SOLV M2 0dnf1.01.28w`b)nP -_юݵz\SXox86_64noarchcvebugzillai6863finalpackager@almalinux.orgselfrhsa9:20200406-26.el9_21:7.1.8.1-11.el9.alma 2.el9_3.alma4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 8.el9_1.almaModerateImportant6.2.2-7.el9_5.alma.10-1.el92.el9_45.el9_4Copyright 2024 AlmaLinux OS 5 AlmaLinux OS 3 AlmaLinux OSkernel-doc4.10.0-98.el9_7.4586.el9_6.7kernel-debug-devel-matched vel -matchedperfkernel-headersrtla8cf767d6rv2.28-13.el9_6.alma.14.el9_610.5.0-7.el9_5.alma.10.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.1Copyright 2022 AlmaLinux OSwebkit2gtk3 -devel jsc-develnodejs9.5.0-7.el9_3.alma.113.3.1-2.2.el9_54.2.1-1.3.el9_5firefoxthunderbird8.0.13-2.el9_020-3.el97-1.el9_130-1.el9_23.el9_65.el9_71.14-1.module_el9.2.0+24+ca6bd7c227-1.module_el9.3.0+53+44872dd130-1.module_el9.5.0+131+62ecd6872-1.module_el9.5.0+156+9f1cd3fd2.25-1.module_el9.5.0+132+adb0ae7a8-1.module_el9.6.0+165+cf879a7c30-1.module_el9.7.0+205+fe410f103.19-1.module_el9.6.0+166+f262c21c26-1.module_el9.7.0+197+324afee89-1.module_el9.7.0+206+f4fec7f311.5.0-5.el9_5.alma.1nodejs-docs1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_0firefox-x118.5.0-7.el9_19.0.0-10.2.el9_25.14.0-70.17.1.el9_0 22.1.el9_0python3-perf17:6.2.0-11.el9_0.37.0.0-13.el9python3-devel17:8.0.0-16.el9_3.alma.12.0-11.el9_4.49.0.0-10.el9_5Copyright 2026 AlmaLinux OS17:7.2.0-14.el9_2.5.alma.140.7-19.el9postgresqlnpmpython3.11-devel libs1:1.8.0.342.b07-1.el9_0nodejs-full-i18npodman-docker3.79.0-17.el9_190.0-4.el9_36.el9_3python-unversioned-command15.10-1.module_el9.5.0+126+03d48c9f2-1.module_el9.5.0+140+e3f03d9d4-1.module_el9.6.0+176+c508cfa25-2.module_el9.7.0+203+960b74c03-1.module_el9.2.0+32+f3c125b55-1.module_el9.3.0+52+217339196-1.module_el9.3.0+55+d62f47798-1.module_el9.4.0+111+667b9e9e6.10-1.module_el9.6.0+174+80cb77f01-1.module_el9.7.0+202+21427d8a4-1.module_el9.4.0+109+624ac33a8-1.module_el9.5.0+141+f4b0f9b75.15.9-10.el9_41.el9_67.el99.el9nodejs-nodemon4.12.2-14.el9_6.1522.el9_7.11.66.1-2.el9_2golang-docsmiscsrctests3:10.11.10-1.module_el9.5.0+135+c9657a87 5-1.module_el9.7.0+199+a988ea015.16-2.el9_0libcurl-develphpnodejs-packaging-bundlerlibsopenssl-devel2.31.1-3.el9_19.1-1.el93-1.el9_243.5-1.el9_47.1-2.el9_63-1.el9_64.12.2-1.el9_5.3ruby4.10.0-43.el955.el9_3.2.alma.162.el9 _4.34.alma.1576.el9_5.4.alma.1dotnet-hostnetstandard-targeting-pack-2.1python3.12-devel libs13.20-1.el9_53-1.el9_7nodejs-develpodman-pluginsremotetestsstgresql-contrib plperlython3 tcl rivate-libs server upgrade1.6.1-20.el9_2.1Low3:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6 3.el9_74.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_4buildah-testslibxml2-devel1.22.12-3.el9java-1.8.0-openjdk-javadoc-zippython3-tkinter1:25.0.2.0.10-1.el9.alma.1golang-bin5.14.0-503.38.1.el9_570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 5.1.el9_7 9.1.el9_7libtiff-develpostgresql-test-rpm-macros1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1 8.module_el9.5.0+153+8c633b18.1.alma.14.0-4.module_el9.5.0+154+722f94fd.1.alma.12021.06-4.module_el9.1.0+13+d9a595eago-toolsetrafana1:5.9.1-13.el9_4.3 7.el9_7.19.el9expat-develruby-devellibs1:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.12:3.5.25-1.el98.0.10-1.el9_43-2.el9_35-1.el9_47-1.el9_48-1.el9_49.0.0-1.el9_510-1.el9_63-1.el9_55-1.el9_66-1.el9_6redistigervnc-icons license selinux5.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5krb5-devellibgsredis-devel1:1.20.1-14.el9_2.1.alma.148.4-2.el9.alma2.4.53-7.el9 _1.157-11.el9_4.15.el98.el962-1.el94.el9_6.47.el9_7.3:1.20.1-22.el9_6.2.alma.13.1.4-143.module_el9.3.0+60+5ebc989a5-145.module_el9.5.0+129+9ba7e8b13.1-2.module_el9.4.0+102+68a938530-5.module_el9.7.0+193+581791665-3.module_el9.4.0+115+226a984bphp-bcmathcliommondbagevelembeddednchantffipmgdmpintlldapmbstringysqlndodbcpcachepdogsqlrocesssnmpoapxmlython3.11 -tkinterrubygem-rbs4.16.1.3-27.el9_3gimp-libs1.22.1-2.el93.el9_52-4.el93.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_48-1.el9_522-1.el9_66.6-1.module_el9.5.0+128+1095dce221.01.0-13.el9 4.el921.el9 3.el9_78.0.14-1.el9_56-1.el9_67-1.el9_621-1.el9_6aspnetcore-runtime-6.0 targeting-pack-6.0dotnet-apphost-pack-6.0hostfxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0java-17-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsredis-docgnutls-c++daneevellibsoup-develrubygem-bigdecimalio-consolejsonpsych1:2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.29.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6bind-dnssec-doclicensefence-agents-common ibm-powervsvpc virshhttpd-filesystemmanualjava-1.8.0-openjdk-demovelheadlesssrcpython3-bindskopeo-teststomcat-admin-webappsdocs-webappel-3.0-apijsp-2.3-apilibservlet-4.0-apiwebapps11.0.6-2.el9_02.37.4-21.el9_732:9.16.23-1.el9_0.1 1.el9_2.12 4.el9_3.4 8.el9_4.16 24.el9_5.3 34.el9_7.1 5.el9_15.1.21-1.module_el9.1.0+15+94ba28e48.4.6-1.module_el9.6.0+180+a4e757e57-1.module_el9.7.0+194+73a02de81.18.9-1.el9_19.10-1.el9_23-1.el9_223.6-2.el9_59-1.el9_64.4-1.el9_66-1.el9_65.3-1.el9_75-2.el9_77-1.el9_71.3.0-1.el95.0-2.el9_4.alma.12.36.7-1.el9 _0 1.1238.5-1.el9 _2.12340.5-1.el9 _3.12.5-1.el94.3-2.el96.1-2.el9_43-1.el9_52.el9_55-1.el9_56-1.el9_52.el9_58.1-1.el9_5 62-1.el9_65-1.el9_650.1-0.el9_61.el9_73-1.el9_74-1.el9_73.0.21-37.el940.el9_44:5.32.1-481.el96.0.10-1.el9_08-1.el9_09-1.el9_07.0.0-0.5.rc2.el9_110-1.el9_21-1.el9_22-1.el9_23-1.el9_27-1.el9_29-1.el9_28.0.0-2.el9_31-1.el9_32-2.el9_3pg_repackauditostgres-decoderbufsql-docs private-devel server-devel tatic test upgrade-devel16.6-1.module_el9.5.0+127+50ff03a92:4.2.0-7.el9_15.14.0-162.6.1.el9_1284.11.1.el9_2 25.1.el9_270.30.1.el9_06.5.1-1.el9_12-6.el9_2.alma.17.12.1-11.el9_7.343.0-13.el9_3cups-develedk2-ovmfglibc-develruby-default-gemsgem-bundlerirbminitestpower_assertrake doc exml sstest-unit ypeprofs-devel1:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.1aspnetcore-runtime-7.08.0 targeting-pack-7.08.0dotnet-apphost-pack-7.08.0hostfxr-7.08.0runtime-7.08.0sdk-7.0 8.0targeting-pack-7.08.0emplates-7.08.0golang-raceopenssl-perltigervnc-server-minimalodule1.12.0-13.el9_25.el9_1.123.1-3.el9_3.3.alma.16.alma.18.el9 _4.34.1-1.el9_5.18.el9_69.el9_65.0-6.el9_73.2.3-5.el97.6-12.el9_08.el9_123.el9_3.348.3-4.el9_46.el9 _6.2ruby-bundled-gems1.17.12-1.el9_09.9-2.el9_220.11-11.el9 7.el9 9.el924.el9 6.el9 8.el9_631.el9_6 2.el9_72-1.el9_32.el9_34.el9_31.11-1.el9_43-3.el9_44.el9_49-2.el9_47.0-8.el99.el9:9.0.62-11.el9_2.3 37.el9_3.1287-1.el9_4.12 2.el9_5.1 3.el9_6.13 6.el9_7.12.24.0-2.el9_5.alma.13.0.4-160.el9_07-162.el9_43.el9_54.16.4-101.el9 3.el9_17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.15.14.0-284.18.1.el9_2 30.1.el9_26.0.13-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.14-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_4ghostscript-docrafana-selinuxpython3.12 -tkinterrunc2.9.4-11.el9_6.1:4.2.0-3.el94.1-3.el96.1-5.el97.el9_35.1.23-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_170.26.1.el9_07.76.1-14.el9_0.5apcu-panellibssh-develpam-develunbound-libs1.0.0-10.el9_1.282.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7020.3-8.el9_5.13.1.5-144.module_el9.4.0+101+d58a8d951.11-2.el9 _6.123-5.el9_72-2.el9_2.125-1.el9_37-1.el9 _4.13569-7.el9 _5.1232.1-4.el9_4.342-1.el9_74.el9_75-2.el9 _5.1239-1.el9 _6.1224.31-5.el9bind-chrootdnssec-utilslibsutilscontainernetworking-pluginsfence-agents-compute kubevirtvirt d -cpg libvirt multicast serial tcphttpd-coredeveltoolsjava-11-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs21-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsmod_ldapuaproxy_htmlsessionslysqlphp-pecl-apcu -devel rrd xdebug3 zipsquid141-1.el9.alma.12.0.32-5.el9_442.6-3.el94.el9_4emacs-filesystemipa-client-commonommonselinuxrver-common dnspython3-ipaclient lib server12.1.5-1.el9_2.1.alma3.alma.12.5-3.el9_3.2.alma.15.0-1.el9.alma.1 _6.23.0.0-1.el9_7.13.5.3-3.module_el9.7.0+187+2286ff0a2:9.18.29-1.el9_5.1 4.el9_6.2 5.el9_7.28.0.43-1.el9_64-1.el9_79.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_6aspnetcore-runtime-dbg-8.0dotnet-runtime-dbg-8.0sdk-dbg-8.0mariadbysql-commonerrmsgosbuild-composer-coreworker0.5.4-1.module_el9.1.0+8+503f6fbd1.16.2-19.el9_6.13.5-1.module_el9.1.0+8+503f6fbd0.2-11.el9:22.13.1-1.module_el9.5.0+139+092964915.0-1.module_el9.6.0+164+2d89b8ed6.0-1.module_el9.6.0+170+f035de7822.0-1.module_el9.7.0+208+fb06c0ab4.13.0-1.module_el9.7.0+209+ecf6523e7.2-10.el9_41.el9_5.124.el9_6.26.el9_1.18.el9 _2.13.0.1-41.el9_02.41-5.el9_7.14-3.el9_7.1:4.9.4-0.1.el98.2.2637-16.el9_0.233.4.8-1.el94:4.9.4-10.el9_4 3.el9_4 6.el9_43.el9_44.el9_45.el9_45.2.2-13.el9_59.el9_55:5.4.0-10.el9_6 2.el9_6 3.el9_66:5.6.0-11.el9_7 4.el9_76.el9_77.el9_79.el9_7flatpak-libsreerdp-libsglib2-develstreamer1-plugins-bad-freegood-gtkiperf3libwinprpcp-devellibs-develtestsuiteoppler-cppglibqt5qt5-qtbase -devel examples gui mysql odbc postgresql rivate-develsqlite-develystemd-develvarnish0.4.31-7.el9_41.0.9-9.el9_712.8-1.el99-1.el9_43.el9_4 58.1-3.el94.el9_4:1.48.10-2.el9_5.alma.1 5.el9_56.16.0-1.el9_07.1-1.el9_08.1-3.el9_19.1-1.el9_2 2.el9_220.1-1.el9_22-3.el9_2 4.el9_3 8.el9_42.0.90-6.el9_17.el919.1-1.el9_650.7-1.el9_2.152-55.el9_7.7.alma.1:2.11.2-1.el97-1.el9_7.124.1-5.el95.15.9-2.el9_7.1autocorr-af bg ca s da e sb el n s fa i r ga hr sb u is t ja ko lb t mn nl pl t ro u sk l r v tr vi ro zhcups-filesystemedk2-aarch64ghostscript -tools-dvipdffontsprinting x11impt-allcore-docemailguiinstaweblfssvnkweblibc-doclibreoffice-data opensymbol-fonts ure-commonmysql-servernginxperl-Git-SVNython3-lib389qemu-guest-agentimgkvm-audio-pa block-curlrbd common re device-display-virtio-gpu"-pcivgausb-hostredirect ocs tools ui-egl-headless openglpr-helperruby-docxorg-x11-server-Xdmxephyrnestorgvfbwaylandcommon3.14.0-13.el96.el97.el9_76.2-10.20210508.el97.2.11-1.module_el9.6.0+188+92104ce8rubygem-mysql2-doc11.3.5-1.el9_0.1:2.3.16-11.el9_4.1 7.el96.0.108-1.el9_076-2.el9_2.alma8.0.103-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_430-3.el9_02-1.el9_26-1.el9_341-2.el9_5emacs-commonlucidnoxgnutls-utilsrafana-pcpipa-client -epn sambaserver -trust-adlibvirt-clientdaemon-config-networkwfilterdriver-interfacenetworkodedevwfilterqemusecrettorage-corediskiscsilogicalmpathrbdscsikvmlibsnssmariadb-backupcommonembedded rrmsggssapi-serveroqgraph-enginepamserver-galerautilsopen-vm-tools -desktopsdmptestssh-askpasspam_ssh_agent_authrepokey:type:idubygem-mysql2pg -doctoolbox-testsvim-X11commonenhanced0.30.0-6.el98-22.el9_61.03-481.el916.2-2.el93.el9 _3.159.3-2.el9_032.9-1.el9_55.4-1.module_el9.4.0+75+1a8fe981:1.12.20-7.el9_12.16.20.2-1.el9_28.12.1-1.module_el9.1.0+16+91bc168f4.2-2.module_el9.2.0+29+de583a0b 3.module_el9.2.0+30+e33124936.1-1.module_el9.2.0+31+cbae0c8e7.1-1.module_el9.2.0+36+853e48f58.2-2.module_el9.2.0+43+3ebc9e209.1-1.module_el9.3.0+59+28b9564420.2-2.module_el9.4.0+99+a01f76764-1.module_el9.4.0+112+bb28ff816-1.module_el9.5.0+136+92f38f3c20.11.1-1.module_el9.3.0+88+29afeaa22.2-2.module_el9.4.0+100+71fc95286.0-1.module_el9.4.0+107+dbd477e48.2-1.module_el9.5.0+137+381f3eaf9.1-1.module_el9.6.0+163+d268fe532-1.module_el9.6.0+169+c9cb05c220.0-1.module_el9.7.0+207+845738102.40-21.el9_7.15.2-9.el9_56.1-8.el9_67.0-10.el9_7:21.11.2-1.el9_13.11-2.el9_5avahi-glibc-ares-develfrr-selinuxgstreamer1-plugins-base-develkeylime-selinuxlibpq-develvpxxslt-develnet-snmp-agent-libs devel libsginx-all-modulesfilesystemspr-devels-develsoftokn -devel freebl-develutil-develprotobuf-literubygem-raccwireshark-cli0.40.0-6.el9_31.0.10-6.el9.28-4.el91.34-13.el9_69.el9_5.128.4-6.el92.0-6.el9_17.el9_22.12-4.el9_646.5-3.el97.0-12.el9_33.11-1.el95:6.2.0-13.el92.3.4-28.el968.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el92.0-10.el9_6.122.el9_7.1358.el9_5.2303.2.1-10.el934.1-6.el9_17.el9_38.el9_69.el9_75.13-10.el98.el9_16.0-12.el9_79.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_789-ds-base -libs4.34.0-17.el9_15.0-4.el9_36.el9_34.0-10.el92.el9 _4.13.el9_6.25.el9_7.22.el95.el9_17.el98.el9_26.2.17-1.el9_58-1.el9_620-1.el9_62.el9_77-1.el9cups-clientipptoollpdprinterappfrrgit-coreredential-libsecretdaemonsubtreelibc-headerslocale-sourceutilslibreoffice-base calc ore draw emailmerge filters gdb-debug-support raphicfilter tk3 help-arbgncasdaezelnostufirgluheiruidtjakoltvnblnplt-BRPTrousiklvtarukzh-Hanst impress langpack-afrsbgnrcasydaezelnostufairygaluheiruidtjakknoltvmailrnblnrsoorpalt-BRPTrousiklrstvtaehnrsukvexhzh-Hanstu math ogltrans pdfimport yuno ure wiki-publisher riter x11 sltfilter kitswanmod_http2open-vm-tools-salt-minionsamba-clientkrb5-printingvfs-iouringwinbind-clientskrb5-locator exe3.0.1-1.module_el9.2.0+36+853e48f55.32.1-481.el9libarchive-devel0.7.0-3.20211109gitb79fd91.el9996-3.module_el9.6.0+152+8cbce00c.41.02-481.el99-481.el97.0-1.module_el9.3.0+52+217339199.7-1.Final.module_el9.3.0+52+2173391901-1.el9.alma.12.el9_4.alma.12.12.0-1.el9_2.alma3.0-2.el9_2.alma4.0-1.el9_2.alma5.0-1.el9_2.alma1-1.el9_2.alma8.0-2.el9_1.alma15.11.0-1.el9_4.alma.13.0-3.el9_4.alma.16.0-1.el9_3.alma7.0-1.el9_3.alma8.0-1.el9_3.alma8-2.el9_5.alma.1.2-1.el9_5.alma.128.10.0-1.el9_5.alma.16.alma.11.0-1.el9_6.alma.12.0-1.el9_6.alma.12.0-1.el9_4.alma.13.0-1.el9_4.alma.132-1.el9.alma.1.2-1.el9_6.alma.12.el9_6.alma.140.3.0-1.el9_6.alma.16.0-1.el9_7.alma.17.0-1.el9_7.alma.19-3.el9_7.alma.36.0-1.module_el9.4.0+66+eb9878bc2.4.0-1.Final.module_el9.4.0+66+eb9878bc7.0.20070801-24.module_el9.6.0+152+8cbce00c021.06-4.module_el9.3.0+88+29afeaa25.0+139+09296491:8.2.2637-20.el9_1 1.el9 2.el9_6.1 3.el9_73.5.3-2.el9_06.0.109-1.el9_010-1.el9_07.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_28.0.100-2.el9_31-1.el9_32-2.el9_314-1.el9_56-1.el9_67-1.el9_621-1.el9_6aspnetcore-runtime-9.0dbg-9.0 targeting-pack-9.0dotnet-apphost-pack-9.0hostfxr-9.0runtime-9.0dbg-9.0sdk-9.0 aot-9.0 dbg-9.0targeting-pack-9.0emplates-9.0flatpak-selinuxgaleralib2-docvisor-tap-vsockipa-selinux-luna nfastkeylime-baseregistrartenantverifierlibreofficevirt-daemon-commonlockgplugin-lockdroxynginx-coremod-http-image-filterperlxslt-filter mail streampam-docscp-docodman-gvproxyython3-jinja2keylimeunbound.11-urllib3qt5-qtbase-commonunbound0.11.0-7.el93.71-11.el9_4 2.el921.1-1.el95.13-14.el9_75-1.module_el9.4.0+75+1a8fe9818-15.el920.el91.0.31-8.el91.0-19.module_el9.6.0+152+8cbce00c23-481.el98.7-11.el9_2.17.el9_45.1-19.el921.el9_52.el9_55.el9_66.el9_64-1.el9:3.0.1-43.el9_0 7.el9_17-16.el9_225.el9_3 7.el9 8.el9_46.el9_22.2-6.el9_5.14.10-4.el9 6.el9 8.el9_7.15.1-4.el9_77.el9_72.1.3-4.el9_12.10-12.el9_0.24.5-8.el9_49.el9_47.0-11.el9_7.3024.3-3.el9_45.5-1.el950-12.el9_1.1 32-32.el9_4.alma.1:2.99.8-3.el9 4.el9_356.23.0.4-1.el9_7.12340.3-2.el9_6.13.1.1-2.el9_4.1 5.15.3-5.el9_66.el9_69.10-3.el9_04.16.0-8.el9_19.el95.2.5-8.el9_06.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.17.1-10.el9_67.2.10-1.module_el9.6.0+173+efaf92056-1.module_el9.5.0+130+36ae76357-1.module_el9.5.0+134+2e6456008-1.module_el9.6.0+168+b8d8e900LibRawbinutils-develcups-filters-libsdbus-develflac-libsgdk-pixbuf2 -devel modulesstreamer1-plugins-bad-free-libsharfbuzz-devel iculibX11-develxcbpm-develasan8blockdev -crypto dm fs kbd loop vm-dbus mdraid path nvdimmme part swap utilsjpeg-turbo -develnbdtasn1-develpmswebp-developenexr-libsjpeg2rpm-ostree-libszziplib1.12-481.el920.1-1.module_el9.1.0+15+94ba28e42.0.3-4.module_el9.4.0+65+49ff6472021.06-4.module_el9.6.0+162+8dc602e53.1.4-1.module_el9.1.0+15+94ba28e46.1-5.el911.2-1.el9_423.1-1.el9_5bsdtarflatpak-session-helperreerdpglib2-testshaproxylibvirt-client-qemumod_auth_openidcysql-libsopentelemetry-collectorpcp-confexport-pcp2elasticsearchgraphiteinfluxdbjsonsparkxmlzabbix zabbix-agentgeolocateuiimport-collectl2pcp ganglia2pcp iostat2pcp mrtg2pcp sar2pcppmda-activemq pache bash cc ind2 onding pf trace cifs sco dbping enki m ocker s389log elasticsearch farm gfs2 luster pfs sd hacluster proxy infiniband json libvirt o msensors ogger ustrecomm mailq emcache ic ongodb unts ssql ysql named etcheck filter ws fsclient ginx vidia-gpu openmetrics vswitch racle pdns erfevent odman stfix gresql rabbitmq edis sctrl oomtemp syslog samba endmail hping lurm mart nmp ockets tatsd ummary ystemd trace unbound weblog zimbra swapselinuxystem-toolszeroconferl-PCP-LogImport Summary MMV PMDAgvectoroppler-utilsython3-pcpqemu-kvm-block-blkiosystemd-journal-remotev8-12.4-develarnish-docs2.27-481.el95.15.3-1.el99-1.el9fence-agents-amt-wspc-snmp bladecenterrocade cisco-mdsucs drac5 eaton-snmpmersonps heuristics-pingpblade ibmbladefmiblo-moonshotpssh2ntelmodularpdumilan lpar mpath rhevmsab sbdcsi vmware-restsoap wtipostgresql-jdbcython3-protobufrequests+securityocksrsync-daemonyajl0.0.99.3-10.el9_2 5.el9 9.el94-6.el9_35-2.el9 5.el92-1.el9_61.0.9-1.el91.6-3.el9_62.22-4.el9_52.3-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.8-1.module_el9.2.0+22+096537937.0-1.module_el9.2.0+22+096537939.7-1.Final.module_el9.2.0+22+096537930.2.6-11.el9_63.el9_64.el9_67.el9_78.el9_74.el97.el9_59.el9_52.10.0-1.el9_1.alma1.0-2.el9_2.alma4.0-1.el9_0.alma9.0-3.el9_1.alma15.10.0-1.el9_3.alma.12.0-1.el9_4.alma.14.0-2.el9_4.alma.13.1-1.el9_2.alma.14.0-1.el9_2.alma.15.0-1.el9_3.alma.19.1-1.el9_3.alma.128.10.1-1.el9_6.alma.13.0-1.el9_6.alma.14.0-2.el9_6.alma.13.1-2.el9_4.alma.14.0-1.el9_455.1-1.el9_56.0-1.el9_57.0-1.el9_58.0-1.el9_59.0-2.el9_540.4.0-3.el9_6.alma.15.0-1.el9_7.alma.18.0-2.el9_7.alma.1:1.27.0-2.el99.1-1.el931.3-1.el9 2.el9_34-1.el9_35-1.el9_32.14.14-1.el94.53-7.el9_1.157-11.el9_4.1 5.el9 8.el962-1.el9 4.el9_6.4 7.el9_7.33.26.1-1.el9_7.12.0.3-4.module_el9.1.0+15+94ba28e46.0+151+5f31e57685-14.el9 _3.15.el99.6-2.el9_6:1.11.2-0.1.el93.3-1.el9 3.el9_3 4.el9_34.3-0.1.el9 2.el9_4 3.el9_45-1.el9_4 2.el9_46.1-1.el98.1-1.el9_6 2.el9_620.0-2.el9_733.10-1.el9_46-2.el97-1.el9_4 2.el9_4 3.el9_4 4.el9_49-1.el9_47.2-1.el95-1.el9_56-1.el9_59.4-1.el9_6 2.el9_641.6-1.el9_78-1.el9_7 2.el9_79.2-1.el92.99.8-4.el9_63.2.2-2.module_el9.4.0+65+49ff64723.1-1.module_el9.6.0+151+5f31e57666-10.el9_62.el9_689-ds-base-snmp5.72-2.el96.0.113-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_41.0-2.module_el9.6.0+151+5f31e576:0.8.5-2.el9_67.0.114-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.6-2.el9_719.2.10-16.el9_4.alma.17.el9_49.el9_41.13.0-1.el9_0.almaavahi-toolsbind-dyndb-ldap9.18-chroot dnssec-utils libs utilsdnsmasq-utilsfence-agents-aliyunlwszure-arm gce kdump openstack redfishgstreamer1-plugins-base-toolsha-cloud-supportipa-client-encrypted-dnsserver-encrypted-dnsluamariadb-develembedded-develtestnet-snmp-perl utilsginx-mod-develss-sysinittoolsphp-pecl-redis6ython3-net-snmptornadosudo-python-pluginweldr-clientireshark0.10.4-11.el93.el95.el9_677.el9_720.2-6.el95.11-143.module_el9.3.0+60+5ebc989a 5.module_el9.5.0+129+9ba7e8b15-3.module_el9.7.0+184+e2e360726.1-13.el9_2.alma7.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669.1-3.20211126git1ff6fe1f43.el9_25.20211126git1ff6fe1f43.el9_69.9-5.el91.0.8-10.el9_510.0-11.el93-481.el97.1-5.el9_2.19.1-1.el92.el9_44.el9_12.0-11.el90.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_62.1-2.el9_34.el93.3-10.el9 _2.148.2-5.el95.30-14.el9_7.17.3-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669.0-7.el9_2.alma.18.el9_59.el9_6:0.9.72-5.el91.1.1k-5.el9_6.142.0-2.el9_42.0.7-6.el92.0.15-32.el9_520-2.module_el9.2.0+29+de583a0b6-4.el9_31.0-22.el90.4-9.el935.2-42.el967.el9_7.14.0-7.el98.el99-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_6 7.16.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b17.0-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b11-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b2-5.module_el9.7.0+193+581791669.13-10.el9_61.el9_62.el9_64.el9_73.el9_1 2.15.el9_36.el9_4 5.12:1.6.37-12.el9_7.13.0.1-1.module_el9.3.0+47+c33bc2885.0+125+8dc388701.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669-2.el9_64.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669-10.el9_2.alma3.el9 _5.14.el9_7.14.0.4-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15.1.2-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791664.0-5.el97.76.1-19.el9 _1.1223.el9 _2.1246.el9 _3.239.el9_4.135.el9_7.38.3.1-11.el9_3.2.alma.1alma.15.el9 _2.2.alma5.3-4.el9CriticalOpenIPMI-lanserv ibsapr-develutil-bdb develbrotli-develzip2-develcjoseompat-openssl11rosynclibyrus-imapd-libse2fsprogs-develfreeglut-develtype-develibidi-develgcc-toolset-13-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel 4-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel 5-binutils-develmp-c++develstreamer1 -devel plugins-ugly-free rtsp-servertk3-devellassoibasanblkid-develcap-develom_err-develfastjsongccjit -develrypt-develicu-develnputtm-develjoselouismicrohttpdount-develpng-devel15qbuadmath-develrabbitmqsvg2-develsndfiletdc++-develubsandisks2uid-develvldpd-develmotif-develpg123-libsunge-libsncurses-c++-libsdevelorc-develperl-devellibsixman-develmix-develpmiqt5-qt3d-develraptor2epokey:type:strpm-develust-std-staticspeextbb-develexlive-libusbguardwavpackxz-develyelp-libs0.03-481.el94.8-7.el9_76.2-1.module_el9.5.0+120+4533eb202.module_el9.6.0+167+4e5611461.0.2-2.el95-481.el96-481.el97-481.el91.0-3.el91-481.el931-481.el97-481.el94.8-2.module_el9.5.0+119+18833d0320+4533eb205.1-1.module_el9.5.0+127+50ff03a96.0+146+c54fdeca2.25.1-10.el9_67.el9_29.el9021.06-4.module_el9.3.0+48+1cf146a15.module_el9.7.0+207+8457381030524-3.el9 4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.32.3.1-4.el96.4.20-1.module_el9.5.0+135+c9657a873.12.33-160.el9_0 2.el9_4 3.el9_55-3.el93.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b15.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791669-2.module_el9.4.0+102+68a938535.74-481.el965.5.1-2.el9_4.14.el9_68.23904002024040318301360020250317151939NetworkManager-cloud-setuponfig-connectivity-redhatdispatcher-routing-rulesovspppbpftoolcloud-initockpit-packagekit cpstoragedups-filtersdbus-daemonx11elveovecot-mysqlpgsql igeonholepdk-develoctoolsfence-agents-nutanix-ahvreeradius -devel oc krb5 ldap utilsgnupg2-smimeidm-pki-acmebasecaestjavakraservertoolsputils-ninfodkernel-abi-stablelistscoreross-headersdebug -core modules-extramodules-extratools -libs-devellibX11-commonblockdev-plugins-all toolsguestfs-winsupportjpeg-turbo-utilsnbd-bash-completiontasn1-toolssan2mecab-develipadic -EUCJPod_jkproxy_clusteruttysql-develtest -datanbdfuseopenexrpki-jackson-databindython3-blockdevfreeradiusidm-pkijwcryptolibnbd.11-setuptools-wheel 2-cryptography setuptools urllib3qemu-kvm-device-display-virtio-gpu-gl#pci-glvga-glt5-rpm-macrossrpm-macrosrapidjson-develpm-ostreesssd-idpysstatvim-filesystemminimalxterm-resizezziplib-utils2021.06-4.module_el9.5.0+124+df88fe4936+92f38f3c3.0.1-1.module_el9.5.0+136+92f38f3c9+09296491rapidjson-docepokey:type:flexarray0.10.4-5.29.el9_2 30.el9_2 4.el9_3.3 8.el9_4.14 45.el9 7.el9_7.alma.127.0-1.el9_62.el9_635.0-2.el9_73.el9_76-103.el9_6.2.0-1.el99-481.el92.2-2.el97-3.el93-481.el95.11-144.module_el9.4.0+101+d58a8d957-160.el9_02.el9_43.el9_565-481.el91.15-481.el9.19-3.el9_1.55.el9_3.16-481.el98-481.el99.9-1.el9_22.10-2.el91-32.el9_049-1.el9_450-1.el9_4.10-481.el91.1-8.el9_424.1-2.el9_55.2-1.el9_78-481.el93.20-1.el9_42-1.el9_6.10-481.el9401-481.el94.8-1.module_el9.3.0+52+217339194.0+66+eb9878bc3-481.el97-481.el98-481.el97.4.1-6.el9_6.18.10-2.el9.alma0-481.el99.5p2-10.el9_36.17.el9_1.14-481.el90.112.10.0-2.el9_1.alma1.0-1.el9_2.alma3.0-3.el9_0.alma6.el9_0.alma7.el9_0.alma5.0-1.el9_1.alma2.el9_1.alma6.0-1.el9_1.alma2.el9_1.alma7.0-1.el9_1.alma1-1.el9_1.alma2.el9_1.alma9.0-1.el9_1.alma1.9-10.el9_4.alma.18.el9_3.3.alma.19.el9_4.alma.15-6.el9_1.10.0-2.el9_3.alma.12.1-1.el9_4.alma.14.0-1.el9_4.alma.13.1-1.el9_2.alma4.1-1.el9_2.alma5.0-1.el9_3.alma9.0-1.el9_3.alma.12.5.4-5.el97.el98.13.0-3.el9_6.alma.14.0-3.el9_6.alma.13.1-1.el9_4.alma.14.0-1.el9_4.alma.15.alma.15.0-1.el9_5.alma.16.0-3.el9_5.alma.17.0-1.el9_5.alma.18.0-2.el9_5.alma.19.0-2.el9_5.alma.12-1.el9_5.alma.14-2.el90.4.0-2.el9_6.alma.1:4.99.0-9.el9:0.79-8.1.el9_61.2.0-1.el93.0-4.el96.el9_34.0-2.el9_43.el9_44.el9_45.el9_46.el9_45.1-2.el96.2-2.el9_60.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644 20.11.1.1.module_el9.3.0+88+29afeaa25.0-1.18.20.2.2.module_el9.4.0+99+a01f7676 20.12.2.2.module_el9.4.0+100+71fc95287.0-1.18.20.4.1.module_el9.4.0+112+bb28ff818.1-1.20.16.0.1.module_el9.4.0+107+dbd477e42-1.18.20.6.1.module_el9.5.0+136+92f38f3c 20.18.2.1.module_el9.5.0+137+381f3eaf9.1.1.module_el9.6.0+163+d268fe532.1.module_el9.6.0+169+c9cb05c220.0.1.module_el9.7.0+207+845738109.2-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de784-1.22.22.0.1.module_el9.7.0+208+fb06c0ab2.4.26-1.el9_7.18.11.0-1.16.16.0.1.el9_05.0-1.16.17.1.1.el9_09.2-1.16.18.1.3.el9_1 8.12.1.1.module_el9.1.0+16+91bc168f3-1.16.19.1.1.el9_22.el9_24-1.16.20.1.1.el9_22.1.el9_23.el9_24.el9_38.el9_49.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b3.module_el9.2.0+30+e33124931-1.18.16.1.1.module_el9.2.0+31+cbae0c8e6.7-1.18.17.1.1.module_el9.2.0+36+853e48f58.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e202.0.26-1.el92.el9_4.14.el9_6.11.0-21.el94.0-1.el92.10-12.el9_0.38-4.el9_53.3-2.el9_05.el9_74.10-1.el9 _6.127-3.el9_1.222-1.el93.el9_39.4-4.el91-3.el95.1-160.el9_02.el9_43.el9_56-21.el9_3.alma.1-144.module_el9.4.0+101+d58a8d957.0-144.module_el9.4.0+101+d58a8d958.14-1.el9_7.19.4-6.el9_47-4.el9_7.10210202-11.el9_6.131.1.3-3.el97.el92.1.9-2.el95.el93.2.7-1.el93.el9_64.el9_65.el9_76.4.14-1.el9_2.alma.120-1.el9_52-1.el9_6:1.14.0-1.el92.1.7-1.el9_23.0.0-160.el9_02.el9_43.el9_55-6.el9_7.21.1-144.module_el9.4.0+101+d58a8d952-4.el9_32.0-1.el92.el9_33.el93.2-160.el9_02.el9_43.el9_54.1-2.el9_44.el9_4 55.3-4.el96.1-1.el92.el9_64.el9_71-2.el9_75.12-4.el9_65-4.el99-1.el97.0.2-6.el9:12.4.254.21-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de7822.0.1.module_el9.7.0+208+fb06c0ab3.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e4.0.4-144.module_el9.4.0+101+d58a8d9512-1.el9 _3.1.alma.12.el9_4.1 alma.16.5-3.el99-2.el9_24.el9_20.0-11.el9_610-21.el91.0.7-2.el9 _6.1:1.1.12-1.el9_3 2.el9 3.el9_4 4.el9_43-4.el94-1.el99-1.el92.el9_32.5-3.el9_63.0-4.el9_74.0-2.el9_75.1.1-1.el91.el9_62.el9_3.alma.1 4.alma.13.el9_49.el9_54.2-4.el9_0.34-2.el9_13.el9:2.2.6-1.el92.el96.1.0-9.el94.2-1.el9_52.el9_6.2:0.7.3-3.el9_4.alma.14.el9_4.alma.15.el9_4.alma.18.5-1.el9_57.5.11-5.el9_05-3.el9:5.2-1.el9_0.125-13.el9_44.el9_5.322.el9_7.15.el9_2.16.el9_3.12588.2.2-4.el947p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.19.0.9-2.el93.el9_2.alma4.el9_2.alma.12-1.el92.el9_2.10-7.el9_3.alma.18.el9_3.alma.105002024100414370450204093711 1404284360020250317150833 10301455171.11.0-2.el9_0.alma2.0-2.el9_0.almaNetworkManager-libreswan-gnomeaardvark-dnsidensible-coretestpr-util-ldap mysql odbc penssl pgsql sqlitevahi-autoipdbcc-toolsluez-cupsobexdootcupdpftraceutanecargolippyonmonppurl-minimalyrus-imapd -utilsdotnet-sdk-6.0-source-built-artifactsexpatfwupd-plugin-flashromgcc-c++gfortranoffload-nvptxplugin-annobintoolset-13-binutils-goldgcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx 4-binutils-goldprofnggcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx 5-binutils-goldprofngdb-gdbserverheadlessminimalnome-remote-desktopshello-filesystemrpm-macrospsd-minimal -clientstk-update-icon-cache3-immodule-ximuestfs-toolsvisor-tap-vsock-gvforwardericugnitionmage-builderjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug1-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug7-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug25-openjdk-crypto-adapterdemovelheadlessjavadoc-zipmodssrctatic-libsosekeepalivedylime-agent-rustlibarchivebpf-toolscurl-minimalgomp-offload-nvptxuestfs -appliance rescue sync xfsinput-devel utilslsanrabbitmq-toolssvg2-toolssndfile-utilstdc++-docstsanvirt-ssh-proxymingw-binutils-genericod_mdsecurity -mlogcpg123-plugins-pulseaudioungeoci-seccomp-bpf-hookpenssl-libsrc-compilersbuild-composer-dnf-jsonpcp-export-pcp2openmetricspmda-uwsgierl-BCyrusDevel-PeekynaLoaderErrnoFCGIcntlile-DosGlobGDBM_FileHash-Util-FieldHashI18N-LanginfoONDBM_FileODBM_FilepcodePOSIXSys-Guestfs HostnameTime-Pieceinterpreterlibmrophsignki-symkeytoolsmix-toolsodman-catatonitstfix-cdbldap mdbmysqlpcre erl-scripts gsqlsqlitegis-clientdocsupgrade tilsython3-brotlilasso ibguestfs mount xmltbb.11-cryptographyqatzip-libst5-qt3d-examplesrearpm-buildplugin-fapolicyd ima syslogtemd-inhibitust-analysis zerdoctoolsetfmtsocatwtpm-libstoolsystem-reinstall-bootcd-boot-unsignedtangbb-doccpdumpexlive-bibtexdvipdfmx ng s svgmfontwaregsftopkkpathsealuahbtex texmakeindex etafont post fwarepdftextex 4htxdvi etexracker-minersudisks2-iscsilsm vm2nbound-dracutsbguard-dbus notifier toolsuiddv8-13.6-develalkey-develirt-v2vsftpdwgetxz-lzma-compatyelpzlib-devel0.02-481.el94-481.el96-481.el976-461.el913-481.el95.2-160.el9_0 2.el9_4 3.el9_52.9-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_51.3-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b19-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791665-481.el93.0-2.module_el9.4.0+102+68a938531-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+5817916641.2-3.el9_7.14-481.el960.800-481.el96-481.el97-481.el975-481.el98-5.el9_41.0.0-9.el9_71-481.el94-481.el98-481.el91-481.el9.3-13.el9_64-6.el90-481.el90.600-481.el91.0-2.module_el9.4.0+102+68a938533.1-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791667-481.el92.0-160.el9_01-162.el9_43.el9_51-481.el95-481.el96-481.el9.12-2.el9 _5.125.el9_7.18-2.el9_5.19-1.el9_7.13.5-160.el9_02.el9_43.el9_55-481.el94.0-160.el9_02.el9_43.el9_51-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b103-481.el95.6-2.el91-481.el96-481.el99-481.el97044-14.1.el9_53.0.3-160.el9_0 2.el9_4 3.el9_56-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b11.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+58179166:0.08-481.el921-481.el911.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e2.0.1-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b19-1.el9_020-1.module_el9.1.0+16+91bc168f2.el9_13-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791663-481.el94-481.el911.3-5.el96.el97.el9_58.el9_53-481.el94.1-2.el92.33-160.el9_0 2.el9_4 3.el9_59-3.el93.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b14-481.el941-481.el95.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791669-2.module_el9.4.0+102+68a9385385-481.el9021.06-5.module_el9.7.0+196+ac40ca3b208+fb06c0ab6.module_el9.7.0+198+8bf605ba209+ecf6523e21207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_51.2.3-7.el93.1.1-11.el9.alma.14.4-4.el9_6.3.alma.13.0.1-1.module_el9.6.0+172+f0ba00ec3-3.module_el9.7.0+209+ecf6523e5-481.el92.3-18.el920.el9_5.15-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_56-2.module_el9.4.0+102+68a938533.6-3.module_el9.4.0+115+226a984b7-160.el9_02.el9_43.el9_54.4-5.module_el9.7.0+193+581791665.3-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b16.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791664.6-481.el92.2.18-6.el9_127-1.el98-1.el9_35.14.2-160.el9_0 2.el9_4 3.el9_55.0-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b120.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+5817916639-16.el96.3.3-160.el9_04.1-162.el9_4 3.el9_54.0-143.module_el9.3.0+60+5ebc989a1-9.el9_1.1-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b16.3.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791668.2.2-3.el9_4.15.el9_6bcelgdb-docnome-classic-sessionshell-extension-apps-menuuto-move-windowsclassification-bannerommonustom-menudash-to-dockpanelesktop-iconsrive-menugesture-inhibitorheads-up-displaylaunch-new-instancenative-window-placementpanel-favoriteslaces-menuscreenshot-window-sizerystemMonitortop-iconsupdates-dialogser-themewindow-listsNavigatororkspace-indicatoro-rpm-templatessrpm-macroslibguestfs-bash-completion inspect-iconsncurses-termosbuild-depsolve-dnfluks2 vm2ostreeselinuxperl-App-cpanminusttribute-HandlersutoLoader SplitBenchmarkCPANlass-Structonfig-ExtensionsDBM_Filterevel-SelfStubberirHandleumpvalueEnglishxtUtils-ConstantEmbedMiniperlFile-Basename Compare py Find stat Cache HandlendBinGetopt-StdHTTP-TinyI18N-Collate LangTagsPC-Open3Locale-Maketext-SimpleMath-Complexemoizeodule-LoadedNEXTetPod-Functions HtmlSafeearch-DictlectSaverfLoaderymbolTerm-Complete ReadLinestxt-Abbrevhread -Semaphoreie-File MemoizemeUnicode-UCDser-pwentautousebaselibdebuggerprecateiagnosticsocencoding-warningsfieldsletestiflessibnetcfgocalemacroseta-notationopenverload ingsigtraportubsutilsvarsmsishki-acmebase-javacajackson-annotations core jaxrs-json-providerproviders module-jaxb-annotationskraserverython3-bccfile-magickdcproxylouismakoosbuildpip ki yasn1-modules.11-PyMySQL+rsa pip-wheel 2-PyMySQL+rsa wheelrpm-apidocscronsync-rrsyncust-debugger-commongdblldbsrctd-static-wasm32-unknown-unknownwasisystemd-ukifytexlive-adjustbox e lgorithms phalph mscls fonts math nyfontsize size ppendix rabxetex phic tbegshi tachfile2 veryend uxhook vantgar wesomeboxbabel -english bib se eamer ra ton ibtopic di gfoot intcalc tset ookmanrk tabs reakurl qncapt-of ion rlisle tchfile hangebarpage rter ngcntr ite jk lasspack m -lgc super ap extra ns ollectboxion-basicfontsrecommendedhtmlxmllatexrecommendedxetex orprofiles tbl ntext urier rop squotes tablestack urrfiledatetime ehyphec epic nctex umitem viron psf topdf-pkg qparbox so-pic tex -pkg cmds oc olbox uenc ler ro sym xtsizesfancybox hdr ref vrb ilecontents hook nstrut x2col latvian loat mtcount ncychap ontawesome book s-tlwg pec wrap otmisc notehyper p l ramedgaruda-c90 eometry ttitlestring lyphlist raphics-cfgdef fext filehanging elvetic obsub logo ycolor perref h-utf8 en-baseatexifmtarg oddpage platform tex mport ndex fwarerr tcalcjadetex knapltxkastrup erkis nuth-libocal oma-script vdefinekeys options setkeysl3backend experimental kernel packages astpage tex -fonts 2man bug config etltxmacro trine inegoal no stings ofitems m -math tabptch xcmds misc ua-alt-getopt latex-math ibs otfload tex85base warpmakecmds nfnt-font rginnote vosym thpazo spec tools dwtools emoir talogo flogo-font nfss icrotype nitoc nsymbol odes parhack topdf s ultido rownatbib cctools ntrsbk eedspace wfloat unicodechar orasi-c90 toccite tgclassoberdiek solete verpicpalatino ralist lel skip ssivetex dfcolmk escape lscape pages texcmds gf hilokalia laceins in olyglossia werdot reprint sfrag latex nfss picture t-3d arrow blur coil eps fill grad math node plot slpe text ools ree ricks-add text xfontsqstestragged2e cs ealscripts fcount runfilecheck sfssansmathaccent uerj cheme-basic ection sty minar pnum tspace howexpl oul tackengine maryrd ringenc ubfigure vn-prov ymbolt2 abu lary ex-gyre-math ini-files live-common-docdocindexenmsg-translationsscripts-extra.infra tcase pos hreeparttable umbpdf imes pa tlesec ing ocloft ols ranslator imspaces xfonts ype1cm htmlucharcatlasses s hc lem nderscore icode-datamath quecounter sugar pdmap-map quote rl topiavarwidthwadalab s y -type1 sym rapfigxcolor ecjk olor yr index persian search tex-itranspstrickstibetan config fontinfo ifthen keyval ltxtra mltexconfig string tab unicodezapfchan ding refuned-gtkppdrofiles-atomicmssqloraclepostgresqlspectrumscaleutilsusbguard-selinuxvirt-v2v-bash-completionwin-regxdg-utils1.2424901002022120713184520020230413133347537 511122142 623091417 802112332 927094557 1019054835 261116023002023122112104840124164610 227081546 402085113 114627 906462740020240403183139 510175312 6053207 60610363063337 826124927 8134336 9130124 903074554 1909074450020241004144219 204144523 6140523833 1206590850127065635 214043037 21080435 328124628928 42819310660020250513150515837 4095852 604050441617 729092450 91714314070020251211084025 509390660217124637303491521patch:ALBA-2022:82565:20841SA-2022:49405242495276348252769570916366799904428600343157657422435852185905602103470017638389549136399700713207117828831482369950458967870898003811225476278708906810012263951629472078192126502637919317405361844314449356180637438329065803:00052177194202108253023418218334567894383476608112281024903465134786570106781413376840770592670936701386809798090918207481276125677799320241622346489536789601823933129264057667703841744538788751923327082621633455034531437850245318423325597781567992566171145223923484030576047199158778201325730149504774112629956971634424838955850486971801941436942001424313634345536962532968497081133844953635849679246960771206788912426656324304013663589712805402392093146973482924675081823435942495166970589366315435961779948970732844587253577746550177112547534623456845914:0001102571108415126249656731087463567475335760237057908057114895012637710090218447438447259027025878918586099394950788311112232193842509301494127869503091034764273686285935012330766889175089818225872990840632033557911926325745675696097080493920481137283694566472688799025830233748536687787944103384763504124895019602456897016167972458798423538389103306739619687175482036730145784239559994002507788316521278312497189422395075002637873836234726495567612676986192835513892231793223463925293383693815928999602014676367984678992457356464510296768137265478358489134679771362046034645750550286799588025379110127214762803744467563617788072693800914359051889937811452283564450867801457890234520043778130617253137140451349501246789687023454138523459605258275:005980146761210308122434774226578667739237919124722351007213648899635379550631676998374862773114033541162374884961992200883100872804475196274683143009304286507860273782935624075130814162036936408276278983500710189239942960861700408879006046861081635639859701818070843778412835587426080971495152758132181521491135237345409895849273050203551883890922683564355456789601311101392558046269370281591626682005111753764056607908653034496387109114221041309235636423480359700293944856919500627689798649931072612344406531566173144571373833455259374025169229446344360889166978769779370495067767941079183847603578201412356309137879957402491078922356789301235678404586986007289390337958049126364283293333746787660735435582813737916908010618434575062843023627964301244862526634587780978A00256:005212637238473124223745587091236059467197193914234783236108891432393509778140891029738595617903813392042821262470792276812369992030314667951892918337959repokey:type:relidarray numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistmodule :archcontextnamestreamversionreference:hrefidtitleypeightsseveritytatus o o    {h      "o#o p!p !"#3344%F&F)I*I+P,P2P-P.P  r456748496:6'G(G  $$@@'+(+{C w!w"v#vDuEu77992*+*,*%s&s)O*O-*.*{e 5D9D:Dlliikkjj %t&t2+-+.+',(,)P*P++,+NaOa{f,,//--aa..yyCCy8899::  uuuPP[[&&__XX!!WW``##$$22""ZZTT\\%%^^]]TTVVYY33MMjjHH>>H==]]UUddSS^^[[aaVV\\YYTT__XXcc``bbWWZZ::  ww  vv  ttrruupp    qqssoo  8866447755qq%%!!    $$    ""##99KK@@??ddbb\\ffXXWW``]]SSVV^^jjeeTTaaYY[[__hhggUUZZccii((**""++..&&''$$%%##))OO    5566LLKK  OOLL NNwwvvwvNN00//aa  55ee JJ223311442143``]]__\\^^EE==WWnnoo%%&&OO##$$;;::;;::<<8899ff{{@@yyzzyzoo@@osss    !!  8877   RR555UUnnllkkmmvvuu$$@7766NN~~xxxhhh::iigggjjij7766jjiiijBBB==<<>>;;oofflljjgghhiikkhhBB??@@bbcceeggddffWBBB##$$#$qq??II;;AACCGGEE==<<QQ>>==??@@>>>??vvv"";;99www::ee<<TTUUCC44vv]]II&&iiff\\``GGWW  ""66[[##  //qq^^33llnnQQ}}77cc@@bb**DD99ttMM^^??ooZZ=={{yyFF--KK..kk[[55''wwuu;;xxzzmmZZrr!!pp>>||AAOO$$  ,,\\BB]]jj~~LLSSRR00  %%HHss  ((XXggdd11EE::22NNWWXX  VVhh))YYYYaa__JJPP++88pp8899uuu==999ssttst==gg=))((()SSPPOORRQQNNMMOOPPOOmm::;;:ee;ttoo  xxvvssqqrr  wwwvuuppourpqtsx``--))``,,**((++''RR@@???@ddiiggjjhhbbffcceeEEIIHHDDFFwwGGddFF223311QQ!!  ! II  ___```RRbbPP\\\bFFaa|||kkjjk  jlll>>>''QQ__110099;;==::<<8877```llbbbkkccc**))11vv,,##--..''""((0022$$%%v!!//&&  ++  aaaHHGGrrrKKJJLLIIMMAAAAAUUTTUTUU  VV TT==;;????>><<?gggKKGGIIHHLLOOJJ  TT<<qqllnnkkooppprrqnkrommlmooqqpprrLLLDDBBCCEEFFeefffeCCC@@SSS&&''&%%%'AANN[[OO[hMMMQQQ]]QQ]333776676ccbbcbnn___||yy}}~~{{xxzzBBDD<<>>HH@@JJFF33iihhhi^^^        qq  q  44MM4))DED E _}`}eeemmm##""ccbbbc``KKJJ`  --++,,ooVVVBBkklljjljppk<<zzss<22}}//ll  wwtteeff&&XXff886600{{ccYYZZ44oo!!;;""__yyaaqq**cWWcc''  ee##||\\kk  edd%%ddmm..33$$uu^^  ss  ]]gghh--,,ii77((``jjxx++vv11nn~~bb))rrppfd  [[55zz^^___^bbiiggee__XXjjg[[\\cc]]llfffWWUUkkYY^^ggddTT``aahhSS6677FFDDDnnmm!! 7[8[{{{r[CCC9955[[[eeddePPdBB      AAttAttEE\\]]]\00KKK==yy=zz<<<@@44??EEVVNNMMvvyyttxxwwsszzuurrMM--0011FFFBBAARRSS44,,//2255..33--++**11003322ooo]^11ss~~xx||ww{{}}yyzz88GG}}GttuutuVVhh**333ff4400dd--gg..ee4jj-//22hh/*ii.211kk0,,,1%%###**]][[\\$$*%__""ZZ$&&(("''&``())'YY)^^XXIIRRSSDDXRRDRIJJEETTVV??E77WWJJJ??UUDD?WCC    j { 55_~`~D E DEYY5566Y4477}}o_p_UUqrsltluvqqwlxlpp_>>rrttqqssppSSRqSqPqQqqmmmnn  n>>>::>>??vvuuWW!!XX!GGiihhihSS44CC88;;8"""::;999:DD22 H HzzzDD{ >>ZZIIHH||..77//bb000++66886vv9989--44.,,4111/-7+,5522cc53332aaccbb+++OOO}}||~~{{AAwwxx//..&&**++))'',,--((mmnnll555@@<<NNZZ@NZ==PPPLLaaagDhDiDjDpDqDyDp p p p'   () HHHHH H!H"H H* #x$x%x&x'x+ (R)R*R+RUR,R-R.R/R0R1R2R3RR4R5R6R7R8R9R:R;RR?R@RARBRCRDRERFRGRHRIRJRKRLRMRNROR, PQRSTU- VBWBXBYBZB[B\B. ]U^U_U`UaUbUcUdUeUfUgUhUiUjUkUlUmUnUoUpUqUrUsUtUuUvUwUxUyUzU{U|U}U~UUUUUUUUU/ 000   1  M M MMMMMMMMMMMMMMMMMMM M!M"M#M$M%M&M'M(M)M*M+M,M-M.M/M0M1M2M3M4M5M6M7M8M2 ;d9d:d;dd?d@dAdBdCdDdEdFdGdHdIdJdKdLdMdNdOdPdQdRdSdTd;?;@;8 III I!I"I III9 ABCDEFGHIJKLMNOPQRSTUVWXYZ[\: FSGS(S)SS*S+SBSCSLSMSDSES@SAS.S/SS?S6S7S,S-SJSKS0S1SNSOS; ]~^~_v`va~b~c~d~e~f~gvhvi~j~kvlvmvnvo~p~q~r~< s1t1u1v1w1x1y1z1{1|1}1= mm> mm? ~DDDDDDDDD@ ssssss s sA klijcdopefmnghabqr]^B +K  -(J )Q I I*O%r11'',m#~"+RR!&$]'gC }}}}}}}}D  !{"#$%&'(LE )'*'F <0=00607080900010D0E0G +`,`-`.`/`0`1`2`3`4`5`6`H OOI NNJ 7F8F,F9F:F;FF9F?F@F-FK #%$%L   M A^B^C^D^E^F^G^H^I^J^K^N o}p}mngh]}^}c}d}q}r}kle}f}a}b}i}j}O L"#&'$%( !P { | _ `   a b } ~ g h s t w x ] ^ Q <.O.P.G.H.?.@.A.B.C.D.;.R xxxx!x"x+x,x5x6xxx x x#x$x7x8xS PPT U V ii~iiiW L2M2X DE<=89*+0167Y N O j P Q Z RDSDTDUD[ VW\ X^Y^] Z&[&\&]&^&_&`&a&f&b&c&^ dMeMfMgM_ hBiBjBkBlBmBnBoBpBqBrBsBtBuBBB` v6w6s6a yVzVVViVjVuVvVmVnVaVbVoVpV_V`VVVcVdVqVrV]V^V}V~V{V|VeVfVsVtVkVlVgVhVwVxVVVVVb rAxAyAc zm{m|m}m~mdmmd e ***f P P P P P PPPPPPPPPPPPPPPPPPP P!P"P#P$P%P&P'P(P)P*P+P,P-P.P/P0P1P2P3Pg 4567h 8~9~:~;~<~=~i AAAj +_,_1_2_3_6_._-_/_0_5_4_k WXl >>?>@>A>B>C>D>m 3CECFCGCHCI J KCLC2CMCNCOCPCQCRCS T UCVCn 9O:O;OO-O7O8O9O,Oo W/X/Y/Z/p [4\4]4q ^w_wr HPHQHRHSH`Hs ajbjcjdjt ekfkgkhkikjku klv m$n$w oypyqyx r{s{t{u{v{w{x{y{z{{{|{}{~{{y wwRwwwz @@@@@ @{ -<.<9<:<<<<</<0<1<2<<<<<;<<<<<'<(<<<)<*<5<6<<<%<&<#<$<3<4<!<"<=<><< <+<,<?<@<7<8<<<|  I I I}  uuuuuuuu~  hhhhhhhhh h!h"h #<$< %k&k 'Q(Q )#*# A]+],]-].]/]0] *+01<=6789DE gE yztzsz 123456789:;< =F>F?F N#O#j#P#Q#@# ABCDEF GHIJKL Z[`afbc^_MN\] OPopghQRSTUVWXYZ[\]^ d_`abcdefghij j$@$Q$P$N$O$ RR QQ k)l)m) nopqr LH{ !sHtH&H'H$H%H SS TT sk 1a2a-a.a3a,a6a4a0a5a+a/a efijcdmUnUqr]^kUlUab _ `   ] ^ { | } ~ a b w x s t g h  yyyy y y#y$y!y"y+y,y7y8y5y6yyy ?/@/G/H/O/P/A/B/C/D/;/?@ABC6DEFGHIJK4LMNOPQ!RSTUVWXYZ[\]^_`abcdefghi-jklmnopqrstuvwxyz{|}~(7     , !"##$%&'()*+,-./*0123456789:;<=>?@ABCDEFGHIJKLMNO 0KPQRSTUVWXYZ[\]^_`a&bc+$defghijklmnopqrstuvw8xyz{|}L"~'     # cZ$ L(#{$%"&' !%  S SSSS S S SSSSS& s{t{y{' D,E,,<,=,8,9,0,1,6,7,( EEEEEEE) ~~~~~* %K$K#K+ ^^ ^, !"#$%&- '()*+. ,!-!.!/!0!1!/ VV0 WW1 I P C A 2 3 4 5 B D 6 7 H 8 9 E : ; Q G 2 %RR?R'R@RARBRCR&R3 DxExxx4 xx5 6b.b5b2b-b4b0b/b3b,b1b+b6 jjjj~j7 -0-1-D-E-<-=-6-7-8-9-8 P%Q%j%@%N%O%9 : VW;  < = ='=(===%=&=-=.=+=,=7=8===;=<=)=*===3=4=9=:===>=/=0=!="=?=@===5=6=#=$=====1=2====== MDNDI!J!2DEDFDODPDGDHD3DKDLDQDRDUDVDS!T!> F\G\? H I J K L M N O @ D_E_K_J_G_H_C_B_I_F_A_A DEB PgQgR8S8TgUgVgWgXgYgZg[g\g]g^g_g`gagbgcgdgegfgggh8i8j8kglgm8ngogpgqgC XXD 6.7.D.E.0.1.8.9..<.=.E @SAS%SBSCSS?S'SF 2EGEHE3EMENEOEPEEEFEI"J"UEVEKELES"T"r,s,QEREG tsusvswsxsyszs{s|s}s~ssssssH ,,I s|t|y|J /0/1/8/9/D/E/w?w^ @ABCDEFGH_ IHJH` KdLda akbkckdkb iiiiii!i"iiii ic #=$=d 6745e -d.d/d0d+d,d5d2d3d6d1d4df BQCQ>Q?QG9G:G?G@G7G8Gk b'c'\']'^'_'Z'['f'`'a'l d1e1f1g1m M]S]T]L]Q]P]x]N]O]K]n u*o CABGI89D45E67QP23H:;p UVWXYZ[\q  BBBBBBr ]O^Os  B BB BB B BBBt _u`uu C?D?@?A?B?>???v arbrcrdrerw c[x 7A8AAA'A(AAA#A$A1A2AAA-A.A;AA!A"Ay ftgthtitjtktltmtntotptqtrtstttutvtz w x y { <=z{89DE6701| s}t}y}} |E}E~ 3 4 9 : 5 6 7 8 1 2 ; <  oooo~o RXSX k+l+m+ VW ~~~~~~~~  C CC C C CCCC ~ll  s~t~y~ +e,e4e0e1e2e3e-e.e5e6e/e  !LI$I%I&I'IsItI "# !&'$%(L DE ..... . . . . ............ ~mm MM 45HGBA2389E67IC:;PQD  gg g gg g ggg00g aaaaa /f0f-f.f+f,f3f4f1f2f5f6f && & LJ$J%J&J'J !sJtJ abqrmVnVijcdkVlV]^ef !D"D#D$D%D&D'D(D)D*D &'"#( !L$% ss ssDsEs WXYZ]^QRghOPSTop[\UV P&Q&@&j&N&O& = & -  J / B %  i D  A + ,  Q    y 0 # p y  5  X J   :    ^ ( / K - .  \  6 G #   O l R / 0 \ ( 1 2 E  ;  b I H   g  .  ] 2 ) R  ) c p d w t   { _ H e + + 1 k X T Y C @  E f ! m  g 3 4 , z  A V j V  ; Z [ Q  Z 5 6 h W % k Y v a h J & W ~  x 7 )  Y 2 P 7 8 \ c T  <  i z ' 9 : r ] t x a  s " I   O > ^ q 9 ; < C | ? N * 4 h - 3 | !  C L    b L   P 0 = >  "  e Z N $  b   u   B ? @ -  l O D K > A B o : 8 o } ' ? * =  < >  M [ 5 P U B { @ ( g X  W  C D c & H  7 a $ S  0 L  E F 1 j ~   T  "    ' M V ! [ I G H N f S I r  G 2   J K  4 _  Q F e u ` n ` # < : 4  8 * K 7 9 . .   v  ? 3 L M 8  A ] } G   d E  $ ^ f N O   P Q R S ; F 6 n  s =   5 q @ + U T U  ,  ` U w F _ M S D 9 % / R  , m 3  1 6 d  CC CCCC zt{ttt~ttxtyt|t}tttttutvtwt QQQQ.Q/Q Q Q*Q+Q0Q1Q Q!Q,Q-Q Q QQQQQQQ"Q#QQQ$Q%QQQ2Q3Q(Q)QQ QQQQQ&Q'Q kk~kkk! D E < = z { 8 9 6 7 0 1 " TT T T TT T TTTTT#   $ W%X%% [\ghUVWXYZOPQRST]^op& efcdijabqrmWnWkWlW]^' tt( DtEttt) ;HH?H@H*  { {5{6{!{"{#{${+{,{{{7{8{{{{{+ s t } ~ { | _ ` g h   a b w x ] ^ , A1B1<1O1P1C1D1G1H1;1?1@1- /g0g4g+g,g6g.g1g2g3g5g-g. 7 8 ; < 9 : 3 4 5 6 1 2 / VoWozo{oXoYotouooovowoooZo[o\o]o^o_o`oao|o}o~ookoxoyo0  !LK&K'KsKtK$K%K1 &' !(#"L$%2  ___3 e f 4 yts5 <=DE01z{67896 bcd7 8 DuEuuu9 uu: FFFFFFF; epfpgp< hi jklmno pqrstuvwxyz = OPWX]^UV[\opYZSTghQR> ijkXlXmXnX]^efcdqrab? {|}~9@ vvA vvDvEvB ]5\5[5C DE01<=8967z{D L L LE efcdghabd_`ijF         G m^n^^^g^h^}^~^q^r^]^^^s^t^a^b^u^v^^^{^|^w^x^^^^^_^`^k^l^e^f^o^p^H cdabijkYlYqrmYnY]^efI opYZUV]^Q R g h OP[ \ WXSTJ a k l K wwDwEwL M wwN   O  !&L'L$L%LLLsLtLP DEQ ``R ====J======S *E)E&E'E(E#E$E%E!E"ET $$$$ $!$"$#$ $$$%$&$'$($U j'@'Q'P'N'O'V $G%G"G#G&G'G !LGW );*;+;X O0P0I0J0M0N0A0B0]D^DC0D0G0H0W0X0E0F0K0L0[0\0Q0R0Y -I9I,I9I:I?I@I7I8I=I>I;I>;><>/>0>1>2>#>$>>>>>>>?>@>'>(>)>*>+>,>5>6>>>=>>>!>">>>7>8>%>&>9>:>>>3>4>->.>>>> >g >yAy$>u <=>v cldlalblw d2e2f2g2x ?/@/y {X|XXX_X`XaXbXeXfXkXlXsXtXoXpXAXBXwXxXXXqXrXgXhXuXvX}X~XXX]X^XmXnXXXz CyDyEyFyGyHyIyJyBKyLyMyNyOyPyQyBRyTySyBTyUyVyWyXyYyZy{ 3@| [7\7]7^7t7_7`7a7b7} ^x_x~ cJdJeJuJ _v`v EHFH2HUHVHQHRHI%J%MHNHGHHH3HS%T%KHLHOHPH  6 6f6g66666662636"6#666666 6 6!6(6)6h6i666 6 6,6-6j6k666*6+666$6%6l6m6n6o6&6'6061666.6/6 W)X) p q r s t u  v"w"x" akl esdsasbscs 4567 `(a(f(b(c(^(_(Z([(\(]( yVzV{V|V}V ~qq *F)F!F"F(F%F$F&F'F#F -- awwwwwwwwww ,-VWfg  de&'  ^_BC<=&jklm4  ./LM  01$%hi`aK  bcM@A FG()PQ67 !7JK|}RS+#xy<=hiL(*+011DE5HIRS*+6  FG,TUXY rsfgVWZ[:;XY  \].:;"#89|}NO./deNOpq 45JK845z{tu"#8967 @A'>?BC~*0`almLMtu/no!&'PQ^_$jkxy !HITUrs23bcZ[vw>?-z{,-)3~vwnopq%23DE2()$%"\]  y y yy6yyyy  W-X-Y-Z- 6h.h3h,h5h2h1h-h4h0h+h/h . 1I && & &!&&&"&#&$&%&&&'&(& ~gg )E*EE >>> KeLe z=z?zCzAz@zBz  ;;;;;; DDD GGG {|}~9    ! " 8   '''! #$%" j(N(O(@(Q(P(# & ' ( ) * + $ 5 6 7 8 9 : 3 4 1 2 ; < % sty& x?' p,p-p.p/p0p1p( m,l,k,) 2\3\4\5\6\* ('#' '!'&'''"''''' '$'%'+ 789:;<=>?@ABCDEFGH, 7 8 5 6 3 4 1 2 9 : ; < - sty.   / g#h#IJKLMNOPQRSTU#V#opW#X#0 ]^STOPUV[c\cWXQcRcYZ1 efcdk\l\m\n\abqrij]^2   3   4 bb5   D E 6 YZ[\]^7_N`N8-i.i6i+i,i1i2i4i0i/i3i5i9 ```:0/ !"#$%.1;a}b}c}d}e}f}<f3g3d3e3=^y_y>6745?Z)[)`)a)\)])b)c)^)_)f)@_w`wA|u}uuuuutuuu~uuvuwuzu{uxuyuB|p}p^p_p`papxpypppzp{pXpYpZp[ptpup~pppp\p]pkpvpwpVpWpCg2h2i2D{{E&T%TBTCT>T?T@TAT9:;<?@GH78N<3C3D3O3P3;3G3H3?3@3A3B3O}}7}8}+},}5}6}#}$}}} } }}}!}"}Pab{|]^wx_`}~stghQ~lllllRBBBB5B6BBB3B4B)B*BB B9B:BBB7B8B;BBStnunvnwnxnynnzn{n|n}n~nnnnT#$%"!&UN)O)j)P)Q)@)V@{>{C{?{B{A{<{={WklaXC`B`K`J`F`E`G`H`D`A`I`Y>U?U&U@?@h'X>X?X@XAXEEEEE3E4E#E$E!E"E;EC5C6C{VVVVVVVV V!V|N0O0P0Q0j0@0}%N$N#N&N'N*N)N(N!N"N~OqNqMqPqQqRq"q#q$q%q&q'q(q)q:Sz*C+C,C-C.C/C0Cdddddstypppppp p p ppB|=|>|C|@|A|?|<|cdijab_`efdgh  .. 1424 D8E888868788898z8{80818<8=8*8+8 d4e4f4g46745QfRf]^[f\fWXYZUVSTOPSTMNUxVxKLgxhxIJopWxXx3x4xQROP5678Y.Z.W.X.  RS89(), LM,-6  245|}BC23hi454Z[5@A23"#<=\])BC  bcde*LtuTUhi^_  *+>?$%lm01:;DE(~67-8+PQ   :;&'  ^_3"z{,-|}0xyHI()rs./\]fg  *+  VWK67 !`a"#rs !PQvwz{&'&~pq JK$%fgZ[<=89HI01nopqNO7tu>?'vwVWjklmdexy%NO/bc`aJK.DE#!TUjk$noFGRSXYM1 XYLMFG@A./c\ !$%(#&'L"q qq q qqqqqqD E   ccW*X*'(sNtN$N%NLN&N'N !%M$M#Mtt#!N"/-  N N NN+T g g(G'j*SeNSS, NN%tSNNNUU$`&NN)NgNULR $R%RsRtR&R'R  !pqrno @AAA>A?ACADABA!-J9J=J>J?J@J,J9J:J9Z:Z7J8J;JGH78CD9:&r-s-'CaBaIaJaGaHaKaDaEaFaAa(DE)]]* rrrrrrr r rr+~hh,6745-]P^P.8q9qY=Y^?^=fGZG[GbGcG\G]G`GaG>@]A]B]C]D]E]F]G]H]I]J]?K}L}M}N}O}P}f}Q}@WXUV[Z\YARsSsBTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-.N/0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%C& ' ( ) * + D,+-+:m%Z4ufZ|Y{&e!JiG)&.|/|2m.#-lW=`F0|1|2J3J4555Em6B7B7="EaCq\|Q 0EX`?.@. HanM=)mA/B/(7=3>&b$#@@wCiDiTi,nE|F|BS'nG|V@]i`H:I:diO@FDJFKFL`M`N=O=Dc={P%Q%K=9bRG_R`S`6 TCUC3_V|W|?m*2HY/ IX"Y"^EZA[AfgLc$\>]>Ej/k///0/1/&/'///f/g/*/+/h/i/,/-///2/3/^/_/l/m/(/)/./////n/o/////// / ///$/%/// / /"/#/ /!// /Fd5e5f5g5G6?7?4?5?H`abcI=J_x`xKIzJzWzXzSzHzTzMzNzZzCzDzGzYzFzUzQzPzEzKzLzTzVzRzOzLMINIOIPI2IGIHIUIVIS&T&KILIQIRII&J&EIFI3IMg3h3i3N<<<<< <OP!G"G*G)G(G#G$G&G'G%GQJ K H I O M N L R'VV?V@VAV&VBVCVS&p'p$p%p"p#p(p)pTRpQpPpOpNpMpUd`e`VP%Wf0g0XhijklmYrsZnWoWpWqWrW[s;t;u3v3\z({(0(1(<(=(8(9(D(E(6(7((((*(+(]IJGHKL^2]3]4]5]6]_ccccc`mmmm~mab%$#csfd`NaNbNcN\N]NfNZN[Nef6g6d6e6f4@5@6@7@g9[:[?K@K9K:K9K-K=K>K7K8K,K;K~tu%&lmbchifg-.  3lm  DEXYno;<dep)*Nvw?@|}jkpq 56FG9:fgnWjXjwjxjo'(pGbHbIbJbFbEbKbDbAbBbCbqy8z8rW?W'W&W%W@WAWBWCWs aaat]U^UuD)E))0)1)6)7)8)9)))<)=)z){)*)+)vsOtOLO&O'O !$O%OwUyVy78KLWyXyIJOPgyhySTQRMNop3y4y56x]^ST[g\gWXQgRgUVOPYZyLS$S%SsStS !&S'SzDyEyyy{yy| !" # $ % & ' L ( }6*7****<*=*8*9*z*{*0*1***+*D*E*~=}A}B}>}@}?}<}C}88888J88888*+++z+{+++6+7+<+=++0+1+8+9+D+E+*T+U&!?ff66"0$a%'l??&&,!e? ? ?)O??(H M M#55??-!vv-%PP"6)[~88mmWW8 P P'nPP&*VP(M#neP!PPPPW% i i P+Wmv,%P$c ij5k5r5s555p5q555l5m555n5o555/0"# !1$%.|||||`OaO\O]OfObOcOZO[O4A5A6A7A   _y`y EFHGABCD@  \]) ,-4K^_89rsDE  delm FG:;<=lm675,-hiJK@ABC./."Z[rs%HI/Z[hi*+:;jkxyPQ  01z{HI&  ./tuVWRSbc"#()tuDE8TUFG  !*+XY~  xy~,no45>?PQNOMNO623+7$JKz{ !&'-23RS@ALMjkXY|}*^_bc\] '#()vw01`adeTUfg !pqfg67|}novwL  >?<=3(89VWpqLM$%"#1  BC0&'`a2$%45 Ryyyyy m#)R 22 ,& J J",+L'h((SS-$^ %s(K*P! (((6K4K K KDE6z z z zzzzz"(#($(%((((( ( (!(((&('(^^~ii&H'H%H$H*H)H(H!H"H#H@*Q*j*N*O*P*PE2389CG:;BQI45DAH67N^M^x^Q^K^S^T^P^L^O^ss ssssss s sgZhZsZtZZZ]Z^Z_Z`ZaZbZZZoZpZuZvZwZxZZZAZBZkZlZZZqZrZmZnZeZfZ{Z|Z}Z~Z  0,1,,,z,{,D,E,<,=,*,+,,8,9,6,7,6B7B4B5BZP[P\P]PbPcP`PaPfP   1$%"#0 !/.!]^qrefcdk_l_abijm_n_"IJ7856opSTKLQRgzhzWzXzOPMNUzVz3z4z#!!$zzDzEz%f7g7d7e7&?5@5A5B5C5D5<5G5H5;5O5P5'+,#$78!"  56(stabghwx{|}~_`]^);<=>ABGH78CDEF9:?@*6-7----0-1-z-{-<-=-D-E-*-+-8-9-+OwNwPwQwMwZwXwKwLwVwCwDwEwFwTwJwRwYwSwHwGwWwIwTwUw,zz-MFNFEFFFOFPFI#J#UFVF2FKFLFS#T#3FGFHFQFRF.:/VW@AK0hi`aXY89vw"FG  'NOPQ*+`aBC  01>?rs8pqDE+$%^_XY45-&'  z{fg6*)/bc./\]()  de,FG|}7hi*+23LM32$PQ./~lmRSnono"# ,-\]JK^_@A1vwTU  >? ! !jkL  tu 5BC %01LM89,-"#z{45rsHIpq67M~RSNO<=(DE.|}jk:;  4xyVWHI$%<=! xyTU&'67bcJKZ[()Z[&#lmde23fg:;tu0 @ @ @12.3.n.o. . ...&.'.$.%...0.1.*.+. .!.,.-.l.m.f.g.".#.../. . .............(.).j.k...^._.h.i.. .2_z`z3^t_t4*I)I%I$I(I!I"I&I'I#I5  } ~   9 { |      6P+Q+j+N+O+@+7  8D.E.8.9.6.7..z.{.<.=.*.+.0.1...92{3{&{'{0{1{.{/{*{+{({){,{-{:EGFGQGRGI$J$3GUGVG2GGGHGMGNGOGPGS$T$KGLG;zzRzzz<;LL?L@L=|'{'>DE?U{V{g{h{3{4{IJSTOPW{X{KL7856MNQRop@8/9/*/+///6/7/z/{/?|}890*+JK/:;\]RS*JKXY^_z{./\]TUlmVW&Z[  Z[`a,-jk<=ders>?lm$%vwDEvw  $nobcXY VW01fg,-4.645TU1LM#  &'  NOL5 012+"#67@ApqBCFG*+rs~E>~@~A~B~C~=~?~<~F&T'TLT$T%TsTtT !G8090<0=06070*0+0D0E0z0{00010000H`uau\u]uzu{u^u_uvuwuxuyuXuYuuuku~uu|u}utuuuZu[uuuVuWuD@E@I|w}wvwwwwwxwywzw{wtwuwww~wwJvrwr\r]rxryr~rrzr{rZr[r|r}rD?E?rrVrWrtrur`rarXrYrrrkr^r_rKPP PP!PPPPPPL&P'P$P%PLP !sPtPMP,Q,N,O,@,j,Nk-l-m-O*J)J#J$J%J&J'J(J!J"JPwwwwwwwwQ_{`{R  S^u_uT4C5C6C7CU66V`KaK\K]KZK[KfKbKcKWf8g8d8e8X$)%)))")#))) ) )!)&)')()Y {{6{{{{ { {Z8" ![ = ==== = = ==\tt tttttt]z1{181911110111<1=1D1E16171*1+1^DE_`0/ !"#.1$%a%N$N#NbK~L~O~P~f~M~N~Q~cnn~nnndRR(N!RRReR99"4,#-#nnXX*W~9 j jRR%!wwR'o&jn R RXRw#o$d RR)\+XevwZ[)*12lm;<hiTU\]z{noz{=>vw  NO  $%hi+,`a`a|}rsXYVWtu$~TU|}VW'(jkpq !de?@Z[N !no/0\]56bcrstu xyBCLM78jk34xyFG     DElmpqde"#9:RSAHI^_~XYPQfg"#fgJKbc-.%&^_ft t ttttt tttg'(hWkXkwkxki*2+282926272<2=2z2{2D2E20212222j]V^Vk8r9r;<78EFCDAB?@9:GH83933303133z3{3*3+3D3E3<3=363735l2l1l4l0l/l3l,l6l.l+l-l*K)K(K&K'K#K$K%K!K"K@-Q-N-O-j-P-!QQQQ QQQQQQ4>5>6>7>041448494*4+4<4=444D4E46474z4{4wlxlWlXlr!s!DE ii ! " # $ %  ===== = : `MaMbMcMZM[MfM\M]M>_}`}#@$@4E5E6E7Ef:g:d:e:__y_ ___x_}_&o'o_ _z_{_ __ _u_v____~__|_w_w}x}W}X}lll lllll!l"lllf,g,,, ,!,",#,,,,,l,m,&,', , ,h,i,, ,,,^,_,,,(,),0,1,,,2,3,(,),,, , ,,,-,j,k,$,%,.,/,n,o,,,*,+,,,cndnanbna[b[[[m[n[q[r[}[~[{[|[_[`[k[l[s[t[o[p[[[][^[e[f[[[A[B[g[h[w[x[[[u[v[-k.k/k0k+k,k1k2k4k5k3k6kP&*+,-./y}z}~}x}{}r}s}w}|}}}u}v}t}}?)@)0h1h2h3h4h5[6[7[8[9[:[;[<[=[>[ gqfqeq!?;@;A;B;r;C;D;"EYFY#TT T!TTTTTTT$%L$L#L&L'L!L"L(L)L*L%&|}'GJHJIJJJKJLJMJNJOJ(^v_v)PQRSTUVWXYZ[\]^_`a*b1c1+y ,UJVJ2JEJFJS'T'QJRJI'J'KJLJOJPJMJNJGJHJ3J-.de/fghi. L L6L4L/m.l.k.0pppp~p1P.Q.N.O.j.@.2j$k$l$3 4mTnToTpT5 ||||| | |6|6(M)M*M!M"M&M'M#M$M%M7UU UU!UUUUUU8$%xyvw56\] !pqz{^_)*NOPQDE|}-.z{hi;<N^_jkFGqr$bc"#  |}Z[CtulmLMde34=>jkTUVW`aVW  `a78RSfgnovwrsJK?@%&pqtu'(B st+,XYlmno~\]hi   !rsHI TU12fg  Z[bcxy9:A/0XY"#de~9ZR[RbRcRfR\R]R`RaR:8~9~<~=~:~;~;|<Sy=6F7F4F5F>P/Q/j/N/O/@/?!!!!!!!!!}!~!9!{!|!@'(Aw~x~W~X~Bk/l/m/C#O$O%ODuvopwxg&h&yz{&|&}&~&&& & &  E% " # $ ! FjjG6m.m3m,m-m4m0m1m2m+m/m5mHDEI rrrrJK<5=555585950515D5E5z5{56575*5+5L  M+<*<)<N09198999<9=969799*9+9z9{9D9E999ODEP5o2o4o0o1o-o.o+o,o6o3o/oQllRerfrgrS+^,^-^.^A^/^0^T$%"# !./01UBBBVgFW;pq:jkrslmnoXhi.defg/Y{|st_`abwx}~]^ghZEF;<=>CD9:AB?@GH78[0:1:::6:7:*:+:8:9::z:{:D:E:<:=:\P']]W^W^RSPQ_PDQDD`DSDRD`aYZKLMNUVEFQRWXSTABCD[\IJOPGHbO1P1I1J1[1\1K1L1E1F1C1D1]E^EA1B1Q1R1G1H1W1X1M1N1c&&d`QaQ\Q]QfQbQcQZQ[Qe6G7G4G5Gf## #gDEhN2O2j2P2Q2@2i!A"A&A'A#A$A*A)A%A(Aj!YYYYYYY YYYkl!D"Dm9:?@x8 !"yCB<>A?@=zDLELLL5?5DMEM8M9MzM{M0M1MJMKMM>?>@>A>B>C>D>E>F>G>y!x!w!ffk l m n u o [[ [ f e  0;1;*;+;D;E;<;=;;8;9;z;{;;;6;7; K?K@KAKBKCKDKEKFKGKHKIKJKKKLKMKNKOKPK bbb{(|(OOJOKO8O9OzO{O0O1O<BC  D E QQ??M@M9M,M-M;MM7M8M9M:M@DWEWCDABU >>>>>>V > >>>> > >> >W`FSFFPFQFRFXYz[{[D[E[[[<[=[[*[+[6[7[J[K[0[1[8[9[ZB[C[@[A[<[=[%[&['[>[?[[I2J2G2H2O2P2M2N2K2L2Q2R2C2D2A2B2[2\2]F^FE2F2W2X2\^z_z]<\=\\6\7\*\+\0\1\D\E\8\9\J\K\z\{\\\^"" " """""""_4p0p+p,p5p2p6p.p-p3p/p1p`*g+g8g9gDgEgggJgKg0g1gg\?\<\=\B\C\'\op#C$Cqo ooooooooo!o"ors,N?N@N7N8N;NN9Nt######## # #utev~uuuuuwDEx{{ {!{"{y77z\Y]YfYZY[Y`YaYbYcY{ Z ZZZZ#9$9 ZZZZZ Z Z|%h&h'h(h}JhKh8h9hDhEhhhh?=B xxQQ+Y$er k koo& QQkoeQYY78'p%"Q,$QQY"5::~:x#p)]-$QQ!Q(R*XQ Q Q W{X{w{x{ p%q%%%%%%%%% RRxRyR0R|R}RpRqRRR/RrR etdtctatbtab_`cdefijghd0_1_z_{___*_+_D_E_J_K_8_9__<_=_6_7_)I*I1I2III'I(I+I,I=I>I/I0I;IY?Y@YAY'YC23r,r4r0r/r6r.r1r2r-r5r+r3VVV VVVVV#8$8 V V V V45O7P7C7D7;7G7H7<7?7@7A7B76{|st}~_`ab]^wxgh7?@GH9:78AB;<EFCD=>8*A+AAAAzA{A0A1A8A9AD?D@DD D'D(D)D*D-D.D!D"D;DDE?@ARZZZ>Z?ZZZB<=89:;C? ? ? ? ? ????Dj1N1O1P1Q1@1E""FefGgHk0l0m0IFcEcIcJcAcBcCcDcGcHcKcJ+()*'K@GAGL!XXXXXX XXXXM!@"@%@$@&@'@*@)@(@#@N w  <=  :;  89O~n{nn}nzndn|nP}}}}}QBqCqDqEqR!m"mmmm mmmmmmmS#A$ATF:G:i:h:g:H:I:J:K:L:M:N:O:P:Q:R:S:T:UUlVlWlVX$Y$WRrQrMrNrOrPrX"r#r$r%r(r&r'r)rY]Y^YZ J J J[Z#[#\lpmp]/s0s6s.s1s2s-s3s,s4s5s+s^6H7H4H5H_[[R[>[?[[[`d;e;f;g;a0M1MmM4M5MnM.M/M,M-M2M3M8M9M6M7MbWxXxwxxxcQ45D23P89ABIH67CGE:;d89:;=<eNNNNfHH#H$HH H=H>H7H8H9H:H/H0HHH?H@H'H(H;H?)?*???7?8???????1?2?!?"?9?:???@?;?F;FZ?Z&Z"r+s+t+u+v+w+x+y+z+{+|+}+~+++++++++++ + + + + +++++++++++++++++++ +!+"+#+$+#?+@+$m1l1k1%T U R S U &::'s<t<( @ @@@ @ @ @@@)RxDxMxNxTxJxPxQxYxFxUxIxKxLxExGxHxOxZxXxSxCxWxVxTx*fffff+<=:;89,X]Y]-;;J;;;;;;;;.*I+I6I7II8I9I0I1III\n]nxnyn^n_n|n}nkn~nnVnWnzn{n`nanvnwnXnYnnntnunZn[nnn?1 2 3 4 XtYtzt{tttut5 6 ^t_t7 8 ~ttttZt[t`tatkt|t}t\t]tvtwtttVtWt9 : xtyt@;L*?*@*E78EFCDAB9:?@GH;<KO:P:G:H:?:@:C:D:<:A:B:;:LA>B>C>D>E>F>G>H>I>J>K>L>M>N>O>P>Q>R>S>T>M !8"N}OS{PG'G(G3G4G%G&G;GJJJJJ1J2J-J.JJJJJJJ'J(J!J"J;J@1@2@@@3@4@%@&@pw|x|W|X|qw7x7y7rzZ{Z|Z}Z~ZsJfKf8f9f0f1fzf{f6f7fDfEf*f+ffff\?\R\w^|_|x6L7L4L5Ly`WaWbWcW\W]WfWZW[WzDE{{|z||222 2},}p2p22pppp22 2 2 p ~22222;NOPSTUABCDEFHIJKLMRWXZ[\]_ABCDEFHIJKLMR_WX%V' GBBbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256 https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256 pqatzip-libs-1.0.9-1.el9.x86_64.rpmpqatzip-1.0.9-1.el9.x86_64.rpmpqatzip-libs-1.0.9-1.el9.x86_64.rpmpqatzip-1.0.9-1.el9.x86_64.rpm|( LBBBBBBBBbugfixModerate: open-vm-tools bug fix and enhancement updateyyhttps://access.redhat.com/errata/RHBA-2025:20841RHBA-2025:20841RHBA-2025:20841 https://errata.almalinux.org/9/ALBA-2025-20841.htmlALBA-2025:20841ALBA-2025:20841 https://www.redhat.com/security/data/cve/CVE-2025-22247.htmlCVE-2025-22247CVE-2025-22247,open-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm/open-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm-open-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpmaopen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm.open-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm,open-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm/open-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm-open-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpmaopen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm.open-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm) WBBBsecurityImportant: xz security update0rhttps://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940 https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940 yxz-devel-5.2.5-8.el9_0.i686.rpmCxz-lzma-compat-5.2.5-8.el9_0.x86_64.rpmyxz-devel-5.2.5-8.el9_0.x86_64.rpmyxz-devel-5.2.5-8.el9_0.i686.rpmCxz-lzma-compat-5.2.5-8.el9_0.x86_64.rpmyxz-devel-5.2.5-8.el9_0.x86_64.rpm$* &]BBBBBBBsecurityModerate: vim security update0Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242 https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242 8Hvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm9Hvim-common-8.2.2637-16.el9_0.2.x86_64.rpm:Hvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm Hvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm Hvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm8Hvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm9Hvim-common-8.2.2637-16.el9_0.2.x86_64.rpm:Hvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm Hvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm Hvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmT+ ,gBBBsecurityModerate: expat security update0[xhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244 https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244 uxexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmuxexpat-devel-2.2.10-12.el9_0.2.i686.rpmPxexpat-2.2.10-12.el9_0.2.x86_64.rpmuxexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmuxexpat-devel-2.2.10-12.el9_0.2.i686.rpmPxexpat-2.2.10-12.el9_0.2.x86_64.rpm:, mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0S https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249 [Rkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm&Rkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpmURkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm_Rkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpmXRkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm!Rkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmWRkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmRkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm`Rkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm#Rkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm$Rkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm2Rbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm"Rkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmZRkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpmTRkernel-5.14.0-70.17.1.el9_0.x86_64.rpm\Rkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm%Rperf-5.14.0-70.17.1.el9_0.x86_64.rpm^Rkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm]Rkernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmTRpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpmVRkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpmYRkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm[Rkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm&Rkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpmURkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm_Rkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpmXRkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm!Rkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmWRkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmRkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm`Rkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm#Rkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm$Rkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm2Rbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm"Rkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmZRkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpmTRkernel-5.14.0-70.17.1.el9_0.x86_64.rpm\Rkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm%Rperf-5.14.0-70.17.1.el9_0.x86_64.rpm^Rkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm]Rkernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmTRpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpmVRkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpmYRkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm- XBBBBsecurityModerate: libarchive security update0hXhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252 https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252 3libarchive-3.5.3-2.el9_0.x86_64.rpmMbsdtar-3.5.3-2.el9_0.x86_64.rpmjlibarchive-devel-3.5.3-2.el9_0.x86_64.rpm3libarchive-3.5.3-2.el9_0.x86_64.rpmMbsdtar-3.5.3-2.el9_0.x86_64.rpmjlibarchive-devel-3.5.3-2.el9_0.x86_64.rpme. &_BBBBBsecurityModerate: libinput security update0@3https://access.redhat.com/errata/RHSA-2022:5257RHSA-2022:5257RHSA-2022:5257 https://access.redhat.com/security/cve/CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/20749522074952https://errata.almalinux.org/9/ALSA-2022-5257.htmlALSA-2022:5257ALSA-2022:5257 HBlibinput-1.19.3-2.el9_0.x86_64.rpm>Blibinput-utils-1.19.3-2.el9_0.x86_64.rpmHBlibinput-1.19.3-2.el9_0.i686.rpm=Blibinput-devel-1.19.3-2.el9_0.x86_64.rpmHBlibinput-1.19.3-2.el9_0.x86_64.rpm>Blibinput-utils-1.19.3-2.el9_0.x86_64.rpmHBlibinput-1.19.3-2.el9_0.i686.rpm=Blibinput-devel-1.19.3-2.el9_0.x86_64.rpms/ gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security and bug fix update0s>https://access.redhat.com/errata/RHSA-2022:5263RHSA-2022:5263RHSA-2022:5263 https://access.redhat.com/security/cve/CVE-2022-26353CVE-2022-26353CVE-2022-26353https://access.redhat.com/security/cve/CVE-2022-26354CVE-2022-26354CVE-2022-26354https://bugzilla.redhat.com/20631972063197https://bugzilla.redhat.com/20632572063257https://errata.almalinux.org/9/ALSA-2022-5263.htmlALSA-2022:5263ALSA-2022:5263 ]Uqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpmUUqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpmdUqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpmUqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpmSUqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpm^Uqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpmUqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpm[Uqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpmaUqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpmVUqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpm\Uqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpmYUqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpmTUqemu-img-6.2.0-11.el9_0.3.x86_64.rpm_Uqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpmUqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpmXUqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpmcUqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpm`Uqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpmbUqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpmWUqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpmZUqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm]Uqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpmUUqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpmdUqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpmUqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpmSUqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpm^Uqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpmUqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpm[Uqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpmaUqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpmVUqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpm\Uqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpmYUqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpmTUqemu-img-6.2.0-11.el9_0.3.x86_64.rpm_Uqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpmUqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpmXUqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpmcUqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpm`Uqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpmbUqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpmWUqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpmZUqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm$0 RsecurityImportant: thunderbird security update01ehttps://access.redhat.com/errata/RHSA-2022:5482RHSA-2022:5482 https://access.redhat.com/security/cve/CVE-2022-2200CVE-2022-2200https://access.redhat.com/security/cve/CVE-2022-2226CVE-2022-2226https://access.redhat.com/security/cve/CVE-2022-31744CVE-2022-31744https://access.redhat.com/security/cve/CVE-2022-34468CVE-2022-34468https://access.redhat.com/security/cve/CVE-2022-34470CVE-2022-34470https://access.redhat.com/security/cve/CVE-2022-34472CVE-2022-34472https://access.redhat.com/security/cve/CVE-2022-34479CVE-2022-34479https://access.redhat.com/security/cve/CVE-2022-34481CVE-2022-34481https://access.redhat.com/security/cve/CVE-2022-34484CVE-2022-34484https://bugzilla.redhat.com/21021612102161https://bugzilla.redhat.com/21021622102162https://bugzilla.redhat.com/21021632102163https://bugzilla.redhat.com/21021642102164https://bugzilla.redhat.com/21021652102165https://bugzilla.redhat.com/21021662102166https://bugzilla.redhat.com/21021682102168https://bugzilla.redhat.com/21021692102169https://bugzilla.redhat.com/21022042102204https://errata.almalinux.org/9/ALSA-2022-5482.htmlALSA-2022:5482ALSA-2022:5482 :0thunderbird-91.11.0-2.el9_0.alma.x86_64.rpm:0thunderbird-91.11.0-2.el9_0.alma.x86_64.rpmY1 UsecurityImportant: squid security update0https://access.redhat.com/errata/RHSA-2022:5527RHSA-2022:5527 https://access.redhat.com/security/cve/CVE-2021-46784CVE-2021-46784https://bugzilla.redhat.com/21007212100721https://errata.almalinux.org/9/ALSA-2022-5527.htmlALSA-2022:5527ALSA-2022:5527  squid-5.2-1.el9_0.1.x86_64.rpm squid-5.2-1.el9_0.1.x86_64.rpm2 XBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement update0+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695 wMjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmvMjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmtMjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmrMjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmuMjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpmpMjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmqMjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmsMjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpmoMjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpmwMjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmvMjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmtMjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmrMjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmuMjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpmpMjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm Mjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmqMjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmMjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmsMjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpmoMjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm3 'GBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement update0G.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709 ;djava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmdjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm djava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm8djava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm6djava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm4djava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm7djava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm5djava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm PsecurityImportant: thunderbird security update0S https://access.redhat.com/errata/RHSA-2022:6165RHSA-2022:6165RHSA-2022:6165 https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6165.htmlALSA-2022:6165ALSA-2022:6165 :mthunderbird-91.13.0-1.el9_0.alma.x86_64.rpm:mthunderbird-91.13.0-1.el9_0.alma.x86_64.rpm? SsecurityImportant: firefox security update0a? https://access.redhat.com/errata/RHSA-2022:6174RHSA-2022:6174RHSA-2022:6174 https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6174.htmlALSA-2022:6174ALSA-2022:6174 9mfirefox-91.13.0-1.el9_0.alma.x86_64.rpm9mfirefox-91.13.0-1.el9_0.alma.x86_64.rpm+@ VBBBBBBBsecurityModerate: openssl security and bug fix update0 / https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224 https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224  Dopenssl-devel-3.0.1-41.el9_0.i686.rpmODopenssl-libs-3.0.1-41.el9_0.x86_64.rpmLDopenssl-perl-3.0.1-41.el9_0.x86_64.rpm Dopenssl-devel-3.0.1-41.el9_0.x86_64.rpmNDopenssl-3.0.1-41.el9_0.x86_64.rpm Dopenssl-devel-3.0.1-41.el9_0.i686.rpmODopenssl-libs-3.0.1-41.el9_0.x86_64.rpmLDopenssl-perl-3.0.1-41.el9_0.x86_64.rpm Dopenssl-devel-3.0.1-41.el9_0.x86_64.rpmNDopenssl-3.0.1-41.el9_0.x86_64.rpmA (`BBBBBBsecurityImportant: open-vm-tools security update0Ohttps://access.redhat.com/errata/RHSA-2022:6358RHSA-2022:6358RHSA-2022:6358 https://access.redhat.com/security/cve/CVE-2022-31676CVE-2022-31676CVE-2022-31676https://bugzilla.redhat.com/21187142118714https://errata.almalinux.org/9/ALSA-2022-6358.htmlALSA-2022:6358ALSA-2022:6358 -sopen-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm.sopen-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm/sopen-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm,sopen-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm-sopen-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm.sopen-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm/sopen-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm,sopen-vm-tools-11.3.5-1.el9_0.1.x86_64.rpmB =iBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update0Vxhttps://access.redhat.com/errata/RHSA-2022:6521RHSA-2022:6521RHSA-2022:6521 https://access.redhat.com/security/cve/CVE-2022-38013CVE-2022-38013CVE-2022-38013https://bugzilla.redhat.com/21251242125124https://errata.almalinux.org/9/ALSA-2022-6521.htmlALSA-2022:6521ALSA-2022:6521  dotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpmaspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-host-6.0.9-1.el9_0.x86_64.rpmdotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm dotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm  dotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpmaspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-host-6.0.9-1.el9_0.x86_64.rpmdotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm dotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm%C ~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security, bug fix, and enhancement update0NMhttps://access.redhat.com/errata/RHSA-2022:6585RHSA-2022:6585RHSA-2022:6585 https://access.redhat.com/security/cve/CVE-2022-28738CVE-2022-28738CVE-2022-28738https://access.redhat.com/security/cve/CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/20756852075685https://bugzilla.redhat.com/20756872075687https://errata.almalinux.org/9/ALSA-2022-6585.htmlALSA-2022:6585ALSA-2022:6585 wruby-libs-3.0.4-160.el9_0.x86_64.rpm+Krubygem-typeprof-0.15.2-160.el9_0.noarch.rpmvruby-devel-3.0.4-160.el9_0.x86_64.rpm-rubygems-devel-3.2.33-160.el9_0.noarch.rpm(Jrubygem-rexml-3.2.5-160.el9_0.noarch.rpmwruby-libs-3.0.4-160.el9_0.i686.rpm)Qrubygem-rss-0.2.9-160.el9_0.noarch.rpmIrubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpmruby-3.0.4-160.el9_0.i686.rpm*Orubygem-test-unit-3.3.7-160.el9_0.noarch.rpm%rrubygem-power_assert-1.2.0-160.el9_0.noarch.rpm1rubygem-json-2.5.1-160.el9_0.x86_64.rpm'rubygem-io-console-0.5.7-160.el9_0.x86_64.rpm,rubygems-3.2.33-160.el9_0.noarch.rpmmrubygem-rbs-1.4.0-160.el9_0.noarch.rpm#~rubygem-irb-1.3.5-160.el9_0.noarch.rpmruby-3.0.4-160.el9_0.x86_64.rpm"+rubygem-bundler-2.2.33-160.el9_0.noarch.rpmRrubygem-psych-3.3.2-160.el9_0.x86_64.rpm!ruby-default-gems-3.0.4-160.el9_0.noarch.rpm&rubygem-rake-13.0.3-160.el9_0.noarch.rpm$]rubygem-minitest-5.14.2-160.el9_0.noarch.rpm'grubygem-rdoc-6.3.3-160.el9_0.noarch.rpmvruby-devel-3.0.4-160.el9_0.i686.rpmwruby-libs-3.0.4-160.el9_0.x86_64.rpm+Krubygem-typeprof-0.15.2-160.el9_0.noarch.rpmvruby-devel-3.0.4-160.el9_0.x86_64.rpm-rubygems-devel-3.2.33-160.el9_0.noarch.rpm(Jrubygem-rexml-3.2.5-160.el9_0.noarch.rpmwruby-libs-3.0.4-160.el9_0.i686.rpm)Qrubygem-rss-0.2.9-160.el9_0.noarch.rpmIrubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpmruby-3.0.4-160.el9_0.i686.rpm*Orubygem-test-unit-3.3.7-160.el9_0.noarch.rpm%rrubygem-power_assert-1.2.0-160.el9_0.noarch.rpm1rubygem-json-2.5.1-160.el9_0.x86_64.rpm'rubygem-io-console-0.5.7-160.el9_0.x86_64.rpm,rubygems-3.2.33-160.el9_0.noarch.rpmmrubygem-rbs-1.4.0-160.el9_0.noarch.rpm#~rubygem-irb-1.3.5-160.el9_0.noarch.rpmruby-3.0.4-160.el9_0.x86_64.rpm"+rubygem-bundler-2.2.33-160.el9_0.noarch.rpmRrubygem-psych-3.3.2-160.el9_0.x86_64.rpm!ruby-default-gems-3.0.4-160.el9_0.noarch.rpm&rubygem-rake-13.0.3-160.el9_0.noarch.rpm$]rubygem-minitest-5.14.2-160.el9_0.noarch.rpm'grubygem-rdoc-6.3.3-160.el9_0.noarch.rpmvruby-devel-3.0.4-160.el9_0.i686.rpmRD &^BBBBBBsecurityModerate: mysql security, bug fix, and enhancement update0eZhttps://access.redhat.com/errata/RHSA-2022:6590RHSA-2022:6590RHSA-2022:6590 https://access.redhat.com/security/cve/CVE-2022-21412CVE-2022-21412CVE-2022-21412https://access.redhat.com/security/cve/CVE-2022-21413CVE-2022-21413CVE-2022-21413https://access.redhat.com/security/cve/CVE-2022-21414CVE-2022-21414CVE-2022-21414https://access.redhat.com/security/cve/CVE-2022-21415CVE-2022-21415CVE-2022-21415https://access.redhat.com/security/cve/CVE-2022-21417CVE-2022-21417CVE-2022-21417https://access.redhat.com/security/cve/CVE-2022-21418CVE-2022-21418CVE-2022-21418https://access.redhat.com/security/cve/CVE-2022-21423CVE-2022-21423CVE-2022-21423https://access.redhat.com/security/cve/CVE-2022-21425CVE-2022-21425CVE-2022-21425https://access.redhat.com/security/cve/CVE-2022-21427CVE-2022-21427CVE-2022-21427https://access.redhat.com/security/cve/CVE-2022-21435CVE-2022-21435CVE-2022-21435https://access.redhat.com/security/cve/CVE-2022-21436CVE-2022-21436CVE-2022-21436https://access.redhat.com/security/cve/CVE-2022-21437CVE-2022-21437CVE-2022-21437https://access.redhat.com/security/cve/CVE-2022-21438CVE-2022-21438CVE-2022-21438https://access.redhat.com/security/cve/CVE-2022-21440CVE-2022-21440CVE-2022-21440https://access.redhat.com/security/cve/CVE-2022-21444CVE-2022-21444CVE-2022-21444https://access.redhat.com/security/cve/CVE-2022-21451CVE-2022-21451CVE-2022-21451https://access.redhat.com/security/cve/CVE-2022-21452CVE-2022-21452CVE-2022-21452https://access.redhat.com/security/cve/CVE-2022-21454CVE-2022-21454CVE-2022-21454https://access.redhat.com/security/cve/CVE-2022-21455CVE-2022-21455CVE-2022-21455https://access.redhat.com/security/cve/CVE-2022-21457CVE-2022-21457CVE-2022-21457https://access.redhat.com/security/cve/CVE-2022-21459CVE-2022-21459CVE-2022-21459https://access.redhat.com/security/cve/CVE-2022-21460CVE-2022-21460CVE-2022-21460https://access.redhat.com/security/cve/CVE-2022-21462CVE-2022-21462CVE-2022-21462https://access.redhat.com/security/cve/CVE-2022-21478CVE-2022-21478CVE-2022-21478https://access.redhat.com/security/cve/CVE-2022-21479CVE-2022-21479CVE-2022-21479https://access.redhat.com/security/cve/CVE-2022-21509CVE-2022-21509CVE-2022-21509https://access.redhat.com/security/cve/CVE-2022-21515CVE-2022-21515CVE-2022-21515https://access.redhat.com/security/cve/CVE-2022-21517CVE-2022-21517CVE-2022-21517https://access.redhat.com/security/cve/CVE-2022-21522CVE-2022-21522CVE-2022-21522https://access.redhat.com/security/cve/CVE-2022-21525CVE-2022-21525CVE-2022-21525https://access.redhat.com/security/cve/CVE-2022-21526CVE-2022-21526CVE-2022-21526https://access.redhat.com/security/cve/CVE-2022-21527CVE-2022-21527CVE-2022-21527https://access.redhat.com/security/cve/CVE-2022-21528CVE-2022-21528CVE-2022-21528https://access.redhat.com/security/cve/CVE-2022-21529CVE-2022-21529CVE-2022-21529https://access.redhat.com/security/cve/CVE-2022-21530CVE-2022-21530CVE-2022-21530https://access.redhat.com/security/cve/CVE-2022-21531CVE-2022-21531CVE-2022-21531https://access.redhat.com/security/cve/CVE-2022-21534CVE-2022-21534CVE-2022-21534https://access.redhat.com/security/cve/CVE-2022-21537CVE-2022-21537CVE-2022-21537https://access.redhat.com/security/cve/CVE-2022-21538CVE-2022-21538CVE-2022-21538https://access.redhat.com/security/cve/CVE-2022-21539CVE-2022-21539CVE-2022-21539https://access.redhat.com/security/cve/CVE-2022-21547CVE-2022-21547CVE-2022-21547https://access.redhat.com/security/cve/CVE-2022-21553CVE-2022-21553CVE-2022-21553https://access.redhat.com/security/cve/CVE-2022-21556CVE-2022-21556CVE-2022-21556https://access.redhat.com/security/cve/CVE-2022-21569CVE-2022-21569CVE-2022-21569https://bugzilla.redhat.com/20826362082636https://bugzilla.redhat.com/20826372082637https://bugzilla.redhat.com/20826382082638https://bugzilla.redhat.com/20826392082639https://bugzilla.redhat.com/20826402082640https://bugzilla.redhat.com/20826412082641https://bugzilla.redhat.com/20826422082642https://bugzilla.redhat.com/20826432082643https://bugzilla.redhat.com/20826442082644https://bugzilla.redhat.com/20826452082645https://bugzilla.redhat.com/20826462082646https://bugzilla.redhat.com/20826472082647https://bugzilla.redhat.com/20826482082648https://bugzilla.redhat.com/20826492082649https://bugzilla.redhat.com/20826502082650https://bugzilla.redhat.com/20826512082651https://bugzilla.redhat.com/20826522082652https://bugzilla.redhat.com/20826532082653https://bugzilla.redhat.com/20826542082654https://bugzilla.redhat.com/20826552082655https://bugzilla.redhat.com/20826562082656https://bugzilla.redhat.com/20826572082657https://bugzilla.redhat.com/20826582082658https://bugzilla.redhat.com/20826592082659https://bugzilla.redhat.com/21152822115282https://bugzilla.redhat.com/21152832115283https://bugzilla.redhat.com/21152842115284https://bugzilla.redhat.com/21152852115285https://bugzilla.redhat.com/21152862115286https://bugzilla.redhat.com/21152872115287https://bugzilla.redhat.com/21152882115288https://bugzilla.redhat.com/21152892115289https://bugzilla.redhat.com/21152902115290https://bugzilla.redhat.com/21152912115291https://bugzilla.redhat.com/21152922115292https://bugzilla.redhat.com/21152932115293https://bugzilla.redhat.com/21152942115294https://bugzilla.redhat.com/21152952115295https://bugzilla.redhat.com/21152962115296https://bugzilla.redhat.com/21152972115297https://bugzilla.redhat.com/21152982115298https://bugzilla.redhat.com/21152992115299https://bugzilla.redhat.com/21153002115300https://bugzilla.redhat.com/21153012115301https://errata.almalinux.org/9/ALSA-2022-6590.htmlALSA-2022:6590ALSA-2022:6590 N}mysql-server-8.0.30-3.el9_0.x86_64.rpm}mysql-8.0.30-3.el9_0.x86_64.rpm0}mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm/}mysql-common-8.0.30-3.el9_0.x86_64.rpmN}mysql-server-8.0.30-3.el9_0.x86_64.rpm}mysql-8.0.30-3.el9_0.x86_64.rpm0}mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm/}mysql-common-8.0.30-3.el9_0.x86_64.rpmOE 2gBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security and bug fix update01https://access.redhat.com/errata/RHSA-2022:6595RHSA-2022:6595RHSA-2022:6595 https://access.redhat.com/security/cve/CVE-2020-28469CVE-2020-28469CVE-2020-28469https://access.redhat.com/security/cve/CVE-2020-7788CVE-2020-7788CVE-2020-7788https://access.redhat.com/security/cve/CVE-2021-33502CVE-2021-33502CVE-2021-33502https://access.redhat.com/security/cve/CVE-2021-3807CVE-2021-3807CVE-2021-3807https://access.redhat.com/security/cve/CVE-2022-29244CVE-2022-29244CVE-2022-29244https://access.redhat.com/security/cve/CVE-2022-32212CVE-2022-32212CVE-2022-32212https://access.redhat.com/security/cve/CVE-2022-32213CVE-2022-32213CVE-2022-32213https://access.redhat.com/security/cve/CVE-2022-32214CVE-2022-32214CVE-2022-32214https://access.redhat.com/security/cve/CVE-2022-32215CVE-2022-32215CVE-2022-32215https://access.redhat.com/security/cve/CVE-2022-33987CVE-2022-33987CVE-2022-33987https://bugzilla.redhat.com/19074441907444https://bugzilla.redhat.com/19454591945459https://bugzilla.redhat.com/19644611964461https://bugzilla.redhat.com/20075572007557https://bugzilla.redhat.com/20985562098556https://bugzilla.redhat.com/21020012102001https://bugzilla.redhat.com/21054222105422https://bugzilla.redhat.com/21054262105426https://bugzilla.redhat.com/21054282105428https://bugzilla.redhat.com/21054302105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlALSA-2022:6595ALSA-2022:6595 anpm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpm{nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm nodejs-libs-16.16.0-1.el9_0.x86_64.rpm5nodejs-16.16.0-1.el9_0.x86_64.rpmenodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm nodejs-libs-16.16.0-1.el9_0.i686.rpmLnodejs-docs-16.16.0-1.el9_0.noarch.rpmanpm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpm{nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm nodejs-libs-16.16.0-1.el9_0.x86_64.rpm5nodejs-16.16.0-1.el9_0.x86_64.rpmenodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm nodejs-libs-16.16.0-1.el9_0.i686.rpmLnodejs-docs-16.16.0-1.el9_0.noarch.rpmF 5ssecurityModerate: gnupg2 security update01(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602 https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602 J'gnupg2-smime-2.3.3-2.el9_0.x86_64.rpmJ'gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm'G vBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0Y=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610 https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610 "0kernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm0kernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm#0kernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm$0kernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm!0kernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm%0perf-5.14.0-70.26.1.el9_0.x86_64.rpm"0kernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm0kernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm#0kernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm$0kernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm!0kernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm%0perf-5.14.0-70.26.1.el9_0.x86_64.rpm&H BBBBBBBBBBBsecurityModerate: webkit2gtk3 security update0uhttps://access.redhat.com/errata/RHSA-2022:6634RHSA-2022:6634RHSA-2022:6634 https://access.redhat.com/security/cve/CVE-2022-32893CVE-2022-32893CVE-2022-32893https://bugzilla.redhat.com/21216452121645https://errata.almalinux.org/9/ALSA-2022-6634.htmlALSA-2022:6634ALSA-2022:6634 2`webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm1`webkit2gtk3-2.36.7-1.el9_0.i686.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm2`webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm1`webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm2`webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm1`webkit2gtk3-2.36.7-1.el9_0.i686.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm2`webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm1`webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpmTI OsecurityImportant: firefox security update0 yhttps://access.redhat.com/errata/RHSA-2022:6700RHSA-2022:6700RHSA-2022:6700 https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6700.htmlALSA-2022:6700ALSA-2022:6700 9Ofirefox-102.3.0-6.el9_0.alma.x86_64.rpm9Ofirefox-102.3.0-6.el9_0.alma.x86_64.rpmJ RsecurityImportant: thunderbird security update0https://access.redhat.com/errata/RHSA-2022:6717RHSA-2022:6717RHSA-2022:6717 https://access.redhat.com/security/cve/CVE-2022-3032CVE-2022-3032CVE-2022-3032https://access.redhat.com/security/cve/CVE-2022-3033CVE-2022-3033CVE-2022-3033https://access.redhat.com/security/cve/CVE-2022-3034CVE-2022-3034CVE-2022-3034https://access.redhat.com/security/cve/CVE-2022-36059CVE-2022-36059CVE-2022-36059https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21232552123255https://bugzilla.redhat.com/21232562123256https://bugzilla.redhat.com/21232572123257https://bugzilla.redhat.com/21232582123258https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6717.htmlALSA-2022:6717ALSA-2022:6717 :Nthunderbird-102.3.0-3.el9_0.alma.x86_64.rpm:Nthunderbird-102.3.0-3.el9_0.alma.x86_64.rpm1K "UBBBBBBBBBBBsecurityImportant: bind security update0https://access.redhat.com/errata/RHSA-2022:6763RHSA-2022:6763RHSA-2022:6763 https://access.redhat.com/security/cve/CVE-2022-3080CVE-2022-3080CVE-2022-3080https://access.redhat.com/security/cve/CVE-2022-38177CVE-2022-38177CVE-2022-38177https://access.redhat.com/security/cve/CVE-2022-38178CVE-2022-38178CVE-2022-38178https://bugzilla.redhat.com/21286002128600https://bugzilla.redhat.com/21286012128601https://bugzilla.redhat.com/21286022128602https://errata.almalinux.org/9/ALSA-2022-6763.htmlALSA-2022:6763ALSA-2022:6763 `Fbind-utils-9.16.23-1.el9_0.1.x86_64.rpm,Fbind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm]Fbind-chroot-9.16.23-1.el9_0.1.x86_64.rpm_Fbind-libs-9.16.23-1.el9_0.1.x86_64.rpm\Fbind-9.16.23-1.el9_0.1.x86_64.rpm9Fpython3-bind-9.16.23-1.el9_0.1.noarch.rpm^Fbind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm-Fbind-license-9.16.23-1.el9_0.1.noarch.rpm`Fbind-utils-9.16.23-1.el9_0.1.x86_64.rpm,Fbind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm]Fbind-chroot-9.16.23-1.el9_0.1.x86_64.rpm_Fbind-libs-9.16.23-1.el9_0.1.x86_64.rpm\Fbind-9.16.23-1.el9_0.1.x86_64.rpm9Fpython3-bind-9.16.23-1.el9_0.1.noarch.rpm^Fbind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm-Fbind-license-9.16.23-1.el9_0.1.noarch.rpm L %csecurityImportant: expat security update0"Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838 https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838 u%expat-devel-2.2.10-12.el9_0.3.x86_64.rpmu%expat-devel-2.2.10-12.el9_0.3.x86_64.rpmM (fsecurityImportant: squid security update0w https://access.redhat.com/errata/RHSA-2022:6839RHSA-2022:6839RHSA-2022:6839 https://access.redhat.com/security/cve/CVE-2022-41318CVE-2022-41318CVE-2022-41318https://bugzilla.redhat.com/21297712129771https://errata.almalinux.org/9/ALSA-2022-6839.htmlALSA-2022:6839ALSA-2022:6839  squid-5.2-1.el9_0.2.x86_64.rpm squid-5.2-1.el9_0.2.x86_64.rpmN 4iBBBBBBBBBsecurityModerate: gnutls and nettle security, bug fix, and enhancement update02https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854 https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854 ^gnutls-dane-3.7.6-12.el9_0.x86_64.rpm^gnutls-dane-3.7.6-12.el9_0.i686.rpm^gnutls-c++-3.7.6-12.el9_0.x86_64.rpm^gnutls-c++-3.7.6-12.el9_0.i686.rpm^gnutls-utils-3.7.6-12.el9_0.x86_64.rpm^gnutls-devel-3.7.6-12.el9_0.x86_64.rpm^gnutls-devel-3.7.6-12.el9_0.i686.rpm^gnutls-dane-3.7.6-12.el9_0.x86_64.rpm^gnutls-dane-3.7.6-12.el9_0.i686.rpm^gnutls-c++-3.7.6-12.el9_0.x86_64.rpm^gnutls-c++-3.7.6-12.el9_0.i686.rpm^gnutls-utils-3.7.6-12.el9_0.x86_64.rpm^gnutls-devel-3.7.6-12.el9_0.x86_64.rpm^gnutls-devel-3.7.6-12.el9_0.i686.rpmO uBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update06Vhttps://access.redhat.com/errata/RHSA-2022:6913RHSA-2022:6913RHSA-2022:6913 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-6913.htmlALSA-2022:6913ALSA-2022:6913 }dotnet-host-6.0.10-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm}aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm}dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm}dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm dotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm}dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm }dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm}aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm }dotnet-host-6.0.10-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm}aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm}dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm}dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm dotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm}dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm }dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm}aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm;P JBBBBBBBBsecurityImportant: nodejs security update0 Ohttps://access.redhat.com/errata/RHSA-2022:6963RHSA-2022:6963RHSA-2022:6963 https://access.redhat.com/security/cve/CVE-2022-35255CVE-2022-35255CVE-2022-35255https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://bugzilla.redhat.com/21305172130517https://bugzilla.redhat.com/21305182130518https://errata.almalinux.org/9/ALSA-2022-6963.htmlALSA-2022:6963ALSA-2022:6963 Lnodejs-docs-16.17.1-1.el9_0.noarch.rpm nodejs-libs-16.17.1-1.el9_0.x86_64.rpmenodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm5nodejs-16.17.1-1.el9_0.x86_64.rpm nodejs-libs-16.17.1-1.el9_0.i686.rpmanpm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpmLnodejs-docs-16.17.1-1.el9_0.noarch.rpm nodejs-libs-16.17.1-1.el9_0.x86_64.rpmenodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm5nodejs-16.17.1-1.el9_0.x86_64.rpm nodejs-libs-16.17.1-1.el9_0.i686.rpmanpm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm^Q 'UBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update0[ https://access.redhat.com/errata/RHSA-2022:6999RHSA-2022:6999RHSA-2022:6999 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-6999.htmlALSA-2022:6999ALSA-2022:6999  java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm  java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpmR 4hBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update0e_ https://access.redhat.com/errata/RHSA-2022:7007RHSA-2022:7007RHSA-2022:7007 https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://errata.almalinux.org/9/ALSA-2022-7007.htmlALSA-2022:7007ALSA-2022:7007 <.java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm5.java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm7.java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm8.java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm6.java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm4.java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm;.java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm<.java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm5.java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm7.java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm8.java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm6.java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm4.java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm;.java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpmɷS uBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update0D https://access.redhat.com/errata/RHSA-2022:7013RHSA-2022:7013RHSA-2022:7013 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-7013.htmlALSA-2022:7013ALSA-2022:7013 vxjava-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpmtxjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpmuxjava-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpmqxjava-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpmsxjava-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpmrxjava-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpmwxjava-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpmpxjava-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpmoxjava-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm vxjava-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpmtxjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpmuxjava-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpmqxjava-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpmsxjava-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpmrxjava-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpmwxjava-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpmpxjava-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpmoxjava-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpmT HsecurityImportant: firefox security update0OKhttps://access.redhat.com/errata/RHSA-2022:7020RHSA-2022:7020RHSA-2022:7020 https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-7020.htmlALSA-2022:7020ALSA-2022:7020 9Pfirefox-102.3.0-7.el9_0.alma.x86_64.rpm9Pfirefox-102.3.0-7.el9_0.alma.x86_64.rpm+U KsecurityImportant: firefox security update0) https://access.redhat.com/errata/RHSA-2022:7071RHSA-2022:7071RHSA-2022:7071 https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7071.htmlALSA-2022:7071ALSA-2022:7071 9firefox-102.4.0-1.el9_0.alma.x86_64.rpm9firefox-102.4.0-1.el9_0.alma.x86_64.rpmAV NsecurityImportant: thunderbird security update0C>https://access.redhat.com/errata/RHSA-2022:7178RHSA-2022:7178RHSA-2022:7178 https://access.redhat.com/security/cve/CVE-2022-39236CVE-2022-39236CVE-2022-39236https://access.redhat.com/security/cve/CVE-2022-39249CVE-2022-39249CVE-2022-39249https://access.redhat.com/security/cve/CVE-2022-39250CVE-2022-39250CVE-2022-39250https://access.redhat.com/security/cve/CVE-2022-39251CVE-2022-39251CVE-2022-39251https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21353912135391https://bugzilla.redhat.com/21353932135393https://bugzilla.redhat.com/21353952135395https://bugzilla.redhat.com/21353962135396https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7178.htmlALSA-2022:7178ALSA-2022:7178 :thunderbird-102.4.0-1.el9_0.alma.x86_64.rpm:thunderbird-102.4.0-1.el9_0.alma.x86_64.rpm:W QBBBsecurityImportant: openssl security update0https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288 https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288  iopenssl-devel-3.0.1-43.el9_0.x86_64.rpm iopenssl-devel-3.0.1-43.el9_0.i686.rpmLiopenssl-perl-3.0.1-43.el9_0.x86_64.rpm iopenssl-devel-3.0.1-43.el9_0.x86_64.rpm iopenssl-devel-3.0.1-43.el9_0.i686.rpmLiopenssl-perl-3.0.1-43.el9_0.x86_64.rpmhX WsecurityModerate: zlib security update0Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314 E2zlib-devel-1.2.11-32.el9_0.i686.rpmE2zlib-devel-1.2.11-32.el9_0.i686.rpmOY 'ZBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0chttps://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318 https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 kernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm%perf-5.14.0-70.30.1.el9_0.x86_64.rpm"kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm$kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm&kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm!kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm#kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm%perf-5.14.0-70.30.1.el9_0.x86_64.rpm"kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm$kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm&kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm!kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm#kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm^Z -hBBBsecurityModerate: python3.9 security update0fnhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323 https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323 = python3-tkinter-3.9.10-3.el9_0.x86_64.rpmj python-unversioned-command-3.9.10-3.el9_0.noarch.rpmW python3-devel-3.9.10-3.el9_0.x86_64.rpm= python3-tkinter-3.9.10-3.el9_0.x86_64.rpmj python-unversioned-command-3.9.10-3.el9_0.noarch.rpmW python3-devel-3.9.10-3.el9_0.x86_64.rpm[ 2@BBBBBBiBBsecurityImportant: pki-core security update0Thttps://access.redhat.com/errata/RHSA-2022:7326RHSA-2022:7326RHSA-2022:7326 https://access.redhat.com/security/cve/CVE-2022-2414CVE-2022-2414CVE-2022-2414https://bugzilla.redhat.com/21046762104676https://errata.almalinux.org/9/ALSA-2022-7326.htmlALSA-2022:7326ALSA-2022:7326 nDpki-symkey-11.0.6-2.el9_0.x86_64.rpmyDpython3-pki-11.0.6-2.el9_0.noarch.rpmpDpki-kra-11.0.6-2.el9_0.noarch.rpmiDpki-base-java-11.0.6-2.el9_0.noarch.rpmgDpki-acme-11.0.6-2.el9_0.noarch.rpmqDpki-server-11.0.6-2.el9_0.noarch.rpmoDpki-tools-11.0.6-2.el9_0.x86_64.rpmhDpki-base-11.0.6-2.el9_0.noarch.rpmjDpki-ca-11.0.6-2.el9_0.noarch.rpm nDpki-symkey-11.0.6-2.el9_0.x86_64.rpmyDpython3-pki-11.0.6-2.el9_0.noarch.rpmpDpki-kra-11.0.6-2.el9_0.noarch.rpmiDpki-base-java-11.0.6-2.el9_0.noarch.rpmgDpki-acme-11.0.6-2.el9_0.noarch.rpmqDpki-server-11.0.6-2.el9_0.noarch.rpmoDpki-tools-11.0.6-2.el9_0.x86_64.rpmhDpki-base-11.0.6-2.el9_0.noarch.rpmjDpki-ca-11.0.6-2.el9_0.noarch.rpm \ 5ssecurityModerate: lua security update0phttps://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329 https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329 lua-5.4.2-4.el9_0.3.x86_64.rpmlua-5.4.2-4.el9_0.3.x86_64.rpm] 8vsecurityLow: Image Builder security, bug fix, and enhancement update0/ https://access.redhat.com/errata/RHSA-2022:7950RHSA-2022:7950RHSA-2022:7950 https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://errata.almalinux.org/9/ALSA-2022-7950.htmlALSA-2022:7950ALSA-2022:7950 ^weldr-client-35.5-4.el9.x86_64.rpm^weldr-client-35.5-4.el9.x86_64.rpm݆^ yBBBBBBBBBsecurityModerate: podman security and bug fix update0zhttps://access.redhat.com/errata/RHSA-2022:7954RHSA-2022:7954RHSA-2022:7954 https://access.redhat.com/security/cve/CVE-2020-28851CVE-2020-28851CVE-2020-28851https://access.redhat.com/security/cve/CVE-2020-28852CVE-2020-28852CVE-2020-28852https://access.redhat.com/security/cve/CVE-2021-20199CVE-2021-20199CVE-2021-20199https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-34558CVE-2021-34558CVE-2021-34558https://access.redhat.com/security/cve/CVE-2021-4024CVE-2021-4024CVE-2021-4024https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://bugzilla.redhat.com/19133331913333https://bugzilla.redhat.com/19133381913338https://bugzilla.redhat.com/19190501919050https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19835961983596https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/20266752026675https://bugzilla.redhat.com/20647022064702https://errata.almalinux.org/9/ALSA-2022-7954.htmlALSA-2022:7954ALSA-2022:7954 %&podman-remote-4.2.0-3.el9.x86_64.rpm&&podman-tests-4.2.0-3.el9.x86_64.rpmO&podman-gvproxy-4.2.0-3.el9.x86_64.rpm#&podman-4.2.0-3.el9.x86_64.rpmf&podman-docker-4.2.0-3.el9.noarch.rpm$&podman-plugins-4.2.0-3.el9.x86_64.rpm%&podman-remote-4.2.0-3.el9.x86_64.rpm&&podman-tests-4.2.0-3.el9.x86_64.rpmO&podman-gvproxy-4.2.0-3.el9.x86_64.rpm#&podman-4.2.0-3.el9.x86_64.rpmf&podman-docker-4.2.0-3.el9.noarch.rpm$&podman-plugins-4.2.0-3.el9.x86_64.rpmܸN_ EBBsecurityModerate: skopeo security and bug fix update0?https://access.redhat.com/errata/RHSA-2022:7955RHSA-2022:7955RHSA-2022:7955 https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895751989575https://errata.almalinux.org/9/ALSA-2022-7955.htmlALSA-2022:7955ALSA-2022:7955 ;Mskopeo-tests-1.9.2-1.el9.x86_64.rpm:Mskopeo-1.9.2-1.el9.x86_64.rpm;Mskopeo-tests-1.9.2-1.el9.x86_64.rpm:Mskopeo-1.9.2-1.el9.x86_64.rpmܷ-` JBBBBBBBBBBBBBBsecurityLow: libguestfs security, bug fix, and enhancement update0/Ghttps://access.redhat.com/errata/RHSA-2022:7958RHSA-2022:7958RHSA-2022:7958 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7958.htmlALSA-2022:7958ALSA-2022:7958 ;Blibguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm:Blibguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpmpython3-unbound-1.16.2-2.el9.x86_64.rpm5>unbound-libs-1.16.2-2.el9.x86_64.rpm5>unbound-libs-1.16.2-2.el9.i686.rpmU>unbound-1.16.2-2.el9.x86_64.rpmR>python3-unbound-1.16.2-2.el9.x86_64.rpm5>unbound-libs-1.16.2-2.el9.x86_64.rpm5>unbound-libs-1.16.2-2.el9.i686.rpmU>unbound-1.16.2-2.el9.x86_64.rpmބxn uBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security, bug fix, and enhancement update0=nhttps://access.redhat.com/errata/RHSA-2022:8067RHSA-2022:8067RHSA-2022:8067 https://access.redhat.com/security/cve/CVE-2022-22719CVE-2022-22719CVE-2022-22719https://access.redhat.com/security/cve/CVE-2022-22721CVE-2022-22721CVE-2022-22721https://access.redhat.com/security/cve/CVE-2022-23943CVE-2022-23943CVE-2022-23943https://access.redhat.com/security/cve/CVE-2022-26377CVE-2022-26377CVE-2022-26377https://access.redhat.com/security/cve/CVE-2022-28614CVE-2022-28614CVE-2022-28614https://access.redhat.com/security/cve/CVE-2022-28615CVE-2022-28615CVE-2022-28615https://access.redhat.com/security/cve/CVE-2022-29404CVE-2022-29404CVE-2022-29404https://access.redhat.com/security/cve/CVE-2022-30522CVE-2022-30522CVE-2022-30522https://access.redhat.com/security/cve/CVE-2022-30556CVE-2022-30556CVE-2022-30556https://access.redhat.com/security/cve/CVE-2022-31813CVE-2022-31813CVE-2022-31813https://bugzilla.redhat.com/20643192064319https://bugzilla.redhat.com/20643202064320https://bugzilla.redhat.com/20643222064322https://bugzilla.redhat.com/20949972094997https://bugzilla.redhat.com/20950022095002https://bugzilla.redhat.com/20950062095006https://bugzilla.redhat.com/20950122095012https://bugzilla.redhat.com/20950152095015https://bugzilla.redhat.com/20950182095018https://bugzilla.redhat.com/20950202095020https://errata.almalinux.org/9/ALSA-2022-8067.htmlALSA-2022:8067ALSA-2022:8067 3Chttpd-manual-2.4.53-7.el9.noarch.rpmCmod_ldap-2.4.53-7.el9.x86_64.rpmCmod_lua-2.4.53-7.el9.x86_64.rpm mod_proxy_html-2.4.53-7.el9.x86_64.rpmnChttpd-tools-2.4.53-7.el9.x86_64.rpm2Chttpd-filesystem-2.4.53-7.el9.noarch.rpmCmod_session-2.4.53-7.el9.x86_64.rpmlChttpd-core-2.4.53-7.el9.x86_64.rpmkChttpd-2.4.53-7.el9.x86_64.rpm mod_ssl-2.4.53-7.el9.x86_64.rpmmChttpd-devel-2.4.53-7.el9.x86_64.rpm 3Chttpd-manual-2.4.53-7.el9.noarch.rpmCmod_ldap-2.4.53-7.el9.x86_64.rpmCmod_lua-2.4.53-7.el9.x86_64.rpm mod_proxy_html-2.4.53-7.el9.x86_64.rpmnChttpd-tools-2.4.53-7.el9.x86_64.rpm2Chttpd-filesystem-2.4.53-7.el9.noarch.rpmCmod_session-2.4.53-7.el9.x86_64.rpmlChttpd-core-2.4.53-7.el9.x86_64.rpmkChttpd-2.4.53-7.el9.x86_64.rpm mod_ssl-2.4.53-7.el9.x86_64.rpmmChttpd-devel-2.4.53-7.el9.x86_64.rpmܙIo JBBBBBBBBBBBsecurityModerate: bind security update0+ https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068 https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068 ]Obind-chroot-9.16.23-5.el9_1.x86_64.rpm_Obind-libs-9.16.23-5.el9_1.x86_64.rpm^Obind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm\Obind-9.16.23-5.el9_1.x86_64.rpm-Obind-license-9.16.23-5.el9_1.noarch.rpm`Obind-utils-9.16.23-5.el9_1.x86_64.rpm9Opython3-bind-9.16.23-5.el9_1.noarch.rpm,Obind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm]Obind-chroot-9.16.23-5.el9_1.x86_64.rpm_Obind-libs-9.16.23-5.el9_1.x86_64.rpm^Obind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm\Obind-9.16.23-5.el9_1.x86_64.rpm-Obind-license-9.16.23-5.el9_1.noarch.rpm`Obind-utils-9.16.23-5.el9_1.x86_64.rpm9Opython3-bind-9.16.23-5.el9_1.noarch.rpm,Obind-dnssec-doc-9.16.23-5.el9_1.noarch.rpmܖ<p XBBsecurityModerate: dnsmasq security and bug fix update080https://access.redhat.com/errata/RHSA-2022:8070RHSA-2022:8070RHSA-2022:8070 https://access.redhat.com/security/cve/CVE-2022-0934CVE-2022-0934CVE-2022-0934https://bugzilla.redhat.com/20570752057075https://errata.almalinux.org/9/ALSA-2022-8070.htmlALSA-2022:8070ALSA-2022:8070 v/dnsmasq-utils-2.85-5.el9.x86_64.rpmu/dnsmasq-2.85-5.el9.x86_64.rpmv/dnsmasq-utils-2.85-5.el9.x86_64.rpmu/dnsmasq-2.85-5.el9.x86_64.rpmܔ=q ]BsecurityModerate: flac security update0hjhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078 https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078 4flac-libs-1.3.3-10.el9.i686.rpm4flac-libs-1.3.3-10.el9.x86_64.rpm4flac-libs-1.3.3-10.el9.i686.rpm4flac-libs-1.3.3-10.el9.x86_64.rpmކKr #asecurityLow: runc security update0/R%https://access.redhat.com/errata/RHSA-2022:8090RHSA-2022:8090RHSA-2022:8090 https://access.redhat.com/security/cve/CVE-2022-29162CVE-2022-29162CVE-2022-29162https://bugzilla.redhat.com/20863982086398https://errata.almalinux.org/9/ALSA-2022-8090.htmlALSA-2022:8090ALSA-2022:8090 $wrunc-1.1.4-1.el9.x86_64.rpm$wrunc-1.1.4-1.el9.x86_64.rpmܐhs *dBBBBsecurityLow: redis security and bug fix update0/w>https://access.redhat.com/errata/RHSA-2022:8096RHSA-2022:8096RHSA-2022:8096 https://access.redhat.com/security/cve/CVE-2022-24735CVE-2022-24735CVE-2022-24735https://access.redhat.com/security/cve/CVE-2022-24736CVE-2022-24736CVE-2022-24736https://bugzilla.redhat.com/20802862080286https://bugzilla.redhat.com/20802892080289https://errata.almalinux.org/9/ALSA-2022-8096.htmlALSA-2022:8096ALSA-2022:8096 Hredis-doc-6.2.7-1.el9.noarch.rpm$Hredis-6.2.7-1.el9.x86_64.rpm@Hredis-devel-6.2.7-1.el9.x86_64.rpm@Hredis-devel-6.2.7-1.el9.i686.rpmHredis-doc-6.2.7-1.el9.noarch.rpm$Hredis-6.2.7-1.el9.x86_64.rpm@Hredis-devel-6.2.7-1.el9.x86_64.rpm@Hredis-devel-6.2.7-1.el9.i686.rpmކxt /kBBsecurityModerate: toolbox security and bug fix update05@ https://access.redhat.com/errata/RHSA-2022:8098RHSA-2022:8098RHSA-2022:8098 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073862107386https://errata.almalinux.org/9/ALSA-2022-8098.htmlALSA-2022:8098ALSA-2022:8098 7jtoolbox-tests-0.0.99.3-5.el9.x86_64.rpm6jtoolbox-0.0.99.3-5.el9.x86_64.rpm7jtoolbox-tests-0.0.99.3-5.el9.x86_64.rpm6jtoolbox-0.0.99.3-5.el9.x86_64.rpm܍eu 6pBBBBsecurityLow: swtpm security and bug fix update0/uhttps://access.redhat.com/errata/RHSA-2022:8100RHSA-2022:8100RHSA-2022:8100 https://access.redhat.com/security/cve/CVE-2022-23645CVE-2022-23645CVE-2022-23645https://bugzilla.redhat.com/20564912056491https://errata.almalinux.org/9/ALSA-2022-8100.htmlALSA-2022:8100ALSA-2022:8100 kswtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpmkswtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpmkswtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpmkswtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpmkswtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpmkswtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm܌fv 9wsecurityModerate: frr security, bug fix, and enhancement update0y$https://access.redhat.com/errata/RHSA-2022:8112RHSA-2022:8112RHSA-2022:8112 https://access.redhat.com/security/cve/CVE-2022-26125CVE-2022-26125CVE-2022-26125https://bugzilla.redhat.com/20586282058628https://errata.almalinux.org/9/ALSA-2022-8112.htmlALSA-2022:8112ALSA-2022:8112 Nfrr-8.2.2-4.el9.x86_64.rpmNfrr-8.2.2-4.el9.x86_64.rpm܋Ew y ABBBBBBBBBBBBsecurityModerate: poppler security and bug fix update0{(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151 https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151 h{poppler-cpp-21.01.0-13.el9.i686.rpmh{poppler-cpp-21.01.0-13.el9.x86_64.rpm:{poppler-utils-21.01.0-13.el9.x86_64.rpmi{poppler-glib-21.01.0-13.el9.x86_64.rpmg{poppler-21.01.0-13.el9.i686.rpmg{poppler-21.01.0-13.el9.x86_64.rpmj{poppler-qt5-21.01.0-13.el9.i686.rpmi{poppler-glib-21.01.0-13.el9.i686.rpmj{poppler-qt5-21.01.0-13.el9.x86_64.rpm h{poppler-cpp-21.01.0-13.el9.i686.rpmh{poppler-cpp-21.01.0-13.el9.x86_64.rpm:{poppler-utils-21.01.0-13.el9.x86_64.rpmi{poppler-glib-21.01.0-13.el9.x86_64.rpmg{poppler-21.01.0-13.el9.i686.rpmg{poppler-21.01.0-13.el9.x86_64.rpmj{poppler-qt5-21.01.0-13.el9.i686.rpmi{poppler-glib-21.01.0-13.el9.i686.rpmj{poppler-qt5-21.01.0-13.el9.x86_64.rpmއTz PBBBsecurityModerate: 389-ds-base security, bug fix, and enhancement update0#phttps://access.redhat.com/errata/RHSA-2022:8162RHSA-2022:8162RHSA-2022:8162 https://access.redhat.com/security/cve/CVE-2022-0918CVE-2022-0918CVE-2022-0918https://access.redhat.com/security/cve/CVE-2022-0996CVE-2022-0996CVE-2022-0996https://access.redhat.com/security/cve/CVE-2022-2850CVE-2022-2850CVE-2022-2850https://bugzilla.redhat.com/20558152055815https://bugzilla.redhat.com/20647692064769https://bugzilla.redhat.com/21186912118691https://errata.almalinux.org/9/ALSA-2022-8162.htmlALSA-2022:8162ALSA-2022:8162 7w389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpmRwpython3-lib389-2.1.3-4.el9_1.noarch.rpm6w389-ds-base-2.1.3-4.el9_1.x86_64.rpm7w389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpmRwpython3-lib389-2.1.3-4.el9_1.noarch.rpm6w389-ds-base-2.1.3-4.el9_1.x86_64.rpm܃{ VBBBBsecurityModerate: libtiff security update0@https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194 https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194 j@libtiff-devel-4.4.0-2.el9.x86_64.rpmi@libtiff-4.4.0-2.el9.i686.rpmi@libtiff-4.4.0-2.el9.x86_64.rpmj@libtiff-devel-4.4.0-2.el9.i686.rpmj@libtiff-devel-4.4.0-2.el9.x86_64.rpmi@libtiff-4.4.0-2.el9.i686.rpmi@libtiff-4.4.0-2.el9.x86_64.rpmj@libtiff-devel-4.4.0-2.el9.i686.rpmވ| ]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security, bug fix, and enhancement update0S<https://access.redhat.com/errata/RHSA-2022:8197RHSA-2022:8197RHSA-2022:8197 https://access.redhat.com/security/cve/CVE-2021-21708CVE-2021-21708CVE-2021-21708https://access.redhat.com/security/cve/CVE-2022-31625CVE-2022-31625CVE-2022-31625https://bugzilla.redhat.com/20558792055879https://bugzilla.redhat.com/20985212098521https://errata.almalinux.org/9/ALSA-2022-8197.htmlALSA-2022:8197ALSA-2022:8197 a<php-mbstring-8.0.20-3.el9.x86_64.rpmU<php-common-8.0.20-3.el9.x86_64.rpm<php-8.0.20-3.el9.x86_64.rpmf<php-pgsql-8.0.20-3.el9.x86_64.rpmY<php-embedded-8.0.20-3.el9.x86_64.rpm[<php-ffi-8.0.20-3.el9.x86_64.rpmW<php-dbg-8.0.20-3.el9.x86_64.rpmX<php-devel-8.0.20-3.el9.x86_64.rpmZ<php-enchant-8.0.20-3.el9.x86_64.rpmb<php-mysqlnd-8.0.20-3.el9.x86_64.rpmj<php-xml-8.0.20-3.el9.x86_64.rpm\<php-fpm-8.0.20-3.el9.x86_64.rpme<php-pdo-8.0.20-3.el9.x86_64.rpmh<php-snmp-8.0.20-3.el9.x86_64.rpm`<php-ldap-8.0.20-3.el9.x86_64.rpm^<php-gmp-8.0.20-3.el9.x86_64.rpmV<php-dba-8.0.20-3.el9.x86_64.rpm_<php-intl-8.0.20-3.el9.x86_64.rpmS<php-bcmath-8.0.20-3.el9.x86_64.rpmc<php-odbc-8.0.20-3.el9.x86_64.rpm]<php-gd-8.0.20-3.el9.x86_64.rpmT<php-cli-8.0.20-3.el9.x86_64.rpmi<php-soap-8.0.20-3.el9.x86_64.rpmg<php-process-8.0.20-3.el9.x86_64.rpmd<php-opcache-8.0.20-3.el9.x86_64.rpma<php-mbstring-8.0.20-3.el9.x86_64.rpmU<php-common-8.0.20-3.el9.x86_64.rpm<php-8.0.20-3.el9.x86_64.rpmf<php-pgsql-8.0.20-3.el9.x86_64.rpmY<php-embedded-8.0.20-3.el9.x86_64.rpm[<php-ffi-8.0.20-3.el9.x86_64.rpmW<php-dbg-8.0.20-3.el9.x86_64.rpmX<php-devel-8.0.20-3.el9.x86_64.rpmZ<php-enchant-8.0.20-3.el9.x86_64.rpmb<php-mysqlnd-8.0.20-3.el9.x86_64.rpmj<php-xml-8.0.20-3.el9.x86_64.rpm\<php-fpm-8.0.20-3.el9.x86_64.rpme<php-pdo-8.0.20-3.el9.x86_64.rpmh<php-snmp-8.0.20-3.el9.x86_64.rpm`<php-ldap-8.0.20-3.el9.x86_64.rpm^<php-gmp-8.0.20-3.el9.x86_64.rpmV<php-dba-8.0.20-3.el9.x86_64.rpm_<php-intl-8.0.20-3.el9.x86_64.rpmS<php-bcmath-8.0.20-3.el9.x86_64.rpmc<php-odbc-8.0.20-3.el9.x86_64.rpm]<php-gd-8.0.20-3.el9.x86_64.rpmT<php-cli-8.0.20-3.el9.x86_64.rpmi<php-soap-8.0.20-3.el9.x86_64.rpmg<php-process-8.0.20-3.el9.x86_64.rpmd<php-opcache-8.0.20-3.el9.x86_64.rpm5} PBsecurityLow: openjpeg2 security update0/https://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207 https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207 BIopenjpeg2-2.4.0-7.el9.i686.rpmBIopenjpeg2-2.4.0-7.el9.x86_64.rpmBIopenjpeg2-2.4.0-7.el9.i686.rpmBIopenjpeg2-2.4.0-7.el9.x86_64.rpmވY~ TBBBBBBsecurityModerate: dovecot security and enhancement update0*Zhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208 https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208 =udovecot-pgsql-2.3.16-7.el9.x86_64.rpmudovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm;udovecot-2.3.16-7.el9.x86_64.rpm=udovecot-pgsql-2.3.16-7.el9.x86_64.rpmudovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm;udovecot-2.3.16-7.el9.x86_64.rpmi ]securityModerate: mutt security update0dhttps://access.redhat.com/errata/RHSA-2022:8219RHSA-2022:8219RHSA-2022:8219 https://access.redhat.com/security/cve/CVE-2022-1328CVE-2022-1328CVE-2022-1328https://bugzilla.redhat.com/20760582076058https://errata.almalinux.org/9/ALSA-2022-8219.htmlALSA-2022:8219ALSA-2022:8219 omutt-2.2.6-1.el9.x86_64.rpmomutt-2.2.6-1.el9.x86_64.rpm- ,`BBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update0hZhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221 fhxorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpmlhxorg-x11-server-common-1.20.11-11.el9.x86_64.rpmjhxorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpmghxorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpmhhxorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpmihxorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpmfhxorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpmlhxorg-x11-server-common-1.20.11-11.el9.x86_64.rpmjhxorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpmghxorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpmhhxorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpmihxorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm' /msecurityModerate: xorg-x11-server-Xwayland security update0Bkhttps://access.redhat.com/errata/RHSA-2022:8222RHSA-2022:8222RHSA-2022:8222 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8222.htmlALSA-2022:8222ALSA-2022:8222 k<xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpmk<xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpmD 2psecurityModerate: python-lxml security update0-https://access.redhat.com/errata/RHSA-2022:8226RHSA-2022:8226RHSA-2022:8226 https://access.redhat.com/security/cve/CVE-2022-2309CVE-2022-2309CVE-2022-2309https://bugzilla.redhat.com/21075712107571https://errata.almalinux.org/9/ALSA-2022-8226.htmlALSA-2022:8226ALSA-2022:8226 kpython3-lxml-4.6.5-3.el9.x86_64.rpmkpython3-lxml-4.6.5-3.el9.x86_64.rpm۾ 5ssecurityModerate: grafana-pcp security update0>https://access.redhat.com/errata/RHSA-2022:8250RHSA-2022:8250RHSA-2022:8250 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://errata.almalinux.org/9/ALSA-2022-8250.htmlALSA-2022:8250ALSA-2022:8250 Qgrafana-pcp-3.2.0-3.el9.x86_64.rpmQgrafana-pcp-3.2.0-3.el9.x86_64.rpmۻ9 8vsecurityModerate: yajl security update0?Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252 https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252 h#yajl-2.1.0-21.el9.x86_64.rpmh#yajl-2.1.0-21.el9.x86_64.rpm3 yBBBBBsecurityImportant: dpdk security and bug fix update0)https://access.redhat.com/errata/RHSA-2022:8263RHSA-2022:8263RHSA-2022:8263 https://access.redhat.com/security/cve/CVE-2021-3839CVE-2021-3839CVE-2021-3839https://access.redhat.com/security/cve/CVE-2022-2132CVE-2022-2132CVE-2022-2132https://access.redhat.com/security/cve/CVE-2022-28199CVE-2022-28199CVE-2022-28199https://bugzilla.redhat.com/20258822025882https://bugzilla.redhat.com/20994752099475https://bugzilla.redhat.com/21235492123549https://errata.almalinux.org/9/ALSA-2022-8263.htmlALSA-2022:8263ALSA-2022:8263 A]dpdk-doc-21.11.2-1.el9_1.noarch.rpmB]dpdk-tools-21.11.2-1.el9_1.x86_64.rpm?]dpdk-21.11.2-1.el9_1.x86_64.rpm@]dpdk-devel-21.11.2-1.el9_1.x86_64.rpmA]dpdk-doc-21.11.2-1.el9_1.noarch.rpmB]dpdk-tools-21.11.2-1.el9_1.x86_64.rpm?]dpdk-21.11.2-1.el9_1.x86_64.rpm@]dpdk-devel-21.11.2-1.el9_1.x86_64.rpm۹ ABBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update0=?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 &kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm!kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm"kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm#kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%perf-5.14.0-162.6.1.el9_1.x86_64.rpm&kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm!kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm"kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm#kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%perf-5.14.0-162.6.1.el9_1.x86_64.rpm۰N securityModerate: rsync security and bug fix update0@zhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291 gErsync-daemon-3.2.3-18.el9.noarch.rpmgErsync-daemon-3.2.3-18.el9.noarch.rpmۨ@ QBsecurityLow: curl security update0/:8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299 https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299 zlibcurl-devel-7.76.1-19.el9.x86_64.rpmzlibcurl-devel-7.76.1-19.el9.i686.rpmzlibcurl-devel-7.76.1-19.el9.x86_64.rpmzlibcurl-devel-7.76.1-19.el9.i686.rpmދ  !UBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update0rmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317 bsamba-client-4.16.4-101.el9.x86_64.rpmcsamba-krb5-printing-4.16.4-101.el9.x86_64.rpmesamba-winbind-clients-4.16.4-101.el9.x86_64.rpmgsamba-winexe-4.16.4-101.el9.x86_64.rpmdsamba-vfs-iouring-4.16.4-101.el9.x86_64.rpmfsamba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpmbsamba-client-4.16.4-101.el9.x86_64.rpmcsamba-krb5-printing-4.16.4-101.el9.x86_64.rpmesamba-winbind-clients-4.16.4-101.el9.x86_64.rpmgsamba-winexe-4.16.4-101.el9.x86_64.rpmdsamba-vfs-iouring-4.16.4-101.el9.x86_64.rpmfsamba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpmۓ<  %bBsecurityModerate: freetype security update0_Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340 https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340 Ffreetype-devel-2.10.4-9.el9.x86_64.rpmFfreetype-devel-2.10.4-9.el9.i686.rpmFfreetype-devel-2.10.4-9.el9.x86_64.rpmFfreetype-devel-2.10.4-9.el9.i686.rpmތ/  ,fBBBBsecurityModerate: python3.9 security, bug fix, and enhancement update0.5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353 =#python3-tkinter-3.9.14-1.el9.x86_64.rpmj#python-unversioned-command-3.9.14-1.el9.noarch.rpmW#python3-devel-3.9.14-1.el9.x86_64.rpmW#python3-devel-3.9.14-1.el9.i686.rpm=#python3-tkinter-3.9.14-1.el9.x86_64.rpmj#python-unversioned-command-3.9.14-1.el9.noarch.rpmW#python3-devel-3.9.14-1.el9.x86_64.rpmW#python3-devel-3.9.14-1.el9.i686.rpmތ?  3mBBBBsecurityModerate: e2fsprogs security update0c<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361 https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361 e2fsprogs-devel-1.46.5-3.el9.x86_64.rpme2fsprogs-devel-1.46.5-3.el9.i686.rpmBlibcom_err-devel-1.46.5-3.el9.i686.rpmBlibcom_err-devel-1.46.5-3.el9.x86_64.rpme2fsprogs-devel-1.46.5-3.el9.x86_64.rpme2fsprogs-devel-1.46.5-3.el9.i686.rpmBlibcom_err-devel-1.46.5-3.el9.i686.rpmBlibcom_err-devel-1.46.5-3.el9.x86_64.rpmu  :tBBBBsecurityModerate: harfbuzz security update0uhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384 https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384 #harfbuzz-devel-2.7.4-8.el9.i686.rpm$harfbuzz-icu-2.7.4-8.el9.x86_64.rpm#harfbuzz-devel-2.7.4-8.el9.x86_64.rpm$harfbuzz-icu-2.7.4-8.el9.i686.rpm#harfbuzz-devel-2.7.4-8.el9.i686.rpm$harfbuzz-icu-2.7.4-8.el9.x86_64.rpm#harfbuzz-devel-2.7.4-8.el9.x86_64.rpm$harfbuzz-icu-2.7.4-8.el9.i686.rpmލ {BBBBBBBBBBBsecurityLow: podman security, bug fix, and enhancement update0/https://access.redhat.com/errata/RHSA-2022:8431RHSA-2022:8431RHSA-2022:8431 https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8431.htmlALSA-2022:8431ALSA-2022:8431 %podman-remote-4.2.0-7.el9_1.x86_64.rpm#podman-4.2.0-7.el9_1.x86_64.rpmfpodman-docker-4.2.0-7.el9_1.noarch.rpm$podman-plugins-4.2.0-7.el9_1.x86_64.rpmOpodman-gvproxy-4.2.0-7.el9_1.x86_64.rpmqpodman-catatonit-4.2.0-7.el9_1.x86_64.rpm&podman-tests-4.2.0-7.el9_1.x86_64.rpm%podman-remote-4.2.0-7.el9_1.x86_64.rpm#podman-4.2.0-7.el9_1.x86_64.rpmfpodman-docker-4.2.0-7.el9_1.noarch.rpm$podman-plugins-4.2.0-7.el9_1.x86_64.rpmOpodman-gvproxy-4.2.0-7.el9_1.x86_64.rpmqpodman-catatonit-4.2.0-7.el9_1.x86_64.rpm&podman-tests-4.2.0-7.el9_1.x86_64.rpm IBBBBBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security, bug fix, and enhancement update03Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434 ?dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmdotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpmIdotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm;aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmAdotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmCdotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmEdotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm ?dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmdotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpmIdotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm;aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmAdotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmCdotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmEdotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm] +^BBBBBBBBBBBsecurityModerate: keylime security update0|https://access.redhat.com/errata/RHSA-2022:8444RHSA-2022:8444RHSA-2022:8444 https://access.redhat.com/security/cve/CVE-2022-3500CVE-2022-3500CVE-2022-3500https://bugzilla.redhat.com/21353432135343https://errata.almalinux.org/9/ALSA-2022-8444.htmlALSA-2022:8444ALSA-2022:8444 dkeylime-selinux-6.5.1-1.el9_1.noarch.rpm<keylime-6.5.1-1.el9_1.x86_64.rpmQpython3-keylime-6.5.1-1.el9_1.x86_64.rpm>keylime-registrar-6.5.1-1.el9_1.x86_64.rpm=keylime-base-6.5.1-1.el9_1.x86_64.rpm?keylime-tenant-6.5.1-1.el9_1.x86_64.rpm@keylime-verifier-6.5.1-1.el9_1.x86_64.rpmdkeylime-selinux-6.5.1-1.el9_1.noarch.rpm<keylime-6.5.1-1.el9_1.x86_64.rpmQpython3-keylime-6.5.1-1.el9_1.x86_64.rpm>keylime-registrar-6.5.1-1.el9_1.x86_64.rpm=keylime-base-6.5.1-1.el9_1.x86_64.rpm?keylime-tenant-6.5.1-1.el9_1.x86_64.rpm@keylime-verifier-6.5.1-1.el9_1.x86_64.rpm' 2lBBBBsecurityImportant: python3.9 security update0Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493 j$python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmW$python3-devel-3.9.14-1.el9_1.1.i686.rpmW$python3-devel-3.9.14-1.el9_1.1.x86_64.rpm=$python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmj$python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmW$python3-devel-3.9.14-1.el9_1.1.i686.rpmW$python3-devel-3.9.14-1.el9_1.1.x86_64.rpm=$python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmz 5ssecurityImportant: thunderbird security update0`Dhttps://access.redhat.com/errata/RHSA-2022:8561RHSA-2022:8561RHSA-2022:8561 https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8561.htmlALSA-2022:8561ALSA-2022:8561 :Rthunderbird-102.5.0-2.el9_1.alma.x86_64.rpm:Rthunderbird-102.5.0-2.el9_1.alma.x86_64.rpm} 8vsecurityImportant: firefox security update0$uhttps://access.redhat.com/errata/RHSA-2022:8580RHSA-2022:8580RHSA-2022:8580 https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8580.htmlALSA-2022:8580ALSA-2022:8580 9Qfirefox-102.5.0-1.el9_1.alma.x86_64.rpm9Qfirefox-102.5.0-1.el9_1.alma.x86_64.rpmR )krb5-devel-1.19.1-24.el9_1.i686.rpm>)krb5-devel-1.19.1-24.el9_1.x86_64.rpm>)krb5-devel-1.19.1-24.el9_1.i686.rpm>)krb5-devel-1.19.1-24.el9_1.x86_64.rpm }BBBsecurityImportant: varnish security update0Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643 https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643 ?varnish-docs-6.6.2-2.el9_1.1.x86_64.rpmvvarnish-6.6.2-2.el9_1.1.i686.rpmvvarnish-6.6.2-2.el9_1.1.x86_64.rpm?varnish-docs-6.6.2-2.el9_1.1.x86_64.rpmvvarnish-6.6.2-2.el9_1.1.i686.rpmvvarnish-6.6.2-2.el9_1.1.x86_64.rpm _BdBBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update0V}https://access.redhat.com/errata/RHSA-2022:8832RHSA-2022:8832RHSA-2022:8832 https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2022-8832.htmlALSA-2022:8832ALSA-2022:8832 57w(LHnodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpm{nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmanpm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpm"Hnodejs-devel-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeHnodejs-full-i18n-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm5Hnodejs-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm57w(LHnodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpm{nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmanpm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpm"Hnodejs-devel-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeHnodejs-full-i18n-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm5Hnodejs-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm7 NsecurityImportant: firefox security update0S3https://access.redhat.com/errata/RHSA-2022:9065RHSA-2022:9065RHSA-2022:9065 https://access.redhat.com/security/cve/CVE-2022-46872CVE-2022-46872CVE-2022-46872https://access.redhat.com/security/cve/CVE-2022-46874CVE-2022-46874CVE-2022-46874https://access.redhat.com/security/cve/CVE-2022-46878CVE-2022-46878CVE-2022-46878https://access.redhat.com/security/cve/CVE-2022-46880CVE-2022-46880CVE-2022-46880https://access.redhat.com/security/cve/CVE-2022-46881CVE-2022-46881CVE-2022-46881https://access.redhat.com/security/cve/CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/21534412153441https://bugzilla.redhat.com/21534492153449https://bugzilla.redhat.com/21534542153454https://bugzilla.redhat.com/21534632153463https://bugzilla.redhat.com/21534662153466https://bugzilla.redhat.com/21534672153467https://errata.almalinux.org/9/ALSA-2022-9065.htmlALSA-2022:9065ALSA-2022:9065 9Sfirefox-102.6.0-1.el9_1.alma.x86_64.rpm9Sfirefox-102.6.0-1.el9_1.alma.x86_64.rpm: QsecurityImportant: thunderbird security update08https://access.redhat.com/errata/RHSA-2022:9080RHSA-2022:9080RHSA-2022:9080 https://access.redhat.com/security/cve/CVE-2022-45414CVE-2022-45414CVE-2022-45414https://access.redhat.com/security/cve/CVE-2022-46872CVE-2022-46872CVE-2022-46872https://access.redhat.com/security/cve/CVE-2022-46874CVE-2022-46874CVE-2022-46874https://access.redhat.com/security/cve/CVE-2022-46878CVE-2022-46878CVE-2022-46878https://access.redhat.com/security/cve/CVE-2022-46880CVE-2022-46880CVE-2022-46880https://access.redhat.com/security/cve/CVE-2022-46881CVE-2022-46881CVE-2022-46881https://access.redhat.com/security/cve/CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/21498682149868https://bugzilla.redhat.com/21534412153441https://bugzilla.redhat.com/21534492153449https://bugzilla.redhat.com/21534542153454https://bugzilla.redhat.com/21534632153463https://bugzilla.redhat.com/21534662153466https://bugzilla.redhat.com/21534672153467https://errata.almalinux.org/9/ALSA-2022-9080.htmlALSA-2022:9080ALSA-2022:9080 :Tthunderbird-102.6.0-2.el9_1.alma.x86_64.rpm:Tthunderbird-102.6.0-2.el9_1.alma.x86_64.rpm# securityImportant: bcel security update>lhttps://access.redhat.com/errata/RHSA-2023:0005RHSA-2023:0005RHSA-2023:0005 https://access.redhat.com/security/cve/CVE-2022-42920CVE-2022-42920CVE-2022-42920https://bugzilla.redhat.com/21427072142707https://errata.almalinux.org/9/ALSA-2023-0005.htmlALSA-2023:0005ALSA-2023:0005 skbcel-6.4.1-9.el9_1.noarch.rpmskbcel-6.4.1-9.el9_1.noarch.rpme "VBBBBBBBBBBsecurityImportant: webkit2gtk3 security update*https://access.redhat.com/errata/RHSA-2023:0021RHSA-2023:0021RHSA-2023:0021 https://access.redhat.com/security/cve/CVE-2022-42856CVE-2022-42856CVE-2022-42856https://bugzilla.redhat.com/21536832153683https://errata.almalinux.org/9/ALSA-2023-0021.htmlALSA-2023:0021ALSA-2023:0021 4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm1awebkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm1awebkit2gtk3-2.36.7-1.el9_1.1.i686.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm1awebkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm1awebkit2gtk3-2.36.7-1.el9_1.1.i686.rpm  3cBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement updateD`https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077 https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077 dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpmaspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpmdotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpmUdotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpmdotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm Udotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpmdotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpmaspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpmdotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpmUdotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpmdotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm Udotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm tBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update$Hhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194  java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm  java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm GBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix updatellhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202 tyjava-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpmryjava-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpmwyjava-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpmpyjava-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpmuyjava-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpmqyjava-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpmoyjava-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpmsyjava-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpmvyjava-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm tyjava-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpmryjava-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpmwyjava-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpmpyjava-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpmuyjava-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpmqyjava-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpmoyjava-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpmsyjava-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpmvyjava-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm &ZBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateXxhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210 https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210 8/java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm7/java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm5/java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm6/java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm4/java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm;/java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpmtBBBBBBBBsecurityModerate: usbguard security update*https://access.redhat.com/errata/RHSA-2023:0303RHSA-2023:0303RHSA-2023:0303 https://access.redhat.com/security/cve/CVE-2019-25058CVE-2019-25058CVE-2019-25058https://bugzilla.redhat.com/20584652058465https://errata.almalinux.org/9/ALSA-2023-0303.htmlALSA-2023:0303ALSA-2023:0303 ;6usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm96usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpmw6usbguard-1.0.0-10.el9_1.2.i686.rpmw6usbguard-1.0.0-10.el9_1.2.x86_64.rpmq6usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm:6usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm;6usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm96usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpmw6usbguard-1.0.0-10.el9_1.2.i686.rpmw6usbguard-1.0.0-10.el9_1.2.x86_64.rpmq6usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm:6usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm# 7BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update@z https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304 https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304 0elibreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpm)autocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpmUlibreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm.autocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpm%autocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm4libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpmvlibreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpm]libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm3autocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpmilibreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm/autocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpmflibreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpm5autocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpm1autocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpm\libreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpm`libreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpm2autocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpmWlibreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpm"libreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm[libreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm/libreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpmllibreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpm}libreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm6autocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpm7libreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmclibreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpm4autocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm@libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmblibreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm!autocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpm*libreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmolibreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmZlibreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm{libreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm-autocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpmylibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpm-libreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpmklibreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpm[libreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm'libreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpm(autocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpm7autocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpmwlibreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpmulibreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm,autocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpmZlibreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmrlibreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpmplibreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm#autocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm|libreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpm*autocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpm$libreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpm\libreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpmjlibreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm~libreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm0libreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm autocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpm0autocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpmKlibreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpmHlibreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmslibreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm&autocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm+autocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpm$autocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpm1libreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpmWlibreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpmXlibreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm8autocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpmhlibreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpm)libreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmYlibreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpm"autocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmYlibreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpmalibreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm'autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpm_libreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm0elibreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpm)autocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpmUlibreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm.autocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpm%autocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm4libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpmvlibreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpm]libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm3autocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpmilibreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm/autocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpmflibreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpm5autocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpm1autocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpm\libreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpm`libreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpm2autocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpmWlibreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpm"libreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm[libreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm/libreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpmllibreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpm}libreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm6autocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpm7libreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmclibreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpm4autocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm@libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmblibreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm!autocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpm*libreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmolibreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmZlibreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm{libreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm-autocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpmylibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpm-libreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpmklibreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpm[libreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpm'libreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpm(autocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpm7autocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpmwlibreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpmulibreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm,autocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpmZlibreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmrlibreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpmplibreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm#autocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm|libreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpm*autocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpm$libreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpm\libreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpmjlibreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpm~libreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm0libreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm autocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpm0autocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpmKlibreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpmHlibreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmslibreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm&autocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm+autocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpm$autocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpm1libreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpmWlibreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpmXlibreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm8autocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpmhlibreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpm)libreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmYlibreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpm"autocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmYlibreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpmalibreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm'autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpm_libreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm6$ 98securityModerate: postgresql-jdbc security update:khttps://access.redhat.com/errata/RHSA-2023:0318RHSA-2023:0318RHSA-2023:0318 https://access.redhat.com/security/cve/CVE-2022-31197CVE-2022-31197CVE-2022-31197https://bugzilla.redhat.com/21294282129428https://errata.almalinux.org/9/ALSA-2023-0318.htmlALSA-2023:0318ALSA-2023:0318 cZpostgresql-jdbc-42.2.18-6.el9_1.noarch.rpmcZpostgresql-jdbc-42.2.18-6.el9_1.noarch.rpmd% zBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update%e https://access.redhat.com/errata/RHSA-2023:0321RHSA-2023:0321RHSA-2023:0321 https://access.redhat.com/security/cve/CVE-2021-44906CVE-2021-44906CVE-2021-44906https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/20660092066009https://bugzilla.redhat.com/21305182130518https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2023-0321.htmlALSA-2023:0321ALSA-2023:0321 Lnodejs-docs-16.18.1-3.el9_1.noarch.rpm nodejs-libs-16.18.1-3.el9_1.i686.rpm{nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm5nodejs-16.18.1-3.el9_1.x86_64.rpm nodejs-libs-16.18.1-3.el9_1.x86_64.rpmenodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmanpm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpmLnodejs-docs-16.18.1-3.el9_1.noarch.rpm nodejs-libs-16.18.1-3.el9_1.i686.rpm{nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm5nodejs-16.18.1-3.el9_1.x86_64.rpm nodejs-libs-16.18.1-3.el9_1.x86_64.rpmenodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmanpm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm& FBBBBBBBBBBsecurityModerate: go-toolset and golang security and bug fix update https://access.redhat.com/errata/RHSA-2023:0328RHSA-2023:0328RHSA-2023:0328 https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-0328.htmlALSA-2023:0328ALSA-2023:0328 KSgolang-race-1.18.9-1.el9_1.x86_64.rpmpSgo-toolset-1.18.9-1.el9_1.x86_64.rpmSgolang-tests-1.18.9-1.el9_1.noarch.rpm@Sgolang-bin-1.18.9-1.el9_1.x86_64.rpm?Sgolang-1.18.9-1.el9_1.x86_64.rpmSgolang-docs-1.18.9-1.el9_1.noarch.rpmSgolang-misc-1.18.9-1.el9_1.noarch.rpmSgolang-src-1.18.9-1.el9_1.noarch.rpmKSgolang-race-1.18.9-1.el9_1.x86_64.rpmpSgo-toolset-1.18.9-1.el9_1.x86_64.rpmSgolang-tests-1.18.9-1.el9_1.noarch.rpm@Sgolang-bin-1.18.9-1.el9_1.x86_64.rpm?Sgolang-1.18.9-1.el9_1.x86_64.rpmSgolang-docs-1.18.9-1.el9_1.noarch.rpmSgolang-misc-1.18.9-1.el9_1.noarch.rpmSgolang-src-1.18.9-1.el9_1.noarch.rpm' SBsecurityModerate: curl security update!&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333 https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333 {libcurl-devel-7.76.1-19.el9_1.1.i686.rpm{libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm{libcurl-devel-7.76.1-19.el9_1.1.i686.rpm{libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm( "WBBBBBBBBBsecurityImportant: kernel security and bug fix updateG;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 %,perf-5.14.0-162.12.1.el9_1.x86_64.rpm,kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm",kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm$,kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm!,kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm#,kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm%,perf-5.14.0-162.12.1.el9_1.x86_64.rpm,kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm",kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm$,kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm!,kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm#,kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpmd) *cBBBBBsecurityModerate: dbus security update^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335 https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335 8Edbus-daemon-1.12.20-7.el9_1.x86_64.rpmEdbus-devel-1.12.20-7.el9_1.x86_64.rpmEdbus-devel-1.12.20-7.el9_1.i686.rpm9Edbus-x11-1.12.20-7.el9_1.x86_64.rpm8Edbus-daemon-1.12.20-7.el9_1.x86_64.rpmEdbus-devel-1.12.20-7.el9_1.x86_64.rpmEdbus-devel-1.12.20-7.el9_1.i686.rpm9Edbus-x11-1.12.20-7.el9_1.x86_64.rpm* 0kBBBsecurityModerate: systemd security update`Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336 https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336 u~systemd-devel-250-12.el9_1.1.x86_64.rpmu~systemd-devel-250-12.el9_1.1.i686.rpm=~systemd-journal-remote-250-12.el9_1.1.x86_64.rpmu~systemd-devel-250-12.el9_1.1.x86_64.rpmu~systemd-devel-250-12.el9_1.1.i686.rpm=~systemd-journal-remote-250-12.el9_1.1.x86_64.rpm+ 4qBsecurityModerate: expat security update1}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337 https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337 uKexpat-devel-2.4.9-1.el9_1.1.i686.rpmuKexpat-devel-2.4.9-1.el9_1.1.x86_64.rpmuKexpat-devel-2.4.9-1.el9_1.1.i686.rpmuKexpat-devel-2.4.9-1.el9_1.1.x86_64.rpm, 8uBsecurityModerate: libxml2 security update.Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338 https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338 9^libxml2-devel-2.9.13-3.el9_1.x86_64.rpm9^libxml2-devel-2.9.13-3.el9_1.i686.rpm9^libxml2-devel-2.9.13-3.el9_1.x86_64.rpm9^libxml2-devel-2.9.13-3.el9_1.i686.rpm - ?yBBBBsecurityModerate: sqlite security updatet<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339 https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339 ssqlite-3.34.1-6.el9_1.i686.rpmtsqlite-devel-3.34.1-6.el9_1.x86_64.rpmssqlite-3.34.1-6.el9_1.x86_64.rpmtsqlite-devel-3.34.1-6.el9_1.i686.rpmssqlite-3.34.1-6.el9_1.i686.rpmtsqlite-devel-3.34.1-6.el9_1.x86_64.rpmssqlite-3.34.1-6.el9_1.x86_64.rpmtsqlite-devel-3.34.1-6.el9_1.i686.rpmy. @BBBsecurityModerate: libtasn1 security update0uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343 https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343 =libtasn1-devel-4.16.0-8.el9_1.i686.rpmglibtasn1-tools-4.16.0-8.el9_1.x86_64.rpm=libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm=libtasn1-devel-4.16.0-8.el9_1.i686.rpmglibtasn1-tools-4.16.0-8.el9_1.x86_64.rpm=libtasn1-devel-4.16.0-8.el9_1.x86_64.rpmW/ FBBBBsecurityImportant: libXpm security update%;https://access.redhat.com/errata/RHSA-2023:0383RHSA-2023:0383RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617CVE-2022-44617CVE-2022-44617https://access.redhat.com/security/cve/CVE-2022-46285CVE-2022-46285CVE-2022-46285https://access.redhat.com/security/cve/CVE-2022-4883CVE-2022-4883CVE-2022-4883https://bugzilla.redhat.com/21600922160092https://bugzilla.redhat.com/21601932160193https://bugzilla.redhat.com/21602132160213https://errata.almalinux.org/9/ALSA-2023-0383.htmlALSA-2023:0383ALSA-2023:0383 )!libXpm-devel-3.5.13-8.el9_1.x86_64.rpm(!libXpm-3.5.13-8.el9_1.x86_64.rpm(!libXpm-3.5.13-8.el9_1.i686.rpm)!libXpm-devel-3.5.13-8.el9_1.i686.rpm)!libXpm-devel-3.5.13-8.el9_1.x86_64.rpm(!libXpm-3.5.13-8.el9_1.x86_64.rpm(!libXpm-3.5.13-8.el9_1.i686.rpm)!libXpm-devel-3.5.13-8.el9_1.i686.rpm0 MsecurityImportant: thunderbird security update` https://access.redhat.com/errata/RHSA-2023:0476RHSA-2023:0476RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0476.htmlALSA-2023:0476ALSA-2023:0476 :Vthunderbird-102.7.1-1.el9_1.alma.x86_64.rpm:Vthunderbird-102.7.1-1.el9_1.alma.x86_64.rpmD1 PsecurityImportant: thunderbird security updatel%https://access.redhat.com/errata/RHSA-2023:0608RHSA-2023:0608RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430CVE-2023-0430CVE-2023-0430https://bugzilla.redhat.com/21665912166591https://errata.almalinux.org/9/ALSA-2023-0608.htmlALSA-2023:0608ALSA-2023:0608 :Wthunderbird-102.7.1-2.el9_1.alma.x86_64.rpm:Wthunderbird-102.7.1-2.el9_1.alma.x86_64.rpmo2 'SBBBBBBBBBBBBBBBBBBsecurityImportant: git security updateYhttps://access.redhat.com/errata/RHSA-2023:0611RHSA-2023:0611RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521CVE-2022-23521CVE-2022-23521https://access.redhat.com/security/cve/CVE-2022-41903CVE-2022-41903CVE-2022-41903https://bugzilla.redhat.com/21620552162055https://bugzilla.redhat.com/21620562162056https://errata.almalinux.org/9/ALSA-2023-0611.htmlALSA-2023:0611ALSA-2023:0611 I gitweb-2.31.1-3.el9_1.noarch.rpmP perl-Git-2.31.1-3.el9_1.noarch.rpmC git-email-2.31.1-3.el9_1.noarch.rpmA git-all-2.31.1-3.el9_1.noarch.rpmS git-subtree-2.31.1-3.el9_1.x86_64.rpmP git-core-2.31.1-3.el9_1.x86_64.rpmB git-core-doc-2.31.1-3.el9_1.noarch.rpmD git-gui-2.31.1-3.el9_1.noarch.rpmO git-2.31.1-3.el9_1.x86_64.rpmH gitk-2.31.1-3.el9_1.noarch.rpmR git-daemon-2.31.1-3.el9_1.x86_64.rpmE git-instaweb-2.31.1-3.el9_1.noarch.rpmQ git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpmQ perl-Git-SVN-2.31.1-3.el9_1.noarch.rpmG git-svn-2.31.1-3.el9_1.noarch.rpmI gitweb-2.31.1-3.el9_1.noarch.rpmP perl-Git-2.31.1-3.el9_1.noarch.rpmC git-email-2.31.1-3.el9_1.noarch.rpmA git-all-2.31.1-3.el9_1.noarch.rpmS git-subtree-2.31.1-3.el9_1.x86_64.rpmP git-core-2.31.1-3.el9_1.x86_64.rpmB git-core-doc-2.31.1-3.el9_1.noarch.rpmD git-gui-2.31.1-3.el9_1.noarch.rpmO git-2.31.1-3.el9_1.x86_64.rpmH gitk-2.31.1-3.el9_1.noarch.rpmR git-daemon-2.31.1-3.el9_1.x86_64.rpmE git-instaweb-2.31.1-3.el9_1.noarch.rpmQ git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpmQ perl-Git-SVN-2.31.1-3.el9_1.noarch.rpmG git-svn-2.31.1-3.el9_1.noarch.rpm3 3hBBBBBBBBBsecurityImportant: tigervnc security updatej_https://access.redhat.com/errata/RHSA-2023:0622RHSA-2023:0622RHSA-2023:0622 https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-0622.htmlALSA-2023:0622ALSA-2023:0622 %Rtigervnc-icons-1.12.0-5.el9_1.1.noarch.rpmNRtigervnc-server-1.12.0-5.el9_1.1.x86_64.rpmMRtigervnc-1.12.0-5.el9_1.1.x86_64.rpm'Rtigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpmORtigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpmPRtigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm&Rtigervnc-license-1.12.0-5.el9_1.1.noarch.rpm%Rtigervnc-icons-1.12.0-5.el9_1.1.noarch.rpmNRtigervnc-server-1.12.0-5.el9_1.1.x86_64.rpmMRtigervnc-1.12.0-5.el9_1.1.x86_64.rpm'Rtigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpmORtigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpmPRtigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm&Rtigervnc-license-1.12.0-5.el9_1.1.noarch.rpm4 8tBBsecurityImportant: firefox security updateIMhttps://access.redhat.com/errata/RHSA-2023:0810RHSA-2023:0810RHSA-2023:0810 https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://errata.almalinux.org/9/ALSA-2023-0810.htmlALSA-2023:0810ALSA-2023:0810 Oxfirefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm9xfirefox-102.8.0-2.el9_1.alma.x86_64.rpmOxfirefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm9xfirefox-102.8.0-2.el9_1.alma.x86_64.rpmԄ5 ;ysecurityImportant: thunderbird security updatexhttps://access.redhat.com/errata/RHSA-2023:0824RHSA-2023:0824RHSA-2023:0824 https://access.redhat.com/security/cve/CVE-2023-0616CVE-2023-0616CVE-2023-0616https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://bugzilla.redhat.com/21713972171397https://errata.almalinux.org/9/ALSA-2023-0824.htmlALSA-2023:0824ALSA-2023:0824 :xthunderbird-102.8.0-2.el9_1.alma.x86_64.rpm:xthunderbird-102.8.0-2.el9_1.alma.x86_64.rpmԈn6 |BBBBBBBBBBsecurityImportant: webkit2gtk3 security update https://access.redhat.com/errata/RHSA-2023:0903RHSA-2023:0903RHSA-2023:0903 https://access.redhat.com/security/cve/CVE-2023-23529CVE-2023-23529CVE-2023-23529https://bugzilla.redhat.com/21699342169934https://errata.almalinux.org/9/ALSA-2023-0903.htmlALSA-2023:0903ALSA-2023:0903 3bwebkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm4bwebkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm3bwebkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm1bwebkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm1bwebkit2gtk3-2.36.7-1.el9_1.2.i686.rpm2bwebkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm4bwebkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm2bwebkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm3bwebkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm4bwebkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm3bwebkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm1bwebkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm1bwebkit2gtk3-2.36.7-1.el9_1.2.i686.rpm2bwebkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm4bwebkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm2bwebkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm݆;7 IBBBsecurityModerate: openssl security and bug fix update."https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946 https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946 Ljopenssl-perl-3.0.1-47.el9_1.x86_64.rpm jopenssl-devel-3.0.1-47.el9_1.x86_64.rpm jopenssl-devel-3.0.1-47.el9_1.i686.rpmLjopenssl-perl-3.0.1-47.el9_1.x86_64.rpm jopenssl-devel-3.0.1-47.el9_1.x86_64.rpm jopenssl-devel-3.0.1-47.el9_1.i686.rpmv8 OBBBBBBBBBsecurityImportant: kernel security and bug fix updateP~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 -kernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm!-kernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm%-perf-5.14.0-162.18.1.el9_1.x86_64.rpm"-kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm#-kernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm$-kernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm-kernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm!-kernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm%-perf-5.14.0-162.18.1.el9_1.x86_64.rpm"-kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm#-kernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm$-kernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm9 ![BBBBsecurityModerate: python3.9 security updateN9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953 W%python3-devel-3.9.14-1.el9_1.2.x86_64.rpmj%python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmW%python3-devel-3.9.14-1.el9_1.2.i686.rpm=%python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpmW%python3-devel-3.9.14-1.el9_1.2.x86_64.rpmj%python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmW%python3-devel-3.9.14-1.el9_1.2.i686.rpm=%python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm,: 'bBBBsecurityModerate: systemd security update]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954 https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954 usystemd-devel-250-12.el9_1.3.i686.rpm=systemd-journal-remote-250-12.el9_1.3.x86_64.rpmusystemd-devel-250-12.el9_1.3.x86_64.rpmusystemd-devel-250-12.el9_1.3.i686.rpm=systemd-journal-remote-250-12.el9_1.3.x86_64.rpmusystemd-devel-250-12.el9_1.3.x86_64.rpm; *hsecurityModerate: lua security updated8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 lua-5.4.4-2.el9_1.x86_64.rpmlua-5.4.4-2.el9_1.x86_64.rpm{< 1kBBBBsecurityModerate: vim security updateehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958 https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958 8vim-X11-8.2.2637-20.el9_1.x86_64.rpm:vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm9vim-common-8.2.2637-20.el9_1.x86_64.rpm8vim-X11-8.2.2637-20.el9_1.x86_64.rpm:vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm9vim-common-8.2.2637-20.el9_1.x86_64.rpm@= $rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security updateW https://access.redhat.com/errata/RHSA-2023:0965RHSA-2023:0965RHSA-2023:0965 https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-0965.htmlALSA-2023:0965ALSA-2023:0965 ]=php-gd-8.0.27-1.el9_1.x86_64.rpmj=php-xml-8.0.27-1.el9_1.x86_64.rpmX=php-devel-8.0.27-1.el9_1.x86_64.rpm^=php-gmp-8.0.27-1.el9_1.x86_64.rpma=php-mbstring-8.0.27-1.el9_1.x86_64.rpmT=php-cli-8.0.27-1.el9_1.x86_64.rpmg=php-process-8.0.27-1.el9_1.x86_64.rpm`=php-ldap-8.0.27-1.el9_1.x86_64.rpmZ=php-enchant-8.0.27-1.el9_1.x86_64.rpme=php-pdo-8.0.27-1.el9_1.x86_64.rpmd=php-opcache-8.0.27-1.el9_1.x86_64.rpm_=php-intl-8.0.27-1.el9_1.x86_64.rpmU=php-common-8.0.27-1.el9_1.x86_64.rpmc=php-odbc-8.0.27-1.el9_1.x86_64.rpmY=php-embedded-8.0.27-1.el9_1.x86_64.rpmS=php-bcmath-8.0.27-1.el9_1.x86_64.rpmi=php-soap-8.0.27-1.el9_1.x86_64.rpmb=php-mysqlnd-8.0.27-1.el9_1.x86_64.rpmh=php-snmp-8.0.27-1.el9_1.x86_64.rpmV=php-dba-8.0.27-1.el9_1.x86_64.rpm\=php-fpm-8.0.27-1.el9_1.x86_64.rpm=php-8.0.27-1.el9_1.x86_64.rpm[=php-ffi-8.0.27-1.el9_1.x86_64.rpmf=php-pgsql-8.0.27-1.el9_1.x86_64.rpmW=php-dbg-8.0.27-1.el9_1.x86_64.rpm]=php-gd-8.0.27-1.el9_1.x86_64.rpmj=php-xml-8.0.27-1.el9_1.x86_64.rpmX=php-devel-8.0.27-1.el9_1.x86_64.rpm^=php-gmp-8.0.27-1.el9_1.x86_64.rpma=php-mbstring-8.0.27-1.el9_1.x86_64.rpmT=php-cli-8.0.27-1.el9_1.x86_64.rpmg=php-process-8.0.27-1.el9_1.x86_64.rpm`=php-ldap-8.0.27-1.el9_1.x86_64.rpmZ=php-enchant-8.0.27-1.el9_1.x86_64.rpme=php-pdo-8.0.27-1.el9_1.x86_64.rpmd=php-opcache-8.0.27-1.el9_1.x86_64.rpm_=php-intl-8.0.27-1.el9_1.x86_64.rpmU=php-common-8.0.27-1.el9_1.x86_64.rpmc=php-odbc-8.0.27-1.el9_1.x86_64.rpmY=php-embedded-8.0.27-1.el9_1.x86_64.rpmS=php-bcmath-8.0.27-1.el9_1.x86_64.rpmi=php-soap-8.0.27-1.el9_1.x86_64.rpmb=php-mysqlnd-8.0.27-1.el9_1.x86_64.rpmh=php-snmp-8.0.27-1.el9_1.x86_64.rpmV=php-dba-8.0.27-1.el9_1.x86_64.rpm\=php-fpm-8.0.27-1.el9_1.x86_64.rpm=php-8.0.27-1.el9_1.x86_64.rpm[=php-ffi-8.0.27-1.el9_1.x86_64.rpmf=php-pgsql-8.0.27-1.el9_1.x86_64.rpmW=php-dbg-8.0.27-1.el9_1.x86_64.rpmF> 9eBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security and bug fix updateXIhttps://access.redhat.com/errata/RHSA-2023:0970RHSA-2023:0970RHSA-2023:0970 https://access.redhat.com/security/cve/CVE-2006-20001CVE-2006-20001CVE-2006-20001https://access.redhat.com/security/cve/CVE-2022-36760CVE-2022-36760CVE-2022-36760https://access.redhat.com/security/cve/CVE-2022-37436CVE-2022-37436CVE-2022-37436https://bugzilla.redhat.com/21617732161773https://bugzilla.redhat.com/21617742161774https://bugzilla.redhat.com/21617772161777https://errata.almalinux.org/9/ALSA-2023-0970.htmlALSA-2023:0970ALSA-2023:0970 Dmod_session-2.4.53-7.el9_1.1.x86_64.rpm!mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm2Dhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpmDmod_ldap-2.4.53-7.el9_1.1.x86_64.rpmlDhttpd-core-2.4.53-7.el9_1.1.x86_64.rpmDmod_lua-2.4.53-7.el9_1.1.x86_64.rpm3Dhttpd-manual-2.4.53-7.el9_1.1.noarch.rpmnDhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpmkDhttpd-2.4.53-7.el9_1.1.x86_64.rpmmDhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpm!mod_ssl-2.4.53-7.el9_1.1.x86_64.rpm Dmod_session-2.4.53-7.el9_1.1.x86_64.rpm!mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm2Dhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpmDmod_ldap-2.4.53-7.el9_1.1.x86_64.rpmlDhttpd-core-2.4.53-7.el9_1.1.x86_64.rpmDmod_lua-2.4.53-7.el9_1.1.x86_64.rpm3Dhttpd-manual-2.4.53-7.el9_1.1.noarch.rpmnDhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpmkDhttpd-2.4.53-7.el9_1.1.x86_64.rpmmDhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpm!mod_ssl-2.4.53-7.el9_1.1.x86_64.rpmt? G https://access.redhat.com/errata/RHSA-2023:2204RHSA-2023:2204RHSA-2023:2204 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2204.htmlALSA-2023:2204ALSA-2023:2204 2wosbuild-composer-core-76-2.el9_2.alma.x86_64.rpm_weldr-client-35.9-1.el9.x86_64.rpm3wosbuild-composer-worker-76-2.el9_2.alma.x86_64.rpm1wosbuild-composer-76-2.el9_2.alma.x86_64.rpmQwosbuild-composer-dnf-json-76-2.el9_2.alma.x86_64.rpm2wosbuild-composer-core-76-2.el9_2.alma.x86_64.rpm_weldr-client-35.9-1.el9.x86_64.rpm3wosbuild-composer-worker-76-2.el9_2.alma.x86_64.rpm1wosbuild-composer-76-2.el9_2.alma.x86_64.rpmQwosbuild-composer-dnf-json-76-2.el9_2.alma.x86_64.rpmT_ '^BBBBBBBsecurityModerate: gdk-pixbuf2 security update`https://access.redhat.com/errata/RHSA-2023:2216RHSA-2023:2216RHSA-2023:2216 https://access.redhat.com/security/cve/CVE-2021-44648CVE-2021-44648CVE-2021-44648https://access.redhat.com/security/cve/CVE-2021-46829CVE-2021-46829CVE-2021-46829https://bugzilla.redhat.com/20437222043722https://bugzilla.redhat.com/21149402114940https://errata.almalinux.org/9/ALSA-2023-2216.htmlALSA-2023:2216ALSA-2023:2216 !gdk-pixbuf2-modules-2.42.6-3.el9.x86_64.rpmgdk-pixbuf2-2.42.6-3.el9.x86_64.rpmgdk-pixbuf2-2.42.6-3.el9.i686.rpm gdk-pixbuf2-devel-2.42.6-3.el9.x86_64.rpm!gdk-pixbuf2-modules-2.42.6-3.el9.i686.rpm gdk-pixbuf2-devel-2.42.6-3.el9.i686.rpm!gdk-pixbuf2-modules-2.42.6-3.el9.x86_64.rpmgdk-pixbuf2-2.42.6-3.el9.x86_64.rpmgdk-pixbuf2-2.42.6-3.el9.i686.rpm gdk-pixbuf2-devel-2.42.6-3.el9.x86_64.rpm!gdk-pixbuf2-modules-2.42.6-3.el9.i686.rpm gdk-pixbuf2-devel-2.42.6-3.el9.i686.rpm#` *hsecurityModerate: conmon security and bug fix updateeshttps://access.redhat.com/errata/RHSA-2023:2222RHSA-2023:2222RHSA-2023:2222 https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2222.htmlALSA-2023:2222ALSA-2023:2222 IHconmon-2.1.7-1.el9_2.x86_64.rpmIHconmon-2.1.7-1.el9_2.x86_64.rpma -ksecurityModerate: sysstat security and bug fix updateXHhttps://access.redhat.com/errata/RHSA-2023:2234RHSA-2023:2234RHSA-2023:2234 https://access.redhat.com/security/cve/CVE-2022-39377CVE-2022-39377CVE-2022-39377https://bugzilla.redhat.com/21412072141207https://errata.almalinux.org/9/ALSA-2023-2234.htmlALSA-2023:2234ALSA-2023:2234  dsysstat-12.5.4-5.el9.x86_64.rpm dsysstat-12.5.4-5.el9.x86_64.rpmb 2nBBsecurityModerate: toolbox security and bug fix update https://access.redhat.com/errata/RHSA-2023:2236RHSA-2023:2236RHSA-2023:2236 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2236.htmlALSA-2023:2236ALSA-2023:2236 7ktoolbox-tests-0.0.99.3-9.el9.x86_64.rpm6ktoolbox-0.0.99.3-9.el9.x86_64.rpm7ktoolbox-tests-0.0.99.3-9.el9.x86_64.rpm6ktoolbox-0.0.99.3-9.el9.x86_64.rpmc ?sBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update/Ohttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248 jixorg-x11-server-Xvfb-1.20.11-17.el9.x86_64.rpmlixorg-x11-server-common-1.20.11-17.el9.x86_64.rpmgixorg-x11-server-Xephyr-1.20.11-17.el9.x86_64.rpmiixorg-x11-server-Xorg-1.20.11-17.el9.x86_64.rpmfixorg-x11-server-Xdmx-1.20.11-17.el9.x86_64.rpmhixorg-x11-server-Xnest-1.20.11-17.el9.x86_64.rpmjixorg-x11-server-Xvfb-1.20.11-17.el9.x86_64.rpmlixorg-x11-server-common-1.20.11-17.el9.x86_64.rpmgixorg-x11-server-Xephyr-1.20.11-17.el9.x86_64.rpmiixorg-x11-server-Xorg-1.20.11-17.el9.x86_64.rpmfixorg-x11-server-Xdmx-1.20.11-17.el9.x86_64.rpmhixorg-x11-server-Xnest-1.20.11-17.el9.x86_64.rpmd @securityModerate: xorg-x11-server-Xwayland security update~`https://access.redhat.com/errata/RHSA-2023:2249RHSA-2023:2249RHSA-2023:2249 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2249.htmlALSA-2023:2249ALSA-2023:2249 k=xorg-x11-server-Xwayland-21.1.3-7.el9.x86_64.rpmk=xorg-x11-server-Xwayland-21.1.3-7.el9.x86_64.rpm7e CBBsecurityModerate: buildah security and bug fix update^https://access.redhat.com/errata/RHSA-2023:2253RHSA-2023:2253RHSA-2023:2253 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2253.htmlALSA-2023:2253ALSA-2023:2253 7buildah-1.29.1-1.el9.x86_64.rpm8buildah-tests-1.29.1-1.el9.x86_64.rpm7buildah-1.29.1-1.el9.x86_64.rpm8buildah-tests-1.29.1-1.el9.x86_64.rpmf HBBBBBBBBBBsecurityImportant: webkit2gtk3 security and bug fix updatecX.https://access.redhat.com/errata/RHSA-2023:2256RHSA-2023:2256RHSA-2023:2256 https://access.redhat.com/security/cve/CVE-2022-32886CVE-2022-32886CVE-2022-32886https://access.redhat.com/security/cve/CVE-2022-32888CVE-2022-32888CVE-2022-32888https://access.redhat.com/security/cve/CVE-2022-32923CVE-2022-32923CVE-2022-32923https://access.redhat.com/security/cve/CVE-2022-42799CVE-2022-42799CVE-2022-42799https://access.redhat.com/security/cve/CVE-2022-42823CVE-2022-42823CVE-2022-42823https://access.redhat.com/security/cve/CVE-2022-42824CVE-2022-42824CVE-2022-42824https://access.redhat.com/security/cve/CVE-2022-42826CVE-2022-42826CVE-2022-42826https://access.redhat.com/security/cve/CVE-2022-42852CVE-2022-42852CVE-2022-42852https://access.redhat.com/security/cve/CVE-2022-42863CVE-2022-42863CVE-2022-42863https://access.redhat.com/security/cve/CVE-2022-42867CVE-2022-42867CVE-2022-42867https://access.redhat.com/security/cve/CVE-2022-46691CVE-2022-46691CVE-2022-46691https://access.redhat.com/security/cve/CVE-2022-46692CVE-2022-46692CVE-2022-46692https://access.redhat.com/security/cve/CVE-2022-46698CVE-2022-46698CVE-2022-46698https://access.redhat.com/security/cve/CVE-2022-46699CVE-2022-46699CVE-2022-46699https://access.redhat.com/security/cve/CVE-2022-46700CVE-2022-46700CVE-2022-46700https://access.redhat.com/security/cve/CVE-2023-23517CVE-2023-23517CVE-2023-23517https://access.redhat.com/security/cve/CVE-2023-23518CVE-2023-23518CVE-2023-23518https://access.redhat.com/security/cve/CVE-2023-25358CVE-2023-25358CVE-2023-25358https://access.redhat.com/security/cve/CVE-2023-25360CVE-2023-25360CVE-2023-25360https://access.redhat.com/security/cve/CVE-2023-25361CVE-2023-25361CVE-2023-25361https://access.redhat.com/security/cve/CVE-2023-25362CVE-2023-25362CVE-2023-25362https://access.redhat.com/security/cve/CVE-2023-25363CVE-2023-25363CVE-2023-25363https://bugzilla.redhat.com/21286432128643https://bugzilla.redhat.com/21405012140501https://bugzilla.redhat.com/21405022140502https://bugzilla.redhat.com/21405032140503https://bugzilla.redhat.com/21405042140504https://bugzilla.redhat.com/21405052140505https://bugzilla.redhat.com/21569862156986https://bugzilla.redhat.com/21569872156987https://bugzilla.redhat.com/21569892156989https://bugzilla.redhat.com/21569902156990https://bugzilla.redhat.com/21569912156991https://bugzilla.redhat.com/21569922156992https://bugzilla.redhat.com/21569932156993https://bugzilla.redhat.com/21569942156994https://bugzilla.redhat.com/21677152167715https://bugzilla.redhat.com/21677162167716https://bugzilla.redhat.com/21677172167717https://bugzilla.redhat.com/21750992175099https://bugzilla.redhat.com/21751012175101https://bugzilla.redhat.com/21751032175103https://bugzilla.redhat.com/21751052175105https://bugzilla.redhat.com/21751072175107https://errata.almalinux.org/9/ALSA-2023-2256.htmlALSA-2023:2256ALSA-2023:2256 3dwebkit2gtk3-jsc-2.38.5-1.el9.i686.rpm1dwebkit2gtk3-2.38.5-1.el9.i686.rpm2dwebkit2gtk3-devel-2.38.5-1.el9.x86_64.rpm4dwebkit2gtk3-jsc-devel-2.38.5-1.el9.x86_64.rpm2dwebkit2gtk3-devel-2.38.5-1.el9.i686.rpm3dwebkit2gtk3-jsc-2.38.5-1.el9.x86_64.rpm4dwebkit2gtk3-jsc-devel-2.38.5-1.el9.i686.rpm1dwebkit2gtk3-2.38.5-1.el9.x86_64.rpm3dwebkit2gtk3-jsc-2.38.5-1.el9.i686.rpm1dwebkit2gtk3-2.38.5-1.el9.i686.rpm2dwebkit2gtk3-devel-2.38.5-1.el9.x86_64.rpm4dwebkit2gtk3-jsc-devel-2.38.5-1.el9.x86_64.rpm2dwebkit2gtk3-devel-2.38.5-1.el9.i686.rpm3dwebkit2gtk3-jsc-2.38.5-1.el9.x86_64.rpm4dwebkit2gtk3-jsc-devel-2.38.5-1.el9.i686.rpm1dwebkit2gtk3-2.38.5-1.el9.x86_64.rpmwg UBBBBBBBBBsecurityModerate: tigervnc security and bug fix update;8https://access.redhat.com/errata/RHSA-2023:2257RHSA-2023:2257RHSA-2023:2257 https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://errata.almalinux.org/9/ALSA-2023-2257.htmlALSA-2023:2257ALSA-2023:2257 PQtigervnc-server-module-1.12.0-13.el9_2.x86_64.rpmMQtigervnc-1.12.0-13.el9_2.x86_64.rpmNQtigervnc-server-1.12.0-13.el9_2.x86_64.rpm%Qtigervnc-icons-1.12.0-13.el9_2.noarch.rpm&Qtigervnc-license-1.12.0-13.el9_2.noarch.rpmOQtigervnc-server-minimal-1.12.0-13.el9_2.x86_64.rpm'Qtigervnc-selinux-1.12.0-13.el9_2.noarch.rpmPQtigervnc-server-module-1.12.0-13.el9_2.x86_64.rpmMQtigervnc-1.12.0-13.el9_2.x86_64.rpmNQtigervnc-server-1.12.0-13.el9_2.x86_64.rpm%Qtigervnc-icons-1.12.0-13.el9_2.noarch.rpm&Qtigervnc-license-1.12.0-13.el9_2.noarch.rpmOQtigervnc-server-minimal-1.12.0-13.el9_2.x86_64.rpm'Qtigervnc-selinux-1.12.0-13.el9_2.noarch.rpm h "!securityModerate: python-mako security updates'https://access.redhat.com/errata/RHSA-2023:2258RHSA-2023:2258RHSA-2023:2258 https://access.redhat.com/security/cve/CVE-2022-40023CVE-2022-40023CVE-2022-40023https://bugzilla.redhat.com/21289772128977https://errata.almalinux.org/9/ALSA-2023-2258.htmlALSA-2023:2258ALSA-2023:2258 vkpython3-mako-1.1.4-6.el9.noarch.rpmvkpython3-mako-1.1.4-6.el9.noarch.rpmti 1cBBBBBBBBBBBBsecurityModerate: poppler security and bug fix updatehttps://access.redhat.com/errata/RHSA-2023:2259RHSA-2023:2259RHSA-2023:2259 https://access.redhat.com/security/cve/CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/21245272124527https://errata.almalinux.org/9/ALSA-2023-2259.htmlALSA-2023:2259ALSA-2023:2259 :|poppler-utils-21.01.0-14.el9.x86_64.rpmg|poppler-21.01.0-14.el9.i686.rpmh|poppler-cpp-21.01.0-14.el9.i686.rpmi|poppler-glib-21.01.0-14.el9.x86_64.rpmj|poppler-qt5-21.01.0-14.el9.i686.rpmj|poppler-qt5-21.01.0-14.el9.x86_64.rpmg|poppler-21.01.0-14.el9.x86_64.rpmi|poppler-glib-21.01.0-14.el9.i686.rpmh|poppler-cpp-21.01.0-14.el9.x86_64.rpm :|poppler-utils-21.01.0-14.el9.x86_64.rpmg|poppler-21.01.0-14.el9.i686.rpmh|poppler-cpp-21.01.0-14.el9.i686.rpmi|poppler-glib-21.01.0-14.el9.x86_64.rpmj|poppler-qt5-21.01.0-14.el9.i686.rpmj|poppler-qt5-21.01.0-14.el9.x86_64.rpmg|poppler-21.01.0-14.el9.x86_64.rpmi|poppler-glib-21.01.0-14.el9.i686.rpmh|poppler-cpp-21.01.0-14.el9.x86_64.rpmTj 8rBBBBsecurityModerate: gstreamer1-plugins-good security update3Ghttps://access.redhat.com/errata/RHSA-2023:2260RHSA-2023:2260RHSA-2023:2260 https://access.redhat.com/security/cve/CVE-2022-1920CVE-2022-1920CVE-2022-1920https://access.redhat.com/security/cve/CVE-2022-1921CVE-2022-1921CVE-2022-1921https://access.redhat.com/security/cve/CVE-2022-1922CVE-2022-1922CVE-2022-1922https://access.redhat.com/security/cve/CVE-2022-1923CVE-2022-1923CVE-2022-1923https://access.redhat.com/security/cve/CVE-2022-1924CVE-2022-1924CVE-2022-1924https://access.redhat.com/security/cve/CVE-2022-1925CVE-2022-1925CVE-2022-1925https://access.redhat.com/security/cve/CVE-2022-2122CVE-2022-2122CVE-2022-2122https://bugzilla.redhat.com/21309352130935https://bugzilla.redhat.com/21309492130949https://bugzilla.redhat.com/21309552130955https://bugzilla.redhat.com/21309592130959https://bugzilla.redhat.com/21310032131003https://bugzilla.redhat.com/21310072131007https://bugzilla.redhat.com/21310182131018https://errata.almalinux.org/9/ALSA-2023-2260.htmlALSA-2023:2260ALSA-2023:2260 _gstreamer1-plugins-good-1.18.4-6.el9.i686.rpm_gstreamer1-plugins-good-1.18.4-6.el9.x86_64.rpm`gstreamer1-plugins-good-gtk-1.18.4-6.el9.i686.rpm`gstreamer1-plugins-good-gtk-1.18.4-6.el9.x86_64.rpm_gstreamer1-plugins-good-1.18.4-6.el9.i686.rpm_gstreamer1-plugins-good-1.18.4-6.el9.x86_64.rpm`gstreamer1-plugins-good-gtk-1.18.4-6.el9.i686.rpm`gstreamer1-plugins-good-gtk-1.18.4-6.el9.x86_64.rpmkk yBBBBBBBBBBBsecurityModerate: bind security and bug fix updatezJ https://access.redhat.com/errata/RHSA-2023:2261RHSA-2023:2261RHSA-2023:2261 https://access.redhat.com/security/cve/CVE-2022-2795CVE-2022-2795CVE-2022-2795https://access.redhat.com/security/cve/CVE-2022-3094CVE-2022-3094CVE-2022-3094https://access.redhat.com/security/cve/CVE-2022-3736CVE-2022-3736CVE-2022-3736https://access.redhat.com/security/cve/CVE-2022-3924CVE-2022-3924CVE-2022-3924https://bugzilla.redhat.com/21285842128584https://bugzilla.redhat.com/21640322164032https://bugzilla.redhat.com/21640382164038https://bugzilla.redhat.com/21640392164039https://errata.almalinux.org/9/ALSA-2023-2261.htmlALSA-2023:2261ALSA-2023:2261 -Gbind-license-9.16.23-11.el9.noarch.rpm9Gpython3-bind-9.16.23-11.el9.noarch.rpm_Gbind-libs-9.16.23-11.el9.x86_64.rpm,Gbind-dnssec-doc-9.16.23-11.el9.noarch.rpm\Gbind-9.16.23-11.el9.x86_64.rpm]Gbind-chroot-9.16.23-11.el9.x86_64.rpm^Gbind-dnssec-utils-9.16.23-11.el9.x86_64.rpm`Gbind-utils-9.16.23-11.el9.x86_64.rpm-Gbind-license-9.16.23-11.el9.noarch.rpm9Gpython3-bind-9.16.23-11.el9.noarch.rpm_Gbind-libs-9.16.23-11.el9.x86_64.rpm,Gbind-dnssec-doc-9.16.23-11.el9.noarch.rpm\Gbind-9.16.23-11.el9.x86_64.rpm]Gbind-chroot-9.16.23-11.el9.x86_64.rpm^Gbind-dnssec-utils-9.16.23-11.el9.x86_64.rpm`Gbind-utils-9.16.23-11.el9.x86_64.rpmfl GBBBBBBBBBsecurityModerate: podman security and bug fix updateDYhttps://access.redhat.com/errata/RHSA-2023:2282RHSA-2023:2282RHSA-2023:2282 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2282.htmlALSA-2023:2282ALSA-2023:2282 $'podman-plugins-4.4.1-3.el9.x86_64.rpm&'podman-tests-4.4.1-3.el9.x86_64.rpmO'podman-gvproxy-4.4.1-3.el9.x86_64.rpm%'podman-remote-4.4.1-3.el9.x86_64.rpmf'podman-docker-4.4.1-3.el9.noarch.rpm#'podman-4.4.1-3.el9.x86_64.rpm$'podman-plugins-4.4.1-3.el9.x86_64.rpm&'podman-tests-4.4.1-3.el9.x86_64.rpmO'podman-gvproxy-4.4.1-3.el9.x86_64.rpm%'podman-remote-4.4.1-3.el9.x86_64.rpmf'podman-docker-4.4.1-3.el9.noarch.rpm#'podman-4.4.1-3.el9.x86_64.rpmnm SBBsecurityModerate: skopeo security and bug fix update2https://access.redhat.com/errata/RHSA-2023:2283RHSA-2023:2283RHSA-2023:2283 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2283.htmlALSA-2023:2283ALSA-2023:2283 ;1skopeo-tests-1.11.2-0.1.el9.x86_64.rpm:1skopeo-1.11.2-0.1.el9.x86_64.rpm;1skopeo-tests-1.11.2-0.1.el9.x86_64.rpm:1skopeo-1.11.2-0.1.el9.x86_64.rpm(n "XBBBBBBBBsecurityModerate: pki-core security, bug fix, and enhancement updateOlhttps://access.redhat.com/errata/RHSA-2023:2293RHSA-2023:2293RHSA-2023:2293 https://access.redhat.com/security/cve/CVE-2022-2393CVE-2022-2393CVE-2022-2393https://bugzilla.redhat.com/21010462101046https://errata.almalinux.org/9/ALSA-2023-2293.htmlALSA-2023:2293ALSA-2023:2293 M]idm-pki-ca-11.3.0-1.el9.noarch.rpmR]idm-pki-tools-11.3.0-1.el9.x86_64.rpmL]idm-pki-base-11.3.0-1.el9.noarch.rpmQ]idm-pki-server-11.3.0-1.el9.noarch.rpmP]idm-pki-kra-11.3.0-1.el9.noarch.rpmx]python3-idm-pki-11.3.0-1.el9.noarch.rpmN]idm-pki-est-11.3.0-1.el9.noarch.rpmO]idm-pki-java-11.3.0-1.el9.noarch.rpmK]idm-pki-acme-11.3.0-1.el9.noarch.rpm M]idm-pki-ca-11.3.0-1.el9.noarch.rpmR]idm-pki-tools-11.3.0-1.el9.x86_64.rpmL]idm-pki-base-11.3.0-1.el9.noarch.rpmQ]idm-pki-server-11.3.0-1.el9.noarch.rpmP]idm-pki-kra-11.3.0-1.el9.noarch.rpmx]python3-idm-pki-11.3.0-1.el9.noarch.rpmN]idm-pki-est-11.3.0-1.el9.noarch.rpmO]idm-pki-java-11.3.0-1.el9.noarch.rpmK]idm-pki-acme-11.3.0-1.el9.noarch.rpm*o $#securityModerate: jackson security update;!https://access.redhat.com/errata/RHSA-2023:2312RHSA-2023:2312RHSA-2023:2312 https://access.redhat.com/security/cve/CVE-2020-36518CVE-2020-36518CVE-2020-36518https://bugzilla.redhat.com/20646982064698https://errata.almalinux.org/9/ALSA-2023-2312.htmlALSA-2023:2312ALSA-2023:2312 u*pki-jackson-databind-2.14.1-2.el9.noarch.rpmu*pki-jackson-databind-2.14.1-2.el9.noarch.rpm\p 9eBBBBBBBBBBBBBBBBBBsecurityModerate: git security and bug fix update\5 https://access.redhat.com/errata/RHSA-2023:2319RHSA-2023:2319RHSA-2023:2319 https://access.redhat.com/security/cve/CVE-2022-24765CVE-2022-24765CVE-2022-24765https://access.redhat.com/security/cve/CVE-2022-29187CVE-2022-29187CVE-2022-29187https://access.redhat.com/security/cve/CVE-2022-39253CVE-2022-39253CVE-2022-39253https://access.redhat.com/security/cve/CVE-2022-39260CVE-2022-39260CVE-2022-39260https://bugzilla.redhat.com/20734142073414https://bugzilla.redhat.com/21074392107439https://bugzilla.redhat.com/21374222137422https://bugzilla.redhat.com/21374232137423https://errata.almalinux.org/9/ALSA-2023-2319.htmlALSA-2023:2319ALSA-2023:2319 Cgit-email-2.39.1-1.el9.noarch.rpmAgit-all-2.39.1-1.el9.noarch.rpmBgit-core-doc-2.39.1-1.el9.noarch.rpmGgit-svn-2.39.1-1.el9.noarch.rpmIgitweb-2.39.1-1.el9.noarch.rpmRgit-daemon-2.39.1-1.el9.x86_64.rpmDgit-gui-2.39.1-1.el9.noarch.rpmPgit-core-2.39.1-1.el9.x86_64.rpmEgit-instaweb-2.39.1-1.el9.noarch.rpmOgit-2.39.1-1.el9.x86_64.rpmQperl-Git-SVN-2.39.1-1.el9.noarch.rpmPperl-Git-2.39.1-1.el9.noarch.rpmSgit-subtree-2.39.1-1.el9.x86_64.rpmHgitk-2.39.1-1.el9.noarch.rpmQgit-credential-libsecret-2.39.1-1.el9.x86_64.rpmCgit-email-2.39.1-1.el9.noarch.rpmAgit-all-2.39.1-1.el9.noarch.rpmBgit-core-doc-2.39.1-1.el9.noarch.rpmGgit-svn-2.39.1-1.el9.noarch.rpmIgitweb-2.39.1-1.el9.noarch.rpmRgit-daemon-2.39.1-1.el9.x86_64.rpmDgit-gui-2.39.1-1.el9.noarch.rpmPgit-core-2.39.1-1.el9.x86_64.rpmEgit-instaweb-2.39.1-1.el9.noarch.rpmOgit-2.39.1-1.el9.x86_64.rpmQperl-Git-SVN-2.39.1-1.el9.noarch.rpmPperl-Git-2.39.1-1.el9.noarch.rpmSgit-subtree-2.39.1-1.el9.x86_64.rpmHgitk-2.39.1-1.el9.noarch.rpmQgit-credential-libsecret-2.39.1-1.el9.x86_64.rpm`q zBBBBBBsecurityModerate: freerdp security updatefhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326 https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326 blibwinpr-2.4.1-5.el9.i686.rpmPfreerdp-2.4.1-5.el9.x86_64.rpm\freerdp-libs-2.4.1-5.el9.i686.rpm\freerdp-libs-2.4.1-5.el9.x86_64.rpmblibwinpr-2.4.1-5.el9.x86_64.rpmblibwinpr-2.4.1-5.el9.i686.rpmPfreerdp-2.4.1-5.el9.x86_64.rpm\freerdp-libs-2.4.1-5.el9.i686.rpm\freerdp-libs-2.4.1-5.el9.x86_64.rpmblibwinpr-2.4.1-5.el9.x86_64.rpm%r CBBBBsecurityModerate: libtiff security updatew>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340 https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340 jBlibtiff-devel-4.4.0-7.el9.i686.rpmiBlibtiff-4.4.0-7.el9.x86_64.rpmiBlibtiff-4.4.0-7.el9.i686.rpmjBlibtiff-devel-4.4.0-7.el9.x86_64.rpmjBlibtiff-devel-4.4.0-7.el9.i686.rpmiBlibtiff-4.4.0-7.el9.x86_64.rpmiBlibtiff-4.4.0-7.el9.i686.rpmjBlibtiff-devel-4.4.0-7.el9.x86_64.rpm8s JsecurityModerate: git-lfs security and bug fix update5Mhttps://access.redhat.com/errata/RHSA-2023:2357RHSA-2023:2357RHSA-2023:2357 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2357.htmlALSA-2023:2357ALSA-2023:2357 FOgit-lfs-3.2.0-1.el9.x86_64.rpmFOgit-lfs-3.2.0-1.el9.x86_64.rpmpt MBBBBBBBsecurityModerate: emacs security and bug fix updateahttps://access.redhat.com/errata/RHSA-2023:2366RHSA-2023:2366RHSA-2023:2366 https://access.redhat.com/security/cve/CVE-2022-45939CVE-2022-45939CVE-2022-45939https://bugzilla.redhat.com/21493802149380https://errata.almalinux.org/9/ALSA-2023-2366.htmlALSA-2023:2366ALSA-2023:2366 Bemacs-lucid-27.2-8.el9.x86_64.rpmBemacs-common-27.2-8.el9.x86_64.rpmBemacs-filesystem-27.2-8.el9.noarch.rpmBemacs-nox-27.2-8.el9.x86_64.rpmBemacs-27.2-8.el9.x86_64.rpmBemacs-lucid-27.2-8.el9.x86_64.rpmBemacs-common-27.2-8.el9.x86_64.rpmBemacs-filesystem-27.2-8.el9.noarch.rpmBemacs-nox-27.2-8.el9.x86_64.rpmBemacs-27.2-8.el9.x86_64.rpmSu WsecurityModerate: containernetworking-plugins security and bug fix updatechttps://access.redhat.com/errata/RHSA-2023:2367RHSA-2023:2367RHSA-2023:2367 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2367.htmlALSA-2023:2367ALSA-2023:2367 aucontainernetworking-plugins-1.2.0-1.el9.x86_64.rpmaucontainernetworking-plugins-1.2.0-1.el9.x86_64.rpmv !ZBBBBBsecurityModerate: unbound security updated9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370 https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370 U?unbound-1.16.2-3.el9.x86_64.rpm5?unbound-libs-1.16.2-3.el9.x86_64.rpm5?unbound-libs-1.16.2-3.el9.i686.rpmR?python3-unbound-1.16.2-3.el9.x86_64.rpmU?unbound-1.16.2-3.el9.x86_64.rpm5?unbound-libs-1.16.2-3.el9.x86_64.rpm5?unbound-libs-1.16.2-3.el9.i686.rpmR?python3-unbound-1.16.2-3.el9.x86_64.rpmFw 'bBBBsecurityModerate: wireshark security and bug fix update4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373 https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373 rwireshark-3.4.10-4.el9.x86_64.rpm|rwireshark-cli-3.4.10-4.el9.i686.rpm|rwireshark-cli-3.4.10-4.el9.x86_64.rpmrwireshark-3.4.10-4.el9.x86_64.rpm|rwireshark-cli-3.4.10-4.el9.i686.rpm|rwireshark-cli-3.4.10-4.el9.x86_64.rpm x )(securityModerate: postgresql-jdbc security updateQhttps://access.redhat.com/errata/RHSA-2023:2378RHSA-2023:2378RHSA-2023:2378 https://access.redhat.com/security/cve/CVE-2022-41946CVE-2022-41946CVE-2022-41946https://bugzilla.redhat.com/21533992153399https://errata.almalinux.org/9/ALSA-2023-2378.htmlALSA-2023:2378ALSA-2023:2378 c[postgresql-jdbc-42.2.27-1.el9.noarch.rpmc[postgresql-jdbc-42.2.27-1.el9.noarch.rpmy |BBBBBBBBRBUBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security updatecZ https://access.redhat.com/errata/RHSA-2023:2417RHSA-2023:2417RHSA-2023:2417 https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-2417.htmlALSA-2023:2417ALSA-2023:2417 iy(gAphp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmdAphp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmjAphp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm\Aphp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmVAphp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm[Aphp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm +php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmbAphp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmaAphp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmZAphp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmYAphp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmAphp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmTAphp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmhAphp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmfAphp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm`Aphp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmXAphp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm_Aphp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm^Aphp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmiAphp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmUAphp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmWAphp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmeAphp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm]Aphp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmcAphp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmSAphp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmiy(gAphp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmdAphp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmjAphp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm\Aphp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmVAphp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm[Aphp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm +php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmbAphp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmaAphp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmZAphp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmYAphp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmAphp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmTAphp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmhAphp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmfAphp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm`Aphp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmXAphp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm_Aphp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm^Aphp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmiAphp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmUAphp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmWAphp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmeAphp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm]Aphp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmcAphp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmSAphp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmbz .]BBBBBBBBBBBBBBBsecurityModerate: net-snmp security and bug fix update=vhttps://access.redhat.com/errata/RHSA-2023:2444RHSA-2023:2444RHSA-2023:2444 https://access.redhat.com/security/cve/CVE-2022-44792CVE-2022-44792CVE-2022-44792https://access.redhat.com/security/cve/CVE-2022-44793CVE-2022-44793CVE-2022-44793https://bugzilla.redhat.com/21418972141897https://bugzilla.redhat.com/21418982141898https://errata.almalinux.org/9/ALSA-2023-2444.htmlALSA-2023:2444ALSA-2023:2444 tnet-snmp-5.9.1-9.el9.x86_64.rpmktnet-snmp-devel-5.9.1-9.el9.i686.rpmjtnet-snmp-agent-libs-5.9.1-9.el9.i686.rpmtnet-snmp-perl-5.9.1-9.el9.x86_64.rpmktnet-snmp-devel-5.9.1-9.el9.x86_64.rpmtpython3-net-snmp-5.9.1-9.el9.x86_64.rpm tnet-snmp-utils-5.9.1-9.el9.x86_64.rpmjtnet-snmp-agent-libs-5.9.1-9.el9.x86_64.rpmltnet-snmp-libs-5.9.1-9.el9.i686.rpmltnet-snmp-libs-5.9.1-9.el9.x86_64.rpm tnet-snmp-5.9.1-9.el9.x86_64.rpmktnet-snmp-devel-5.9.1-9.el9.i686.rpmjtnet-snmp-agent-libs-5.9.1-9.el9.i686.rpmtnet-snmp-perl-5.9.1-9.el9.x86_64.rpmktnet-snmp-devel-5.9.1-9.el9.x86_64.rpmtpython3-net-snmp-5.9.1-9.el9.x86_64.rpm tnet-snmp-utils-5.9.1-9.el9.x86_64.rpmjtnet-snmp-agent-libs-5.9.1-9.el9.x86_64.rpmltnet-snmp-libs-5.9.1-9.el9.i686.rpmltnet-snmp-libs-5.9.1-9.el9.x86_64.rpm{ 2oBsecurityModerate: libtpms security update3khttps://access.redhat.com/errata/RHSA-2023:2453RHSA-2023:2453RHSA-2023:2453 https://access.redhat.com/security/cve/CVE-2023-1017CVE-2023-1017CVE-2023-1017https://access.redhat.com/security/cve/CVE-2023-1018CVE-2023-1018CVE-2023-1018https://bugzilla.redhat.com/21494162149416https://bugzilla.redhat.com/21494202149420https://errata.almalinux.org/9/ALSA-2023-2453.htmlALSA-2023:2453ALSA-2023:2453 > libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.i686.rpm> libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.x86_64.rpm> libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.i686.rpm> libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.x86_64.rpmF| sBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458 "kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm'rtla-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm$kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm%perf-5.14.0-284.11.1.el9_2.x86_64.rpm#kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm!kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm"kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm'rtla-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm$kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm%perf-5.14.0-284.11.1.el9_2.x86_64.rpm#kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm!kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpmX} ABsecurityLow: curl security update/q"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478 https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478 }libcurl-devel-7.76.1-23.el9.i686.rpm}libcurl-devel-7.76.1-23.el9.x86_64.rpm}libcurl-devel-7.76.1-23.el9.i686.rpm}libcurl-devel-7.76.1-23.el9.x86_64.rpmb~ EsecurityModerate: fwupd security and bug fix updateM https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487 QEfwupd-plugin-flashrom-1.8.10-2.el9.alma.x86_64.rpmQEfwupd-plugin-flashrom-1.8.10-2.el9.alma.x86_64.rpm} HBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update/`https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519 c samba-krb5-printing-4.17.5-102.el9.x86_64.rpmd samba-vfs-iouring-4.17.5-102.el9.x86_64.rpme samba-winbind-clients-4.17.5-102.el9.x86_64.rpmg samba-winexe-4.17.5-102.el9.x86_64.rpmb samba-client-4.17.5-102.el9.x86_64.rpmf samba-winbind-krb5-locator-4.17.5-102.el9.x86_64.rpmc samba-krb5-printing-4.17.5-102.el9.x86_64.rpmd samba-vfs-iouring-4.17.5-102.el9.x86_64.rpme samba-winbind-clients-4.17.5-102.el9.x86_64.rpmg samba-winexe-4.17.5-102.el9.x86_64.rpmb samba-client-4.17.5-102.el9.x86_64.rpmf samba-winbind-krb5-locator-4.17.5-102.el9.x86_64.rpmV UBBBsecurityLow: openssl security and bug fix update/dphttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523 https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523 Loopenssl-perl-3.0.7-6.el9_2.x86_64.rpm oopenssl-devel-3.0.7-6.el9_2.x86_64.rpm oopenssl-devel-3.0.7-6.el9_2.i686.rpmLoopenssl-perl-3.0.7-6.el9_2.x86_64.rpm oopenssl-devel-3.0.7-6.el9_2.x86_64.rpm oopenssl-devel-3.0.7-6.el9_2.i686.rpmC [securityLow: libarchive security update/TYhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532 MXbsdtar-3.5.3-4.el9.x86_64.rpmMXbsdtar-3.5.3-4.el9.x86_64.rpm !^BsecurityModerate: krb5 security, bug fix, and enhancement update-Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570 https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570 >+krb5-devel-1.20.1-8.el9.i686.rpm>+krb5-devel-1.20.1-8.el9.x86_64.rpm>+krb5-devel-1.20.1-8.el9.i686.rpm>+krb5-devel-1.20.1-8.el9.x86_64.rpm) $bsecurityLow: lua security update/Rhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582 lua-5.4.4-3.el9.x86_64.rpmlua-5.4.4-3.el9.x86_64.rpmk -eBBBBBBsecurityImportant: mysql security updateVLhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621 https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621 0~mysql-errmsg-8.0.32-1.el9_2.x86_64.rpm/~mysql-common-8.0.32-1.el9_2.x86_64.rpm~mysql-8.0.32-1.el9_2.x86_64.rpmN~mysql-server-8.0.32-1.el9_2.x86_64.rpm0~mysql-errmsg-8.0.32-1.el9_2.x86_64.rpm/~mysql-common-8.0.32-1.el9_2.x86_64.rpm~mysql-8.0.32-1.el9_2.x86_64.rpmN~mysql-server-8.0.32-1.el9_2.x86_64.rpmi 7nBBBBBBBsecurityImportant: emacs security updateU, https://access.redhat.com/errata/RHSA-2023:2626RHSA-2023:2626RHSA-2023:2626 https://access.redhat.com/security/cve/CVE-2022-48337CVE-2022-48337CVE-2022-48337https://access.redhat.com/security/cve/CVE-2022-48338CVE-2022-48338CVE-2022-48338https://access.redhat.com/security/cve/CVE-2022-48339CVE-2022-48339CVE-2022-48339https://access.redhat.com/security/cve/CVE-2023-2491CVE-2023-2491CVE-2023-2491https://bugzilla.redhat.com/21719872171987https://bugzilla.redhat.com/21719882171988https://bugzilla.redhat.com/21719892171989https://bugzilla.redhat.com/21928732192873https://errata.almalinux.org/9/ALSA-2023-2626.htmlALSA-2023:2626ALSA-2023:2626 Cemacs-lucid-27.2-8.el9_2.1.x86_64.rpmCemacs-common-27.2-8.el9_2.1.x86_64.rpmCemacs-nox-27.2-8.el9_2.1.x86_64.rpmCemacs-filesystem-27.2-8.el9_2.1.noarch.rpmCemacs-27.2-8.el9_2.1.x86_64.rpmCemacs-lucid-27.2-8.el9_2.1.x86_64.rpmCemacs-common-27.2-8.el9_2.1.x86_64.rpmCemacs-nox-27.2-8.el9_2.1.x86_64.rpmCemacs-filesystem-27.2-8.el9_2.1.noarch.rpmCemacs-27.2-8.el9_2.1.x86_64.rpm` :xsecurityModerate: libreswan security update_https://access.redhat.com/errata/RHSA-2023:2633RHSA-2023:2633RHSA-2023:2633 https://access.redhat.com/security/cve/CVE-2023-23009CVE-2023-23009CVE-2023-23009https://bugzilla.redhat.com/21736102173610https://errata.almalinux.org/9/ALSA-2023-2633.htmlALSA-2023:2633ALSA-2023:2633 _llibreswan-4.9-2.el9_2.x86_64.rpm_llibreswan-4.9-2.el9_2.x86_64.rpmv ?{BBsecurityModerate: openssh security update`https://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645 https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645 1pam_ssh_agent_auth-0.10.4-5.29.el9_2.x86_64.rpm0openssh-askpass-8.7p1-29.el9_2.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.29.el9_2.x86_64.rpm0openssh-askpass-8.7p1-29.el9_2.x86_64.rpmH @BsecurityModerate: curl security updateh(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650 https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650 ~libcurl-devel-7.76.1-23.el9_2.1.i686.rpm~libcurl-devel-7.76.1-23.el9_2.1.x86_64.rpm~libcurl-devel-7.76.1-23.el9_2.1.i686.rpm~libcurl-devel-7.76.1-23.el9_2.1.x86_64.rpmA  DBBBBBBBBBBsecurityImportant: webkit2gtk3 security updatezhttps://access.redhat.com/errata/RHSA-2023:2653RHSA-2023:2653RHSA-2023:2653 https://access.redhat.com/security/cve/CVE-2023-2203CVE-2023-2203CVE-2023-2203https://bugzilla.redhat.com/21885432188543https://errata.almalinux.org/9/ALSA-2023-2653.htmlALSA-2023:2653ALSA-2023:2653 2ewebkit2gtk3-devel-2.38.5-1.el9_2.1.x86_64.rpm1ewebkit2gtk3-2.38.5-1.el9_2.1.x86_64.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.i686.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.1.i686.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.1.i686.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.x86_64.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.1.x86_64.rpm1ewebkit2gtk3-2.38.5-1.el9_2.1.i686.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.1.x86_64.rpm1ewebkit2gtk3-2.38.5-1.el9_2.1.x86_64.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.i686.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.1.i686.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.1.i686.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.x86_64.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.1.x86_64.rpm1ewebkit2gtk3-2.38.5-1.el9_2.1.i686.rpmC  _Bx{BBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update |https://access.redhat.com/errata/RHSA-2023:2654RHSA-2023:2654RHSA-2023:2654 https://access.redhat.com/security/cve/CVE-2021-35065CVE-2021-35065CVE-2021-35065https://access.redhat.com/security/cve/CVE-2022-25881CVE-2022-25881CVE-2022-25881https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-23918CVE-2023-23918CVE-2023-23918https://access.redhat.com/security/cve/CVE-2023-23919CVE-2023-23919CVE-2023-23919https://access.redhat.com/security/cve/CVE-2023-23920CVE-2023-23920CVE-2023-23920https://access.redhat.com/security/cve/CVE-2023-23936CVE-2023-23936CVE-2023-23936https://access.redhat.com/security/cve/CVE-2023-24807CVE-2023-24807CVE-2023-24807https://bugzilla.redhat.com/21563242156324https://bugzilla.redhat.com/21658242165824https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/21719352171935https://bugzilla.redhat.com/21721702172170https://bugzilla.redhat.com/21721902172190https://bugzilla.redhat.com/21722042172204https://bugzilla.redhat.com/21722172172217https://errata.almalinux.org/9/ALSA-2023-2654.htmlALSA-2023:2654ALSA-2023:2654 57z(anpm-9.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b.x86_64.rpmLInodejs-docs-18.14.2-2.module_el9.2.0+29+de583a0b.noarch.rpm5Inodejs-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeInodejs-full-i18n-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm{Cnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm"Inodejs-devel-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm57z(anpm-9.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b.x86_64.rpmLInodejs-docs-18.14.2-2.module_el9.2.0+29+de583a0b.noarch.rpm5Inodejs-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeInodejs-full-i18n-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm{Cnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm"Inodejs-devel-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm  %[BBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update}https://access.redhat.com/errata/RHSA-2023:2655RHSA-2023:2655RHSA-2023:2655 https://access.redhat.com/security/cve/CVE-2022-25881CVE-2022-25881CVE-2022-25881https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-23918CVE-2023-23918CVE-2023-23918https://access.redhat.com/security/cve/CVE-2023-23920CVE-2023-23920CVE-2023-23920https://access.redhat.com/security/cve/CVE-2023-23936CVE-2023-23936CVE-2023-23936https://access.redhat.com/security/cve/CVE-2023-24807CVE-2023-24807CVE-2023-24807https://bugzilla.redhat.com/21658242165824https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/21719352171935https://bugzilla.redhat.com/21721902172190https://bugzilla.redhat.com/21722042172204https://bugzilla.redhat.com/21722172172217https://errata.almalinux.org/9/ALSA-2023-2655.htmlALSA-2023:2655ALSA-2023:2655  nodejs-libs-16.19.1-1.el9_2.x86_64.rpmanpm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpmenodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm5nodejs-16.19.1-1.el9_2.x86_64.rpm nodejs-libs-16.19.1-1.el9_2.i686.rpmLnodejs-docs-16.19.1-1.el9_2.noarch.rpm nodejs-libs-16.19.1-1.el9_2.x86_64.rpmanpm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpmenodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm5nodejs-16.19.1-1.el9_2.x86_64.rpm nodejs-libs-16.19.1-1.el9_2.i686.rpmLnodejs-docs-16.19.1-1.el9_2.noarch.rpmt  *fBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2023:3143RHSA-2023:3143RHSA-2023:3143 https://access.redhat.com/security/cve/CVE-2023-32205CVE-2023-32205CVE-2023-32205https://access.redhat.com/security/cve/CVE-2023-32206CVE-2023-32206CVE-2023-32206https://access.redhat.com/security/cve/CVE-2023-32207CVE-2023-32207CVE-2023-32207https://access.redhat.com/security/cve/CVE-2023-32211CVE-2023-32211CVE-2023-32211https://access.redhat.com/security/cve/CVE-2023-32212CVE-2023-32212CVE-2023-32212https://access.redhat.com/security/cve/CVE-2023-32213CVE-2023-32213CVE-2023-32213https://access.redhat.com/security/cve/CVE-2023-32215CVE-2023-32215CVE-2023-32215https://bugzilla.redhat.com/21967362196736https://bugzilla.redhat.com/21967372196737https://bugzilla.redhat.com/21967382196738https://bugzilla.redhat.com/21967402196740https://bugzilla.redhat.com/21967412196741https://bugzilla.redhat.com/21967422196742https://bugzilla.redhat.com/21967532196753https://errata.almalinux.org/9/ALSA-2023-3143.htmlALSA-2023:3143ALSA-2023:3143 Ofirefox-x11-102.11.0-2.el9_2.alma.x86_64.rpm9firefox-102.11.0-2.el9_2.alma.x86_64.rpmOfirefox-x11-102.11.0-2.el9_2.alma.x86_64.rpm9firefox-102.11.0-2.el9_2.alma.x86_64.rpm  kBBBBBBBBBBBBBBBBBBBsecurityImportant: apr-util security update%https://access.redhat.com/errata/RHSA-2023:3147RHSA-2023:3147RHSA-2023:3147 https://access.redhat.com/security/cve/CVE-2022-25147CVE-2022-25147CVE-2022-25147https://bugzilla.redhat.com/21696522169652https://errata.almalinux.org/9/ALSA-2023-3147.htmlALSA-2023:3147ALSA-2023:3147 .apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm9.apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-1.6.1-20.el9_2.1.i686.rpm.apr-util-1.6.1-20.el9_2.1.x86_64.rpm;.apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm=.apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm:.apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm<.apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm8.apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-devel-1.6.1-20.el9_2.1.i686.rpm .apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm9.apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-1.6.1-20.el9_2.1.i686.rpm.apr-util-1.6.1-20.el9_2.1.x86_64.rpm;.apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm=.apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm:.apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm<.apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm8.apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm.apr-util-devel-1.6.1-20.el9_2.1.i686.rpm? AsecurityImportant: libreswan security update texlive-cm-super-20200406-26.el9_2.noarch.rpm^ texlive-etex-20200406-26.el9_2.noarch.rpmq texlive-preprint-20200406-26.el9_2.noarch.rpm9 texlive-cite-20200406-26.el9_2.noarch.rpm' texlive-kpathsea-20200406-26.el9_2.x86_64.rpmC texlive-collection-basic-20200406-26.el9_2.noarch.rpm| texlive-fpl-20200406-26.el9_2.noarch.rpm? texlive-ucs-20200406-26.el9_2.noarch.rpmN texlive-wasy-20200406-26.el9_2.noarch.rpm* texlive-latex2man-20200406-26.el9_2.noarch.rpm4 texlive-catchfile-20200406-26.el9_2.noarch.rpmh texlive-pdflscape-20200406-26.el9_2.noarch.rpm- texlive-bookmark-20200406-26.el9_2.noarch.rpm3 texlive-lm-20200406-26.el9_2.noarch.rpm| texlive-pst-grad-20200406-26.el9_2.noarch.rpm! texlive-kvoptions-20200406-26.el9_2.noarch.rpm texlive-adjustbox-20200406-26.el9_2.noarch.rpmC texlive-unicode-data-20200406-26.el9_2.noarch.rpmL texlive-microtype-20200406-26.el9_2.noarch.rpm texlive-pst-tree-20200406-26.el9_2.noarch.rpm texlive-awesomebox-20200406-26.el9_2.noarch.rpm texlive-auxhook-20200406-26.el9_2.noarch.rpmb texlive-paralist-20200406-26.el9_2.noarch.rpmL texlive-wadalab-20200406-26.el9_2.noarch.rpm texlive-pst-tools-20200406-26.el9_2.noarch.rpm texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpmP texlive-ctablestack-20200406-26.el9_2.noarch.rpm0 texlive-breqn-20200406-26.el9_2.noarch.rpm" texlive-dvipng-20200406-26.el9_2.x86_64.rpm texlive-pst-text-20200406-26.el9_2.noarch.rpm" texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm texlive-stmaryrd-20200406-26.el9_2.noarch.rpme texlive-euro-20200406-26.el9_2.noarch.rpmZ texlive-newunicodechar-20200406-26.el9_2.noarch.rpmN texlive-csquotes-20200406-26.el9_2.noarch.rpm$ texlive-beamer-20200406-26.el9_2.noarch.rpm texlive-sepnum-20200406-26.el9_2.noarch.rpmb texlive-etoolbox-20200406-26.el9_2.noarch.rpm texlive-section-20200406-26.el9_2.noarch.rpm texlive-rcs-20200406-26.el9_2.noarch.rpmu texlive-pspicture-20200406-26.el9_2.noarch.rpm texlive-iftex-20200406-26.el9_2.noarch.rpm texlive-scheme-basic-20200406-26.el9_2.noarch.rpmB texlive-underscore-20200406-26.el9_2.noarch.rpm( texlive-luahbtex-20200406-26.el9_2.x86_64.rpm- texlive-letltxmacro-20200406-26.el9_2.noarch.rpm texlive-seminar-20200406-26.el9_2.noarch.rpml texlive-filecontents-20200406-26.el9_2.noarch.rpmO texlive-ctable-20200406-26.el9_2.noarch.rpmD texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpmK texlive-varwidth-20200406-26.el9_2.noarch.rpm> texlive-ucharclasses-20200406-26.el9_2.noarch.rpm0 texlive-tex4ht-20200406-26.el9_2.x86_64.rpmo texlive-fix2col-20200406-26.el9_2.noarch.rpm: texlive-cjk-20200406-26.el9_2.noarch.rpm8 texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpmo texlive-polyglossia-20200406-26.el9_2.noarch.rpm} texlive-pst-math-20200406-26.el9_2.noarch.rpm' texlive-bibtopic-20200406-26.el9_2.noarch.rpm? texlive-makecmds-20200406-26.el9_2.noarch.rpm* texlive-bigintcalc-20200406-26.el9_2.noarch.rpm= texlive-ucharcat-20200406-26.el9_2.noarch.rpm texlive-pstricks-20200406-26.el9_2.noarch.rpm< texlive-luatex85-20200406-26.el9_2.noarch.rpm> texlive-lwarp-20200406-26.el9_2.noarch.rpm texlive-arabxetex-20200406-26.el9_2.noarch.rpmM texlive-minitoc-20200406-26.el9_2.noarch.rpm[ texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm5 texlive-changebar-20200406-26.el9_2.noarch.rpmP texlive-wasysym-20200406-26.el9_2.noarch.rpmU texlive-xecyr-20200406-26.el9_2.noarch.rpmB texlive-collectbox-20200406-26.el9_2.noarch.rpm{ texlive-pst-fill-20200406-26.el9_2.noarch.rpm@ texlive-cmextra-20200406-26.el9_2.noarch.rpm( texlive-bidi-20200406-26.el9_2.noarch.rpmg texlive-zapfding-20200406-26.el9_2.noarch.rpmX texlive-environ-20200406-26.el9_2.noarch.rpm texlive-sauerj-20200406-26.el9_2.noarch.rpmW texlive-xepersian-20200406-26.el9_2.noarch.rpm texlive-jknapltx-20200406-26.el9_2.noarch.rpm2 texlive-xetex-20200406-26.el9_2.x86_64.rpmc texlive-xstring-20200406-26.el9_2.noarch.rpm& texlive-beton-20200406-26.el9_2.noarch.rpmH texlive-collection-xetex-20200406-26.el9_2.noarch.rpm texlive-rsfs-20200406-26.el9_2.noarch.rpm7 texlive-tools-20200406-26.el9_2.noarch.rpma texlive-palatino-20200406-26.el9_2.noarch.rpm$ texlive-tex-gyre-20200406-26.el9_2.noarch.rpmS texlive-xecjk-20200406-26.el9_2.noarch.rpm texlive-ptext-20200406-26.el9_2.noarch.rpm0 texlive-lineno-20200406-26.el9_2.noarch.rpmL texlive-courier-20200406-26.el9_2.noarch.rpm texlive-symbol-20200406-26.el9_2.noarch.rpm$ texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm1 texlive-listings-20200406-26.el9_2.noarch.rpmj texlive-fancyref-20200406-26.el9_2.noarch.rpm~ texlive-garuda-c90-20200406-26.el9_2.noarch.rpm texlive-subfigure-20200406-26.el9_2.noarch.rpm texlive-graphics-cfg-20200406-26.el9_2.noarch.rpmT texlive-xecolor-20200406-26.el9_2.noarch.rpm texlive-avantgar-20200406-26.el9_2.noarch.rpm" texlive-tabu-20200406-26.el9_2.noarch.rpm texlive-ifmtarg-20200406-26.el9_2.noarch.rpm texlive-sansmath-20200406-26.el9_2.noarch.rpm texlive-qstest-20200406-26.el9_2.noarch.rpm' texlive-lastpage-20200406-26.el9_2.noarch.rpmM texlive-crop-20200406-26.el9_2.noarch.rpmV texlive-ncctools-20200406-26.el9_2.noarch.rpm! texlive-t2-20200406-26.el9_2.noarch.rpm[ texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpmI texlive-url-20200406-26.el9_2.noarch.rpm% texlive-fontware-20200406-26.el9_2.x86_64.rpmN texlive-mnsymbol-20200406-26.el9_2.noarch.rpmf texlive-zapfchan-20200406-26.el9_2.noarch.rpmS texlive-multido-20200406-26.el9_2.noarch.rpmv texlive-lib-20200406-26.el9_2.i686.rpmr texlive-fmtcount-20200406-26.el9_2.noarch.rpm texlive-refcount-20200406-26.el9_2.noarch.rpmG texlive-updmap-map-20200406-26.el9_2.noarch.rpm2 texlive-listofitems-20200406-26.el9_2.noarch.rpm texlive-attachfile2-20200406-26.el9_2.noarch.rpm texlive-hyphen-base-20200406-26.el9_2.noarch.rpm! texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpm texlive-grfext-20200406-26.el9_2.noarch.rpm4 texlive-titlesec-20200406-26.el9_2.noarch.rpm_ texlive-obsolete-20200406-26.el9_2.noarch.rpm texlive-stringenc-20200406-26.el9_2.noarch.rpmQ texlive-wrapfig-20200406-26.el9_2.noarch.rpmF texlive-mdwtools-20200406-26.el9_2.noarch.rpme texlive-xunicode-20200406-26.el9_2.noarch.rpmu texlive-fontbook-20200406-26.el9_2.noarch.rpm` texlive-xltxtra-20200406-26.el9_2.noarch.rpmn texlive-finstrut-20200406-26.el9_2.noarch.rpm` texlive-overpic-20200406-26.el9_2.noarch.rpm# texlive-base-20200406-26.el9_2.noarch.rpm< texlive-typehtml-20200406-26.el9_2.noarch.rpm: texlive-lualibs-20200406-26.el9_2.noarch.rpm4 texlive-lm-math-20200406-26.el9_2.noarch.rpm texlive-intcalc-20200406-26.el9_2.noarch.rpm8 texlive-chngcntr-20200406-26.el9_2.noarch.rpm* texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpmK texlive-mfnfss-20200406-26.el9_2.noarch.rpm7 texlive-ltxmisc-20200406-26.el9_2.noarch.rpm9 texlive-trimspaces-20200406-26.el9_2.noarch.rpm. texlive-lettrine-20200406-26.el9_2.noarch.rpm. texlive-textcase-20200406-26.el9_2.noarch.rpm texlive-glyphlist-20200406-26.el9_2.noarch.rpm texlive-algorithms-20200406-26.el9_2.noarch.rpmv texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpm texlive-pstricks-add-20200406-26.el9_2.noarch.rpm? texlive-cmap-20200406-26.el9_2.noarch.rpm3 texlive-carlisle-20200406-26.el9_2.noarch.rpm/ texlive-tex-20200406-26.el9_2.x86_64.rpm8 texlive-translator-20200406-26.el9_2.noarch.rpm texlive-hycolor-20200406-26.el9_2.noarch.rpmA texlive-marginnote-20200406-26.el9_2.noarch.rpm] texlive-ntgclass-20200406-26.el9_2.noarch.rpm} texlive-framed-20200406-26.el9_2.noarch.rpmG texlive-memoir-20200406-26.el9_2.noarch.rpm texlive-arphic-20200406-26.el9_2.noarch.rpm texlive-geometry-20200406-26.el9_2.noarch.rpmd texlive-xtab-20200406-26.el9_2.noarch.rpmE texlive-uniquecounter-20200406-26.el9_2.noarch.rpm texlive-knuth-lib-20200406-26.el9_2.noarch.rpm$ texlive-l3experimental-20200406-26.el9_2.noarch.rpm^ texlive-oberdiek-20200406-26.el9_2.noarch.rpmf texlive-eurosym-20200406-26.el9_2.noarch.rpm& texlive-gsftopk-20200406-26.el9_2.x86_64.rpm texlive-kerkis-20200406-26.el9_2.noarch.rpm texlive-pst-plot-20200406-26.el9_2.noarch.rpm texlive-20200406-26.el9_2.x86_64.rpm texlive-bibtex-20200406-26.el9_2.x86_64.rpm; texlive-type1cm-20200406-26.el9_2.noarch.rpmF texlive-collection-latex-20200406-26.el9_2.noarch.rpm6 texlive-ltxcmds-20200406-26.el9_2.noarch.rpmn texlive-plain-20200406-26.el9_2.noarch.rpm texlive-index-20200406-26.el9_2.noarch.rpms texlive-pslatex-20200406-26.el9_2.noarch.rpm= texlive-luatexbase-20200406-26.el9_2.noarch.rpm texlive-stackengine-20200406-26.el9_2.noarch.rpm texlive-ae-20200406-26.el9_2.noarch.rpm5 texlive-ltabptch-20200406-26.el9_2.noarch.rpmq texlive-float-20200406-26.el9_2.noarch.rpm@ texlive-uhc-20200406-26.el9_2.noarch.rpm+ texlive-bitset-20200406-26.el9_2.noarch.rpmU texlive-natbib-20200406-26.el9_2.noarch.rpm+ texlive-metafont-20200406-26.el9_2.x86_64.rpm texlive-anyfontsize-20200406-26.el9_2.noarch.rpm, texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpm texlive-ifoddpage-20200406-26.el9_2.noarch.rpm` texlive-etexcmds-20200406-26.el9_2.noarch.rpmU texlive-eepic-20200406-26.el9_2.noarch.rpmw texlive-fontspec-20200406-26.el9_2.noarch.rpmF texlive-unisugar-20200406-26.el9_2.noarch.rpm_ texlive-xkeyval-20200406-26.el9_2.noarch.rpmM texlive-was-20200406-26.el9_2.noarch.rpmS texlive-dehyph-20200406-26.el9_2.noarch.rpmD texlive-unicode-math-20200406-26.el9_2.noarch.rpm9 texlive-lualatex-math-20200406-26.el9_2.noarch.rpm% texlive-bera-20200406-26.el9_2.noarch.rpm/ texlive-breakurl-20200406-26.el9_2.noarch.rpmR texlive-xcolor-20200406-26.el9_2.noarch.rpm texlive-subfig-20200406-26.el9_2.noarch.rpm, texlive-latexconfig-20200406-26.el9_2.noarch.rpmm texlive-placeins-20200406-26.el9_2.noarch.rpm3 texlive-tipa-20200406-26.el9_2.noarch.rpm texlive-grffile-20200406-26.el9_2.noarch.rpm1 texlive-capt-of-20200406-26.el9_2.noarch.rpm6 texlive-changepage-20200406-26.el9_2.noarch.rpmd texlive-parskip-20200406-26.el9_2.noarch.rpmr= texlive-cm-lgc-20200406-26.el9_2.noarch.rpm& texlive-tex-ini-files-20200406-26.el9_2.noarch.rpm- texlive-texlive.infra-20200406-26.el9_2.noarch.rpm texlive-soul-20200406-26.el9_2.noarch.rpmJ texlive-colortbl-20200406-26.el9_2.noarch.rpm/ texlive-textpos-20200406-26.el9_2.noarch.rpmB texlive-marvosym-20200406-26.el9_2.noarch.rpm% texlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm texlive-jadetex-20200406-26.el9_2.noarch.rpmi texlive-fancyhdr-20200406-26.el9_2.noarch.rpmD texlive-mathspec-20200406-26.el9_2.noarch.rpm texlive-koma-script-20200406-26.el9_2.noarch.rpmA texlive-ulem-20200406-26.el9_2.noarch.rpm* texlive-makeindex-20200406-26.el9_2.x86_64.rpm texlive-sectsty-20200406-26.el9_2.noarch.rpmQ texlive-mptopdf-20200406-26.el9_2.noarch.rpm texlive-infwarerr-20200406-26.el9_2.noarch.rpm texlive-helvetic-20200406-26.el9_2.noarch.rpm texlive-svn-prov-20200406-26.el9_2.noarch.rpmy texlive-pst-coil-20200406-26.el9_2.noarch.rpm0 texlive-threeparttable-20200406-26.el9_2.noarch.rpm# texlive-tabulary-20200406-26.el9_2.noarch.rpmp texlive-fixlatvian-20200406-26.el9_2.noarch.rpmy texlive-footmisc-20200406-26.el9_2.noarch.rpm texlive-import-20200406-26.el9_2.noarch.rpm5 texlive-titling-20200406-26.el9_2.noarch.rpm texlive-hologo-20200406-26.el9_2.noarch.rpmX texlive-needspace-20200406-26.el9_2.noarch.rpmJ texlive-mflogo-font-20200406-26.el9_2.noarch.rpm texlive-hyph-utf8-20200406-26.el9_2.noarch.rpm texlive-knuth-local-20200406-26.el9_2.noarch.rpm: texlive-txfonts-20200406-26.el9_2.noarch.rpm texlive-ragged2e-20200406-26.el9_2.noarch.rpm texlive-hobsub-20200406-26.el9_2.noarch.rpm texlive-showexpl-20200406-26.el9_2.noarch.rpm^ texlive-xifthen-20200406-26.el9_2.noarch.rpm( texlive-latex-20200406-26.el9_2.noarch.rpm/ texlive-linegoal-20200406-26.el9_2.noarch.rpmK texlive-context-20200406-26.el9_2.noarch.rpm) texlive-luatex-20200406-26.el9_2.x86_64.rpm texlive-appendix-20200406-26.el9_2.noarch.rpm\ texlive-eqparbox-20200406-26.el9_2.noarch.rpm texlive-realscripts-20200406-26.el9_2.noarch.rpm6 texlive-tocloft-20200406-26.el9_2.noarch.rpmG texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm# texlive-l3backend-20200406-26.el9_2.noarch.rpm texlive-amsfonts-20200406-26.el9_2.noarch.rpm texlive-pst-slpe-20200406-26.el9_2.noarch.rpmO texlive-modes-20200406-26.el9_2.noarch.rpml texlive-philokalia-20200406-26.el9_2.noarch.rpmR texlive-ms-20200406-26.el9_2.noarch.rpm1 texlive-xdvi-20200406-26.el9_2.x86_64.rpm\ texlive-notoccite-20200406-26.el9_2.noarch.rpm( texlive-texlive-docindex-20200406-26.el9_2.noarch.rpmv texlive-lib-20200406-26.el9_2.x86_64.rpmE texlive-mathtools-20200406-26.el9_2.noarch.rpm texlive-anysize-20200406-26.el9_2.noarch.rpm; texlive-classpack-20200406-26.el9_2.noarch.rpm texlive-hanging-20200406-26.el9_2.noarch.rpmb texlive-xmltexconfig-20200406-26.el9_2.noarch.rpmI texlive-mflogo-20200406-26.el9_2.noarch.rpmH texlive-upquote-20200406-26.el9_2.noarch.rpm texlive-kastrup-20200406-26.el9_2.noarch.rpm texlive-hyphenex-20200406-26.el9_2.noarch.rpmg texlive-extsizes-20200406-26.el9_2.noarch.rpm texlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm. texlive-booktabs-20200406-26.el9_2.noarch.rpm texlive-amsmath-20200406-26.el9_2.noarch.rpm] texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm2 texlive-times-20200406-26.el9_2.noarch.rpm) texlive-texlive-en-20200406-26.el9_2.noarch.rpmR texlive-datetime-20200406-26.el9_2.noarch.rpm texlive-atveryend-20200406-26.el9_2.noarch.rpm) texlive-bigfoot-20200406-26.el9_2.noarch.rpmc texlive-parallel-20200406-26.el9_2.noarch.rpmp texlive-powerdot-20200406-26.el9_2.noarch.rpmd texlive-euler-20200406-26.el9_2.noarch.rpmw texlive-pst-arrow-20200406-26.el9_2.noarch.rpmt texlive-fontawesome-20200406-26.el9_2.noarch.rpm texlive-gettitlestring-20200406-26.el9_2.noarch.rpm texlive-pxfonts-20200406-26.el9_2.noarch.rpm{ texlive-fp-20200406-26.el9_2.noarch.rpm_ texlive-etex-pkg-20200406-26.el9_2.noarch.rpmH texlive-metalogo-20200406-26.el9_2.noarch.rpme texlive-passivetex-20200406-26.el9_2.noarch.rpm+ texlive-texlive-scripts-20200406-26.el9_2.noarch.rpm+ texlive-latexbug-20200406-26.el9_2.noarch.rpm1 texlive-thumbpdf-20200406-26.el9_2.noarch.rpmk texlive-fancyvrb-20200406-26.el9_2.noarch.rpmX texlive-xesearch-20200406-26.el9_2.noarch.rpmT texlive-multirow-20200406-26.el9_2.noarch.rpmY texlive-xetex-itrans-20200406-26.el9_2.noarch.rpmC texlive-mathpazo-20200406-26.el9_2.noarch.rpm@ texlive-manfnt-font-20200406-26.el9_2.noarch.rpm texlive-ifplatform-20200406-26.el9_2.noarch.rpmE texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpmf texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm! texlive-babel-english-20200406-26.el9_2.noarch.rpmm texlive-filehook-20200406-26.el9_2.noarch.rpm texlive-sansmathaccent-20200406-26.el9_2.noarch.rpmg texlive-pdfescape-20200406-26.el9_2.noarch.rpm, texlive-metapost-20200406-26.el9_2.x86_64.rpm, texlive-bookman-20200406-26.el9_2.noarch.rpmz texlive-pst-eps-20200406-26.el9_2.noarch.rpm texlive-alphalph-20200406-26.el9_2.noarch.rpmA texlive-cns-20200406-26.el9_2.noarch.rpmV texlive-enctex-20200406-26.el9_2.noarch.rpmj texlive-pdftexcmds-20200406-26.el9_2.noarch.rpmV texlive-xeindex-20200406-26.el9_2.noarch.rpm texlive-babel-20200406-26.el9_2.noarch.rpm; texlive-luaotfload-20200406-26.el9_2.noarch.rpmZ texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpm[ texlive-norasi-c90-20200406-26.el9_2.noarch.rpmQ texlive-currfile-20200406-26.el9_2.noarch.rpm texlive-graphics-20200406-26.el9_2.noarch.rpmZ texlive-epstopdf-20200406-26.el9_2.noarch.rpm# texlive-dvips-20200406-26.el9_2.x86_64.rpmh texlive-fancybox-20200406-26.el9_2.noarch.rpmW texlive-enumitem-20200406-26.el9_2.noarch.rpm% texlive-l3kernel-20200406-26.el9_2.noarch.rpmk texlive-pgf-20200406-26.el9_2.noarch.rpmY texlive-newfloat-20200406-26.el9_2.noarch.rpmv texlive-pst-3d-20200406-26.el9_2.noarch.rpma texlive-etoc-20200406-26.el9_2.noarch.rpmh texlive-zref-20200406-26.el9_2.noarch.rpmJ texlive-utopia-20200406-26.el9_2.noarch.rpm& texlive-l3packages-20200406-26.el9_2.noarch.rpmW texlive-ncntrsbk-20200406-26.el9_2.noarch.rpm~ texlive-pst-node-20200406-26.el9_2.noarch.rpm texlive-atbegshi-20200406-26.el9_2.noarch.rpmx texlive-fontwrap-20200406-26.el9_2.noarch.rpm7 texlive-charter-20200406-26.el9_2.noarch.rpm) texlive-latex-fonts-20200406-26.el9_2.noarch.rpm texlive-hyphenat-20200406-26.el9_2.noarch.rpmY texlive-epsf-20200406-26.el9_2.noarch.rpm2 texlive-caption-20200406-26.el9_2.noarch.rpmP texlive-mparhack-20200406-26.el9_2.noarch.rpm- texlive-mfware-20200406-26.el9_2.x86_64.rpm\ texlive-xetexconfig-20200406-26.el9_2.noarch.rpmc texlive-euenc-20200406-26.el9_2.noarch.rpmT texlive-ec-20200406-26.el9_2.noarch.rpm texlive-attachfile-20200406-26.el9_2.noarch.rpm< texlive-cm-20200406-26.el9_2.noarch.rpm texlive-setspace-20200406-26.el9_2.noarch.rpmi texlive-pdfpages-20200406-26.el9_2.noarch.rpmz texlive-footnotehyper-20200406-26.el9_2.noarch.rpm' texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm. texlive-pdftex-20200406-26.el9_2.x86_64.rpmr texlive-psfrag-20200406-26.el9_2.noarch.rpm] texlive-eso-pic-20200406-26.el9_2.noarch.rpmt texlive-psnfss-20200406-26.el9_2.noarch.rpmx texlive-pst-blur-20200406-26.el9_2.noarch.rpma texlive-xmltex-20200406-26.el9_2.noarch.rpm texlive-graphics-def-20200406-26.el9_2.noarch.rpms texlive-fncychap-20200406-26.el9_2.noarch.rpm" texlive-babelbib-20200406-26.el9_2.noarch.rpmI texlive-colorprofiles-20200406-26.el9_2.noarch.rpm texlive-hyperref-20200406-26.el9_2.noarch.rpm texlive-amscls-20200406-26.el9_2.noarch.rpmO texlive-wasy-type1-20200406-26.el9_2.noarch.rpm> texlive-cm-super-20200406-26.el9_2.noarch.rpm^ texlive-etex-20200406-26.el9_2.noarch.rpmq texlive-preprint-20200406-26.el9_2.noarch.rpm9 texlive-cite-20200406-26.el9_2.noarch.rpm' texlive-kpathsea-20200406-26.el9_2.x86_64.rpmC texlive-collection-basic-20200406-26.el9_2.noarch.rpm| texlive-fpl-20200406-26.el9_2.noarch.rpm? texlive-ucs-20200406-26.el9_2.noarch.rpmN texlive-wasy-20200406-26.el9_2.noarch.rpm* texlive-latex2man-20200406-26.el9_2.noarch.rpm4 texlive-catchfile-20200406-26.el9_2.noarch.rpmh texlive-pdflscape-20200406-26.el9_2.noarch.rpm- texlive-bookmark-20200406-26.el9_2.noarch.rpm3 texlive-lm-20200406-26.el9_2.noarch.rpm| texlive-pst-grad-20200406-26.el9_2.noarch.rpm! texlive-kvoptions-20200406-26.el9_2.noarch.rpm texlive-adjustbox-20200406-26.el9_2.noarch.rpmC texlive-unicode-data-20200406-26.el9_2.noarch.rpmL texlive-microtype-20200406-26.el9_2.noarch.rpm texlive-pst-tree-20200406-26.el9_2.noarch.rpm texlive-awesomebox-20200406-26.el9_2.noarch.rpm texlive-auxhook-20200406-26.el9_2.noarch.rpmb texlive-paralist-20200406-26.el9_2.noarch.rpmL texlive-wadalab-20200406-26.el9_2.noarch.rpm texlive-pst-tools-20200406-26.el9_2.noarch.rpm texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpmP texlive-ctablestack-20200406-26.el9_2.noarch.rpm0 texlive-breqn-20200406-26.el9_2.noarch.rpm" texlive-dvipng-20200406-26.el9_2.x86_64.rpm texlive-pst-text-20200406-26.el9_2.noarch.rpm" texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm texlive-stmaryrd-20200406-26.el9_2.noarch.rpme texlive-euro-20200406-26.el9_2.noarch.rpmZ texlive-newunicodechar-20200406-26.el9_2.noarch.rpmN texlive-csquotes-20200406-26.el9_2.noarch.rpm$ texlive-beamer-20200406-26.el9_2.noarch.rpm texlive-sepnum-20200406-26.el9_2.noarch.rpmb texlive-etoolbox-20200406-26.el9_2.noarch.rpm texlive-section-20200406-26.el9_2.noarch.rpm texlive-rcs-20200406-26.el9_2.noarch.rpmu texlive-pspicture-20200406-26.el9_2.noarch.rpm texlive-iftex-20200406-26.el9_2.noarch.rpm texlive-scheme-basic-20200406-26.el9_2.noarch.rpmB texlive-underscore-20200406-26.el9_2.noarch.rpm( texlive-luahbtex-20200406-26.el9_2.x86_64.rpm- texlive-letltxmacro-20200406-26.el9_2.noarch.rpm texlive-seminar-20200406-26.el9_2.noarch.rpml texlive-filecontents-20200406-26.el9_2.noarch.rpmO texlive-ctable-20200406-26.el9_2.noarch.rpmD texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpmK texlive-varwidth-20200406-26.el9_2.noarch.rpm> texlive-ucharclasses-20200406-26.el9_2.noarch.rpm0 texlive-tex4ht-20200406-26.el9_2.x86_64.rpmo texlive-fix2col-20200406-26.el9_2.noarch.rpm: texlive-cjk-20200406-26.el9_2.noarch.rpm8 texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpmo texlive-polyglossia-20200406-26.el9_2.noarch.rpm} texlive-pst-math-20200406-26.el9_2.noarch.rpm' texlive-bibtopic-20200406-26.el9_2.noarch.rpm? texlive-makecmds-20200406-26.el9_2.noarch.rpm* texlive-bigintcalc-20200406-26.el9_2.noarch.rpm= texlive-ucharcat-20200406-26.el9_2.noarch.rpm texlive-pstricks-20200406-26.el9_2.noarch.rpm< texlive-luatex85-20200406-26.el9_2.noarch.rpm> texlive-lwarp-20200406-26.el9_2.noarch.rpm texlive-arabxetex-20200406-26.el9_2.noarch.rpmM texlive-minitoc-20200406-26.el9_2.noarch.rpm[ texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm5 texlive-changebar-20200406-26.el9_2.noarch.rpmP texlive-wasysym-20200406-26.el9_2.noarch.rpmU texlive-xecyr-20200406-26.el9_2.noarch.rpmB texlive-collectbox-20200406-26.el9_2.noarch.rpm{ texlive-pst-fill-20200406-26.el9_2.noarch.rpm@ texlive-cmextra-20200406-26.el9_2.noarch.rpm( texlive-bidi-20200406-26.el9_2.noarch.rpmg texlive-zapfding-20200406-26.el9_2.noarch.rpmX texlive-environ-20200406-26.el9_2.noarch.rpm texlive-sauerj-20200406-26.el9_2.noarch.rpmW texlive-xepersian-20200406-26.el9_2.noarch.rpm texlive-jknapltx-20200406-26.el9_2.noarch.rpm2 texlive-xetex-20200406-26.el9_2.x86_64.rpmc texlive-xstring-20200406-26.el9_2.noarch.rpm& texlive-beton-20200406-26.el9_2.noarch.rpmH texlive-collection-xetex-20200406-26.el9_2.noarch.rpm texlive-rsfs-20200406-26.el9_2.noarch.rpm7 texlive-tools-20200406-26.el9_2.noarch.rpma texlive-palatino-20200406-26.el9_2.noarch.rpm$ texlive-tex-gyre-20200406-26.el9_2.noarch.rpmS texlive-xecjk-20200406-26.el9_2.noarch.rpm texlive-ptext-20200406-26.el9_2.noarch.rpm0 texlive-lineno-20200406-26.el9_2.noarch.rpmL texlive-courier-20200406-26.el9_2.noarch.rpm texlive-symbol-20200406-26.el9_2.noarch.rpm$ texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm1 texlive-listings-20200406-26.el9_2.noarch.rpmj texlive-fancyref-20200406-26.el9_2.noarch.rpm~ texlive-garuda-c90-20200406-26.el9_2.noarch.rpm texlive-subfigure-20200406-26.el9_2.noarch.rpm texlive-graphics-cfg-20200406-26.el9_2.noarch.rpmT texlive-xecolor-20200406-26.el9_2.noarch.rpm texlive-avantgar-20200406-26.el9_2.noarch.rpm" texlive-tabu-20200406-26.el9_2.noarch.rpm texlive-ifmtarg-20200406-26.el9_2.noarch.rpm texlive-sansmath-20200406-26.el9_2.noarch.rpm texlive-qstest-20200406-26.el9_2.noarch.rpm' texlive-lastpage-20200406-26.el9_2.noarch.rpmM texlive-crop-20200406-26.el9_2.noarch.rpmV texlive-ncctools-20200406-26.el9_2.noarch.rpm! texlive-t2-20200406-26.el9_2.noarch.rpm[ texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpmI texlive-url-20200406-26.el9_2.noarch.rpm% texlive-fontware-20200406-26.el9_2.x86_64.rpmN texlive-mnsymbol-20200406-26.el9_2.noarch.rpmf texlive-zapfchan-20200406-26.el9_2.noarch.rpmS texlive-multido-20200406-26.el9_2.noarch.rpmv texlive-lib-20200406-26.el9_2.i686.rpmr texlive-fmtcount-20200406-26.el9_2.noarch.rpm texlive-refcount-20200406-26.el9_2.noarch.rpmG texlive-updmap-map-20200406-26.el9_2.noarch.rpm2 texlive-listofitems-20200406-26.el9_2.noarch.rpm texlive-attachfile2-20200406-26.el9_2.noarch.rpm texlive-hyphen-base-20200406-26.el9_2.noarch.rpm! texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpm texlive-grfext-20200406-26.el9_2.noarch.rpm4 texlive-titlesec-20200406-26.el9_2.noarch.rpm_ texlive-obsolete-20200406-26.el9_2.noarch.rpm texlive-stringenc-20200406-26.el9_2.noarch.rpmQ texlive-wrapfig-20200406-26.el9_2.noarch.rpmF texlive-mdwtools-20200406-26.el9_2.noarch.rpme texlive-xunicode-20200406-26.el9_2.noarch.rpmu texlive-fontbook-20200406-26.el9_2.noarch.rpm` texlive-xltxtra-20200406-26.el9_2.noarch.rpmn texlive-finstrut-20200406-26.el9_2.noarch.rpm` texlive-overpic-20200406-26.el9_2.noarch.rpm# texlive-base-20200406-26.el9_2.noarch.rpm< texlive-typehtml-20200406-26.el9_2.noarch.rpm: texlive-lualibs-20200406-26.el9_2.noarch.rpm4 texlive-lm-math-20200406-26.el9_2.noarch.rpm texlive-intcalc-20200406-26.el9_2.noarch.rpm8 texlive-chngcntr-20200406-26.el9_2.noarch.rpm* texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpmK texlive-mfnfss-20200406-26.el9_2.noarch.rpm7 texlive-ltxmisc-20200406-26.el9_2.noarch.rpm9 texlive-trimspaces-20200406-26.el9_2.noarch.rpm. texlive-lettrine-20200406-26.el9_2.noarch.rpm. texlive-textcase-20200406-26.el9_2.noarch.rpm texlive-glyphlist-20200406-26.el9_2.noarch.rpm texlive-algorithms-20200406-26.el9_2.noarch.rpmv texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpm texlive-pstricks-add-20200406-26.el9_2.noarch.rpm? texlive-cmap-20200406-26.el9_2.noarch.rpm3 texlive-carlisle-20200406-26.el9_2.noarch.rpm/ texlive-tex-20200406-26.el9_2.x86_64.rpm8 texlive-translator-20200406-26.el9_2.noarch.rpm texlive-hycolor-20200406-26.el9_2.noarch.rpmA texlive-marginnote-20200406-26.el9_2.noarch.rpm] texlive-ntgclass-20200406-26.el9_2.noarch.rpm} texlive-framed-20200406-26.el9_2.noarch.rpmG texlive-memoir-20200406-26.el9_2.noarch.rpm texlive-arphic-20200406-26.el9_2.noarch.rpm texlive-geometry-20200406-26.el9_2.noarch.rpmd texlive-xtab-20200406-26.el9_2.noarch.rpmE texlive-uniquecounter-20200406-26.el9_2.noarch.rpm texlive-knuth-lib-20200406-26.el9_2.noarch.rpm$ texlive-l3experimental-20200406-26.el9_2.noarch.rpm^ texlive-oberdiek-20200406-26.el9_2.noarch.rpmf texlive-eurosym-20200406-26.el9_2.noarch.rpm& texlive-gsftopk-20200406-26.el9_2.x86_64.rpm texlive-kerkis-20200406-26.el9_2.noarch.rpm texlive-pst-plot-20200406-26.el9_2.noarch.rpm texlive-20200406-26.el9_2.x86_64.rpm texlive-bibtex-20200406-26.el9_2.x86_64.rpm; texlive-type1cm-20200406-26.el9_2.noarch.rpmF texlive-collection-latex-20200406-26.el9_2.noarch.rpm6 texlive-ltxcmds-20200406-26.el9_2.noarch.rpmn texlive-plain-20200406-26.el9_2.noarch.rpm texlive-index-20200406-26.el9_2.noarch.rpms texlive-pslatex-20200406-26.el9_2.noarch.rpm= texlive-luatexbase-20200406-26.el9_2.noarch.rpm texlive-stackengine-20200406-26.el9_2.noarch.rpm texlive-ae-20200406-26.el9_2.noarch.rpm5 texlive-ltabptch-20200406-26.el9_2.noarch.rpmq texlive-float-20200406-26.el9_2.noarch.rpm@ texlive-uhc-20200406-26.el9_2.noarch.rpm+ texlive-bitset-20200406-26.el9_2.noarch.rpmU texlive-natbib-20200406-26.el9_2.noarch.rpm+ texlive-metafont-20200406-26.el9_2.x86_64.rpm texlive-anyfontsize-20200406-26.el9_2.noarch.rpm, texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpm texlive-ifoddpage-20200406-26.el9_2.noarch.rpm` texlive-etexcmds-20200406-26.el9_2.noarch.rpmU texlive-eepic-20200406-26.el9_2.noarch.rpmw texlive-fontspec-20200406-26.el9_2.noarch.rpmF texlive-unisugar-20200406-26.el9_2.noarch.rpm_ texlive-xkeyval-20200406-26.el9_2.noarch.rpmM texlive-was-20200406-26.el9_2.noarch.rpmS texlive-dehyph-20200406-26.el9_2.noarch.rpmD texlive-unicode-math-20200406-26.el9_2.noarch.rpm9 texlive-lualatex-math-20200406-26.el9_2.noarch.rpm% texlive-bera-20200406-26.el9_2.noarch.rpm/ texlive-breakurl-20200406-26.el9_2.noarch.rpmR texlive-xcolor-20200406-26.el9_2.noarch.rpm texlive-subfig-20200406-26.el9_2.noarch.rpm, texlive-latexconfig-20200406-26.el9_2.noarch.rpmm texlive-placeins-20200406-26.el9_2.noarch.rpm3 texlive-tipa-20200406-26.el9_2.noarch.rpm texlive-grffile-20200406-26.el9_2.noarch.rpm1 texlive-capt-of-20200406-26.el9_2.noarch.rpm6 texlive-changepage-20200406-26.el9_2.noarch.rpmd texlive-parskip-20200406-26.el9_2.noarch.rpm: #]BBBBsecurityModerate: libtiff security updatephttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711 https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711 iClibtiff-4.4.0-8.el9_2.i686.rpmjClibtiff-devel-4.4.0-8.el9_2.i686.rpmjClibtiff-devel-4.4.0-8.el9_2.x86_64.rpmiClibtiff-4.4.0-8.el9_2.x86_64.rpmiClibtiff-4.4.0-8.el9_2.i686.rpmjClibtiff-devel-4.4.0-8.el9_2.i686.rpmjClibtiff-devel-4.4.0-8.el9_2.x86_64.rpmiClibtiff-4.4.0-8.el9_2.x86_64.rpmk 4dBBBBBBBBBBBBBBsecurityModerate: postgresql security updateShttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714 ,tpostgresql-server-13.11-1.el9_2.x86_64.rpm+tpostgresql-private-libs-13.11-1.el9_2.x86_64.rpm(tpostgresql-plperl-13.11-1.el9_2.x86_64.rpm`tpostgresql-13.11-1.el9_2.x86_64.rpm*tpostgresql-pltcl-13.11-1.el9_2.x86_64.rpm'tpostgresql-contrib-13.11-1.el9_2.x86_64.rpm-tpostgresql-upgrade-13.11-1.el9_2.x86_64.rpm)tpostgresql-plpython3-13.11-1.el9_2.x86_64.rpm,tpostgresql-server-13.11-1.el9_2.x86_64.rpm+tpostgresql-private-libs-13.11-1.el9_2.x86_64.rpm(tpostgresql-plperl-13.11-1.el9_2.x86_64.rpm`tpostgresql-13.11-1.el9_2.x86_64.rpm*tpostgresql-pltcl-13.11-1.el9_2.x86_64.rpm'tpostgresql-contrib-13.11-1.el9_2.x86_64.rpm-tpostgresql-upgrade-13.11-1.el9_2.x86_64.rpm)tpostgresql-plpython3-13.11-1.el9_2.x86_64.rpm  !uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security updateZ}https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715 https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715 Qlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm Qlibvirt-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm Qlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpm!Qlibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm Qlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm Qlibvirt-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm Qlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpm!Qlibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm Qlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpmQlibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm! 'bBBBsecurityModerate: openssl security and bug fix updateWV https://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722 https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722  kopenssl-devel-3.0.7-16.el9_2.x86_64.rpm kopenssl-devel-3.0.7-16.el9_2.i686.rpmLkopenssl-perl-3.0.7-16.el9_2.x86_64.rpm kopenssl-devel-3.0.7-16.el9_2.x86_64.rpm kopenssl-devel-3.0.7-16.el9_2.i686.rpmLkopenssl-perl-3.0.7-16.el9_2.x86_64.rpm{" 4hBBBBBBBBBBsecurityImportant: kernel security and bug fix update-https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723 % perf-5.14.0-284.18.1.el9_2.x86_64.rpm" kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm' rtla-5.14.0-284.18.1.el9_2.x86_64.rpm$ kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm# kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm! kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm% perf-5.14.0-284.18.1.el9_2.x86_64.rpm" kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm' rtla-5.14.0-284.18.1.el9_2.x86_64.rpm$ kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm# kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm! kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpmY# uBBBBBBBBBBsecurityCritical: go-toolset and golang security update ;x https://access.redhat.com/errata/RHSA-2023:3923RHSA-2023:3923RHSA-2023:3923 https://access.redhat.com/security/cve/CVE-2023-29402CVE-2023-29402CVE-2023-29402https://access.redhat.com/security/cve/CVE-2023-29403CVE-2023-29403CVE-2023-29403https://access.redhat.com/security/cve/CVE-2023-29404CVE-2023-29404CVE-2023-29404https://access.redhat.com/security/cve/CVE-2023-29405CVE-2023-29405CVE-2023-29405https://bugzilla.redhat.com/22169652216965https://bugzilla.redhat.com/22175622217562https://bugzilla.redhat.com/22175652217565https://bugzilla.redhat.com/22175692217569https://errata.almalinux.org/9/ALSA-2023-3923.htmlALSA-2023:3923ALSA-2023:3923 Tgolang-tests-1.19.10-1.el9_2.noarch.rpmTgolang-docs-1.19.10-1.el9_2.noarch.rpm@Tgolang-bin-1.19.10-1.el9_2.x86_64.rpm?Tgolang-1.19.10-1.el9_2.x86_64.rpmKTgolang-race-1.19.10-1.el9_2.x86_64.rpmpTgo-toolset-1.19.10-1.el9_2.x86_64.rpmTgolang-misc-1.19.10-1.el9_2.noarch.rpmTgolang-src-1.19.10-1.el9_2.noarch.rpmTgolang-tests-1.19.10-1.el9_2.noarch.rpmTgolang-docs-1.19.10-1.el9_2.noarch.rpm@Tgolang-bin-1.19.10-1.el9_2.x86_64.rpm?Tgolang-1.19.10-1.el9_2.x86_64.rpmKTgolang-race-1.19.10-1.el9_2.x86_64.rpmpTgo-toolset-1.19.10-1.el9_2.x86_64.rpmTgolang-misc-1.19.10-1.el9_2.noarch.rpmTgolang-src-1.19.10-1.el9_2.noarch.rpmN$ BBBBBBBBBsecurityLow: open-vm-tools security update/3 https://access.redhat.com/errata/RHSA-2023:3948RHSA-2023:3948RHSA-2023:3948 https://access.redhat.com/security/cve/CVE-2023-20867CVE-2023-20867CVE-2023-20867https://bugzilla.redhat.com/22130872213087https://errata.almalinux.org/9/ALSA-2023-3948.htmlALSA-2023:3948ALSA-2023:3948 aopen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpm/open-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpm-open-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpm.open-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpm,open-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpmaopen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpm/open-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpm-open-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpm.open-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpm,open-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpmN% MsecurityCritical: grafana security update <https://access.redhat.com/errata/RHSA-2023:4030RHSA-2023:4030RHSA-2023:4030 https://access.redhat.com/security/cve/CVE-2023-3128CVE-2023-3128CVE-2023-3128https://bugzilla.redhat.com/22136262213626https://errata.almalinux.org/9/ALSA-2023-4030.htmlALSA-2023:4030ALSA-2023:4030 q%grafana-9.0.9-3.el9_2.alma.x86_64.rpmq%grafana-9.0.9-3.el9_2.alma.x86_64.rpmZ& $PBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateLEhttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057 Edotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpmAdotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpmIdotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpmdotnet-host-7.0.9-1.el9_2.x86_64.rpm Edotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpmAdotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpmIdotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpmdotnet-host-7.0.9-1.el9_2.x86_64.rpmE' 5eBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updateFhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060 dotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpmWdotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpm Wdotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpmWdotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpm Wdotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm;( 8vsecurityImportant: thunderbird security updateWg https://access.redhat.com/errata/RHSA-2023:4064RHSA-2023:4064RHSA-2023:4064 https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4064.htmlALSA-2023:4064ALSA-2023:4064 :tthunderbird-102.13.0-2.el9_2.alma.x86_64.rpm:tthunderbird-102.13.0-2.el9_2.alma.x86_64.rpmǔ) =yBBsecurityImportant: firefox security update> https://access.redhat.com/errata/RHSA-2023:4071RHSA-2023:4071RHSA-2023:4071 https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4071.htmlALSA-2023:4071ALSA-2023:4071 Otfirefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm9tfirefox-102.13.0-2.el9_2.alma.x86_64.rpmOtfirefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm9tfirefox-102.13.0-2.el9_2.alma.x86_64.rpmǑ* ~BBBBBBBBBBBsecurityImportant: bind security updateVNhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099 https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099 _Hbind-libs-9.16.23-11.el9_2.1.x86_64.rpm9Hpython3-bind-9.16.23-11.el9_2.1.noarch.rpm]Hbind-chroot-9.16.23-11.el9_2.1.x86_64.rpm-Hbind-license-9.16.23-11.el9_2.1.noarch.rpm`Hbind-utils-9.16.23-11.el9_2.1.x86_64.rpm,Hbind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm\Hbind-9.16.23-11.el9_2.1.x86_64.rpm^Hbind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm_Hbind-libs-9.16.23-11.el9_2.1.x86_64.rpm9Hpython3-bind-9.16.23-11.el9_2.1.noarch.rpm]Hbind-chroot-9.16.23-11.el9_2.1.x86_64.rpm-Hbind-license-9.16.23-11.el9_2.1.noarch.rpm`Hbind-utils-9.16.23-11.el9_2.1.x86_64.rpm,Hbind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm\Hbind-9.16.23-11.el9_2.1.x86_64.rpm^Hbind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpmٟ+ LBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update$"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158 w{java-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpms{java-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpmu{java-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpmp{java-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpmq{java-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpmv{java-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpmo{java-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpmr{java-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpmt{java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm w{java-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpms{java-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpmu{java-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpmp{java-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpmq{java-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpmv{java-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpmo{java-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpmr{java-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpmt{java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm, 1_BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updateFNhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177  java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpm  java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpmz- >rBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateyhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178 https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178 61java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm<1java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm51java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm41java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm71java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm;1java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm81java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm61java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm<1java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm51java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm41java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm71java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm;1java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm81java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm;. BBBBBBBBBBsecurityImportant: webkit2gtk3 security update Zhttps://access.redhat.com/errata/RHSA-2023:4201RHSA-2023:4201RHSA-2023:4201 https://access.redhat.com/security/cve/CVE-2023-32435CVE-2023-32435CVE-2023-32435https://access.redhat.com/security/cve/CVE-2023-32439CVE-2023-32439CVE-2023-32439https://bugzilla.redhat.com/22186262218626https://bugzilla.redhat.com/22186402218640https://errata.almalinux.org/9/ALSA-2023-4201.htmlALSA-2023:4201ALSA-2023:4201 1gwebkit2gtk3-2.38.5-1.el9_2.3.i686.rpm1gwebkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm2gwebkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm3gwebkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm4gwebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm2gwebkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm4gwebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm3gwebkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm1gwebkit2gtk3-2.38.5-1.el9_2.3.i686.rpm1gwebkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm2gwebkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm3gwebkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm4gwebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm2gwebkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm4gwebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm3gwebkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpmt/ LBBBBBBBBBBsecurityModerate: samba security and bug fix updateghttps://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325 g samba-winexe-4.17.5-103.el9_2.alma.x86_64.rpmf samba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpmd samba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpmc samba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpme samba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpmb samba-client-4.17.5-103.el9_2.alma.x86_64.rpmg samba-winexe-4.17.5-103.el9_2.alma.x86_64.rpmf samba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpmd samba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpmc samba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpme samba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpmb samba-client-4.17.5-103.el9_2.alma.x86_64.rpm*0 6XBBBBB}BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security updateoShttps://access.redhat.com/errata/RHSA-2023:4327RHSA-2023:4327RHSA-2023:4327 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-4327.htmlALSA-2023:4327ALSA-2023:4327 ` x(opostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm wpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm,opostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm-opostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm vpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm'opostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm)opostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm+opostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm upg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm opostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm*opostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm(opostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmkopostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpm`opostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm` x(opostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm wpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm,opostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm-opostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm vpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm'opostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm)opostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm+opostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm upg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm opostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm*opostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm(opostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmkopostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpm`opostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmy1 _BxaBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement updateBU https://access.redhat.com/errata/RHSA-2023:4330RHSA-2023:4330RHSA-2023:4330 https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4330.htmlALSA-2023:4330ALSA-2023:4330 57|(anpm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmLKnodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeKnodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm"Knodejs-devel-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm{Cnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm5Knodejs-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm57|(anpm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmLKnodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeKnodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm"Knodejs-devel-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm{Cnodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm5Knodejs-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm;2 ABBBBBBBBsecurityModerate: nodejs security, bug fix, and enhancement updateZ https://access.redhat.com/errata/RHSA-2023:4331RHSA-2023:4331RHSA-2023:4331 https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4331.htmlALSA-2023:4331ALSA-2023:4331 enodejs-full-i18n-16.20.1-1.el9_2.x86_64.rpmanpm-8.19.4-1.16.20.1.1.el9_2.x86_64.rpm nodejs-libs-16.20.1-1.el9_2.i686.rpm nodejs-libs-16.20.1-1.el9_2.x86_64.rpmLnodejs-docs-16.20.1-1.el9_2.noarch.rpm5nodejs-16.20.1-1.el9_2.x86_64.rpmenodejs-full-i18n-16.20.1-1.el9_2.x86_64.rpmanpm-8.19.4-1.16.20.1.1.el9_2.x86_64.rpm nodejs-libs-16.20.1-1.el9_2.i686.rpm nodejs-libs-16.20.1-1.el9_2.x86_64.rpmLnodejs-docs-16.20.1-1.el9_2.noarch.rpm5nodejs-16.20.1-1.el9_2.x86_64.rpmA3 LBsecurityModerate: libxml2 security updateqNhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349 https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349 9_libxml2-devel-2.9.13-3.el9_2.1.i686.rpm9_libxml2-devel-2.9.13-3.el9_2.1.x86_64.rpm9_libxml2-devel-2.9.13-3.el9_2.1.i686.rpm9_libxml2-devel-2.9.13-3.el9_2.1.x86_64.rpm4 PsecurityModerate: python-requests security update?https://access.redhat.com/errata/RHSA-2023:4350RHSA-2023:4350RHSA-2023:4350 https://access.redhat.com/security/cve/CVE-2023-32681CVE-2023-32681CVE-2023-32681https://bugzilla.redhat.com/22094692209469https://errata.almalinux.org/9/ALSA-2023-4350.htmlALSA-2023:4350ALSA-2023:4350 e python3-requests+security-2.25.1-7.el9_2.noarch.rpmf python3-requests+socks-2.25.1-7.el9_2.noarch.rpme python3-requests+security-2.25.1-7.el9_2.noarch.rpmf python3-requests+socks-2.25.1-7.el9_2.noarch.rpmQ5 SBsecurityModerate: curl security updateF~https://access.redhat.com/errata/RHSA-2023:4354RHSA-2023:4354RHSA-2023:4354 https://access.redhat.com/security/cve/CVE-2023-28321CVE-2023-28321CVE-2023-28321https://access.redhat.com/security/cve/CVE-2023-28322CVE-2023-28322CVE-2023-28322https://bugzilla.redhat.com/21967862196786https://bugzilla.redhat.com/21967932196793https://errata.almalinux.org/9/ALSA-2023-4354.htmlALSA-2023:4354ALSA-2023:4354 libcurl-devel-7.76.1-23.el9_2.2.x86_64.rpmlibcurl-devel-7.76.1-23.el9_2.2.i686.rpmlibcurl-devel-7.76.1-23.el9_2.2.x86_64.rpmlibcurl-devel-7.76.1-23.el9_2.2.i686.rpmh6 $WBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateD0 https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377 "kernel-debug-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm%perf-5.14.0-284.25.1.el9_2.x86_64.rpm!kernel-debug-devel-5.14.0-284.25.1.el9_2.x86_64.rpmkernel-doc-5.14.0-284.25.1.el9_2.noarch.rpm'rtla-5.14.0-284.25.1.el9_2.x86_64.rpm#kernel-devel-5.14.0-284.25.1.el9_2.x86_64.rpm$kernel-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm"kernel-debug-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm%perf-5.14.0-284.25.1.el9_2.x86_64.rpm!kernel-debug-devel-5.14.0-284.25.1.el9_2.x86_64.rpmkernel-doc-5.14.0-284.25.1.el9_2.noarch.rpm'rtla-5.14.0-284.25.1.el9_2.x86_64.rpm#kernel-devel-5.14.0-284.25.1.el9_2.x86_64.rpm$kernel-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm57 (eBsecurityImportant: cjose security updatethttps://access.redhat.com/errata/RHSA-2023:4411RHSA-2023:4411RHSA-2023:4411 https://access.redhat.com/security/cve/CVE-2023-37464CVE-2023-37464CVE-2023-37464https://bugzilla.redhat.com/22232952223295https://errata.almalinux.org/9/ALSA-2023-4411.htmlALSA-2023:4411ALSA-2023:4411 cjose-0.6.1-13.el9_2.alma.i686.rpmcjose-0.6.1-13.el9_2.alma.x86_64.rpmcjose-0.6.1-13.el9_2.alma.i686.rpmcjose-0.6.1-13.el9_2.alma.x86_64.rpmR8 -iBBsecurityImportant: openssh security update]https://access.redhat.com/errata/RHSA-2023:4412RHSA-2023:4412RHSA-2023:4412 https://access.redhat.com/security/cve/CVE-2023-38408CVE-2023-38408CVE-2023-38408https://bugzilla.redhat.com/22241732224173https://errata.almalinux.org/9/ALSA-2023-4412.htmlALSA-2023:4412ALSA-2023:4412 0openssh-askpass-8.7p1-30.el9_2.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.30.el9_2.x86_64.rpm0openssh-askpass-8.7p1-30.el9_2.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.30.el9_2.x86_64.rpm 9 2nBBsecurityImportant: firefox security updatep*https://access.redhat.com/errata/RHSA-2023:4462RHSA-2023:4462RHSA-2023:4462 https://access.redhat.com/security/cve/CVE-2023-4045CVE-2023-4045CVE-2023-4045https://access.redhat.com/security/cve/CVE-2023-4046CVE-2023-4046CVE-2023-4046https://access.redhat.com/security/cve/CVE-2023-4047CVE-2023-4047CVE-2023-4047https://access.redhat.com/security/cve/CVE-2023-4048CVE-2023-4048CVE-2023-4048https://access.redhat.com/security/cve/CVE-2023-4049CVE-2023-4049CVE-2023-4049https://access.redhat.com/security/cve/CVE-2023-4050CVE-2023-4050CVE-2023-4050https://access.redhat.com/security/cve/CVE-2023-4055CVE-2023-4055CVE-2023-4055https://access.redhat.com/security/cve/CVE-2023-4056CVE-2023-4056CVE-2023-4056https://access.redhat.com/security/cve/CVE-2023-4057CVE-2023-4057CVE-2023-4057https://bugzilla.redhat.com/22283602228360https://bugzilla.redhat.com/22283612228361https://bugzilla.redhat.com/22283622228362https://bugzilla.redhat.com/22283632228363https://bugzilla.redhat.com/22283642228364https://bugzilla.redhat.com/22283652228365https://bugzilla.redhat.com/22283672228367https://bugzilla.redhat.com/22283702228370https://bugzilla.redhat.com/22283712228371https://errata.almalinux.org/9/ALSA-2023-4462.htmlALSA-2023:4462ALSA-2023:4462 Oufirefox-x11-102.14.0-1.el9_2.alma.x86_64.rpm9ufirefox-102.14.0-1.el9_2.alma.x86_64.rpmOufirefox-x11-102.14.0-1.el9_2.alma.x86_64.rpm9ufirefox-102.14.0-1.el9_2.alma.x86_64.rpmG: 5ssecurityImportant: thunderbird security updateOhttps://access.redhat.com/errata/RHSA-2023:4499RHSA-2023:4499RHSA-2023:4499 https://access.redhat.com/security/cve/CVE-2023-3417CVE-2023-3417CVE-2023-3417https://access.redhat.com/security/cve/CVE-2023-4045CVE-2023-4045CVE-2023-4045https://access.redhat.com/security/cve/CVE-2023-4046CVE-2023-4046CVE-2023-4046https://access.redhat.com/security/cve/CVE-2023-4047CVE-2023-4047CVE-2023-4047https://access.redhat.com/security/cve/CVE-2023-4048CVE-2023-4048CVE-2023-4048https://access.redhat.com/security/cve/CVE-2023-4049CVE-2023-4049CVE-2023-4049https://access.redhat.com/security/cve/CVE-2023-4050CVE-2023-4050CVE-2023-4050https://access.redhat.com/security/cve/CVE-2023-4055CVE-2023-4055CVE-2023-4055https://access.redhat.com/security/cve/CVE-2023-4056CVE-2023-4056CVE-2023-4056https://access.redhat.com/security/cve/CVE-2023-4057CVE-2023-4057CVE-2023-4057https://bugzilla.redhat.com/22253252225325https://bugzilla.redhat.com/22283602228360https://bugzilla.redhat.com/22283612228361https://bugzilla.redhat.com/22283622228362https://bugzilla.redhat.com/22283632228363https://bugzilla.redhat.com/22283642228364https://bugzilla.redhat.com/22283652228365https://bugzilla.redhat.com/22283672228367https://bugzilla.redhat.com/22283702228370https://bugzilla.redhat.com/22283712228371https://errata.almalinux.org/9/ALSA-2023-4499.htmlALSA-2023:4499ALSA-2023:4499 :uthunderbird-102.14.0-1.el9_2.alma.x86_64.rpm:uthunderbird-102.14.0-1.el9_2.alma.x86_64.rpmY; =vBBBBBsecurityModerate: dbus security updateihttps://access.redhat.com/errata/RHSA-2023:4569RHSA-2023:4569RHSA-2023:4569 https://access.redhat.com/security/cve/CVE-2023-34969CVE-2023-34969CVE-2023-34969https://bugzilla.redhat.com/22131662213166https://errata.almalinux.org/9/ALSA-2023-4569.htmlALSA-2023:4569ALSA-2023:4569 8Fdbus-daemon-1.12.20-7.el9_2.1.x86_64.rpmFdbus-devel-1.12.20-7.el9_2.1.x86_64.rpmFdbus-devel-1.12.20-7.el9_2.1.i686.rpm9Fdbus-x11-1.12.20-7.el9_2.1.x86_64.rpm8Fdbus-daemon-1.12.20-7.el9_2.1.x86_64.rpmFdbus-devel-1.12.20-7.el9_2.1.x86_64.rpmFdbus-devel-1.12.20-7.el9_2.1.i686.rpm9Fdbus-x11-1.12.20-7.el9_2.1.x86_64.rpm< ~BsecurityImportant: iperf3 security updateh8https://access.redhat.com/errata/RHSA-2023:4571RHSA-2023:4571RHSA-2023:4571 https://access.redhat.com/security/cve/CVE-2023-38403CVE-2023-38403CVE-2023-38403https://bugzilla.redhat.com/22222042222204https://errata.almalinux.org/9/ALSA-2023-4571.htmlALSA-2023:4571ALSA-2023:4571 apiperf3-3.9-10.el9_2.alma.i686.rpmapiperf3-3.9-10.el9_2.alma.x86_64.rpmapiperf3-3.9-10.el9_2.alma.i686.rpmapiperf3-3.9-10.el9_2.alma.x86_64.rpmo= BBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: rust security update 9https://access.redhat.com/errata/RHSA-2023:4634RHSA-2023:4634RHSA-2023:4634 https://access.redhat.com/security/cve/CVE-2023-38497CVE-2023-38497CVE-2023-38497https://bugzilla.redhat.com/22280382228038https://errata.almalinux.org/9/ALSA-2023-4634.htmlALSA-2023:4634ALSA-2023:4634 rust-doc-1.66.1-2.el9_2.x86_64.rpm rust-src-1.66.1-2.el9_2.noarch.rpmHclippy-1.66.1-2.el9_2.x86_64.rpmGcargo-1.66.1-2.el9_2.x86_64.rpmrust-analysis-1.66.1-2.el9_2.x86_64.rpm rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpmrust-lldb-1.66.1-2.el9_2.noarch.rpmrrust-std-static-1.66.1-2.el9_2.x86_64.rpmrust-gdb-1.66.1-2.el9_2.noarch.rpmrust-toolset-1.66.1-2.el9_2.x86_64.rpmrust-1.66.1-2.el9_2.x86_64.rpmrust-analyzer-1.66.1-2.el9_2.x86_64.rpmrrust-std-static-1.66.1-2.el9_2.i686.rpmrust-debugger-common-1.66.1-2.el9_2.noarch.rpmrustfmt-1.66.1-2.el9_2.x86_64.rpm rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpmrust-doc-1.66.1-2.el9_2.x86_64.rpm rust-src-1.66.1-2.el9_2.noarch.rpmHclippy-1.66.1-2.el9_2.x86_64.rpmGcargo-1.66.1-2.el9_2.x86_64.rpmrust-analysis-1.66.1-2.el9_2.x86_64.rpm rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpmrust-lldb-1.66.1-2.el9_2.noarch.rpmrrust-std-static-1.66.1-2.el9_2.x86_64.rpmrust-gdb-1.66.1-2.el9_2.noarch.rpmrust-toolset-1.66.1-2.el9_2.x86_64.rpmrust-1.66.1-2.el9_2.x86_64.rpmrust-analyzer-1.66.1-2.el9_2.x86_64.rpmrrust-std-static-1.66.1-2.el9_2.i686.rpmrust-debugger-common-1.66.1-2.el9_2.noarch.rpmrustfmt-1.66.1-2.el9_2.x86_64.rpm rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpmP> 0\BBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateYhttps://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642 ?dotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpmAdotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpmEdotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpmdotnet-host-7.0.10-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpmIdotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm ?dotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpmAdotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpmEdotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpmdotnet-host-7.0.10-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpmIdotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm? qBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updatephttps://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644 aspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm Xdotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpmXdotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm Xdotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpmXdotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm0@ BBBBBBBBBBBBBsecurityImportant: cups security updatehttps://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838 https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838 Kcups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpmJcups-client-2.3.3op2-16.el9_2.1.x86_64.rpmLcups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpmIcups-2.3.3op2-16.el9_2.1.x86_64.rpmcups-devel-2.3.3op2-16.el9_2.1.i686.rpm9cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpmcups-devel-2.3.3op2-16.el9_2.1.x86_64.rpmMcups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpmKcups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpmJcups-client-2.3.3op2-16.el9_2.1.x86_64.rpmLcups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpmIcups-2.3.3op2-16.el9_2.1.x86_64.rpmcups-devel-2.3.3op2-16.el9_2.1.i686.rpm9cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpmcups-devel-2.3.3op2-16.el9_2.1.x86_64.rpmMcups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpmMA QsecurityImportant: thunderbird security update!https://access.redhat.com/errata/RHSA-2023:4955RHSA-2023:4955RHSA-2023:4955 https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4955.htmlALSA-2023:4955ALSA-2023:4955 :vthunderbird-102.15.0-1.el9_2.alma.x86_64.rpm:vthunderbird-102.15.0-1.el9_2.alma.x86_64.rpm&B TBBsecurityImportant: firefox security update 0https://access.redhat.com/errata/RHSA-2023:4958RHSA-2023:4958RHSA-2023:4958 https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4958.htmlALSA-2023:4958ALSA-2023:4958 9vfirefox-102.15.0-1.el9_2.alma.x86_64.rpmOvfirefox-x11-102.15.0-1.el9_2.alma.x86_64.rpm9vfirefox-102.15.0-1.el9_2.alma.x86_64.rpmOvfirefox-x11-102.15.0-1.el9_2.alma.x86_64.rpmMC YBsecurityImportant: flac security updatePwhttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048 https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048 5flac-libs-1.3.3-10.el9_2.1.x86_64.rpm5flac-libs-1.3.3-10.el9_2.1.i686.rpm5flac-libs-1.3.3-10.el9_2.1.x86_64.rpm5flac-libs-1.3.3-10.el9_2.1.i686.rpm5D )]BBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateG_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069 %perf-5.14.0-284.30.1.el9_2.x86_64.rpm!kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm"kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm$kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm#kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm'rtla-5.14.0-284.30.1.el9_2.x86_64.rpm%perf-5.14.0-284.30.1.el9_2.x86_64.rpm!kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm"kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm$kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm#kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm'rtla-5.14.0-284.30.1.el9_2.x86_64.rpmE -jBsecurityModerate: libcap security update&0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071 https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071 ALlibcap-devel-2.48-9.el9_2.x86_64.rpmALlibcap-devel-2.48-9.el9_2.i686.rpmALlibcap-devel-2.48-9.el9_2.x86_64.rpmALlibcap-devel-2.48-9.el9_2.i686.rpmF ;nBBBBBBBBBBBsecurityModerate: keylime security updateVhhttps://access.redhat.com/errata/RHSA-2023:5080RHSA-2023:5080RHSA-2023:5080 https://access.redhat.com/security/cve/CVE-2023-38200CVE-2023-38200CVE-2023-38200https://access.redhat.com/security/cve/CVE-2023-38201CVE-2023-38201CVE-2023-38201https://bugzilla.redhat.com/22226922222692https://bugzilla.redhat.com/22226932222693https://errata.almalinux.org/9/ALSA-2023-5080.htmlALSA-2023:5080ALSA-2023:5080 =keylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm>keylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm?keylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpmQpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpmdkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpm<keylime-6.5.2-6.el9_2.alma.1.x86_64.rpm@keylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm=keylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm>keylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm?keylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpmQpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpmdkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpm<keylime-6.5.2-6.el9_2.alma.1.x86_64.rpm@keylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpmG |BBBBBBsecurityModerate: librsvg2 security update>https://access.redhat.com/errata/RHSA-2023:5081RHSA-2023:5081RHSA-2023:5081 https://access.redhat.com/security/cve/CVE-2023-38633CVE-2023-38633CVE-2023-38633https://bugzilla.redhat.com/22249452224945https://errata.almalinux.org/9/ALSA-2023-5081.htmlALSA-2023:5081ALSA-2023:5081 A librsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpmU librsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpmT librsvg2-2.50.7-1.el9_2.1.x86_64.rpmU librsvg2-devel-2.50.7-1.el9_2.1.i686.rpmT librsvg2-2.50.7-1.el9_2.1.i686.rpmA librsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpmU librsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpmT librsvg2-2.50.7-1.el9_2.1.x86_64.rpmU librsvg2-devel-2.50.7-1.el9_2.1.i686.rpmT librsvg2-2.50.7-1.el9_2.1.i686.rpm]H )EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security and bug fix updateNBhttps://access.redhat.com/errata/RHSA-2023:5094RHSA-2023:5094RHSA-2023:5094 https://access.redhat.com/security/cve/CVE-2023-3354CVE-2023-3354CVE-2023-3354https://bugzilla.redhat.com/22164782216478https://errata.almalinux.org/9/ALSA-2023-5094.htmlALSA-2023:5094ALSA-2023:5094 a^qemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpmZ^qemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpm^^qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpmc^qemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm\^qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpm]^qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpmY^qemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpmd^qemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpmT^qemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpmb^qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpmX^qemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpm_^qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpm`^qemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpmW^qemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmU^qemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpm[^qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpmS^qemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpmV^qemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpma^qemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpmZ^qemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpm^^qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpmc^qemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm\^qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpm]^qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpmY^qemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpmd^qemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpmT^qemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpmb^qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpmX^qemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpm_^qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpm`^qemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpmW^qemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmU^qemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpm[^qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpmS^qemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpmV^qemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpmI :jBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updateRhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143 dotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm Ydotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpmYdotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm Ydotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpmYdotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm~J {BBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updatebRhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146 dotnet-host-7.0.11-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmAdotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmI dotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpm netstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpmE dotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm dotnet-host-7.0.11-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmAdotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmI dotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpm netstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpmE dotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpmqK PBsecurityImportant: frr security update4jhttps://access.redhat.com/errata/RHSA-2023:5194RHSA-2023:5194RHSA-2023:5194 https://access.redhat.com/security/cve/CVE-2023-38802CVE-2023-38802CVE-2023-38802https://bugzilla.redhat.com/22309832230983https://errata.almalinux.org/9/ALSA-2023-5194.htmlALSA-2023:5194ALSA-2023:5194 a frr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpmN frr-8.3.1-5.el9_2.2.alma.x86_64.rpma frr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpmN frr-8.3.1-5.el9_2.2.alma.x86_64.rpm*L TBBsecurityImportant: firefox security update7https://access.redhat.com/errata/RHSA-2023:5200RHSA-2023:5200RHSA-2023:5200 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5200.htmlALSA-2023:5200ALSA-2023:5200 9wfirefox-102.15.1-1.el9_2.alma.x86_64.rpmOwfirefox-x11-102.15.1-1.el9_2.alma.x86_64.rpm9wfirefox-102.15.1-1.el9_2.alma.x86_64.rpmOwfirefox-x11-102.15.1-1.el9_2.alma.x86_64.rpmMM YBBBBsecurityImportant: libwebp security updateU-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214 @libwebp-devel-1.2.0-7.el9_2.i686.rpm?libwebp-1.2.0-7.el9_2.i686.rpm@libwebp-devel-1.2.0-7.el9_2.x86_64.rpm?libwebp-1.2.0-7.el9_2.x86_64.rpm@libwebp-devel-1.2.0-7.el9_2.i686.rpm?libwebp-1.2.0-7.el9_2.i686.rpm@libwebp-devel-1.2.0-7.el9_2.x86_64.rpm?libwebp-1.2.0-7.el9_2.x86_64.rpm^N "`securityImportant: thunderbird security updatehttps://access.redhat.com/errata/RHSA-2023:5224RHSA-2023:5224RHSA-2023:5224 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5224.htmlALSA-2023:5224ALSA-2023:5224 :wthunderbird-102.15.1-1.el9_2.alma.x86_64.rpm:wthunderbird-102.15.1-1.el9_2.alma.x86_64.rpmpO -cBBBBBBBBsecurityImportant: open-vm-tools security updatelhttps://access.redhat.com/errata/RHSA-2023:5313RHSA-2023:5313RHSA-2023:5313 https://access.redhat.com/security/cve/CVE-2023-20900CVE-2023-20900CVE-2023-20900https://bugzilla.redhat.com/22365422236542https://errata.almalinux.org/9/ALSA-2023-5313.htmlALSA-2023:5313ALSA-2023:5313 -open-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpm/open-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpm,open-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpm.open-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpmaopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpm-open-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpm/open-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpm,open-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpm.open-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpmaopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpmP 7_BFJBBBBBBBsecurityImportant: nodejs:18 security, bug fix, and enhancement updatet. https://access.redhat.com/errata/RHSA-2023:5363RHSA-2023:5363RHSA-2023:5363 https://access.redhat.com/security/cve/CVE-2022-25883CVE-2022-25883CVE-2022-25883https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22164752216475https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlALSA-2023:5363ALSA-2023:5363 57}(anpm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpmeLnodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm5Lnodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmLLnodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm"Lnodejs-devel-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm57}(anpm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpmeLnodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm5Lnodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmLLnodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm"Lnodejs-devel-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpmѸ Q $ghostscript-tools-printing-9.54.0-10.el9_2.x86_64.rpm<$ghostscript-tools-dvipdf-9.54.0-10.el9_2.x86_64.rpm?$libgs-9.54.0-10.el9_2.i686.rpm=$ghostscript-tools-fonts-9.54.0-10.el9_2.x86_64.rpm;$ghostscript-9.54.0-10.el9_2.x86_64.rpm?$ghostscript-x11-9.54.0-10.el9_2.x86_64.rpm?$libgs-9.54.0-10.el9_2.x86_64.rpm $ghostscript-doc-9.54.0-10.el9_2.noarch.rpm>$ghostscript-tools-printing-9.54.0-10.el9_2.x86_64.rpm<$ghostscript-tools-dvipdf-9.54.0-10.el9_2.x86_64.rpm?$libgs-9.54.0-10.el9_2.i686.rpmdV +eBBBBsecurityImportant: python3.9 security update%https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462 j'python-unversioned-command-3.9.16-1.el9_2.2.noarch.rpmW'python3-devel-3.9.16-1.el9_2.2.i686.rpmW'python3-devel-3.9.16-1.el9_2.2.x86_64.rpm='python3-tkinter-3.9.16-1.el9_2.2.x86_64.rpmj'python-unversioned-command-3.9.16-1.el9_2.2.noarch.rpmW'python3-devel-3.9.16-1.el9_2.2.i686.rpmW'python3-devel-3.9.16-1.el9_2.2.x86_64.rpm='python3-tkinter-3.9.16-1.el9_2.2.x86_64.rpmOW 5lBBBBBBBsecurityImportant: nodejs security and bug fix update@Thttps://access.redhat.com/errata/RHSA-2023:5532RHSA-2023:5532RHSA-2023:5532 https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5532.htmlALSA-2023:5532ALSA-2023:5532 5Gnodejs-16.20.2-1.el9_2.x86_64.rpm Gnodejs-libs-16.20.2-1.el9_2.x86_64.rpmeGnodejs-full-i18n-16.20.2-1.el9_2.x86_64.rpmanpm-8.19.4-1.16.20.2.1.el9_2.x86_64.rpmLGnodejs-docs-16.20.2-1.el9_2.noarch.rpm5Gnodejs-16.20.2-1.el9_2.x86_64.rpm Gnodejs-libs-16.20.2-1.el9_2.x86_64.rpmeGnodejs-full-i18n-16.20.2-1.el9_2.x86_64.rpmanpm-8.19.4-1.16.20.2.1.el9_2.x86_64.rpmLGnodejs-docs-16.20.2-1.el9_2.noarch.rpmX 9vBsecurityImportant: libvpx security updatehttps://access.redhat.com/errata/RHSA-2023:5539RHSA-2023:5539RHSA-2023:5539 https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22411912241191https://bugzilla.redhat.com/22418062241806https://errata.almalinux.org/9/ALSA-2023-5539.htmlALSA-2023:5539ALSA-2023:5539 g;libvpx-1.9.0-7.el9_2.alma.1.i686.rpmg;libvpx-1.9.0-7.el9_2.alma.1.x86_64.rpmg;libvpx-1.9.0-7.el9_2.alma.1.i686.rpmg;libvpx-1.9.0-7.el9_2.alma.1.x86_64.rpmwY zBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: galera and mariadb security updateUhttps://access.redhat.com/errata/RHSA-2023:5684RHSA-2023:5684RHSA-2023:5684 https://access.redhat.com/security/cve/CVE-2022-32081CVE-2022-32081CVE-2022-32081https://access.redhat.com/security/cve/CVE-2022-32082CVE-2022-32082CVE-2022-32082https://access.redhat.com/security/cve/CVE-2022-32084CVE-2022-32084CVE-2022-32084https://access.redhat.com/security/cve/CVE-2022-32089CVE-2022-32089CVE-2022-32089https://access.redhat.com/security/cve/CVE-2022-32091CVE-2022-32091CVE-2022-32091https://access.redhat.com/security/cve/CVE-2022-38791CVE-2022-38791CVE-2022-38791https://access.redhat.com/security/cve/CVE-2022-47015CVE-2022-47015CVE-2022-47015https://access.redhat.com/security/cve/CVE-2023-5157CVE-2023-5157CVE-2023-5157https://bugzilla.redhat.com/21060282106028https://bugzilla.redhat.com/21060302106030https://bugzilla.redhat.com/21060342106034https://bugzilla.redhat.com/21060352106035https://bugzilla.redhat.com/21060422106042https://bugzilla.redhat.com/21301052130105https://bugzilla.redhat.com/21636092163609https://bugzilla.redhat.com/22402462240246https://errata.almalinux.org/9/ALSA-2023-5684.htmlALSA-2023:5684ALSA-2023:5684 $0mariadb-embedded-10.5.22-1.el9_2.alma.1.x86_64.rpm.0mariadb-10.5.22-1.el9_2.alma.1.x86_64.rpm'0mariadb-oqgraph-engine-10.5.22-1.el9_2.alma.1.x86_64.rpm(0mariadb-pam-10.5.22-1.el9_2.alma.1.x86_64.rpm7Dgalera-26.4.14-1.el9_2.alma.1.x86_64.rpm*0mariadb-server-galera-10.5.22-1.el9_2.alma.1.x86_64.rpm+0mariadb-server-utils-10.5.22-1.el9_2.alma.1.x86_64.rpm#0mariadb-common-10.5.22-1.el9_2.alma.1.x86_64.rpm"0mariadb-backup-10.5.22-1.el9_2.alma.1.x86_64.rpm&0mariadb-gssapi-server-10.5.22-1.el9_2.alma.1.x86_64.rpm)0mariadb-server-10.5.22-1.el9_2.alma.1.x86_64.rpm%0mariadb-errmsg-10.5.22-1.el9_2.alma.1.x86_64.rpm $0mariadb-embedded-10.5.22-1.el9_2.alma.1.x86_64.rpm.0mariadb-10.5.22-1.el9_2.alma.1.x86_64.rpm'0mariadb-oqgraph-engine-10.5.22-1.el9_2.alma.1.x86_64.rpm(0mariadb-pam-10.5.22-1.el9_2.alma.1.x86_64.rpm7Dgalera-26.4.14-1.el9_2.alma.1.x86_64.rpm*0mariadb-server-galera-10.5.22-1.el9_2.alma.1.x86_64.rpm+0mariadb-server-utils-10.5.22-1.el9_2.alma.1.x86_64.rpm#0mariadb-common-10.5.22-1.el9_2.alma.1.x86_64.rpm"0mariadb-backup-10.5.22-1.el9_2.alma.1.x86_64.rpm&0mariadb-gssapi-server-10.5.22-1.el9_2.alma.1.x86_64.rpm)0mariadb-server-10.5.22-1.el9_2.alma.1.x86_64.rpm%0mariadb-errmsg-10.5.22-1.el9_2.alma.1.x86_64.rpm;Z SBBBBBBBBBBBsecurityImportant: bind security updatemEhttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689 https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689 -Ibind-license-9.16.23-11.el9_2.2.noarch.rpm9Ipython3-bind-9.16.23-11.el9_2.2.noarch.rpm,Ibind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm]Ibind-chroot-9.16.23-11.el9_2.2.x86_64.rpm^Ibind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpm`Ibind-utils-9.16.23-11.el9_2.2.x86_64.rpm\Ibind-9.16.23-11.el9_2.2.x86_64.rpm_Ibind-libs-9.16.23-11.el9_2.2.x86_64.rpm-Ibind-license-9.16.23-11.el9_2.2.noarch.rpm9Ipython3-bind-9.16.23-11.el9_2.2.noarch.rpm,Ibind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm]Ibind-chroot-9.16.23-11.el9_2.2.x86_64.rpm^Ibind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpm`Ibind-utils-9.16.23-11.el9_2.2.x86_64.rpm\Ibind-9.16.23-11.el9_2.2.x86_64.rpm_Ibind-libs-9.16.23-11.el9_2.2.x86_64.rpm [ 1aBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security update2ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708 Zdotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm Zdotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmZdotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm Zdotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm dotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmr\ rBBBBBBBBBBBBBBsecurityModerate: nginx security update!Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711 mAnginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpmKAnginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpmGAnginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpmIAnginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpmHAnginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmnAnginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpmLAnginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpmOAnginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpmJAnginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm mAnginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpmKAnginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpmGAnginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpmIAnginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpmHAnginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmnAnginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpmLAnginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpmOAnginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpmJAnginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmH] CBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updaterEhttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733 https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733 82java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpm<2java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpm72java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpm42java-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpm52java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpm;2java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpm62java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm82java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpm<2java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpm72java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpm42java-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpm52java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpm;2java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpm62java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm(^ PBBBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update7https://access.redhat.com/errata/RHSA-2023:5738RHSA-2023:5738RHSA-2023:5738 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-5738.htmlALSA-2023:5738ALSA-2023:5738 Ugolang-src-1.19.13-1.el9_2.noarch.rpm?Ugolang-1.19.13-1.el9_2.x86_64.rpm@Ugolang-bin-1.19.13-1.el9_2.x86_64.rpmUgolang-docs-1.19.13-1.el9_2.noarch.rpmpUgo-toolset-1.19.13-1.el9_2.x86_64.rpmKUgolang-race-1.19.13-1.el9_2.x86_64.rpmUgolang-misc-1.19.13-1.el9_2.noarch.rpmUgolang-tests-1.19.13-1.el9_2.noarch.rpmUgolang-src-1.19.13-1.el9_2.noarch.rpm?Ugolang-1.19.13-1.el9_2.x86_64.rpm@Ugolang-bin-1.19.13-1.el9_2.x86_64.rpmUgolang-docs-1.19.13-1.el9_2.noarch.rpmpUgo-toolset-1.19.13-1.el9_2.x86_64.rpmKUgolang-race-1.19.13-1.el9_2.x86_64.rpmUgolang-misc-1.19.13-1.el9_2.noarch.rpmUgolang-tests-1.19.13-1.el9_2.noarch.rpm=_ /]BBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update=&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744 https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744 t|java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpmq|java-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpmp|java-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpmw|java-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpms|java-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpmu|java-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpmr|java-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpmo|java-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpmv|java-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm t|java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpmq|java-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpmp|java-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpmw|java-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpms|java-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpmu|java-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpmr|java-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpmo|java-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpmv|java-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm˶ ` pBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security updatecohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749 Adotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpm!netstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmE!dotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmI!dotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpmdotnet-host-7.0.12-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpm Adotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpm!netstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmE!dotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmI!dotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpmdotnet-host-7.0.12-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpma EBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updateR<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753 java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-headless-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-headless-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.9.0.9-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.9.0.9-2.el9.x86_64.rpm˩lb XBsecurityImportant: curl security update}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763 https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763 libcurl-devel-7.76.1-23.el9_2.4.i686.rpmlibcurl-devel-7.76.1-23.el9_2.4.x86_64.rpmlibcurl-devel-7.76.1-23.el9_2.4.i686.rpmlibcurl-devel-7.76.1-23.el9_2.4.x86_64.rpmec &\BBBBBBBBsecurityImportant: nodejs security update Mhttps://access.redhat.com/errata/RHSA-2023:5765RHSA-2023:5765RHSA-2023:5765 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5765.htmlALSA-2023:5765ALSA-2023:5765 Lnodejs-docs-16.20.2-3.el9_2.noarch.rpm nodejs-libs-16.20.2-3.el9_2.i686.rpmenodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm nodejs-libs-16.20.2-3.el9_2.x86_64.rpmanpm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm5nodejs-16.20.2-3.el9_2.x86_64.rpmLnodejs-docs-16.20.2-3.el9_2.noarch.rpm nodejs-libs-16.20.2-3.el9_2.i686.rpmenodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm nodejs-libs-16.20.2-3.el9_2.x86_64.rpmanpm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm5nodejs-16.20.2-3.el9_2.x86_64.rpm[d 0_BFCBBBBBBBsecurityImportant: nodejs:18 security updateX https://access.redhat.com/errata/RHSA-2023:5849RHSA-2023:5849RHSA-2023:5849 https://access.redhat.com/security/cve/CVE-2023-38552CVE-2023-38552CVE-2023-38552https://access.redhat.com/security/cve/CVE-2023-39333CVE-2023-39333CVE-2023-39333https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://access.redhat.com/security/cve/CVE-2023-45143CVE-2023-45143CVE-2023-45143https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22441042244104https://bugzilla.redhat.com/22444152244415https://bugzilla.redhat.com/22444182244418https://errata.almalinux.org/9/ALSA-2023-5849.htmlALSA-2023:5849ALSA-2023:5849 57~(eMnodejs-full-i18n-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpmanpm-9.8.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e20.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm5Mnodejs-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmLMnodejs-docs-18.18.2-2.module_el9.2.0+43+3ebc9e20.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm"Mnodejs-devel-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm57~(eMnodejs-full-i18n-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpmanpm-9.8.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e20.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm5Mnodejs-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmLMnodejs-docs-18.18.2-2.module_el9.2.0+43+3ebc9e20.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm"Mnodejs-devel-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpm e 3qsecurityModerate: grafana security updater https://access.redhat.com/errata/RHSA-2023:5867RHSA-2023:5867RHSA-2023:5867 https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-5867.htmlALSA-2023:5867ALSA-2023:5867 q&grafana-9.0.9-4.el9_2.alma.1.x86_64.rpmq&grafana-9.0.9-4.el9_2.alma.1.x86_64.rpmœ5f 9tBBBsecurityImportant: varnish security update}https://access.redhat.com/errata/RHSA-2023:5924RHSA-2023:5924RHSA-2023:5924 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5924.htmlALSA-2023:5924ALSA-2023:5924 vvarnish-6.6.2-3.el9_2.1.i686.rpmvvarnish-6.6.2-3.el9_2.1.x86_64.rpm?varnish-docs-6.6.2-3.el9_2.1.x86_64.rpmvvarnish-6.6.2-3.el9_2.1.i686.rpmvvarnish-6.6.2-3.el9_2.1.x86_64.rpm?varnish-docs-6.6.2-3.el9_2.1.x86_64.rpm{g ,zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php security update rhttps://access.redhat.com/errata/RHSA-2023:5926RHSA-2023:5926RHSA-2023:5926 https://access.redhat.com/security/cve/CVE-2023-0567CVE-2023-0567CVE-2023-0567https://access.redhat.com/security/cve/CVE-2023-0568CVE-2023-0568CVE-2023-0568https://access.redhat.com/security/cve/CVE-2023-0662CVE-2023-0662CVE-2023-0662https://access.redhat.com/security/cve/CVE-2023-3247CVE-2023-3247CVE-2023-3247https://access.redhat.com/security/cve/CVE-2023-3823CVE-2023-3823CVE-2023-3823https://access.redhat.com/security/cve/CVE-2023-3824CVE-2023-3824CVE-2023-3824https://bugzilla.redhat.com/21707612170761https://bugzilla.redhat.com/21707702170770https://bugzilla.redhat.com/21707712170771https://bugzilla.redhat.com/22192902219290https://bugzilla.redhat.com/22293962229396https://bugzilla.redhat.com/22301012230101https://errata.almalinux.org/9/ALSA-2023-5926.htmlALSA-2023:5926ALSA-2023:5926 f>php-pgsql-8.0.30-1.el9_2.x86_64.rpmZ>php-enchant-8.0.30-1.el9_2.x86_64.rpmY>php-embedded-8.0.30-1.el9_2.x86_64.rpm[>php-ffi-8.0.30-1.el9_2.x86_64.rpmV>php-dba-8.0.30-1.el9_2.x86_64.rpm\>php-fpm-8.0.30-1.el9_2.x86_64.rpm>php-8.0.30-1.el9_2.x86_64.rpm`>php-ldap-8.0.30-1.el9_2.x86_64.rpmi>php-soap-8.0.30-1.el9_2.x86_64.rpmj>php-xml-8.0.30-1.el9_2.x86_64.rpme>php-pdo-8.0.30-1.el9_2.x86_64.rpmT>php-cli-8.0.30-1.el9_2.x86_64.rpmh>php-snmp-8.0.30-1.el9_2.x86_64.rpmW>php-dbg-8.0.30-1.el9_2.x86_64.rpmc>php-odbc-8.0.30-1.el9_2.x86_64.rpmS>php-bcmath-8.0.30-1.el9_2.x86_64.rpmd>php-opcache-8.0.30-1.el9_2.x86_64.rpmg>php-process-8.0.30-1.el9_2.x86_64.rpm^>php-gmp-8.0.30-1.el9_2.x86_64.rpmU>php-common-8.0.30-1.el9_2.x86_64.rpmb>php-mysqlnd-8.0.30-1.el9_2.x86_64.rpm_>php-intl-8.0.30-1.el9_2.x86_64.rpma>php-mbstring-8.0.30-1.el9_2.x86_64.rpmX>php-devel-8.0.30-1.el9_2.x86_64.rpm]>php-gd-8.0.30-1.el9_2.x86_64.rpmf>php-pgsql-8.0.30-1.el9_2.x86_64.rpmZ>php-enchant-8.0.30-1.el9_2.x86_64.rpmY>php-embedded-8.0.30-1.el9_2.x86_64.rpm[>php-ffi-8.0.30-1.el9_2.x86_64.rpmV>php-dba-8.0.30-1.el9_2.x86_64.rpm\>php-fpm-8.0.30-1.el9_2.x86_64.rpm>php-8.0.30-1.el9_2.x86_64.rpm`>php-ldap-8.0.30-1.el9_2.x86_64.rpmi>php-soap-8.0.30-1.el9_2.x86_64.rpmj>php-xml-8.0.30-1.el9_2.x86_64.rpme>php-pdo-8.0.30-1.el9_2.x86_64.rpmT>php-cli-8.0.30-1.el9_2.x86_64.rpmh>php-snmp-8.0.30-1.el9_2.x86_64.rpmW>php-dbg-8.0.30-1.el9_2.x86_64.rpmc>php-odbc-8.0.30-1.el9_2.x86_64.rpmS>php-bcmath-8.0.30-1.el9_2.x86_64.rpmd>php-opcache-8.0.30-1.el9_2.x86_64.rpmg>php-process-8.0.30-1.el9_2.x86_64.rpm^>php-gmp-8.0.30-1.el9_2.x86_64.rpmU>php-common-8.0.30-1.el9_2.x86_64.rpmb>php-mysqlnd-8.0.30-1.el9_2.x86_64.rpm_>php-intl-8.0.30-1.el9_2.x86_64.rpma>php-mbstring-8.0.30-1.el9_2.x86_64.rpmX>php-devel-8.0.30-1.el9_2.x86_64.rpm]>php-gd-8.0.30-1.el9_2.x86_64.rpmdh 5mBBBBBBsecurityImportant: tomcat security update)https://access.redhat.com/errata/RHSA-2023:5929RHSA-2023:5929RHSA-2023:5929 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5929.htmlALSA-2023:5929ALSA-2023:5929 >ytomcat-docs-webapp-9.0.62-11.el9_2.3.noarch.rpmAytomcat-lib-9.0.62-11.el9_2.3.noarch.rpmytomcat-docs-webapp-9.0.62-11.el9_2.3.noarch.rpmAytomcat-lib-9.0.62-11.el9_2.3.noarch.rpmjBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updateKQhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246 Adotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpmE"dotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmI"dotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpmdotnet-host-7.0.13-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm"netstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpm Adotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpmE"dotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmCdotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmI"dotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpmdotnet-host-7.0.13-1.el9_2.x86_64.rpm;aspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm"netstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpmLp BBBBBBBBBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265 ?%libgs-9.54.0-11.el9_2.x86_64.rpm=%ghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpm?%libgs-9.54.0-11.el9_2.i686.rpm?%ghostscript-x11-9.54.0-11.el9_2.x86_64.rpm %ghostscript-doc-9.54.0-11.el9_2.noarch.rpm;%ghostscript-9.54.0-11.el9_2.x86_64.rpm<%ghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpm>%ghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpm?%libgs-9.54.0-11.el9_2.x86_64.rpm=%ghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpm?%libgs-9.54.0-11.el9_2.i686.rpm?%ghostscript-x11-9.54.0-11.el9_2.x86_64.rpm %ghostscript-doc-9.54.0-11.el9_2.noarch.rpm;%ghostscript-9.54.0-11.el9_2.x86_64.rpm<%ghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpm>%ghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpmq NsecurityCritical: squid security update 1https://access.redhat.com/errata/RHSA-2023:6266RHSA-2023:6266RHSA-2023:6266 https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6266.htmlALSA-2023:6266ALSA-2023:6266  squid-5.5-5.el9_2.1.x86_64.rpm squid-5.5-5.el9_2.1.x86_64.rpmTr QsecurityModerate: python3.11-pip security updateN'https://access.redhat.com/errata/RHSA-2023:6324RHSA-2023:6324RHSA-2023:6324 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6324.htmlALSA-2023:6324ALSA-2023:6324 python3.11-pip-wheel-22.3.1-4.el9.noarch.rpm~python3.11-pip-22.3.1-4.el9.noarch.rpmpython3.11-pip-wheel-22.3.1-4.el9.noarch.rpm~python3.11-pip-22.3.1-4.el9.noarch.rpm&s TsecurityModerate: edk2 security, bug fix, and enhancement updateuBhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330 https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330 :edk2-aarch64-20230524-3.el9.noarch.rpmedk2-ovmf-20230524-3.el9.noarch.rpm:edk2-aarch64-20230524-3.el9.noarch.rpmedk2-ovmf-20230524-3.el9.noarch.rpmt #WBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update7https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340 hjxorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpmljxorg-x11-server-common-1.20.11-19.el9.x86_64.rpmijxorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpmfjxorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpmjjxorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpmgjxorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpmhjxorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpmljxorg-x11-server-common-1.20.11-19.el9.x86_64.rpmijxorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpmfjxorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpmjjxorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpmgjxorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpmu &dsecurityModerate: xorg-x11-server-Xwayland security, bug fix, and enhancement update; https://access.redhat.com/errata/RHSA-2023:6341RHSA-2023:6341RHSA-2023:6341 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6341.htmlALSA-2023:6341ALSA-2023:6341 k>xorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpmk>xorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpmrv *gBsecurityModerate: LibRaw security updateHGhttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343 https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343 LibRaw-0.20.2-6.el9.x86_64.rpmLibRaw-0.20.2-6.el9.i686.rpmLibRaw-0.20.2-6.el9.x86_64.rpmLibRaw-0.20.2-6.el9.i686.rpm w /kBBsecurityModerate: toolbox security and bug fix updatebhttps://access.redhat.com/errata/RHSA-2023:6346RHSA-2023:6346RHSA-2023:6346 https://access.redhat.com/security/cve/CVE-2022-3064CVE-2022-3064CVE-2022-3064https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21630372163037https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6346.htmlALSA-2023:6346ALSA-2023:6346 6ltoolbox-0.0.99.4-6.el9_3.x86_64.rpm7ltoolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm6ltoolbox-0.0.99.4-6.el9_3.x86_64.rpm7ltoolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm x 4pBBsecurityModerate: skopeo security updateqRhttps://access.redhat.com/errata/RHSA-2023:6363RHSA-2023:6363RHSA-2023:6363 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24537CVE-2023-24537CVE-2023-24537https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21844842184484https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6363.htmlALSA-2023:6363ALSA-2023:6363 ;2skopeo-tests-1.13.3-1.el9.x86_64.rpm:2skopeo-1.13.3-1.el9.x86_64.rpm;2skopeo-tests-1.13.3-1.el9.x86_64.rpm:2skopeo-1.13.3-1.el9.x86_64.rpm y 7usecurityModerate: mod_auth_openidc security and bug fix updateChttps://access.redhat.com/errata/RHSA-2023:6365RHSA-2023:6365RHSA-2023:6365 https://access.redhat.com/security/cve/CVE-2022-23527CVE-2022-23527CVE-2022-23527https://access.redhat.com/security/cve/CVE-2023-28625CVE-2023-28625CVE-2023-28625https://bugzilla.redhat.com/21536552153655https://bugzilla.redhat.com/21841182184118https://errata.almalinux.org/9/ALSA-2023-6365.htmlALSA-2023:6365ALSA-2023:6365 T/mod_auth_openidc-2.4.9.4-4.el9.x86_64.rpmT/mod_auth_openidc-2.4.9.4-4.el9.x86_64.rpmsz xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement updateXrhttps://access.redhat.com/errata/RHSA-2023:6368RHSA-2023:6368RHSA-2023:6368 https://access.redhat.com/security/cve/CVE-2023-2680CVE-2023-2680CVE-2023-2680https://bugzilla.redhat.com/22033872203387https://errata.almalinux.org/9/ALSA-2023-6368.htmlALSA-2023:6368ALSA-2023:6368 XXqemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpmbXqemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpmUXqemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpmdXqemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpmSXqemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpm[Xqemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpmYXqemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpmVXqemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpmwlibreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm'autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpm]libreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpm~libreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpm'libreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-es-7.1.8.1-11.el9.alma.noarch.rpm*autocorr-lt-7.1.8.1-11.el9.alma.noarch.rpm0autocorr-ru-7.1.8.1-11.el9.alma.noarch.rpm?libreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm/autocorr-ro-7.1.8.1-11.el9.alma.noarch.rpmWlibreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpm!autocorr-ga-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-da-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpm$autocorr-hu-7.1.8.1-11.el9.alma.noarch.rpm&libreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpmplibreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmolibreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-fi-7.1.8.1-11.el9.alma.noarch.rpmnlibreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpm-autocorr-pl-7.1.8.1-11.el9.alma.noarch.rpmklibreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpm)autocorr-lb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-de-7.1.8.1-11.el9.alma.noarch.rpmelibreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpm3autocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm5libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpmXlibreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpm%autocorr-is-7.1.8.1-11.el9.alma.noarch.rpmautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-el-7.1.8.1-11.el9.alma.noarch.rpm2autocorr-sl-7.1.8.1-11.el9.alma.noarch.rpmrlibreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-af-7.1.8.1-11.el9.alma.noarch.rpmWlibreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpm"autocorr-hr-7.1.8.1-11.el9.alma.noarch.rpm^libreofficekit-7.1.8.1-11.el9.alma.x86_64.rpm1libreoffice-help-si-7.1.8.1-11.el9.alma.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-11.el9.alma.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-11.el9.alma.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-11.el9.alma.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-11.el9.alma.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-11.el9.alma.x86_64.rpm|libreoffice-help-nb-7.1.8.1-11.el9.alma.x86_64.rpmflibreoffice-help-de-7.1.8.1-11.el9.alma.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-11.el9.alma.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-11.el9.alma.x86_64.rpm`libreoffice-help-ar-7.1.8.1-11.el9.alma.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-11.el9.alma.x86_64.rpm}libreoffice-help-nl-7.1.8.1-11.el9.alma.x86_64.rpmllibreoffice-help-et-7.1.8.1-11.el9.alma.x86_64.rpm&autocorr-it-7.1.8.1-11.el9.alma.noarch.rpmylibreoffice-help-ko-7.1.8.1-11.el9.alma.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-11.el9.alma.x86_64.rpm4autocorr-sv-7.1.8.1-11.el9.alma.noarch.rpm!libreoffice-langpack-fi-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-11.el9.alma.x86_64.rpm[libreoffice-writer-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-11.el9.alma.x86_64.rpmalibreoffice-help-bg-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-ta-7.1.8.1-11.el9.alma.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-11.el9.alma.x86_64.rpm{libreoffice-help-lv-7.1.8.1-11.el9.alma.x86_64.rpmYlibreoffice-ure-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-sk-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-data-7.1.8.1-11.el9.alma.noarch.rpmautocorr-fa-7.1.8.1-11.el9.alma.noarch.rpmulibreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpmQlibreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpm0libreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpm"libreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpmHlibreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpm7autocorr-vro-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpm[libreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-en-7.1.8.1-11.el9.alma.noarch.rpm*libreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpm+autocorr-mn-7.1.8.1-11.el9.alma.noarch.rpm#autocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpmhlibreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpm(autocorr-ko-7.1.8.1-11.el9.alma.noarch.rpm<libreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpm1autocorr-sk-7.1.8.1-11.el9.alma.noarch.rpm7libreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpm5autocorr-tr-7.1.8.1-11.el9.alma.noarch.rpmclibreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpmslibreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpmilibreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpm6autocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm4libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpm,autocorr-nl-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpm_libreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpm autocorr-fr-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpmvlibreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpmglibreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpm.autocorr-pt-7.1.8.1-11.el9.alma.noarch.rpm]libreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpmYlibreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpmZlibreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpmblibreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpmPlibreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpm/libreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpmUlibreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpm8autocorr-zh-7.1.8.1-11.el9.alma.noarch.rpm,libreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpm)libreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpmwlibreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm'autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpm]libreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpm~libreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpm'libreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-es-7.1.8.1-11.el9.alma.noarch.rpm*autocorr-lt-7.1.8.1-11.el9.alma.noarch.rpm0autocorr-ru-7.1.8.1-11.el9.alma.noarch.rpm?libreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm/autocorr-ro-7.1.8.1-11.el9.alma.noarch.rpmWlibreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpm!autocorr-ga-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-da-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpm$autocorr-hu-7.1.8.1-11.el9.alma.noarch.rpm&libreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpmplibreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmolibreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-fi-7.1.8.1-11.el9.alma.noarch.rpmnlibreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpm-autocorr-pl-7.1.8.1-11.el9.alma.noarch.rpmklibreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpm)autocorr-lb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-de-7.1.8.1-11.el9.alma.noarch.rpmelibreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpm3autocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm5libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpmXlibreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpm%autocorr-is-7.1.8.1-11.el9.alma.noarch.rpmautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-el-7.1.8.1-11.el9.alma.noarch.rpm2autocorr-sl-7.1.8.1-11.el9.alma.noarch.rpmrlibreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-af-7.1.8.1-11.el9.alma.noarch.rpmWlibreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpm"autocorr-hr-7.1.8.1-11.el9.alma.noarch.rpm^libreofficekit-7.1.8.1-11.el9.alma.x86_64.rpmp -eBBBBBBsecurityModerate: flatpak security, bug fix, and enhancement update|whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518 https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518 Nyflatpak-1.12.8-1.el9.x86_64.rpm[yflatpak-libs-1.12.8-1.el9.x86_64.rpm6yflatpak-selinux-1.12.8-1.el9.noarch.rpmOyflatpak-session-helper-1.12.8-1.el9.x86_64.rpm[yflatpak-libs-1.12.8-1.el9.i686.rpmNyflatpak-1.12.8-1.el9.x86_64.rpm[yflatpak-libs-1.12.8-1.el9.x86_64.rpm6yflatpak-selinux-1.12.8-1.el9.noarch.rpmOyflatpak-session-helper-1.12.8-1.el9.x86_64.rpm[yflatpak-libs-1.12.8-1.el9.i686.rpmg 0nsecurityModerate: python-tornado security updatesmhttps://access.redhat.com/errata/RHSA-2023:6523RHSA-2023:6523RHSA-2023:6523 https://access.redhat.com/security/cve/CVE-2023-28370CVE-2023-28370CVE-2023-28370https://bugzilla.redhat.com/22101992210199https://errata.almalinux.org/9/ALSA-2023-6523.htmlALSA-2023:6523ALSA-2023:6523 python3-tornado-6.1.0-9.el9.x86_64.rpmpython3-tornado-6.1.0-9.el9.x86_64.rpmz 5qBBsecurityModerate: dnsmasq security and bug fix update`Uhttps://access.redhat.com/errata/RHSA-2023:6524RHSA-2023:6524RHSA-2023:6524 https://access.redhat.com/security/cve/CVE-2023-28450CVE-2023-28450CVE-2023-28450https://bugzilla.redhat.com/21789482178948https://errata.almalinux.org/9/ALSA-2023-6524.htmlALSA-2023:6524ALSA-2023:6524 v-dnsmasq-utils-2.85-14.el9.x86_64.rpmu-dnsmasq-2.85-14.el9.x86_64.rpmv-dnsmasq-utils-2.85-14.el9.x86_64.rpmu-dnsmasq-2.85-14.el9.x86_64.rpm vBBBBBBBBBBsecurityImportant: webkit2gtk3 security and bug fix update5&https://access.redhat.com/errata/RHSA-2023:6535RHSA-2023:6535RHSA-2023:6535 https://access.redhat.com/security/cve/CVE-2022-32885CVE-2022-32885CVE-2022-32885https://access.redhat.com/security/cve/CVE-2023-27932CVE-2023-27932CVE-2023-27932https://access.redhat.com/security/cve/CVE-2023-27954CVE-2023-27954CVE-2023-27954https://access.redhat.com/security/cve/CVE-2023-28198CVE-2023-28198CVE-2023-28198https://access.redhat.com/security/cve/CVE-2023-32370CVE-2023-32370CVE-2023-32370https://access.redhat.com/security/cve/CVE-2023-32393CVE-2023-32393CVE-2023-32393https://access.redhat.com/security/cve/CVE-2023-38133CVE-2023-38133CVE-2023-38133https://access.redhat.com/security/cve/CVE-2023-38572CVE-2023-38572CVE-2023-38572https://access.redhat.com/security/cve/CVE-2023-38592CVE-2023-38592CVE-2023-38592https://access.redhat.com/security/cve/CVE-2023-38594CVE-2023-38594CVE-2023-38594https://access.redhat.com/security/cve/CVE-2023-38595CVE-2023-38595CVE-2023-38595https://access.redhat.com/security/cve/CVE-2023-38597CVE-2023-38597CVE-2023-38597https://access.redhat.com/security/cve/CVE-2023-38599CVE-2023-38599CVE-2023-38599https://access.redhat.com/security/cve/CVE-2023-38600CVE-2023-38600CVE-2023-38600https://access.redhat.com/security/cve/CVE-2023-38611CVE-2023-38611CVE-2023-38611https://access.redhat.com/security/cve/CVE-2023-39434CVE-2023-39434CVE-2023-39434https://access.redhat.com/security/cve/CVE-2023-40397CVE-2023-40397CVE-2023-40397https://access.redhat.com/security/cve/CVE-2023-40451CVE-2023-40451CVE-2023-40451https://bugzilla.redhat.com/22246082224608https://bugzilla.redhat.com/22310152231015https://bugzilla.redhat.com/22310172231017https://bugzilla.redhat.com/22310182231018https://bugzilla.redhat.com/22310192231019https://bugzilla.redhat.com/22310202231020https://bugzilla.redhat.com/22310212231021https://bugzilla.redhat.com/22310222231022https://bugzilla.redhat.com/22310282231028https://bugzilla.redhat.com/22310432231043https://bugzilla.redhat.com/22368422236842https://bugzilla.redhat.com/22368432236843https://bugzilla.redhat.com/22368442236844https://bugzilla.redhat.com/22389432238943https://bugzilla.redhat.com/22389442238944https://bugzilla.redhat.com/22389452238945https://bugzilla.redhat.com/22414052241405https://bugzilla.redhat.com/22414092241409https://errata.almalinux.org/9/ALSA-2023-6535.htmlALSA-2023:6535ALSA-2023:6535 3hwebkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.40.5-1.el9.i686.rpm4hwebkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm4hwebkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm3hwebkit2gtk3-jsc-2.40.5-1.el9.i686.rpm1hwebkit2gtk3-2.40.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm1hwebkit2gtk3-2.40.5-1.el9.i686.rpm3hwebkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.40.5-1.el9.i686.rpm4hwebkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm4hwebkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm3hwebkit2gtk3-jsc-2.40.5-1.el9.i686.rpm1hwebkit2gtk3-2.40.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm1hwebkit2gtk3-2.40.5-1.el9.i686.rpm} securityModerate: perl-CPAN security updateC"https://access.redhat.com/errata/RHSA-2023:6539RHSA-2023:6539RHSA-2023:6539 https://access.redhat.com/security/cve/CVE-2023-31484CVE-2023-31484CVE-2023-31484https://bugzilla.redhat.com/22186672218667https://errata.almalinux.org/9/ALSA-2023-6539.htmlALSA-2023:6539ALSA-2023:6539 .perl-CPAN-2.29-3.el9.noarch.rpm.perl-CPAN-2.29-3.el9.noarch.rpmA securityModerate: perl-HTTP-Tiny security updatee[https://access.redhat.com/errata/RHSA-2023:6542RHSA-2023:6542RHSA-2023:6542 https://access.redhat.com/security/cve/CVE-2023-31486CVE-2023-31486CVE-2023-31486https://bugzilla.redhat.com/22283922228392https://errata.almalinux.org/9/ALSA-2023-6542.htmlALSA-2023:6542ALSA-2023:6542 1Iperl-HTTP-Tiny-0.076-461.el9.noarch.rpm1Iperl-HTTP-Tiny-0.076-461.el9.noarch.rpmA GBBBBBBBBBBBBsecurityModerate: ghostscript security and bug fix update@rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544 https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544 =&ghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpm &ghostscript-doc-9.54.0-13.el9.noarch.rpm?&ghostscript-x11-9.54.0-13.el9.x86_64.rpm;&ghostscript-9.54.0-13.el9.x86_64.rpm?&libgs-9.54.0-13.el9.x86_64.rpm>&ghostscript-tools-printing-9.54.0-13.el9.x86_64.rpm<&ghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpm?&libgs-9.54.0-13.el9.i686.rpm=&ghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpm &ghostscript-doc-9.54.0-13.el9.noarch.rpm?&ghostscript-x11-9.54.0-13.el9.x86_64.rpm;&ghostscript-9.54.0-13.el9.x86_64.rpm?&libgs-9.54.0-13.el9.x86_64.rpm>&ghostscript-tools-printing-9.54.0-13.el9.x86_64.rpm<&ghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpm?&libgs-9.54.0-13.el9.i686.rpm VsecurityModerate: libreswan security update2yhttps://access.redhat.com/errata/RHSA-2023:6549RHSA-2023:6549RHSA-2023:6549 https://access.redhat.com/security/cve/CVE-2023-38710CVE-2023-38710CVE-2023-38710https://access.redhat.com/security/cve/CVE-2023-38711CVE-2023-38711CVE-2023-38711https://access.redhat.com/security/cve/CVE-2023-38712CVE-2023-38712CVE-2023-38712https://bugzilla.redhat.com/22159522215952https://bugzilla.redhat.com/22253682225368https://bugzilla.redhat.com/22253692225369https://errata.almalinux.org/9/ALSA-2023-6549.htmlALSA-2023:6549ALSA-2023:6549 _glibreswan-4.12-1.el9.x86_64.rpm_glibreswan-4.12-1.el9.x86_64.rpm{ YBsecurityModerate: yajl security update+,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551 https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551 hEyajl-2.1.0-22.el9.x86_64.rpmhEyajl-2.1.0-22.el9.i686.rpmhEyajl-2.1.0-22.el9.x86_64.rpmhEyajl-2.1.0-22.el9.i686.rpm ]BsecurityModerate: libmicrohttpd security updateW~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566 https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566 M>libmicrohttpd-0.9.72-5.el9.x86_64.rpmM>libmicrohttpd-0.9.72-5.el9.i686.rpmM>libmicrohttpd-0.9.72-5.el9.x86_64.rpmM>libmicrohttpd-0.9.72-5.el9.i686.rpm #asecurityModerate: sysstat security and bug fix updateUYhttps://access.redhat.com/errata/RHSA-2023:6569RHSA-2023:6569RHSA-2023:6569 https://access.redhat.com/security/cve/CVE-2023-33204CVE-2023-33204CVE-2023-33204https://bugzilla.redhat.com/22082702208270https://errata.almalinux.org/9/ALSA-2023-6569.htmlALSA-2023:6569ALSA-2023:6569  esysstat-12.5.4-7.el9.x86_64.rpm esysstat-12.5.4-7.el9.x86_64.rpm| ,dBBBBBBsecurityModerate: tomcat security and bug fix update.3https://access.redhat.com/errata/RHSA-2023:6570RHSA-2023:6570RHSA-2023:6570 https://access.redhat.com/security/cve/CVE-2023-24998CVE-2023-24998CVE-2023-24998https://access.redhat.com/security/cve/CVE-2023-28708CVE-2023-28708CVE-2023-28708https://access.redhat.com/security/cve/CVE-2023-28709CVE-2023-28709CVE-2023-28709https://bugzilla.redhat.com/21722982172298https://bugzilla.redhat.com/21808562180856https://bugzilla.redhat.com/22103212210321https://errata.almalinux.org/9/ALSA-2023-6570.htmlALSA-2023:6570ALSA-2023:6570 ztomcat-docs-webapp-9.0.62-37.el9_3.noarch.rpm=ztomcat-admin-webapps-9.0.62-37.el9_3.noarch.rpm?ztomcat-el-3.0-api-9.0.62-37.el9_3.noarch.rpmCztomcat-webapps-9.0.62-37.el9_3.noarch.rpmAztomcat-lib-9.0.62-37.el9_3.noarch.rpm@ztomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpmBztomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpmztomcat-docs-webapp-9.0.62-37.el9_3.noarch.rpm=ztomcat-admin-webapps-9.0.62-37.el9_3.noarch.rpm?ztomcat-el-3.0-api-9.0.62-37.el9_3.noarch.rpmCztomcat-webapps-9.0.62-37.el9_3.noarch.rpmAztomcat-lib-9.0.62-37.el9_3.noarch.rpm@ztomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpmBztomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpmv 3mBBBBsecurityModerate: libtiff security updateaN https://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575 https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575 j;libtiff-devel-4.4.0-10.el9.i686.rpmi;libtiff-4.4.0-10.el9.x86_64.rpmi;libtiff-4.4.0-10.el9.i686.rpmj;libtiff-devel-4.4.0-10.el9.x86_64.rpmj;libtiff-devel-4.4.0-10.el9.i686.rpmi;libtiff-4.4.0-10.el9.x86_64.rpmi;libtiff-4.4.0-10.el9.i686.rpmj;libtiff-devel-4.4.0-10.el9.x86_64.rpmY 7tBsecurityModerate: libqb security update/ohttps://access.redhat.com/errata/RHSA-2023:6578RHSA-2023:6578RHSA-2023:6578 https://access.redhat.com/security/cve/CVE-2023-39976CVE-2023-39976CVE-2023-39976https://bugzilla.redhat.com/22307082230708https://errata.almalinux.org/9/ALSA-2023-6578.htmlALSA-2023:6578ALSA-2023:6578 QDlibqb-2.0.6-4.el9_3.i686.rpmQDlibqb-2.0.6-4.el9_3.x86_64.rpmQDlibqb-2.0.6-4.el9_3.i686.rpmQDlibqb-2.0.6-4.el9_3.x86_64.rpm; ;xBsecurityModerate: binutils security updateJhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593 https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593 Gbinutils-devel-2.35.2-42.el9.x86_64.rpmGbinutils-devel-2.35.2-42.el9.i686.rpmGbinutils-devel-2.35.2-42.el9.x86_64.rpmGbinutils-devel-2.35.2-42.el9.i686.rpm |BBBBBBBBBBBBsecurityModerate: cups security and bug fix updatehnhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596 https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596 Lcups-lpd-2.3.3op2-21.el9.x86_64.rpmKcups-ipptool-2.3.3op2-21.el9.x86_64.rpmIcups-2.3.3op2-21.el9.x86_64.rpmJcups-client-2.3.3op2-21.el9.x86_64.rpmMcups-printerapp-2.3.3op2-21.el9.x86_64.rpmcups-devel-2.3.3op2-21.el9.i686.rpm9cups-filesystem-2.3.3op2-21.el9.noarch.rpmcups-devel-2.3.3op2-21.el9.x86_64.rpmLcups-lpd-2.3.3op2-21.el9.x86_64.rpmKcups-ipptool-2.3.3op2-21.el9.x86_64.rpmIcups-2.3.3op2-21.el9.x86_64.rpmJcups-client-2.3.3op2-21.el9.x86_64.rpmMcups-printerapp-2.3.3op2-21.el9.x86_64.rpmcups-devel-2.3.3op2-21.el9.i686.rpm9cups-filesystem-2.3.3op2-21.el9.noarch.rpmcups-devel-2.3.3op2-21.el9.x86_64.rpm  KBBBBsecurityLow: glib2 security and bug fix update/Vohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631 ] glib2-devel-2.68.4-11.el9.x86_64.rpmQ glib2-tests-2.68.4-11.el9.x86_64.rpm] glib2-devel-2.68.4-11.el9.i686.rpm8 glib2-doc-2.68.4-11.el9.noarch.rpm] glib2-devel-2.68.4-11.el9.x86_64.rpmQ glib2-tests-2.68.4-11.el9.x86_64.rpm] glib2-devel-2.68.4-11.el9.i686.rpm8 glib2-doc-2.68.4-11.el9.noarch.rpma! RBsecurityModerate: c-ares security, bug fix, and enhancement updateE https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635 https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635 `'c-ares-devel-1.19.1-1.el9.x86_64.rpm`'c-ares-devel-1.19.1-1.el9.i686.rpm`'c-ares-devel-1.19.1-1.el9.x86_64.rpm`'c-ares-devel-1.19.1-1.el9.i686.rpm" VBsecurityModerate: libssh security updateO{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643 https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643 3libssh-devel-0.10.4-11.el9.x86_64.rpm3libssh-devel-0.10.4-11.el9.i686.rpm3libssh-devel-0.10.4-11.el9.x86_64.rpm3libssh-devel-0.10.4-11.el9.i686.rpm# ZBBBBsecurityModerate: python3.9 security updateJ https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659 j(python-unversioned-command-3.9.18-1.el9_3.noarch.rpm=(python3-tkinter-3.9.18-1.el9_3.x86_64.rpmW(python3-devel-3.9.18-1.el9_3.i686.rpmW(python3-devel-3.9.18-1.el9_3.x86_64.rpmj(python-unversioned-command-3.9.18-1.el9_3.noarch.rpm=(python3-tkinter-3.9.18-1.el9_3.x86_64.rpmW(python3-devel-3.9.18-1.el9_3.i686.rpmW(python3-devel-3.9.18-1.el9_3.x86_64.rpma$ 'aBBBBsecurityLow: gmp security and enhancement update/jUhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661 https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661 7 gmp-devel-6.2.0-13.el9.i686.rpm6 gmp-c++-6.2.0-13.el9.x86_64.rpm7 gmp-devel-6.2.0-13.el9.x86_64.rpm6 gmp-c++-6.2.0-13.el9.i686.rpm7 gmp-devel-6.2.0-13.el9.i686.rpm6 gmp-c++-6.2.0-13.el9.x86_64.rpm7 gmp-devel-6.2.0-13.el9.x86_64.rpm6 gmp-c++-6.2.0-13.el9.i686.rpm% 4hBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update?K https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667 e samba-winbind-clients-4.18.6-100.el9.x86_64.rpmg samba-winexe-4.18.6-100.el9.x86_64.rpmd samba-vfs-iouring-4.18.6-100.el9.x86_64.rpmc samba-krb5-printing-4.18.6-100.el9.x86_64.rpmb samba-client-4.18.6-100.el9.x86_64.rpmf samba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpme samba-winbind-clients-4.18.6-100.el9.x86_64.rpmg samba-winexe-4.18.6-100.el9.x86_64.rpmd samba-vfs-iouring-4.18.6-100.el9.x86_64.rpmc samba-krb5-printing-4.18.6-100.el9.x86_64.rpmb samba-client-4.18.6-100.el9.x86_64.rpmf samba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpm & 8uBsecurityModerate: curl security update q https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679 https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679 libcurl-devel-7.76.1-26.el9.i686.rpmlibcurl-devel-7.76.1-26.el9.x86_64.rpmlibcurl-devel-7.76.1-26.el9.i686.rpmlibcurl-devel-7.76.1-26.el9.x86_64.rpmV' :9securityModerate: python-pip security update{(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694 x?python3-pip-21.2.3-7.el9.noarch.rpmx?python3-pip-21.2.3-7.el9.noarch.rpmD( {BBBBBsecurityModerate: ncurses security and bug fix update#xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698 https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698 pncurses-term-6.2-10.20210508.el9.noarch.rpmcpncurses-devel-6.2-10.20210508.el9.i686.rpmbpncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpmcpncurses-devel-6.2-10.20210508.el9.x86_64.rpmbpncurses-c++-libs-6.2-10.20210508.el9.i686.rpmpncurses-term-6.2-10.20210508.el9.noarch.rpmcpncurses-devel-6.2-10.20210508.el9.i686.rpmbpncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpmcpncurses-devel-6.2-10.20210508.el9.x86_64.rpmbpncurses-c++-libs-6.2-10.20210508.el9.i686.rpmi) CBsecurityModerate: krb5 security and bug fix update9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699 https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699 >,krb5-devel-1.21.1-1.el9.x86_64.rpm>,krb5-devel-1.21.1-1.el9.i686.rpm>,krb5-devel-1.21.1-1.el9.x86_64.rpm>,krb5-devel-1.21.1-1.el9.i686.rpm"* GBBBsecurityModerate: avahi security updateThttps://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 n\avahi-tools-0.8-15.el9.x86_64.rpm_\avahi-glib-0.8-15.el9.x86_64.rpm_\avahi-glib-0.8-15.el9.i686.rpmn\avahi-tools-0.8-15.el9.x86_64.rpm_\avahi-glib-0.8-15.el9.x86_64.rpm_\avahi-glib-0.8-15.el9.i686.rpmG+ MBBBBBBBBBBBBsecurityImportant: ghostscript security updateehttps://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732 ?'libgs-9.54.0-14.el9_3.i686.rpm?'ghostscript-x11-9.54.0-14.el9_3.x86_64.rpm<'ghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpm?'libgs-9.54.0-14.el9_3.x86_64.rpm='ghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpm;'ghostscript-9.54.0-14.el9_3.x86_64.rpm 'ghostscript-doc-9.54.0-14.el9_3.noarch.rpm>'ghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm?'libgs-9.54.0-14.el9_3.i686.rpm?'ghostscript-x11-9.54.0-14.el9_3.x86_64.rpm<'ghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpm?'libgs-9.54.0-14.el9_3.x86_64.rpm='ghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpm;'ghostscript-9.54.0-14.el9_3.x86_64.rpm 'ghostscript-doc-9.54.0-14.el9_3.noarch.rpm>'ghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm, .\BBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix updatefhttps://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738 |java-21-openjdk-javadoc-21.0.1.0.12-2.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.1.0.12-2.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.1.0.12-2.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.1.0.12-2.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.1.0.12-2.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.1.0.12-2.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.1.0.12-2.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.1.0.12-2.el9.alma.1.x86_64.rpm |java-21-openjdk-javadoc-21.0.1.0.12-2.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.1.0.12-2.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.1.0.12-2.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.1.0.12-2.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.1.0.12-2.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.1.0.12-2.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.1.0.12-2.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.1.0.12-2.el9.alma.1.x86_64.rpm[- ;oBBBBBBBBBBsecurityModerate: samba security updateYhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744 g samba-winexe-4.18.6-101.el9_3.alma.1.x86_64.rpme samba-winbind-clients-4.18.6-101.el9_3.alma.1.x86_64.rpmc samba-krb5-printing-4.18.6-101.el9_3.alma.1.x86_64.rpmb samba-client-4.18.6-101.el9_3.alma.1.x86_64.rpmd samba-vfs-iouring-4.18.6-101.el9_3.alma.1.x86_64.rpmf samba-winbind-krb5-locator-4.18.6-101.el9_3.alma.1.x86_64.rpmg samba-winexe-4.18.6-101.el9_3.alma.1.x86_64.rpme samba-winbind-clients-4.18.6-101.el9_3.alma.1.x86_64.rpmc samba-krb5-printing-4.18.6-101.el9_3.alma.1.x86_64.rpmb samba-client-4.18.6-101.el9_3.alma.1.x86_64.rpmd samba-vfs-iouring-4.18.6-101.el9_3.alma.1.x86_64.rpmf samba-winbind-krb5-locator-4.18.6-101.el9_3.alma.1.x86_64.rpm!. ?|BsecurityImportant: curl security updateY}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745 https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745 libcurl-devel-7.76.1-26.el9_3.2.i686.rpmlibcurl-devel-7.76.1-26.el9_3.2.x86_64.rpmlibcurl-devel-7.76.1-26.el9_3.2.i686.rpmlibcurl-devel-7.76.1-26.el9_3.2.x86_64.rpm'/ @securityCritical: squid security update V https://access.redhat.com/errata/RHSA-2023:6748RHSA-2023:6748RHSA-2023:6748 https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6748.htmlALSA-2023:6748ALSA-2023:6748  squid-5.5-6.el9_3.1.x86_64.rpm squid-5.5-6.el9_3.1.x86_64.rpm 0 CBBBBBBBBBBBBBBBBBBsecurityModerate: dotnet8.0 security update`https://access.redhat.com/errata/RHSA-2023:7253RHSA-2023:7253RHSA-2023:7253 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7253.htmlALSA-2023:7253ALSA-2023:7253 #netstandard-targeting-pack-2.1-8.0.100-2.el9_3.x86_64.rpmBdotnet-hostfxr-8.0-8.0.0-2.el9_3.x86_64.rpmDdotnet-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm<aspnetcore-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.0-2.el9_3.x86_64.rpmJ#dotnet-templates-8.0-8.0.100-2.el9_3.x86_64.rpmdotnet-host-8.0.0-2.el9_3.x86_64.rpmF#dotnet-sdk-8.0-8.0.100-2.el9_3.x86_64.rpm #netstandard-targeting-pack-2.1-8.0.100-2.el9_3.x86_64.rpmBdotnet-hostfxr-8.0-8.0.0-2.el9_3.x86_64.rpmDdotnet-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm<aspnetcore-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.0-2.el9_3.x86_64.rpmJ#dotnet-templates-8.0-8.0.100-2.el9_3.x86_64.rpmdotnet-host-8.0.0-2.el9_3.x86_64.rpmF#dotnet-sdk-8.0-8.0.100-2.el9_3.x86_64.rpmٍ1 (XBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security update|1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255 =aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.14-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.14-1.el9_3.x86_64.rpmEcdotnet-sdk-7.0-7.0.114-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.14-1.el9_3.x86_64.rpmIcdotnet-templates-7.0-7.0.114-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.14-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.14-1.el9_3.x86_64.rpmEcdotnet-sdk-7.0-7.0.114-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.14-1.el9_3.x86_64.rpmIcdotnet-templates-7.0-7.0.114-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpmt2 9iBBBBBBBBBBBBBBsecurityModerate: dotnet6.0 security update-.https://access.redhat.com/errata/RHSA-2023:7257RHSA-2023:7257RHSA-2023:7257 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7257.htmlALSA-2023:7257ALSA-2023:7257 dotnet-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.25-1.el9_3.x86_64.rpm \dotnet-templates-6.0-6.0.125-1.el9_3.x86_64.rpm\dotnet-sdk-6.0-6.0.125-1.el9_3.x86_64.rpm dotnet-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.25-1.el9_3.x86_64.rpm \dotnet-templates-6.0-6.0.125-1.el9_3.x86_64.rpm\dotnet-sdk-6.0-6.0.125-1.el9_3.x86_64.rpm dotnet-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmو;3 zBBBBBBBBsecurityImportant: open-vm-tools security update[Shttps://access.redhat.com/errata/RHSA-2023:7277RHSA-2023:7277RHSA-2023:7277 https://access.redhat.com/security/cve/CVE-2023-34058CVE-2023-34058CVE-2023-34058https://access.redhat.com/security/cve/CVE-2023-34059CVE-2023-34059CVE-2023-34059https://bugzilla.redhat.com/22460802246080https://bugzilla.redhat.com/22460962246096https://errata.almalinux.org/9/ALSA-2023-7277.htmlALSA-2023:7277ALSA-2023:7277 -open-vm-tools-desktop-12.2.5-3.el9_3.2.alma.1.x86_64.rpm/open-vm-tools-test-12.2.5-3.el9_3.2.alma.1.x86_64.rpmaopen-vm-tools-salt-minion-12.2.5-3.el9_3.2.alma.1.x86_64.rpm,open-vm-tools-12.2.5-3.el9_3.2.alma.1.x86_64.rpm.open-vm-tools-sdmp-12.2.5-3.el9_3.2.alma.1.x86_64.rpm-open-vm-tools-desktop-12.2.5-3.el9_3.2.alma.1.x86_64.rpm/open-vm-tools-test-12.2.5-3.el9_3.2.alma.1.x86_64.rpmaopen-vm-tools-salt-minion-12.2.5-3.el9_3.2.alma.1.x86_64.rpm,open-vm-tools-12.2.5-3.el9_3.2.alma.1.x86_64.rpm.open-vm-tools-sdmp-12.2.5-3.el9_3.2.alma.1.x86_64.rpmؾ4 EsecurityImportant: squid security update.whttps://access.redhat.com/errata/RHSA-2023:7465RHSA-2023:7465RHSA-2023:7465 https://access.redhat.com/security/cve/CVE-2023-5824CVE-2023-5824CVE-2023-5824https://bugzilla.redhat.com/22459142245914https://errata.almalinux.org/9/ALSA-2023-7465.htmlALSA-2023:7465ALSA-2023:7465  squid-5.5-6.el9_3.2.x86_64.rpm squid-5.5-6.el9_3.2.x86_64.rpm5 HsecurityImportant: thunderbird security update%&https://access.redhat.com/errata/RHSA-2023:7501RHSA-2023:7501RHSA-2023:7501 https://access.redhat.com/security/cve/CVE-2023-6204CVE-2023-6204CVE-2023-6204https://access.redhat.com/security/cve/CVE-2023-6205CVE-2023-6205CVE-2023-6205https://access.redhat.com/security/cve/CVE-2023-6206CVE-2023-6206CVE-2023-6206https://access.redhat.com/security/cve/CVE-2023-6207CVE-2023-6207CVE-2023-6207https://access.redhat.com/security/cve/CVE-2023-6208CVE-2023-6208CVE-2023-6208https://access.redhat.com/security/cve/CVE-2023-6209CVE-2023-6209CVE-2023-6209https://access.redhat.com/security/cve/CVE-2023-6212CVE-2023-6212CVE-2023-6212https://bugzilla.redhat.com/22508962250896https://bugzilla.redhat.com/22508972250897https://bugzilla.redhat.com/22508982250898https://bugzilla.redhat.com/22508992250899https://bugzilla.redhat.com/22509002250900https://bugzilla.redhat.com/22509012250901https://bugzilla.redhat.com/22509022250902https://errata.almalinux.org/9/ALSA-2023-7501.htmlALSA-2023:7501ALSA-2023:7501 :bthunderbird-115.5.0-1.el9_3.alma.x86_64.rpm:bthunderbird-115.5.0-1.el9_3.alma.x86_64.rpmH6 KBBsecurityImportant: firefox security updateKWhttps://access.redhat.com/errata/RHSA-2023:7507RHSA-2023:7507RHSA-2023:7507 https://access.redhat.com/security/cve/CVE-2023-6204CVE-2023-6204CVE-2023-6204https://access.redhat.com/security/cve/CVE-2023-6205CVE-2023-6205CVE-2023-6205https://access.redhat.com/security/cve/CVE-2023-6206CVE-2023-6206CVE-2023-6206https://access.redhat.com/security/cve/CVE-2023-6207CVE-2023-6207CVE-2023-6207https://access.redhat.com/security/cve/CVE-2023-6208CVE-2023-6208CVE-2023-6208https://access.redhat.com/security/cve/CVE-2023-6209CVE-2023-6209CVE-2023-6209https://access.redhat.com/security/cve/CVE-2023-6212CVE-2023-6212CVE-2023-6212https://bugzilla.redhat.com/22508962250896https://bugzilla.redhat.com/22508972250897https://bugzilla.redhat.com/22508982250898https://bugzilla.redhat.com/22508992250899https://bugzilla.redhat.com/22509002250900https://bugzilla.redhat.com/22509012250901https://bugzilla.redhat.com/22509022250902https://errata.almalinux.org/9/ALSA-2023-7507.htmlALSA-2023:7507ALSA-2023:7507 9 firefox-115.5.0-1.el9_3.alma.1.x86_64.rpmO firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm9 firefox-115.5.0-1.el9_3.alma.1.x86_64.rpmO firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm%7 PBBBBsecurityModerate: apr security update"@https://access.redhat.com/errata/RHSA-2023:7711RHSA-2023:7711RHSA-2023:7711 https://access.redhat.com/security/cve/CVE-2022-24963CVE-2022-24963CVE-2022-24963https://bugzilla.redhat.com/21694652169465https://errata.almalinux.org/9/ALSA-2023-7711.htmlALSA-2023:7711ALSA-2023:7711 apr-devel-1.7.0-12.el9_3.x86_64.rpmapr-1.7.0-12.el9_3.x86_64.rpmapr-devel-1.7.0-12.el9_3.i686.rpmapr-1.7.0-12.el9_3.i686.rpmapr-devel-1.7.0-12.el9_3.x86_64.rpmapr-1.7.0-12.el9_3.x86_64.rpmapr-devel-1.7.0-12.el9_3.i686.rpmapr-1.7.0-12.el9_3.i686.rpmܗK8 WsecurityImportant: tracker-miners security updateb7https://access.redhat.com/errata/RHSA-2023:7712RHSA-2023:7712RHSA-2023:7712 https://access.redhat.com/security/cve/CVE-2023-5557CVE-2023-5557CVE-2023-5557https://bugzilla.redhat.com/22430962243096https://errata.almalinux.org/9/ALSA-2023-7712.htmlALSA-2023:7712ALSA-2023:7712 3Ntracker-miners-3.1.2-4.el9_3.x86_64.rpm3Ntracker-miners-3.1.2-4.el9_3.x86_64.rpmd9 &ZBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateghttps://access.redhat.com/errata/RHSA-2023:7715RHSA-2023:7715RHSA-2023:7715 https://access.redhat.com/security/cve/CVE-2023-42917CVE-2023-42917CVE-2023-42917https://bugzilla.redhat.com/22530582253058https://errata.almalinux.org/9/ALSA-2023-7715.htmlALSA-2023:7715ALSA-2023:7715 3iwebkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm3iwebkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm2iwebkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm4iwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm1iwebkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm1iwebkit2gtk3-2.40.5-1.el9_3.1.i686.rpm2iwebkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm4iwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm3iwebkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm3iwebkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm2iwebkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm4iwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm1iwebkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm1iwebkit2gtk3-2.40.5-1.el9_3.1.i686.rpm2iwebkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm4iwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm&: *gBsecurityModerate: libxml2 security updatehttps://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747 https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747 9`libxml2-devel-2.9.13-5.el9_3.i686.rpm9`libxml2-devel-2.9.13-5.el9_3.x86_64.rpm9`libxml2-devel-2.9.13-5.el9_3.i686.rpm9`libxml2-devel-2.9.13-5.el9_3.x86_64.rpmK; kBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security updateRhttps://access.redhat.com/errata/RHSA-2023:7753RHSA-2023:7753RHSA-2023:7753 https://access.redhat.com/security/cve/CVE-2023-37920CVE-2023-37920CVE-2023-37920https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/22265862226586https://bugzilla.redhat.com/22424932242493https://errata.almalinux.org/9/ALSA-2023-7753.htmlALSA-2023:7753ALSA-2023:7753 hfence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpmdfence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm0fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpmjfence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm/fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpmgfence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpmbfence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpmffence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpmcfence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpmefence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpmifence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm.fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm1fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm hfence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpmdfence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm0fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpmjfence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm/fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpmgfence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpmbfence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpmffence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpmcfence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpmefence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpmifence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm.fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm1fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm< BBBBBsecurityModerate: pixman security updateQhttps://access.redhat.com/errata/RHSA-2023:7754RHSA-2023:7754RHSA-2023:7754 https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2023-7754.htmlALSA-2023:7754ALSA-2023:7754 i}pixman-devel-0.40.0-6.el9_3.x86_64.rpmh}pixman-0.40.0-6.el9_3.x86_64.rpmh}pixman-0.40.0-6.el9_3.i686.rpmi}pixman-devel-0.40.0-6.el9_3.i686.rpmi}pixman-devel-0.40.0-6.el9_3.x86_64.rpmh}pixman-0.40.0-6.el9_3.x86_64.rpmh}pixman-0.40.0-6.el9_3.i686.rpmi}pixman-devel-0.40.0-6.el9_3.i686.rpmR= IBBsecurityModerate: skopeo security updateVZ https://access.redhat.com/errata/RHSA-2023:7762RHSA-2023:7762RHSA-2023:7762 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7762.htmlALSA-2023:7762ALSA-2023:7762 :3skopeo-1.13.3-3.el9_3.x86_64.rpm;3skopeo-tests-1.13.3-3.el9_3.x86_64.rpm:3skopeo-1.13.3-3.el9_3.x86_64.rpm;3skopeo-tests-1.13.3-3.el9_3.x86_64.rpmK> NsecurityModerate: runc security update0qhttps://access.redhat.com/errata/RHSA-2023:7763RHSA-2023:7763RHSA-2023:7763 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7763.htmlALSA-2023:7763ALSA-2023:7763 $yrunc-1.1.9-2.el9_3.x86_64.rpm$yrunc-1.1.9-2.el9_3.x86_64.rpmI? QBBsecurityModerate: buildah security update! https://access.redhat.com/errata/RHSA-2023:7764RHSA-2023:7764RHSA-2023:7764 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7764.htmlALSA-2023:7764ALSA-2023:7764 7buildah-1.31.3-2.el9_3.x86_64.rpm8buildah-tests-1.31.3-2.el9_3.x86_64.rpm7buildah-1.31.3-2.el9_3.x86_64.rpm8buildah-tests-1.31.3-2.el9_3.x86_64.rpmL@ !VBBBBBBBBBsecurityModerate: podman security update8 https://access.redhat.com/errata/RHSA-2023:7765RHSA-2023:7765RHSA-2023:7765 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7765.htmlALSA-2023:7765ALSA-2023:7765 %)podman-remote-4.6.1-7.el9_3.x86_64.rpm#)podman-4.6.1-7.el9_3.x86_64.rpm&)podman-tests-4.6.1-7.el9_3.x86_64.rpm$)podman-plugins-4.6.1-7.el9_3.x86_64.rpmO)podman-gvproxy-4.6.1-7.el9_3.x86_64.rpmf)podman-docker-4.6.1-7.el9_3.noarch.rpm%)podman-remote-4.6.1-7.el9_3.x86_64.rpm#)podman-4.6.1-7.el9_3.x86_64.rpm&)podman-tests-4.6.1-7.el9_3.x86_64.rpm$)podman-plugins-4.6.1-7.el9_3.x86_64.rpmO)podman-gvproxy-4.6.1-7.el9_3.x86_64.rpmf)podman-docker-4.6.1-7.el9_3.noarch.rpmZA $bsecurityModerate: containernetworking-plugins security update9 https://access.redhat.com/errata/RHSA-2023:7766RHSA-2023:7766RHSA-2023:7766 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7766.htmlALSA-2023:7766ALSA-2023:7766 awcontainernetworking-plugins-1.3.0-6.el9_3.x86_64.rpmawcontainernetworking-plugins-1.3.0-6.el9_3.x86_64.rpmIB 5eBBBBBBBBBBBBBBsecurityImportant: postgresql security updateL https://access.redhat.com/errata/RHSA-2023:7784RHSA-2023:7784RHSA-2023:7784 https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7784.htmlALSA-2023:7784ALSA-2023:7784 *upostgresql-pltcl-13.13-1.el9_3.x86_64.rpm'upostgresql-contrib-13.13-1.el9_3.x86_64.rpm+upostgresql-private-libs-13.13-1.el9_3.x86_64.rpm-upostgresql-upgrade-13.13-1.el9_3.x86_64.rpm(upostgresql-plperl-13.13-1.el9_3.x86_64.rpm)upostgresql-plpython3-13.13-1.el9_3.x86_64.rpm,upostgresql-server-13.13-1.el9_3.x86_64.rpm`upostgresql-13.13-1.el9_3.x86_64.rpm*upostgresql-pltcl-13.13-1.el9_3.x86_64.rpm'upostgresql-contrib-13.13-1.el9_3.x86_64.rpm+upostgresql-private-libs-13.13-1.el9_3.x86_64.rpm-upostgresql-upgrade-13.13-1.el9_3.x86_64.rpm(upostgresql-plperl-13.13-1.el9_3.x86_64.rpm)upostgresql-plpython3-13.13-1.el9_3.x86_64.rpm,upostgresql-server-13.13-1.el9_3.x86_64.rpm`upostgresql-13.13-1.el9_3.x86_64.rpmbC XBBBBBZBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security updateRc https://access.redhat.com/errata/RHSA-2023:7785RHSA-2023:7785RHSA-2023:7785 https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-39418CVE-2023-39418CVE-2023-39418https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22281122228112https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7785.htmlALSA-2023:7785ALSA-2023:7785 ` (*ppostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm wpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmppostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm`ppostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm+ppostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm vpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm,ppostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm-ppostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm upg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm(ppostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm'ppostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmkppostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpm)ppostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm` (*ppostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm wpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmppostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm`ppostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm+ppostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm vpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm,ppostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm-ppostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm upg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm(ppostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm'ppostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmkppostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpm)ppostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm&D TBsecurityImportant: gstreamer1-plugins-bad-free security update5https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791 https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791 ^2gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpm^2gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpm^2gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpm^2gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpmME XsecurityImportant: thunderbird security updateR@https://access.redhat.com/errata/RHSA-2024:0001RHSA-2024:0001RHSA-2024:0001 https://access.redhat.com/security/cve/CVE-2023-50761CVE-2023-50761CVE-2023-50761https://access.redhat.com/security/cve/CVE-2023-50762CVE-2023-50762CVE-2023-50762https://access.redhat.com/security/cve/CVE-2023-6856CVE-2023-6856CVE-2023-6856https://access.redhat.com/security/cve/CVE-2023-6857CVE-2023-6857CVE-2023-6857https://access.redhat.com/security/cve/CVE-2023-6858CVE-2023-6858CVE-2023-6858https://access.redhat.com/security/cve/CVE-2023-6859CVE-2023-6859CVE-2023-6859https://access.redhat.com/security/cve/CVE-2023-6860CVE-2023-6860CVE-2023-6860https://access.redhat.com/security/cve/CVE-2023-6861CVE-2023-6861CVE-2023-6861https://access.redhat.com/security/cve/CVE-2023-6862CVE-2023-6862CVE-2023-6862https://access.redhat.com/security/cve/CVE-2023-6863CVE-2023-6863CVE-2023-6863https://access.redhat.com/security/cve/CVE-2023-6864CVE-2023-6864CVE-2023-6864https://bugzilla.redhat.com/22553602255360https://bugzilla.redhat.com/22553622255362https://bugzilla.redhat.com/22553632255363https://bugzilla.redhat.com/22553642255364https://bugzilla.redhat.com/22553652255365https://bugzilla.redhat.com/22553672255367https://bugzilla.redhat.com/22553682255368https://bugzilla.redhat.com/22553692255369https://bugzilla.redhat.com/22553702255370https://bugzilla.redhat.com/22553782255378https://bugzilla.redhat.com/22553792255379https://errata.almalinux.org/9/ALSA-2024-0001.htmlALSA-2024:0001ALSA-2024:0001 :{thunderbird-115.6.0-1.el9_3.alma.x86_64.rpm:{thunderbird-115.6.0-1.el9_3.alma.x86_64.rpm֯F &[BBBBBBBBBsecurityImportant: tigervnc security update0https://access.redhat.com/errata/RHSA-2024:0010RHSA-2024:0010RHSA-2024:0010 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://errata.almalinux.org/9/ALSA-2024-0010.htmlALSA-2024:0010ALSA-2024:0010 &Ttigervnc-license-1.13.1-3.el9_3.3.alma.1.noarch.rpm%Ttigervnc-icons-1.13.1-3.el9_3.3.alma.1.noarch.rpmPTtigervnc-server-module-1.13.1-3.el9_3.3.alma.1.x86_64.rpmMTtigervnc-1.13.1-3.el9_3.3.alma.1.x86_64.rpmOTtigervnc-server-minimal-1.13.1-3.el9_3.3.alma.1.x86_64.rpmNTtigervnc-server-1.13.1-3.el9_3.3.alma.1.x86_64.rpm'Ttigervnc-selinux-1.13.1-3.el9_3.3.alma.1.noarch.rpm&Ttigervnc-license-1.13.1-3.el9_3.3.alma.1.noarch.rpm%Ttigervnc-icons-1.13.1-3.el9_3.3.alma.1.noarch.rpmPTtigervnc-server-module-1.13.1-3.el9_3.3.alma.1.x86_64.rpmMTtigervnc-1.13.1-3.el9_3.3.alma.1.x86_64.rpmOTtigervnc-server-minimal-1.13.1-3.el9_3.3.alma.1.x86_64.rpmNTtigervnc-server-1.13.1-3.el9_3.3.alma.1.x86_64.rpm'Ttigervnc-selinux-1.13.1-3.el9_3.3.alma.1.noarch.rpm֭$G +gBBsecurityImportant: firefox security updateBhttps://access.redhat.com/errata/RHSA-2024:0025RHSA-2024:0025RHSA-2024:0025 https://access.redhat.com/security/cve/CVE-2023-6856CVE-2023-6856CVE-2023-6856https://access.redhat.com/security/cve/CVE-2023-6857CVE-2023-6857CVE-2023-6857https://access.redhat.com/security/cve/CVE-2023-6858CVE-2023-6858CVE-2023-6858https://access.redhat.com/security/cve/CVE-2023-6859CVE-2023-6859CVE-2023-6859https://access.redhat.com/security/cve/CVE-2023-6860CVE-2023-6860CVE-2023-6860https://access.redhat.com/security/cve/CVE-2023-6861CVE-2023-6861CVE-2023-6861https://access.redhat.com/security/cve/CVE-2023-6862CVE-2023-6862CVE-2023-6862https://access.redhat.com/security/cve/CVE-2023-6863CVE-2023-6863CVE-2023-6863https://access.redhat.com/security/cve/CVE-2023-6864CVE-2023-6864CVE-2023-6864https://access.redhat.com/security/cve/CVE-2023-6865CVE-2023-6865CVE-2023-6865https://access.redhat.com/security/cve/CVE-2023-6867CVE-2023-6867CVE-2023-6867https://bugzilla.redhat.com/22553602255360https://bugzilla.redhat.com/22553612255361https://bugzilla.redhat.com/22553622255362https://bugzilla.redhat.com/22553632255363https://bugzilla.redhat.com/22553642255364https://bugzilla.redhat.com/22553652255365https://bugzilla.redhat.com/22553662255366https://bugzilla.redhat.com/22553672255367https://bugzilla.redhat.com/22553682255368https://bugzilla.redhat.com/22553692255369https://bugzilla.redhat.com/22553702255370https://errata.almalinux.org/9/ALSA-2024-0025.htmlALSA-2024:0025ALSA-2024:0025 9{firefox-115.6.0-1.el9_3.alma.x86_64.rpmO{firefox-x11-115.6.0-1.el9_3.alma.x86_64.rpm9{firefox-115.6.0-1.el9_3.alma.x86_64.rpmO{firefox-x11-115.6.0-1.el9_3.alma.x86_64.rpm֫YH .lsecurityImportant: squid security updateB https://access.redhat.com/errata/RHSA-2024:0071RHSA-2024:0071RHSA-2024:0071 https://access.redhat.com/security/cve/CVE-2023-46724CVE-2023-46724CVE-2023-46724https://access.redhat.com/security/cve/CVE-2023-46728CVE-2023-46728CVE-2023-46728https://access.redhat.com/security/cve/CVE-2023-49285CVE-2023-49285CVE-2023-49285https://access.redhat.com/security/cve/CVE-2023-49286CVE-2023-49286CVE-2023-49286https://bugzilla.redhat.com/22475672247567https://bugzilla.redhat.com/22485212248521https://bugzilla.redhat.com/22529232252923https://bugzilla.redhat.com/22529262252926https://errata.almalinux.org/9/ALSA-2024-0071.htmlALSA-2024:0071ALSA-2024:0071  squid-5.5-6.el9_3.5.x86_64.rpm squid-5.5-6.el9_3.5.x86_64.rpmI oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: nss security updateP+https://access.redhat.com/errata/RHSA-2024:0108RHSA-2024:0108RHSA-2024:0108 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://bugzilla.redhat.com/22436442243644https://errata.almalinux.org/9/ALSA-2024-0108.htmlALSA-2024:0108ALSA-2024:0108 rhnss-devel-3.90.0-4.el9_3.i686.rpmp9nspr-devel-4.35.0-4.el9_3.x86_64.rpmqhnss-3.90.0-4.el9_3.x86_64.rpmwhnss-util-3.90.0-4.el9_3.x86_64.rpmxhnss-util-devel-3.90.0-4.el9_3.i686.rpmthnss-softokn-devel-3.90.0-4.el9_3.x86_64.rpmuhnss-softokn-freebl-3.90.0-4.el9_3.i686.rpmvhnss-softokn-freebl-devel-3.90.0-4.el9_3.i686.rpmrhnss-devel-3.90.0-4.el9_3.x86_64.rpmxhnss-util-devel-3.90.0-4.el9_3.x86_64.rpmo9nspr-4.35.0-4.el9_3.i686.rpmthnss-softokn-devel-3.90.0-4.el9_3.i686.rpmshnss-softokn-3.90.0-4.el9_3.x86_64.rpm hnss-tools-3.90.0-4.el9_3.x86_64.rpmqhnss-3.90.0-4.el9_3.i686.rpmshnss-softokn-3.90.0-4.el9_3.i686.rpmwhnss-util-3.90.0-4.el9_3.i686.rpmo9nspr-4.35.0-4.el9_3.x86_64.rpmp9nspr-devel-4.35.0-4.el9_3.i686.rpmuhnss-softokn-freebl-3.90.0-4.el9_3.x86_64.rpmvhnss-softokn-freebl-devel-3.90.0-4.el9_3.x86_64.rpm hnss-sysinit-3.90.0-4.el9_3.x86_64.rpmrhnss-devel-3.90.0-4.el9_3.i686.rpmp9nspr-devel-4.35.0-4.el9_3.x86_64.rpmqhnss-3.90.0-4.el9_3.x86_64.rpmwhnss-util-3.90.0-4.el9_3.x86_64.rpmxhnss-util-devel-3.90.0-4.el9_3.i686.rpmthnss-softokn-devel-3.90.0-4.el9_3.x86_64.rpmuhnss-softokn-freebl-3.90.0-4.el9_3.i686.rpmvhnss-softokn-freebl-devel-3.90.0-4.el9_3.i686.rpmrhnss-devel-3.90.0-4.el9_3.x86_64.rpmxhnss-util-devel-3.90.0-4.el9_3.x86_64.rpmo9nspr-4.35.0-4.el9_3.i686.rpmthnss-softokn-devel-3.90.0-4.el9_3.i686.rpmshnss-softokn-3.90.0-4.el9_3.x86_64.rpm hnss-tools-3.90.0-4.el9_3.x86_64.rpmqhnss-3.90.0-4.el9_3.i686.rpmshnss-softokn-3.90.0-4.el9_3.i686.rpmwhnss-util-3.90.0-4.el9_3.i686.rpmo9nspr-4.35.0-4.el9_3.x86_64.rpmp9nspr-devel-4.35.0-4.el9_3.i686.rpmuhnss-softokn-freebl-3.90.0-4.el9_3.x86_64.rpmvhnss-softokn-freebl-devel-3.90.0-4.el9_3.x86_64.rpm hnss-sysinit-3.90.0-4.el9_3.x86_64.rpmJ $RBBBBBBBBBBBBBBBBsecurityModerate: ipa security update{4https://access.redhat.com/errata/RHSA-2024:0141RHSA-2024:0141RHSA-2024:0141 https://access.redhat.com/security/cve/CVE-2023-5455CVE-2023-5455CVE-2023-5455https://bugzilla.redhat.com/22428282242828https://errata.almalinux.org/9/ALSA-2024-0141.htmlALSA-2024:0141ALSA-2024:0141 4python3-ipaserver-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-client-common-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-client-4.10.2-5.el9_3.alma.1.x86_64.rpm4python3-ipaclient-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-common-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-server-common-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-server-dns-4.10.2-5.el9_3.alma.1.noarch.rpm 4ipa-client-samba-4.10.2-5.el9_3.alma.1.x86_64.rpm4ipa-selinux-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-client-epn-4.10.2-5.el9_3.alma.1.x86_64.rpm 4ipa-server-4.10.2-5.el9_3.alma.1.x86_64.rpm4python3-ipalib-4.10.2-5.el9_3.alma.1.noarch.rpm 4ipa-server-trust-ad-4.10.2-5.el9_3.alma.1.x86_64.rpm 4python3-ipaserver-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-client-common-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-client-4.10.2-5.el9_3.alma.1.x86_64.rpm4python3-ipaclient-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-common-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-server-common-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-server-dns-4.10.2-5.el9_3.alma.1.noarch.rpm 4ipa-client-samba-4.10.2-5.el9_3.alma.1.x86_64.rpm4ipa-selinux-4.10.2-5.el9_3.alma.1.noarch.rpm4ipa-client-epn-4.10.2-5.el9_3.alma.1.x86_64.rpm 4ipa-server-4.10.2-5.el9_3.alma.1.x86_64.rpm4python3-ipalib-4.10.2-5.el9_3.alma.1.noarch.rpm 4ipa-server-trust-ad-4.10.2-5.el9_3.alma.1.x86_64.rpm|K 5eBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update/ghttps://access.redhat.com/errata/RHSA-2024:0151RHSA-2024:0151RHSA-2024:0151 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0151.htmlALSA-2024:0151ALSA-2024:0151 Gdotnet-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.15-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpmEddotnet-sdk-7.0-7.0.115-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.15-1.el9_3.x86_64.rpmIddotnet-templates-7.0-7.0.115-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.15-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.15-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.15-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.15-1.el9_3.x86_64.rpmEddotnet-sdk-7.0-7.0.115-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.15-1.el9_3.x86_64.rpmIddotnet-templates-7.0-7.0.115-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.15-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.15-1.el9_3.x86_64.rpmUL vBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updatefhttps://access.redhat.com/errata/RHSA-2024:0152RHSA-2024:0152RHSA-2024:0152 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0152.htmlALSA-2024:0152ALSA-2024:0152 >aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpmJ$dotnet-templates-8.0-8.0.101-1.el9_3.x86_64.rpm<aspnetcore-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmF$dotnet-sdk-8.0-8.0.101-1.el9_3.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.1-1.el9_3.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpm$netstandard-targeting-pack-2.1-8.0.101-1.el9_3.x86_64.rpmDdotnet-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmdotnet-host-8.0.1-1.el9_3.x86_64.rpmBdotnet-hostfxr-8.0-8.0.1-1.el9_3.x86_64.rpm >aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpmJ$dotnet-templates-8.0-8.0.101-1.el9_3.x86_64.rpm<aspnetcore-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmF$dotnet-sdk-8.0-8.0.101-1.el9_3.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.1-1.el9_3.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpm$netstandard-targeting-pack-2.1-8.0.101-1.el9_3.x86_64.rpmDdotnet-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmdotnet-host-8.0.1-1.el9_3.x86_64.rpmBdotnet-hostfxr-8.0-8.0.1-1.el9_3.x86_64.rpmM KBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update|ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156  dotnet-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.26-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm ]dotnet-templates-6.0-6.0.126-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpm]dotnet-sdk-6.0-6.0.126-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm dotnet-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.26-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.26-1.el9_3.x86_64.rpm ]dotnet-templates-6.0-6.0.126-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpm]dotnet-sdk-6.0-6.0.126-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.26-1.el9_3.x86_64.rpmwN .\BBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatec! https://access.redhat.com/errata/RHSA-2024:0249RHSA-2024:0249RHSA-2024:0249 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0249.htmlALSA-2024:0249ALSA-2024:0249 xjava-21-openjdk-21.0.2.0.13-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.2.0.13-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.2.0.13-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.2.0.13-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.2.0.13-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.2.0.13-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.2.0.13-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.2.0.13-1.el9.alma.1.x86_64.rpm xjava-21-openjdk-21.0.2.0.13-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.2.0.13-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.2.0.13-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.2.0.13-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.2.0.13-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.2.0.13-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.2.0.13-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.2.0.13-1.el9.alma.1.x86_64.rpm~O ;oBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix update1https://access.redhat.com/errata/RHSA-2024:0265RHSA-2024:0265RHSA-2024:0265 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0265.htmlALSA-2024:0265ALSA-2024:0265 <3java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9.noarch.rpm43java-1.8.0-openjdk-1.8.0.402.b06-2.el9.x86_64.rpm53java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9.x86_64.rpm;3java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9.noarch.rpm73java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9.x86_64.rpm83java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9.x86_64.rpm63java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9.x86_64.rpm<3java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9.noarch.rpm43java-1.8.0-openjdk-1.8.0.402.b06-2.el9.x86_64.rpm53java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9.x86_64.rpm;3java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9.noarch.rpm73java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9.x86_64.rpm83java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9.x86_64.rpm63java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9.x86_64.rpm$P |BBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update5phttps://access.redhat.com/errata/RHSA-2024:0266RHSA-2024:0266RHSA-2024:0266 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0266.htmlALSA-2024:0266ALSA-2024:0266 v}java-11-openjdk-src-11.0.22.0.7-2.el9.x86_64.rpmo}java-11-openjdk-11.0.22.0.7-2.el9.x86_64.rpmq}java-11-openjdk-devel-11.0.22.0.7-2.el9.x86_64.rpms}java-11-openjdk-javadoc-11.0.22.0.7-2.el9.x86_64.rpmp}java-11-openjdk-demo-11.0.22.0.7-2.el9.x86_64.rpmt}java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9.x86_64.rpmw}java-11-openjdk-static-libs-11.0.22.0.7-2.el9.x86_64.rpmr}java-11-openjdk-headless-11.0.22.0.7-2.el9.x86_64.rpmu}java-11-openjdk-jmods-11.0.22.0.7-2.el9.x86_64.rpm v}java-11-openjdk-src-11.0.22.0.7-2.el9.x86_64.rpmo}java-11-openjdk-11.0.22.0.7-2.el9.x86_64.rpmq}java-11-openjdk-devel-11.0.22.0.7-2.el9.x86_64.rpms}java-11-openjdk-javadoc-11.0.22.0.7-2.el9.x86_64.rpmp}java-11-openjdk-demo-11.0.22.0.7-2.el9.x86_64.rpmt}java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9.x86_64.rpmw}java-11-openjdk-static-libs-11.0.22.0.7-2.el9.x86_64.rpmr}java-11-openjdk-headless-11.0.22.0.7-2.el9.x86_64.rpmu}java-11-openjdk-jmods-11.0.22.0.7-2.el9.x86_64.rpmAQ !OBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update%*https://access.redhat.com/errata/RHSA-2024:0267RHSA-2024:0267RHSA-2024:0267 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20932CVE-2024-20932CVE-2024-20932https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577202257720https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0267.htmlALSA-2024:0267ALSA-2024:0267 java-17-openjdk-static-libs-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-javadoc-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-headless-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-javadoc-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.10.0.7-2.el9.x86_64.rpmjava-17-openjdk-headless-17.0.10.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.10.0.7-2.el9.x86_64.rpm1R 'bBBBsecurityModerate: openssl security updateONhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310 https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:0310  lopenssl-devel-3.0.7-25.el9_3.i686.rpm lopenssl-devel-3.0.7-25.el9_3.x86_64.rpmLlopenssl-perl-3.0.7-25.el9_3.x86_64.rpm lopenssl-devel-3.0.7-25.el9_3.i686.rpm lopenssl-devel-3.0.7-25.el9_3.x86_64.rpmLlopenssl-perl-3.0.7-25.el9_3.x86_64.rpm[S |BBBBBBBBRBSBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security updaterhttps://access.redhat.com/errata/RHSA-2024:0387RHSA-2024:0387RHSA-2024:0387 https://access.redhat.com/security/cve/CVE-2023-0567CVE-2023-0567CVE-2023-0567https://access.redhat.com/security/cve/CVE-2023-0568CVE-2023-0568CVE-2023-0568https://access.redhat.com/security/cve/CVE-2023-0662CVE-2023-0662CVE-2023-0662https://access.redhat.com/security/cve/CVE-2023-3247CVE-2023-3247CVE-2023-3247https://access.redhat.com/security/cve/CVE-2023-3823CVE-2023-3823CVE-2023-3823https://access.redhat.com/security/cve/CVE-2023-3824CVE-2023-3824CVE-2023-3824https://bugzilla.redhat.com/21707612170761https://bugzilla.redhat.com/21707702170770https://bugzilla.redhat.com/21707712170771https://bugzilla.redhat.com/22192902219290https://bugzilla.redhat.com/22293962229396https://bugzilla.redhat.com/22301012230101https://errata.almalinux.org/9/ALSA-2024-0387.htmlALSA-2024:0387ALSA-2024:0387 i(\Bphp-fpm-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmWBphp-dbg-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmhBphp-snmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm`Bphp-ldap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm +php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm_Bphp-intl-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmeBphp-pdo-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm]Bphp-gd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmUBphp-common-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmXBphp-devel-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmgBphp-process-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmZBphp-enchant-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmjBphp-xml-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmSBphp-bcmath-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmTBphp-cli-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmdBphp-opcache-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm[Bphp-ffi-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmaBphp-mbstring-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmbBphp-mysqlnd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmfBphp-pgsql-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmBphp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmiBphp-soap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmVBphp-dba-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmYBphp-embedded-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm^Bphp-gmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmcBphp-odbc-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmi(\Bphp-fpm-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmWBphp-dbg-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmhBphp-snmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm`Bphp-ldap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm +php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm_Bphp-intl-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmeBphp-pdo-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm]Bphp-gd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmUBphp-common-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmXBphp-devel-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmgBphp-process-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmZBphp-enchant-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmjBphp-xml-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmSBphp-bcmath-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmTBphp-cli-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmdBphp-opcache-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm[Bphp-ffi-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmaBphp-mbstring-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmbBphp-mysqlnd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmfBphp-pgsql-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmBphp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmiBphp-soap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmVBphp-dba-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmYBphp-embedded-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm^Bphp-gmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmcBphp-odbc-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm˴[T *[BBBBBBBBBBBBBsecurityModerate: rpm security updatewhttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463 https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463  nrpm-build-4.16.1.3-27.el9_3.x86_64.rpmqnrpm-devel-4.16.1.3-27.el9_3.i686.rpm nrpm-plugin-ima-4.16.1.3-27.el9_3.x86_64.rpmnrpm-apidocs-4.16.1.3-27.el9_3.noarch.rpmnrpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3.x86_64.rpmqnrpm-devel-4.16.1.3-27.el9_3.x86_64.rpmnrpm-plugin-syslog-4.16.1.3-27.el9_3.x86_64.rpm nrpm-plugin-fapolicyd-4.16.1.3-27.el9_3.x86_64.rpmnrpm-cron-4.16.1.3-27.el9_3.noarch.rpm  nrpm-build-4.16.1.3-27.el9_3.x86_64.rpmqnrpm-devel-4.16.1.3-27.el9_3.i686.rpm nrpm-plugin-ima-4.16.1.3-27.el9_3.x86_64.rpmnrpm-apidocs-4.16.1.3-27.el9_3.noarch.rpmnrpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3.x86_64.rpmqnrpm-devel-4.16.1.3-27.el9_3.x86_64.rpmnrpm-plugin-syslog-4.16.1.3-27.el9_3.x86_64.rpm nrpm-plugin-fapolicyd-4.16.1.3-27.el9_3.x86_64.rpmnrpm-cron-4.16.1.3-27.el9_3.noarch.rpm˰3U 1kBBBBsecurityModerate: sqlite security updatehttps://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465 https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465 tsqlite-devel-3.34.1-7.el9_3.x86_64.rpmssqlite-3.34.1-7.el9_3.x86_64.rpmssqlite-3.34.1-7.el9_3.i686.rpmtsqlite-devel-3.34.1-7.el9_3.i686.rpmtsqlite-devel-3.34.1-7.el9_3.x86_64.rpmssqlite-3.34.1-7.el9_3.x86_64.rpmssqlite-3.34.1-7.el9_3.i686.rpmtsqlite-devel-3.34.1-7.el9_3.i686.rpm˩7V 8rBBBBsecurityModerate: python3.9 security updatechttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466 =)python3-tkinter-3.9.18-1.el9_3.1.x86_64.rpmj)python-unversioned-command-3.9.18-1.el9_3.1.noarch.rpmW)python3-devel-3.9.18-1.el9_3.1.x86_64.rpmW)python3-devel-3.9.18-1.el9_3.1.i686.rpm=)python3-tkinter-3.9.18-1.el9_3.1.x86_64.rpmj)python-unversioned-command-3.9.18-1.el9_3.1.noarch.rpmW)python3-devel-3.9.18-1.el9_3.1.x86_64.rpmW)python3-devel-3.9.18-1.el9_3.1.i686.rpmˤW yBBBBBBsecurityModerate: tomcat security updateq https://access.redhat.com/errata/RHSA-2024:0474RHSA-2024:0474RHSA-2024:0474 https://access.redhat.com/security/cve/CVE-2023-41080CVE-2023-41080CVE-2023-41080https://access.redhat.com/security/cve/CVE-2023-42794CVE-2023-42794CVE-2023-42794https://access.redhat.com/security/cve/CVE-2023-42795CVE-2023-42795CVE-2023-42795https://access.redhat.com/security/cve/CVE-2023-45648CVE-2023-45648CVE-2023-45648https://bugzilla.redhat.com/22353702235370https://bugzilla.redhat.com/22437492243749https://bugzilla.redhat.com/22437512243751https://bugzilla.redhat.com/22437522243752https://errata.almalinux.org/9/ALSA-2024-0474.htmlALSA-2024:0474ALSA-2024:0474 @{tomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpm>{tomcat-docs-webapp-9.0.62-37.el9_3.1.noarch.rpmC{tomcat-webapps-9.0.62-37.el9_3.1.noarch.rpm?{tomcat-el-3.0-api-9.0.62-37.el9_3.1.noarch.rpmB{tomcat-servlet-4.0-api-9.0.62-37.el9_3.1.noarch.rpmA{tomcat-lib-9.0.62-37.el9_3.1.noarch.rpm<{tomcat-9.0.62-37.el9_3.1.noarch.rpm={tomcat-admin-webapps-9.0.62-37.el9_3.1.noarch.rpm@{tomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpm>{tomcat-docs-webapp-9.0.62-37.el9_3.1.noarch.rpmC{tomcat-webapps-9.0.62-37.el9_3.1.noarch.rpm?{tomcat-el-3.0-api-9.0.62-37.el9_3.1.noarch.rpmB{tomcat-servlet-4.0-api-9.0.62-37.el9_3.1.noarch.rpmA{tomcat-lib-9.0.62-37.el9_3.1.noarch.rpm<{tomcat-9.0.62-37.el9_3.1.noarch.rpm={tomcat-admin-webapps-9.0.62-37.el9_3.1.noarch.rpmˢ#X BBsecurityModerate: frr security update https://access.redhat.com/errata/RHSA-2024:0477RHSA-2024:0477RHSA-2024:0477 https://access.redhat.com/security/cve/CVE-2023-38406CVE-2023-38406CVE-2023-38406https://access.redhat.com/security/cve/CVE-2023-38407CVE-2023-38407CVE-2023-38407https://access.redhat.com/security/cve/CVE-2023-47234CVE-2023-47234CVE-2023-47234https://access.redhat.com/security/cve/CVE-2023-47235CVE-2023-47235CVE-2023-47235https://bugzilla.redhat.com/22482072248207https://bugzilla.redhat.com/22482082248208https://bugzilla.redhat.com/22485262248526https://bugzilla.redhat.com/22485282248528https://errata.almalinux.org/9/ALSA-2024-0477.htmlALSA-2024:0477ALSA-2024:0477 Nfrr-8.3.1-11.el9_3.2.alma.1.x86_64.rpmafrr-selinux-8.3.1-11.el9_3.2.alma.1.noarch.rpmNfrr-8.3.1-11.el9_3.2.alma.1.x86_64.rpmafrr-selinux-8.3.1-11.el9_3.2.alma.1.noarch.rpmˠ(Y FBBBBBBBBBsecurityModerate: gnutls security update0Ghttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533 https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533 `gnutls-dane-3.7.6-23.el9_3.3.i686.rpm`gnutls-devel-3.7.6-23.el9_3.3.i686.rpm`gnutls-c++-3.7.6-23.el9_3.3.i686.rpm`gnutls-utils-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-c++-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-dane-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-devel-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-dane-3.7.6-23.el9_3.3.i686.rpm`gnutls-devel-3.7.6-23.el9_3.3.i686.rpm`gnutls-c++-3.7.6-23.el9_3.3.i686.rpm`gnutls-utils-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-c++-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-dane-3.7.6-23.el9_3.3.x86_64.rpm`gnutls-devel-3.7.6-23.el9_3.3.x86_64.rpm߲Z RBBBBBBBBBsecurityImportant: tigervnc security updatewo https://access.redhat.com/errata/RHSA-2024:0557RHSA-2024:0557RHSA-2024:0557 https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-0557.htmlALSA-2024:0557ALSA-2024:0557 MUtigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm&Utigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpmNUtigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpmOUtigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpmPUtigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm%Utigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm'Utigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpmMUtigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm&Utigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpmNUtigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpmOUtigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpmPUtigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm%Utigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm'Utigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpmW[ ^securityImportant: thunderbird security updatefhttps://access.redhat.com/errata/RHSA-2024:0602RHSA-2024:0602RHSA-2024:0602 https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0602.htmlALSA-2024:0602ALSA-2024:0602 :|thunderbird-115.7.0-1.el9_3.alma.x86_64.rpm:|thunderbird-115.7.0-1.el9_3.alma.x86_64.rpm\ %aBBsecurityImportant: firefox security updatevAhttps://access.redhat.com/errata/RHSA-2024:0603RHSA-2024:0603RHSA-2024:0603 https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0603.htmlALSA-2024:0603ALSA-2024:0603 O|firefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm9|firefox-115.7.0-1.el9_3.alma.x86_64.rpmO|firefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm9|firefox-115.7.0-1.el9_3.alma.x86_64.rpm8] (fsecurityImportant: runc security update7|https://access.redhat.com/errata/RHSA-2024:0670RHSA-2024:0670RHSA-2024:0670 https://access.redhat.com/security/cve/CVE-2024-21626CVE-2024-21626CVE-2024-21626https://bugzilla.redhat.com/22587252258725https://errata.almalinux.org/9/ALSA-2024-0670.htmlALSA-2024:0670ALSA-2024:0670 $rrunc-1.1.12-1.el9_3.x86_64.rpm$rrunc-1.1.12-1.el9_3.x86_64.rpm1^ .iBBBsecurityImportant: gimp security update3 https://access.redhat.com/errata/RHSA-2024:0675RHSA-2024:0675RHSA-2024:0675 https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2024-0675.htmlALSA-2024:0675ALSA-2024:0675 @gimp-2.99.8-4.el9_3.x86_64.rpmogimp-libs-2.99.8-4.el9_3.x86_64.rpmogimp-libs-2.99.8-4.el9_3.i686.rpm@gimp-2.99.8-4.el9_3.x86_64.rpmogimp-libs-2.99.8-4.el9_3.x86_64.rpmogimp-libs-2.99.8-4.el9_3.i686.rpm=_ oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: nss security updateQ:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790 https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790 winss-util-3.90.0-6.el9_3.x86_64.rpmxinss-util-devel-3.90.0-6.el9_3.i686.rpmuinss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmuinss-softokn-freebl-3.90.0-6.el9_3.i686.rpmvinss-softokn-freebl-devel-3.90.0-6.el9_3.i686.rpmtinss-softokn-devel-3.90.0-6.el9_3.i686.rpmwinss-util-3.90.0-6.el9_3.i686.rpmo:nspr-4.35.0-6.el9_3.x86_64.rpmp:nspr-devel-4.35.0-6.el9_3.i686.rpmtinss-softokn-devel-3.90.0-6.el9_3.x86_64.rpm inss-tools-3.90.0-6.el9_3.x86_64.rpmqinss-3.90.0-6.el9_3.i686.rpmrinss-devel-3.90.0-6.el9_3.x86_64.rpm inss-sysinit-3.90.0-6.el9_3.x86_64.rpmrinss-devel-3.90.0-6.el9_3.i686.rpmqinss-3.90.0-6.el9_3.x86_64.rpmxinss-util-devel-3.90.0-6.el9_3.x86_64.rpmsinss-softokn-3.90.0-6.el9_3.i686.rpmsinss-softokn-3.90.0-6.el9_3.x86_64.rpmvinss-softokn-freebl-devel-3.90.0-6.el9_3.x86_64.rpmo:nspr-4.35.0-6.el9_3.i686.rpmp:nspr-devel-4.35.0-6.el9_3.x86_64.rpmwinss-util-3.90.0-6.el9_3.x86_64.rpmxinss-util-devel-3.90.0-6.el9_3.i686.rpmuinss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmuinss-softokn-freebl-3.90.0-6.el9_3.i686.rpmvinss-softokn-freebl-devel-3.90.0-6.el9_3.i686.rpmtinss-softokn-devel-3.90.0-6.el9_3.i686.rpmwinss-util-3.90.0-6.el9_3.i686.rpmo:nspr-4.35.0-6.el9_3.x86_64.rpmp:nspr-devel-4.35.0-6.el9_3.i686.rpmtinss-softokn-devel-3.90.0-6.el9_3.x86_64.rpm inss-tools-3.90.0-6.el9_3.x86_64.rpmqinss-3.90.0-6.el9_3.i686.rpmrinss-devel-3.90.0-6.el9_3.x86_64.rpm inss-sysinit-3.90.0-6.el9_3.x86_64.rpmrinss-devel-3.90.0-6.el9_3.i686.rpmqinss-3.90.0-6.el9_3.x86_64.rpmxinss-util-devel-3.90.0-6.el9_3.x86_64.rpmsinss-softokn-3.90.0-6.el9_3.i686.rpmsinss-softokn-3.90.0-6.el9_3.x86_64.rpmvinss-softokn-freebl-devel-3.90.0-6.el9_3.x86_64.rpmo:nspr-4.35.0-6.el9_3.i686.rpmp:nspr-devel-4.35.0-6.el9_3.x86_64.rpm9` "RBBBBBBBBBBBBBBsecurityImportant: dotnet7.0 security update xhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805 Eedotnet-sdk-7.0-7.0.116-1.el9_3.x86_64.rpmIedotnet-templates-7.0-7.0.116-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.16-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.16-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmEedotnet-sdk-7.0-7.0.116-1.el9_3.x86_64.rpmIedotnet-templates-7.0-7.0.116-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.16-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.16-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmBa 3cBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security updatexhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807 ^dotnet-sdk-6.0-6.0.127-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm ^dotnet-templates-6.0-6.0.127-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm dotnet-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.27-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.27-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.27-1.el9_3.x86_64.rpm^dotnet-sdk-6.0-6.0.127-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm ^dotnet-templates-6.0-6.0.127-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm dotnet-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.27-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.27-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.27-1.el9_3.x86_64.rpm3b 6tsecurityModerate: sudo security update{|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811 https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811 Gsudo-python-plugin-1.9.5p2-10.el9_3.x86_64.rpmGsudo-python-plugin-1.9.5p2-10.el9_3.x86_64.rpm[c wBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updatewwhttps://access.redhat.com/errata/RHSA-2024:0848RHSA-2024:0848RHSA-2024:0848 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0848.htmlALSA-2024:0848ALSA-2024:0848 < aspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm%netstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpm dotnet-host-8.0.2-2.el9_3.x86_64.rpmH dotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmJ%dotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpm@ dotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpm> aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmD dotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpmB dotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpmF%dotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpm < aspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm%netstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpm dotnet-host-8.0.2-2.el9_3.x86_64.rpmH dotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmJ%dotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpm@ dotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpm> aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmD dotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpmB dotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpmF%dotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpmd )XBBBBBpBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security updaten https://access.redhat.com/errata/RHSA-2024:0950RHSA-2024:0950RHSA-2024:0950 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0950.htmlALSA-2024:0950ALSA-2024:0950 ` ( wpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmqpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm vpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm*qpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm+qpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm`qpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm'qpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm,qpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm-qpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm upg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm qpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm)qpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmkqpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpm(qpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm` ( wpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmqpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm vpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm*qpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm+qpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm`qpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm'qpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm,qpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm-qpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm upg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm qpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm)qpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmkqpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpm(qpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqe :jBBBBBBBBBBBBBBsecurityImportant: postgresql security updatew https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951 `vpostgresql-13.14-1.el9_3.x86_64.rpm(vpostgresql-plperl-13.14-1.el9_3.x86_64.rpm'vpostgresql-contrib-13.14-1.el9_3.x86_64.rpm)vpostgresql-plpython3-13.14-1.el9_3.x86_64.rpm-vpostgresql-upgrade-13.14-1.el9_3.x86_64.rpm,vpostgresql-server-13.14-1.el9_3.x86_64.rpm*vpostgresql-pltcl-13.14-1.el9_3.x86_64.rpm+vpostgresql-private-libs-13.14-1.el9_3.x86_64.rpm`vpostgresql-13.14-1.el9_3.x86_64.rpm(vpostgresql-plperl-13.14-1.el9_3.x86_64.rpm'vpostgresql-contrib-13.14-1.el9_3.x86_64.rpm)vpostgresql-plpython3-13.14-1.el9_3.x86_64.rpm-vpostgresql-upgrade-13.14-1.el9_3.x86_64.rpm,vpostgresql-server-13.14-1.el9_3.x86_64.rpm*vpostgresql-pltcl-13.14-1.el9_3.x86_64.rpm+vpostgresql-private-libs-13.14-1.el9_3.x86_64.rpmf ?{BBsecurityImportant: firefox security updatePhttps://access.redhat.com/errata/RHSA-2024:0952RHSA-2024:0952RHSA-2024:0952 https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0952.htmlALSA-2024:0952ALSA-2024:0952 O}firefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm9}firefox-115.8.0-1.el9_3.alma.x86_64.rpmO}firefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm9}firefox-115.8.0-1.el9_3.alma.x86_64.rpmhg @securityImportant: thunderbird security updatePhttps://access.redhat.com/errata/RHSA-2024:0963RHSA-2024:0963RHSA-2024:0963 https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0963.htmlALSA-2024:0963ALSA-2024:0963 :}thunderbird-115.8.0-1.el9_3.alma.x86_64.rpm:}thunderbird-115.8.0-1.el9_3.alma.x86_64.rpmqh CBBBBBsecurityImportant: unbound security updateo[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977 5@unbound-libs-1.16.2-3.el9_3.1.i686.rpmU@unbound-1.16.2-3.el9_3.1.x86_64.rpm5@unbound-libs-1.16.2-3.el9_3.1.x86_64.rpmR@python3-unbound-1.16.2-3.el9_3.1.x86_64.rpm5@unbound-libs-1.16.2-3.el9_3.1.i686.rpmU@unbound-1.16.2-3.el9_3.1.x86_64.rpm5@unbound-libs-1.16.2-3.el9_3.1.x86_64.rpmR@python3-unbound-1.16.2-3.el9_3.1.x86_64.rpmi KBBBBBBBBBsecurityImportant: tigervnc security updateJlhttps://access.redhat.com/errata/RHSA-2024:10090RHSA-2024:10090RHSA-2024:10090 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://bugzilla.redhat.com/23172332317233https://errata.almalinux.org/9/ALSA-2024-10090.htmlALSA-2024:10090ALSA-2024:10090 'Xtigervnc-selinux-1.14.1-1.el9_5.noarch.rpmMXtigervnc-1.14.1-1.el9_5.x86_64.rpmOXtigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpmNXtigervnc-server-1.14.1-1.el9_5.x86_64.rpmPXtigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm%Xtigervnc-icons-1.14.1-1.el9_5.noarch.rpm&Xtigervnc-license-1.14.1-1.el9_5.noarch.rpm'Xtigervnc-selinux-1.14.1-1.el9_5.noarch.rpmMXtigervnc-1.14.1-1.el9_5.x86_64.rpmOXtigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpmNXtigervnc-server-1.14.1-1.el9_5.x86_64.rpmPXtigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm%Xtigervnc-icons-1.14.1-1.el9_5.noarch.rpm&Xtigervnc-license-1.14.1-1.el9_5.noarch.rpm]j securityModerate: perl-App-cpanminus security update6https://access.redhat.com/errata/RHSA-2024:10218RHSA-2024:10218RHSA-2024:10218 https://access.redhat.com/security/cve/CVE-2024-45321CVE-2024-45321CVE-2024-45321https://bugzilla.redhat.com/23080782308078https://errata.almalinux.org/9/ALSA-2024-10218.htmlALSA-2024:10218ALSA-2024:10218  perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpmak YBBBsecurityImportant: pam:1.5.1 security updateE[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:10244 4epam-devel-1.5.1-22.el9_5.x86_64.rpmMepam-docs-1.5.1-22.el9_5.x86_64.rpm4epam-devel-1.5.1-22.el9_5.i686.rpm4epam-devel-1.5.1-22.el9_5.x86_64.rpmMepam-docs-1.5.1-22.el9_5.x86_64.rpm4epam-devel-1.5.1-22.el9_5.i686.rpmgl 0_BBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274 6kernel-doc-5.14.0-503.15.1.el9_5.noarch.rpm#6kernel-devel-5.14.0-503.15.1.el9_5.x86_64.rpm!6kernel-debug-devel-5.14.0-503.15.1.el9_5.x86_64.rpm"6kernel-debug-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm&6kernel-headers-5.14.0-503.15.1.el9_5.x86_64.rpm%6perf-5.14.0-503.15.1.el9_5.x86_64.rpm)6rv-5.14.0-503.15.1.el9_5.x86_64.rpm'6rtla-5.14.0-503.15.1.el9_5.x86_64.rpm$6kernel-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm 6kernel-doc-5.14.0-503.15.1.el9_5.noarch.rpm#6kernel-devel-5.14.0-503.15.1.el9_5.x86_64.rpm!6kernel-debug-devel-5.14.0-503.15.1.el9_5.x86_64.rpm"6kernel-debug-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm&6kernel-headers-5.14.0-503.15.1.el9_5.x86_64.rpm%6perf-5.14.0-503.15.1.el9_5.x86_64.rpm)6rv-5.14.0-503.15.1.el9_5.x86_64.rpm'6rtla-5.14.0-503.15.1.el9_5.x86_64.rpm$6kernel-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpmxm 9qBBBBBBsecurityImportant: tuned security update?https://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384 https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:10384 ptuned-utils-2.24.0-2.el9_5.alma.1.noarch.rpmmtuned-profiles-oracle-2.24.0-2.el9_5.alma.1.noarch.rpmntuned-profiles-postgresql-2.24.0-2.el9_5.alma.1.noarch.rpmotuned-profiles-spectrumscale-2.24.0-2.el9_5.alma.1.noarch.rpmituned-gtk-2.24.0-2.el9_5.alma.1.noarch.rpmjtuned-ppd-2.24.0-2.el9_5.alma.1.noarch.rpmktuned-profiles-atomic-2.24.0-2.el9_5.alma.1.noarch.rpmltuned-profiles-mssql-2.24.0-2.el9_5.alma.1.noarch.rpmptuned-utils-2.24.0-2.el9_5.alma.1.noarch.rpmmtuned-profiles-oracle-2.24.0-2.el9_5.alma.1.noarch.rpmntuned-profiles-postgresql-2.24.0-2.el9_5.alma.1.noarch.rpmotuned-profiles-spectrumscale-2.24.0-2.el9_5.alma.1.noarch.rpmituned-gtk-2.24.0-2.el9_5.alma.1.noarch.rpmjtuned-ppd-2.24.0-2.el9_5.alma.1.noarch.rpmktuned-profiles-atomic-2.24.0-2.el9_5.alma.1.noarch.rpmltuned-profiles-mssql-2.24.0-2.el9_5.alma.1.noarch.rpmzn zBBBBBBBBBBsecurityImportant: webkit2gtk3 security update]shttps://access.redhat.com/errata/RHSA-2024:10472RHSA-2024:10472RHSA-2024:10472 https://access.redhat.com/security/cve/CVE-2024-44309CVE-2024-44309CVE-2024-44309https://bugzilla.redhat.com/23279272327927https://errata.almalinux.org/9/ALSA-2024-10472.htmlALSA-2024:10472ALSA-2024:10472 2nwebkit2gtk3-devel-2.46.3-2.el9_5.x86_64.rpm2nwebkit2gtk3-devel-2.46.3-2.el9_5.i686.rpm1nwebkit2gtk3-2.46.3-2.el9_5.i686.rpm3nwebkit2gtk3-jsc-2.46.3-2.el9_5.x86_64.rpm1nwebkit2gtk3-2.46.3-2.el9_5.x86_64.rpm3nwebkit2gtk3-jsc-2.46.3-2.el9_5.i686.rpm4nwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.x86_64.rpm4nwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.i686.rpm2nwebkit2gtk3-devel-2.46.3-2.el9_5.x86_64.rpm2nwebkit2gtk3-devel-2.46.3-2.el9_5.i686.rpm1nwebkit2gtk3-2.46.3-2.el9_5.i686.rpm3nwebkit2gtk3-jsc-2.46.3-2.el9_5.x86_64.rpm1nwebkit2gtk3-2.46.3-2.el9_5.x86_64.rpm3nwebkit2gtk3-jsc-2.46.3-2.el9_5.i686.rpm4nwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.x86_64.rpm4nwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.i686.rpm7o GsecurityImportant: python-tornado security updatePJhttps://access.redhat.com/errata/RHSA-2024:10590RHSA-2024:10590RHSA-2024:10590 https://access.redhat.com/security/cve/CVE-2024-52804CVE-2024-52804CVE-2024-52804https://bugzilla.redhat.com/23280452328045https://errata.almalinux.org/9/ALSA-2024-10590.htmlALSA-2024:10590ALSA-2024:10590  python3-tornado-6.4.2-1.el9_5.x86_64.rpm python3-tornado-6.4.2-1.el9_5.x86_64.rpm\p JsecurityImportant: thunderbird security updatehttps://access.redhat.com/errata/RHSA-2024:10592RHSA-2024:10592RHSA-2024:10592 https://access.redhat.com/security/cve/CVE-2024-11159CVE-2024-11159CVE-2024-11159https://access.redhat.com/security/cve/CVE-2024-11692CVE-2024-11692CVE-2024-11692https://access.redhat.com/security/cve/CVE-2024-11694CVE-2024-11694CVE-2024-11694https://access.redhat.com/security/cve/CVE-2024-11695CVE-2024-11695CVE-2024-11695https://access.redhat.com/security/cve/CVE-2024-11696CVE-2024-11696CVE-2024-11696https://access.redhat.com/security/cve/CVE-2024-11697CVE-2024-11697CVE-2024-11697https://access.redhat.com/security/cve/CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/23258962325896https://bugzilla.redhat.com/23289412328941https://bugzilla.redhat.com/23289432328943https://bugzilla.redhat.com/23289462328946https://bugzilla.redhat.com/23289472328947https://bugzilla.redhat.com/23289482328948https://bugzilla.redhat.com/23289502328950https://errata.almalinux.org/9/ALSA-2024-10592.htmlALSA-2024:10592ALSA-2024:10592 :kthunderbird-128.5.0-1.el9_5.alma.1.x86_64.rpm:kthunderbird-128.5.0-1.el9_5.alma.1.x86_64.rpm3q MBBsecurityImportant: firefox security update Vhttps://access.redhat.com/errata/RHSA-2024:10702RHSA-2024:10702RHSA-2024:10702 https://access.redhat.com/security/cve/CVE-2024-11692CVE-2024-11692CVE-2024-11692https://access.redhat.com/security/cve/CVE-2024-11694CVE-2024-11694CVE-2024-11694https://access.redhat.com/security/cve/CVE-2024-11695CVE-2024-11695CVE-2024-11695https://access.redhat.com/security/cve/CVE-2024-11696CVE-2024-11696CVE-2024-11696https://access.redhat.com/security/cve/CVE-2024-11697CVE-2024-11697CVE-2024-11697https://access.redhat.com/security/cve/CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/23289412328941https://bugzilla.redhat.com/23289432328943https://bugzilla.redhat.com/23289462328946https://bugzilla.redhat.com/23289472328947https://bugzilla.redhat.com/23289482328948https://bugzilla.redhat.com/23289502328950https://errata.almalinux.org/9/ALSA-2024-10702.htmlALSA-2024:10702ALSA-2024:10702 Ofirefox-x11-128.5.1-1.el9_5.x86_64.rpm9firefox-128.5.1-1.el9_5.x86_64.rpmOfirefox-x11-128.5.1-1.el9_5.x86_64.rpm9firefox-128.5.1-1.el9_5.x86_64.rpmr RsecurityImportant: edk2 security updatev6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075 https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075 edk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm:edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm:edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmLs 2pBBBWBLBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update,`https://access.redhat.com/errata/RHSA-2024:10787RHSA-2024:10787RHSA-2024:10787 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10787.htmlALSA-2024:10787ALSA-2024:10787 ` (kpostgresql-test-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm`kpostgresql-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm(kpostgresql-plperl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-static-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmkkpostgresql-test-rpm-macros-15.10-1.module_el9.5.0+126+03d48c9f.noarch.rpmkpostgresql-server-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-upgrade-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm*kpostgresql-pltcl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-private-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm kpostgresql-docs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm)kpostgresql-plpython3-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm'kpostgresql-contrib-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm,kpostgresql-server-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm-kpostgresql-upgrade-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm+kpostgresql-private-libs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm` (kpostgresql-test-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm`kpostgresql-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm(kpostgresql-plperl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-static-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmkkpostgresql-test-rpm-macros-15.10-1.module_el9.5.0+126+03d48c9f.noarch.rpmkpostgresql-server-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-upgrade-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm*kpostgresql-pltcl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-private-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm kpostgresql-docs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm)kpostgresql-plpython3-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm'kpostgresql-contrib-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm,kpostgresql-server-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm-kpostgresql-upgrade-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm+kpostgresql-private-libs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmvt tBBBUBBBfBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update `https://access.redhat.com/errata/RHSA-2024:10788RHSA-2024:10788RHSA-2024:10788 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10788.htmlALSA-2024:10788ALSA-2024:10788 ` ( pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm,postgresql-server-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm+postgresql-private-libs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmpostgresql-server-devel-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmkpostgresql-test-rpm-macros-16.6-1.module_el9.5.0+127+50ff03a9.noarch.rpm(postgresql-plperl-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm*zpostgresql-pltcl-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-test-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm9}pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm'zpostgresql-contrib-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm postgresql-docs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm)zpostgresql-plpython3-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-private-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm`zpostgresql-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-upgrade-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-static-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm-postgresql-upgrade-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm` ( pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm,postgresql-server-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm+postgresql-private-libs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmpostgresql-server-devel-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmkpostgresql-test-rpm-macros-16.6-1.module_el9.5.0+127+50ff03a9.noarch.rpm(postgresql-plperl-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm*zpostgresql-pltcl-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-test-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm9}pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm'zpostgresql-contrib-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm postgresql-docs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm)zpostgresql-plpython3-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-private-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm`zpostgresql-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-upgrade-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmzpostgresql-static-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm-postgresql-upgrade-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm u !QBBBBBBBBBBBBBBsecurityImportant: postgresql security updatel`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791 `xpostgresql-13.18-1.el9_5.x86_64.rpm(xpostgresql-plperl-13.18-1.el9_5.x86_64.rpm+xpostgresql-private-libs-13.18-1.el9_5.x86_64.rpm)xpostgresql-plpython3-13.18-1.el9_5.x86_64.rpm*xpostgresql-pltcl-13.18-1.el9_5.x86_64.rpm-xpostgresql-upgrade-13.18-1.el9_5.x86_64.rpm'xpostgresql-contrib-13.18-1.el9_5.x86_64.rpm,xpostgresql-server-13.18-1.el9_5.x86_64.rpm`xpostgresql-13.18-1.el9_5.x86_64.rpm(xpostgresql-plperl-13.18-1.el9_5.x86_64.rpm+xpostgresql-private-libs-13.18-1.el9_5.x86_64.rpm)xpostgresql-plpython3-13.18-1.el9_5.x86_64.rpm*xpostgresql-pltcl-13.18-1.el9_5.x86_64.rpm-xpostgresql-upgrade-13.18-1.el9_5.x86_64.rpm'xpostgresql-contrib-13.18-1.el9_5.x86_64.rpm,xpostgresql-server-13.18-1.el9_5.x86_64.rpmpv bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby security updateL%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858 vruby-devel-3.0.7-163.el9_5.x86_64.rpm-rubygems-devel-3.2.33-163.el9_5.noarch.rpmwruby-libs-3.0.7-163.el9_5.i686.rpm#rubygem-irb-1.3.5-163.el9_5.noarch.rpm)rubygem-io-console-0.5.7-163.el9_5.x86_64.rpmTrubygem-psych-3.3.2-163.el9_5.x86_64.rpmwruby-libs-3.0.7-163.el9_5.x86_64.rpm,rubygems-3.2.33-163.el9_5.noarch.rpm&rubygem-rake-13.0.3-163.el9_5.noarch.rpm3rubygem-json-2.5.1-163.el9_5.x86_64.rpm"-rubygem-bundler-2.2.33-163.el9_5.noarch.rpm%trubygem-power_assert-1.2.1-163.el9_5.noarch.rpm$_rubygem-minitest-5.14.2-163.el9_5.noarch.rpmmrubygem-rbs-1.4.0-163.el9_5.noarch.rpm'irubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm!ruby-default-gems-3.0.7-163.el9_5.noarch.rpm)Srubygem-rss-0.2.9-163.el9_5.noarch.rpmruby-3.0.7-163.el9_5.i686.rpmKrubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm*Qrubygem-test-unit-3.3.7-163.el9_5.noarch.rpm+Mrubygem-typeprof-0.15.2-163.el9_5.noarch.rpm(Lrubygem-rexml-3.2.5-163.el9_5.noarch.rpmvruby-devel-3.0.7-163.el9_5.i686.rpmruby-3.0.7-163.el9_5.x86_64.rpmvruby-devel-3.0.7-163.el9_5.x86_64.rpm-rubygems-devel-3.2.33-163.el9_5.noarch.rpmwruby-libs-3.0.7-163.el9_5.i686.rpm#rubygem-irb-1.3.5-163.el9_5.noarch.rpm)rubygem-io-console-0.5.7-163.el9_5.x86_64.rpmTrubygem-psych-3.3.2-163.el9_5.x86_64.rpmwruby-libs-3.0.7-163.el9_5.x86_64.rpm,rubygems-3.2.33-163.el9_5.noarch.rpm&rubygem-rake-13.0.3-163.el9_5.noarch.rpm3rubygem-json-2.5.1-163.el9_5.x86_64.rpm"-rubygem-bundler-2.2.33-163.el9_5.noarch.rpm%trubygem-power_assert-1.2.1-163.el9_5.noarch.rpm$_rubygem-minitest-5.14.2-163.el9_5.noarch.rpmmrubygem-rbs-1.4.0-163.el9_5.noarch.rpm'irubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm!ruby-default-gems-3.0.7-163.el9_5.noarch.rpm)Srubygem-rss-0.2.9-163.el9_5.noarch.rpmruby-3.0.7-163.el9_5.i686.rpmKrubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm*Qrubygem-test-unit-3.3.7-163.el9_5.noarch.rpm+Mrubygem-typeprof-0.15.2-163.el9_5.noarch.rpm(Lrubygem-rexml-3.2.5-163.el9_5.noarch.rpmvruby-devel-3.0.7-163.el9_5.i686.rpmruby-3.0.7-163.el9_5.x86_64.rpmLw +GBBBBBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby:3.1 security updateq%https://access.redhat.com/errata/RHSA-2024:10860RHSA-2024:10860RHSA-2024:10860 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10860.htmlALSA-2024:10860ALSA-2024:10860 ($hrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmvOruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm%rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmeOruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmOruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm!Oruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmOruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm-"rubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm#rubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmwOruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm,"rubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmhrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmeOruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmTrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm+Vrubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmurubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpm*Urubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmurubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm'mrubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmTrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmmVrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpm)Prubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmvOruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm$brubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmmVrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmeOruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm&rubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmwOruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm"1rubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm(Irubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm($hrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmvOruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm%rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmeOruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmOruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm!Oruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmOruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm-"rubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm#rubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmwOruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm,"rubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmhrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmeOruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmTrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm+Vrubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmurubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpm*Urubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmurubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm'mrubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmTrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmmVrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpm)Prubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmvOruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm$brubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmmVrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmeOruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm&rubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmwOruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm"1rubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm(Irubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmdx 1lBBBsecurityModerate: redis:7 security updateM https://access.redhat.com/errata/RHSA-2024:10869RHSA-2024:10869RHSA-2024:10869 https://access.redhat.com/security/cve/CVE-2023-41053CVE-2023-41053CVE-2023-41053https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31227CVE-2024-31227CVE-2024-31227https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://bugzilla.redhat.com/22378262237826https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170532317053https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://errata.almalinux.org/9/ALSA-2024-10869.htmlALSA-2024:10869ALSA-2024:10869 $(@redis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpmredis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm$redis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm$(@redis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpmredis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm$redis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm#y rBBBBBBBBBBBBBBBsecurityModerate: kernel security updatecAhttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939 '7rtla-5.14.0-503.16.1.el9_5.x86_64.rpm7kernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm#7kernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm&7kernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm%7perf-5.14.0-503.16.1.el9_5.x86_64.rpm"7kernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm!7kernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm$7kernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm)7rv-5.14.0-503.16.1.el9_5.x86_64.rpm '7rtla-5.14.0-503.16.1.el9_5.x86_64.rpm7kernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm#7kernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm&7kernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm%7perf-5.14.0-503.16.1.el9_5.x86_64.rpm"7kernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm!7kernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm$7kernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm)7rv-5.14.0-503.16.1.el9_5.x86_64.rpm0z 6MBUBBBBBBBB[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security update$https://access.redhat.com/errata/RHSA-2024:10949RHSA-2024:10949RHSA-2024:10949 https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10949.htmlALSA-2024:10949ALSA-2024:10949 )+(iEphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmgEphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmEphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmhEphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmcEphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmdEphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm2*apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmbEphp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm_Ephp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmVEphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmSEphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmZEphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm[Ephp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmjEphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm*php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm sphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm Ophp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmTEphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmaEphp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmWEphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm\Ephp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm]Ephp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmXEphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmfEphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm`Ephp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm*php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmeEphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmYEphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmUEphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm^Ephp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm)+(iEphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmgEphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmEphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmhEphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmcEphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmdEphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm2*apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmbEphp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm_Ephp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmVEphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmSEphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmZEphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm[Ephp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmjEphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm*php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm sphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm Ophp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmTEphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmaEphp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmWEphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm\Ephp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm]Ephp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmXEphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmfEphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm`Ephp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm*php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmeEphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmYEphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmUEphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm^Ephp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmS{ )|BBBBBBBBJBjBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update=https://access.redhat.com/errata/RHSA-2024:10950RHSA-2024:10950RHSA-2024:10950 https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10950.htmlALSA-2024:10950ALSA-2024:10950 i(SCphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`Cphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmdCphp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmjCphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm^Cphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmbCphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmYCphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmZCphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmXCphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmiCphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm\Cphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmVCphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmgCphp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm[Cphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmeCphp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmUCphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmfCphp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmCphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmWCphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmTCphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm_Cphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmaCphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm]Cphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmcCphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmhCphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmi(SCphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`Cphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmdCphp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmjCphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm^Cphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmbCphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmYCphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmZCphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmXCphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmiCphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm\Cphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmVCphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmgCphp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm[Cphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmeCphp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmUCphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmfCphp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmCphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmWCphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmTCphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm_Cphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmaCphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm]Cphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmcCphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmhCphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`| 4jBBBBBBBBsecurityImportant: python3.12 security updateV-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978 https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978 Vpython3.12-devel-3.12.5-2.el9_5.2.i686.rpm#Vpython3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm"Vpython3.12-3.12.5-2.el9_5.2.x86_64.rpmVpython3.12-libs-3.12.5-2.el9_5.2.x86_64.rpmVpython3.12-devel-3.12.5-2.el9_5.2.x86_64.rpmVpython3.12-libs-3.12.5-2.el9_5.2.i686.rpmVpython3.12-devel-3.12.5-2.el9_5.2.i686.rpm#Vpython3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm"Vpython3.12-3.12.5-2.el9_5.2.x86_64.rpmVpython3.12-libs-3.12.5-2.el9_5.2.x86_64.rpmVpython3.12-devel-3.12.5-2.el9_5.2.x86_64.rpmVpython3.12-libs-3.12.5-2.el9_5.2.i686.rpm} ;uBBBBsecurityModerate: python3.9:3.9.21 security updatehttps://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983 =0python3-tkinter-3.9.21-1.el9_5.x86_64.rpmW0python3-devel-3.9.21-1.el9_5.x86_64.rpmj0python-unversioned-command-3.9.21-1.el9_5.noarch.rpmW0python3-devel-3.9.21-1.el9_5.i686.rpm=0python3-tkinter-3.9.21-1.el9_5.x86_64.rpmW0python3-devel-3.9.21-1.el9_5.x86_64.rpmj0python-unversioned-command-3.9.21-1.el9_5.noarch.rpmW0python3-devel-3.9.21-1.el9_5.i686.rpmH~ |BBBBBBBBsecurityModerate: python3.11 security update!Mhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111 https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111 bNpython3.11-devel-3.11.9-7.el9_5.2.i686.rpmbNpython3.11-devel-3.11.9-7.el9_5.2.x86_64.rpmkNpython3.11-3.11.9-7.el9_5.2.x86_64.rpmcNpython3.11-libs-3.11.9-7.el9_5.2.i686.rpmcNpython3.11-libs-3.11.9-7.el9_5.2.x86_64.rpmlNpython3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpmbNpython3.11-devel-3.11.9-7.el9_5.2.i686.rpmbNpython3.11-devel-3.11.9-7.el9_5.2.x86_64.rpmkNpython3.11-3.11.9-7.el9_5.2.x86_64.rpmcNpython3.11-libs-3.11.9-7.el9_5.2.i686.rpmcNpython3.11-libs-3.11.9-7.el9_5.2.x86_64.rpmlNpython3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm| GBBBBsecurityImportant: gstreamer1-plugins-good security updaten' https://access.redhat.com/errata/RHSA-2024:11122RHSA-2024:11122RHSA-2024:11122 https://access.redhat.com/security/cve/CVE-2024-47537CVE-2024-47537CVE-2024-47537https://access.redhat.com/security/cve/CVE-2024-47539CVE-2024-47539CVE-2024-47539https://access.redhat.com/security/cve/CVE-2024-47540CVE-2024-47540CVE-2024-47540https://access.redhat.com/security/cve/CVE-2024-47606CVE-2024-47606CVE-2024-47606https://access.redhat.com/security/cve/CVE-2024-47613CVE-2024-47613CVE-2024-47613https://bugzilla.redhat.com/23317192331719https://bugzilla.redhat.com/23317222331722https://bugzilla.redhat.com/23317262331726https://bugzilla.redhat.com/23317532331753https://bugzilla.redhat.com/23317602331760https://errata.almalinux.org/9/ALSA-2024-11122.htmlALSA-2024:11122ALSA-2024:11122 _qgstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm_qgstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm`qgstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm`qgstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpm_qgstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm_qgstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm`qgstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm`qgstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpmr NBBBBBBsecurityImportant: gstreamer1-plugins-base security updateBhttps://access.redhat.com/errata/RHSA-2024:11123RHSA-2024:11123RHSA-2024:11123 https://access.redhat.com/security/cve/CVE-2024-47538CVE-2024-47538CVE-2024-47538https://access.redhat.com/security/cve/CVE-2024-47607CVE-2024-47607CVE-2024-47607https://access.redhat.com/security/cve/CVE-2024-47615CVE-2024-47615CVE-2024-47615https://bugzilla.redhat.com/23317272331727https://bugzilla.redhat.com/23317402331740https://bugzilla.redhat.com/23317542331754https://errata.almalinux.org/9/ALSA-2024-11123.htmlALSA-2024:11123ALSA-2024:11123 cqgstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpmbqgstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpmqgstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpmbqgstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpmcqgstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpmcqgstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpmbqgstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpmqgstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpmbqgstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpmcqgstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm- WsecurityModerate: edk2:20240524 security updateWBhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219 https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219 edk2-ovmf-20240524-6.el9_5.3.noarch.rpm:edk2-aarch64-20240524-6.el9_5.3.noarch.rpmedk2-ovmf-20240524-6.el9_5.3.noarch.rpm:edk2-aarch64-20240524-6.el9_5.3.noarch.rpmT securityModerate: python3.11-urllib3 security update9https://access.redhat.com/errata/RHSA-2024:11238RHSA-2024:11238RHSA-2024:11238 https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-11238.htmlALSA-2024:11238ALSA-2024:11238 Szpython3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpmSzpython3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm` #\BBBBBsecurityModerate: mpg123:1.32.9 security updateRqhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242 https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242 `Cmpg123-libs-1.32.9-1.el9_5.x86_64.rpmKCmpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpmJCmpg123-1.32.9-1.el9_5.x86_64.rpm`Cmpg123-libs-1.32.9-1.el9_5.i686.rpm`Cmpg123-libs-1.32.9-1.el9_5.x86_64.rpmKCmpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpmJCmpg123-1.32.9-1.el9_5.x86_64.rpm`Cmpg123-libs-1.32.9-1.el9_5.i686.rpm )dBBBsecurityModerate: pam security updateC?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250 https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:11250 4dpam-devel-1.5.1-21.el9_5.x86_64.rpm4dpam-devel-1.5.1-21.el9_5.i686.rpmMdpam-docs-1.5.1-21.el9_5.x86_64.rpm4dpam-devel-1.5.1-21.el9_5.x86_64.rpm4dpam-devel-1.5.1-21.el9_5.i686.rpmMdpam-docs-1.5.1-21.el9_5.x86_64.rpm -jBsecurityModerate: curl security update@https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129 https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129 libcurl-devel-7.76.1-26.el9_3.3.i686.rpmlibcurl-devel-7.76.1-26.el9_3.3.x86_64.rpmlibcurl-devel-7.76.1-26.el9_3.3.i686.rpmlibcurl-devel-7.76.1-26.el9_3.3.x86_64.rpm6 2nBBsecurityModerate: openssh security updateB0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130 https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130 0openssh-askpass-8.7p1-34.el9_3.3.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpm0openssh-askpass-8.7p1-34.el9_3.3.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpmR =sBBBBBBBBsecurityModerate: golang security updaterPhttps://access.redhat.com/errata/RHSA-2024:1131RHSA-2024:1131RHSA-2024:1131 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45285CVE-2023-45285CVE-2023-45285https://bugzilla.redhat.com/22533232253323https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1131.htmlALSA-2024:1131ALSA-2024:1131 pgolang-misc-1.20.12-1.el9_3.noarch.rpmpgolang-docs-1.20.12-1.el9_3.noarch.rpmpgolang-src-1.20.12-1.el9_3.noarch.rpmpgolang-tests-1.20.12-1.el9_3.noarch.rpmppgo-toolset-1.20.12-1.el9_3.x86_64.rpm@pgolang-bin-1.20.12-1.el9_3.x86_64.rpm?pgolang-1.20.12-1.el9_3.x86_64.rpmpgolang-misc-1.20.12-1.el9_3.noarch.rpmpgolang-docs-1.20.12-1.el9_3.noarch.rpmpgolang-src-1.20.12-1.el9_3.noarch.rpmpgolang-tests-1.20.12-1.el9_3.noarch.rpmppgo-toolset-1.20.12-1.el9_3.x86_64.rpm@pgolang-bin-1.20.12-1.el9_3.x86_64.rpm?pgolang-1.20.12-1.el9_3.x86_64.rpm/ ~BBBBBBsecurityImportant: tomcat security updateBhttps://access.redhat.com/errata/RHSA-2024:1134RHSA-2024:1134RHSA-2024:1134 https://access.redhat.com/security/cve/CVE-2023-46589CVE-2023-46589CVE-2023-46589https://bugzilla.redhat.com/22520502252050https://errata.almalinux.org/9/ALSA-2024-1134.htmlALSA-2024:1134ALSA-2024:1134 B|tomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpm=|tomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpm>|tomcat-docs-webapp-9.0.62-37.el9_3.2.noarch.rpmC|tomcat-webapps-9.0.62-37.el9_3.2.noarch.rpm@|tomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpmA|tomcat-lib-9.0.62-37.el9_3.2.noarch.rpm?|tomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpm<|tomcat-9.0.62-37.el9_3.2.noarch.rpmB|tomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpm=|tomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpm>|tomcat-docs-webapp-9.0.62-37.el9_3.2.noarch.rpmC|tomcat-webapps-9.0.62-37.el9_3.2.noarch.rpm@|tomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpmA|tomcat-lib-9.0.62-37.el9_3.2.noarch.rpm?|tomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpm<|tomcat-9.0.62-37.el9_3.2.noarch.rpma  GBBBBBBBBBBBsecurityLow: keylime security update/Ghttps://access.redhat.com/errata/RHSA-2024:1139RHSA-2024:1139RHSA-2024:1139 https://access.redhat.com/security/cve/CVE-2023-3674CVE-2023-3674CVE-2023-3674https://bugzilla.redhat.com/22229032222903https://errata.almalinux.org/9/ALSA-2024-1139.htmlALSA-2024:1139ALSA-2024:1139 >keylime-registrar-7.3.0-13.el9_3.x86_64.rpm@keylime-verifier-7.3.0-13.el9_3.x86_64.rpmQpython3-keylime-7.3.0-13.el9_3.x86_64.rpm<keylime-7.3.0-13.el9_3.x86_64.rpm=keylime-base-7.3.0-13.el9_3.x86_64.rpmdkeylime-selinux-7.3.0-13.el9_3.noarch.rpm?keylime-tenant-7.3.0-13.el9_3.x86_64.rpm>keylime-registrar-7.3.0-13.el9_3.x86_64.rpm@keylime-verifier-7.3.0-13.el9_3.x86_64.rpmQpython3-keylime-7.3.0-13.el9_3.x86_64.rpm<keylime-7.3.0-13.el9_3.x86_64.rpm=keylime-base-7.3.0-13.el9_3.x86_64.rpmdkeylime-selinux-7.3.0-13.el9_3.noarch.rpm?keylime-tenant-7.3.0-13.el9_3.x86_64.rpm*  UBBBBBBsecurityModerate: mysql security update`thttps://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141 https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141 0mysql-errmsg-8.0.36-1.el9_3.x86_64.rpmmysql-8.0.36-1.el9_3.x86_64.rpmNmysql-server-8.0.36-1.el9_3.x86_64.rpm/mysql-common-8.0.36-1.el9_3.x86_64.rpm0mysql-errmsg-8.0.36-1.el9_3.x86_64.rpmmysql-8.0.36-1.el9_3.x86_64.rpmNmysql-server-8.0.36-1.el9_3.x86_64.rpm/mysql-common-8.0.36-1.el9_3.x86_64.rpmy  ^securityModerate: haproxy security updateT https://access.redhat.com/errata/RHSA-2024:1142RHSA-2024:1142RHSA-2024:1142 https://access.redhat.com/security/cve/CVE-2023-40225CVE-2023-40225CVE-2023-40225https://access.redhat.com/security/cve/CVE-2023-45539CVE-2023-45539CVE-2023-45539https://bugzilla.redhat.com/22313702231370https://bugzilla.redhat.com/22530372253037https://errata.almalinux.org/9/ALSA-2024-1142.htmlALSA-2024:1142ALSA-2024:1142 R.haproxy-2.4.22-3.el9_3.x86_64.rpmR.haproxy-2.4.22-3.el9_3.x86_64.rpme  #asecurityModerate: rear security update]|https://access.redhat.com/errata/RHSA-2024:1147RHSA-2024:1147RHSA-2024:1147 https://access.redhat.com/security/cve/CVE-2024-23301CVE-2024-23301CVE-2024-23301https://bugzilla.redhat.com/22583962258396https://errata.almalinux.org/9/ALSA-2024-1147.htmlALSA-2024:1147ALSA-2024:1147  4rear-2.6-21.el9_3.alma.x86_64.rpm 4rear-2.6-21.el9_3.alma.x86_64.rpm   5dBBBBBBBBBBBBBBBsecurityModerate: kernel security updateYc$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486 %8perf-5.14.0-503.19.1.el9_5.x86_64.rpm8kernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm)8rv-5.14.0-503.19.1.el9_5.x86_64.rpm#8kernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$8kernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm'8rtla-5.14.0-503.19.1.el9_5.x86_64.rpm!8kernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm"8kernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm&8kernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpm %8perf-5.14.0-503.19.1.el9_5.x86_64.rpm8kernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm)8rv-5.14.0-503.19.1.el9_5.x86_64.rpm#8kernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$8kernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm'8rtla-5.14.0-503.19.1.el9_5.x86_64.rpm!8kernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm"8kernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm&8kernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpmi :vBBsecurityModerate: skopeo security update<\https://access.redhat.com/errata/RHSA-2024:1149RHSA-2024:1149RHSA-2024:1149 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1149.htmlALSA-2024:1149ALSA-2024:1149 ;4skopeo-tests-1.13.3-4.el9_3.x86_64.rpm:4skopeo-1.13.3-4.el9_3.x86_64.rpm;4skopeo-tests-1.13.3-4.el9_3.x86_64.rpm:4skopeo-1.13.3-4.el9_3.x86_64.rpm  ?{BBsecurityModerate: buildah security updateyhttps://access.redhat.com/errata/RHSA-2024:1150RHSA-2024:1150RHSA-2024:1150 https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://bugzilla.redhat.com/22542102254210https://errata.almalinux.org/9/ALSA-2024-1150.htmlALSA-2024:1150ALSA-2024:1150 7buildah-1.31.4-1.el9_3.x86_64.rpm8buildah-tests-1.31.4-1.el9_3.x86_64.rpm7buildah-1.31.4-1.el9_3.x86_64.rpm8buildah-tests-1.31.4-1.el9_3.x86_64.rpm0 @BBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updateFhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309 Ifdotnet-templates-7.0-7.0.117-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpmEfdotnet-sdk-7.0-7.0.117-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.17-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.17-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.17-1.el9_3.x86_64.rpmIfdotnet-templates-7.0-7.0.117-1.el9_3.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpmEfdotnet-sdk-7.0-7.0.117-1.el9_3.x86_64.rpmCdotnet-runtime-7.0-7.0.17-1.el9_3.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpmAdotnet-hostfxr-7.0-7.0.17-1.el9_3.x86_64.rpm;aspnetcore-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.17-1.el9_3.x86_64.rpm˥u +QBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security updateWEhttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310 @dotnet-apphost-pack-8.0-8.0.3-2.el9_3.x86_64.rpm<aspnetcore-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmJxdotnet-templates-8.0-8.0.103-2.el9_3.x86_64.rpmDdotnet-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmxnetstandard-targeting-pack-2.1-8.0.103-2.el9_3.x86_64.rpmBdotnet-hostfxr-8.0-8.0.3-2.el9_3.x86_64.rpmdotnet-host-8.0.3-2.el9_3.x86_64.rpmFxdotnet-sdk-8.0-8.0.103-2.el9_3.x86_64.rpm-xdotnet-sdk-dbg-8.0-8.0.103-2.el9_3.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm @dotnet-apphost-pack-8.0-8.0.3-2.el9_3.x86_64.rpm<aspnetcore-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmJxdotnet-templates-8.0-8.0.103-2.el9_3.x86_64.rpmDdotnet-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmxnetstandard-targeting-pack-2.1-8.0.103-2.el9_3.x86_64.rpmBdotnet-hostfxr-8.0-8.0.3-2.el9_3.x86_64.rpmdotnet-host-8.0.3-2.el9_3.x86_64.rpmFxdotnet-sdk-8.0-8.0.103-2.el9_3.x86_64.rpm-xdotnet-sdk-dbg-8.0-8.0.103-2.el9_3.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpmi 0lBBsecurityImportant: dnsmasq security update https://access.redhat.com/errata/RHSA-2024:1334RHSA-2024:1334RHSA-2024:1334 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1334.htmlALSA-2024:1334ALSA-2024:1334 u.dnsmasq-2.85-14.el9_3.1.x86_64.rpmv.dnsmasq-utils-2.85-14.el9_3.1.x86_64.rpmu.dnsmasq-2.85-14.el9_3.1.x86_64.rpmv.dnsmasq-utils-2.85-14.el9_3.1.x86_64.rpmW 3qsecurityImportant: squid security update<https://access.redhat.com/errata/RHSA-2024:1376RHSA-2024:1376RHSA-2024:1376 https://access.redhat.com/security/cve/CVE-2023-50269CVE-2023-50269CVE-2023-50269https://access.redhat.com/security/cve/CVE-2024-25111CVE-2024-25111CVE-2024-25111https://access.redhat.com/security/cve/CVE-2024-25617CVE-2024-25617CVE-2024-25617https://bugzilla.redhat.com/22546632254663https://bugzilla.redhat.com/22643092264309https://bugzilla.redhat.com/22683662268366https://errata.almalinux.org/9/ALSA-2024-1376.htmlALSA-2024:1376ALSA-2024:1376  squid-5.5-6.el9_3.8.x86_64.rpm squid-5.5-6.el9_3.8.x86_64.rpm .tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libreoffice security updateJhttps://access.redhat.com/errata/RHSA-2024:1427RHSA-2024:1427RHSA-2024:1427 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-1427.htmlALSA-2024:1427ALSA-2024:1427 1slibreoffice-help-hi-7.1.8.1-12.el9_3.alma.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-12.el9_3.alma.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm,autocorr-nl-7.1.8.1-12.el9_3.alma.noarch.rpmwlibreoffice-help-it-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-12.el9_3.alma.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm6autocorr-vi-7.1.8.1-12.el9_3.alma.noarch.rpmvlibreoffice-help-id-7.1.8.1-12.el9_3.alma.x86_64.rpm2autocorr-sl-7.1.8.1-12.el9_3.alma.noarch.rpm,libreoffice-langpack-it-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-bg-7.1.8.1-12.el9_3.alma.noarch.rpmIlibreoffice-langpack-ta-7.1.8.1-12.el9_3.alma.x86_64.rpmYlibreoffice-core-7.1.8.1-12.el9_3.alma.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmrlibreoffice-help-he-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-af-7.1.8.1-12.el9_3.alma.noarch.rpmYlibreoffice-ure-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm{libreoffice-help-lv-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-da-7.1.8.1-12.el9_3.alma.noarch.rpm/libreoffice-langpack-kn-7.1.8.1-12.el9_3.alma.x86_64.rpm4autocorr-sv-7.1.8.1-12.el9_3.alma.noarch.rpmMlibreoffice-langpack-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm5autocorr-tr-7.1.8.1-12.el9_3.alma.noarch.rpmQlibreoffice-langpack-xh-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-uk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-12.el9_3.alma.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpmllibreoffice-help-et-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-es-7.1.8.1-12.el9_3.alma.noarch.rpmglibreoffice-help-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmflibreoffice-help-de-7.1.8.1-12.el9_3.alma.x86_64.rpm)autocorr-lb-7.1.8.1-12.el9_3.alma.noarch.rpm}libreoffice-help-nl-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-dsb-7.1.8.1-12.el9_3.alma.noarch.rpmAlibreoffice-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-12.el9_3.alma.x86_64.rpmZlibreoffice-draw-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm*autocorr-lt-7.1.8.1-12.el9_3.alma.noarch.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-help-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_3.alma.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-12.el9_3.alma.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-12.el9_3.alma.x86_64.rpmulibreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm~libreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpmWlibreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm(autocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm\libreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpm-autocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpm8autocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpm+autocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpm&libreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmHlibreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm autocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpm+libreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpm|libreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpm3autocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpm"autocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpm)libreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpm[libreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpm0autocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpm.libreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpmclibreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm"libreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpm libreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpm[libreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpmilibreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm]libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpmplibreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpmklibreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm&autocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm5libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpmXlibreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpmjlibreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpmalibreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm7autocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm'autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmylibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpmFlibreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpmelibreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpm%autocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpmblibreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm`libreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm/autocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpmolibreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmUlibreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpm.autocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpm7libreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm#autocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpm!autocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpmDlibreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm$autocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpmWlibreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm*libreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm_libreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpm1autocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpm\libreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpmPlibreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpm0libreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm1slibreoffice-help-hi-7.1.8.1-12.el9_3.alma.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-12.el9_3.alma.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm,autocorr-nl-7.1.8.1-12.el9_3.alma.noarch.rpmwlibreoffice-help-it-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-12.el9_3.alma.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm6autocorr-vi-7.1.8.1-12.el9_3.alma.noarch.rpmvlibreoffice-help-id-7.1.8.1-12.el9_3.alma.x86_64.rpm2autocorr-sl-7.1.8.1-12.el9_3.alma.noarch.rpm,libreoffice-langpack-it-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-bg-7.1.8.1-12.el9_3.alma.noarch.rpmIlibreoffice-langpack-ta-7.1.8.1-12.el9_3.alma.x86_64.rpmYlibreoffice-core-7.1.8.1-12.el9_3.alma.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmrlibreoffice-help-he-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-af-7.1.8.1-12.el9_3.alma.noarch.rpmYlibreoffice-ure-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm{libreoffice-help-lv-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-da-7.1.8.1-12.el9_3.alma.noarch.rpm/libreoffice-langpack-kn-7.1.8.1-12.el9_3.alma.x86_64.rpm4autocorr-sv-7.1.8.1-12.el9_3.alma.noarch.rpmMlibreoffice-langpack-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm5autocorr-tr-7.1.8.1-12.el9_3.alma.noarch.rpmQlibreoffice-langpack-xh-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-uk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-12.el9_3.alma.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpmllibreoffice-help-et-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-es-7.1.8.1-12.el9_3.alma.noarch.rpmglibreoffice-help-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmflibreoffice-help-de-7.1.8.1-12.el9_3.alma.x86_64.rpm)autocorr-lb-7.1.8.1-12.el9_3.alma.noarch.rpm}libreoffice-help-nl-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-dsb-7.1.8.1-12.el9_3.alma.noarch.rpmAlibreoffice-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-12.el9_3.alma.x86_64.rpmZlibreoffice-draw-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm*autocorr-lt-7.1.8.1-12.el9_3.alma.noarch.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-help-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_3.alma.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-12.el9_3.alma.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-12.el9_3.alma.x86_64.rpmulibreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm~libreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpmWlibreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm(autocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm\libreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpm-autocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpm8autocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpm+autocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpm&libreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmHlibreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm autocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpm+libreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpm|libreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpm3autocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpm"autocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpm)libreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpm[libreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpm0autocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpm.libreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpmclibreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm"libreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpm libreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpm[libreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpmilibreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm]libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpmplibreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpmklibreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm&autocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm5libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpmXlibreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpmjlibreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpmalibreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm7autocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm'autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmylibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpmFlibreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpmelibreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpm%autocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpmblibreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm`libreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm/autocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpmolibreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmUlibreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpm.autocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpm7libreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm#autocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpm!autocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpmDlibreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm$autocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpmWlibreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpm*libreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm_libreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpm1autocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpm\libreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpmPlibreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpm0libreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm^ 0/securityImportant: postgresql-jdbc security update]ohttps://access.redhat.com/errata/RHSA-2024:1436RHSA-2024:1436RHSA-2024:1436 https://access.redhat.com/security/cve/CVE-2024-1597CVE-2024-1597CVE-2024-1597https://bugzilla.redhat.com/22665232266523https://errata.almalinux.org/9/ALSA-2024-1436.htmlALSA-2024:1436ALSA-2024:1436 c\postgresql-jdbc-42.2.28-1.el9_3.noarch.rpmc\postgresql-jdbc-42.2.28-1.el9_3.noarch.rpmg ;qBBBBBBBBsecurityImportant: nodejs security updateLHhttps://access.redhat.com/errata/RHSA-2024:1438RHSA-2024:1438RHSA-2024:1438 https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645742264574https://errata.almalinux.org/9/ALSA-2024-1438.htmlALSA-2024:1438ALSA-2024:1438 anpm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm5nodejs-16.20.2-4.el9_3.x86_64.rpm nodejs-libs-16.20.2-4.el9_3.i686.rpmenodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpmLnodejs-docs-16.20.2-4.el9_3.noarch.rpm nodejs-libs-16.20.2-4.el9_3.x86_64.rpmanpm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm5nodejs-16.20.2-4.el9_3.x86_64.rpm nodejs-libs-16.20.2-4.el9_3.i686.rpmenodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpmLnodejs-docs-16.20.2-4.el9_3.noarch.rpm nodejs-libs-16.20.2-4.el9_3.x86_64.rpm  |BBBBBBBBsecurityImportant: golang security updateBhttps://access.redhat.com/errata/RHSA-2024:1462RHSA-2024:1462RHSA-2024:1462 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1462.htmlALSA-2024:1462ALSA-2024:1462 qgolang-tests-1.20.12-2.el9_3.noarch.rpm?qgolang-1.20.12-2.el9_3.x86_64.rpm@qgolang-bin-1.20.12-2.el9_3.x86_64.rpmpqgo-toolset-1.20.12-2.el9_3.x86_64.rpmqgolang-misc-1.20.12-2.el9_3.noarch.rpmqgolang-docs-1.20.12-2.el9_3.noarch.rpmqgolang-src-1.20.12-2.el9_3.noarch.rpmqgolang-tests-1.20.12-2.el9_3.noarch.rpm?qgolang-1.20.12-2.el9_3.x86_64.rpm@qgolang-bin-1.20.12-2.el9_3.x86_64.rpmpqgo-toolset-1.20.12-2.el9_3.x86_64.rpmqgolang-misc-1.20.12-2.el9_3.noarch.rpmqgolang-docs-1.20.12-2.el9_3.noarch.rpmqgolang-src-1.20.12-2.el9_3.noarch.rpm& GBBsecurityCritical: firefox security update VChttps://access.redhat.com/errata/RHSA-2024:1485RHSA-2024:1485RHSA-2024:1485 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://access.redhat.com/security/cve/CVE-2024-2616CVE-2024-2616CVE-2024-2616https://access.redhat.com/security/cve/CVE-2024-29944CVE-2024-29944CVE-2024-29944https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706622270662https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://bugzilla.redhat.com/22710642271064https://errata.almalinux.org/9/ALSA-2024-1485.htmlALSA-2024:1485ALSA-2024:1485 O firefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm9 firefox-115.9.1-1.el9_3.alma.1.x86_64.rpmO firefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm9 firefox-115.9.1-1.el9_3.alma.1.x86_64.rpm LsecurityModerate: thunderbird security updateKhttps://access.redhat.com/errata/RHSA-2024:1493RHSA-2024:1493RHSA-2024:1493 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-1936CVE-2024-1936CVE-2024-1936https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22681712268171https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://errata.almalinux.org/9/ALSA-2024-1493.htmlALSA-2024:1493ALSA-2024:1493 :cthunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm:cthunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm٨? OsecurityImportant: grafana security updatednhttps://access.redhat.com/errata/RHSA-2024:1501RHSA-2024:1501RHSA-2024:1501 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1501.htmlALSA-2024:1501ALSA-2024:1501 q*grafana-9.2.10-8.el9_3.alma.1.x86_64.rpmq*grafana-9.2.10-8.el9_3.alma.1.x86_64.rpm9 RsecurityImportant: grafana-pcp security updateR:https://access.redhat.com/errata/RHSA-2024:1502RHSA-2024:1502RHSA-2024:1502 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1502.htmlALSA-2024:1502ALSA-2024:1502 grafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpmgrafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpm$ _BFqBBBBBBBsecurityImportant: nodejs:18 security update https://access.redhat.com/errata/RHSA-2024:1503RHSA-2024:1503RHSA-2024:1503 https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://errata.almalinux.org/9/ALSA-2024-1503.htmlALSA-2024:1503ALSA-2024:1503 57("Nnodejs-devel-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm5Nnodejs-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpmLNnodejs-docs-18.19.1-1.module_el9.3.0+59+28b95644.noarch.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeNnodejs-full-i18n-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmanpm-10.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644.x86_64.rpm57("Nnodejs-devel-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm5Nnodejs-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpmLNnodejs-docs-18.19.1-1.module_el9.3.0+59+28b95644.noarch.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmeNnodejs-full-i18n-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmanpm-10.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644.x86_64.rpm  "_BsecurityModerate: expat security update+Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530 https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530 uMexpat-devel-2.5.0-1.el9_3.1.i686.rpmuMexpat-devel-2.5.0-1.el9_3.1.x86_64.rpmuMexpat-devel-2.5.0-1.el9_3.1.i686.rpmuMexpat-devel-2.5.0-1.el9_3.1.x86_64.rpm GBBBBBXBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement updatem https://access.redhat.com/errata/RHSA-2024:1576RHSA-2024:1576RHSA-2024:1576 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2023-36617CVE-2023-36617CVE-2023-36617https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22186142218614https://errata.almalinux.org/9/ALSA-2024-1576.htmlALSA-2024:1576ALSA-2024:1576 ($trubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm#rubygem-irb-1.4.1-143.module_el9.3.0+60+5ebc989a.noarch.rpm!Nruby-default-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpm"/rubygem-bundler-2.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm- rubygems-devel-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmvNruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmwNruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm+Trubygem-typeprof-0.21.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmgrubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpm(Grubygem-rexml-3.2.5-143.module_el9.3.0+60+5ebc989a.noarch.rpm'jrubygem-rdoc-6.4.0-143.module_el9.3.0+60+5ebc989a.noarch.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm*Srubygem-test-unit-3.5.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmeNruby-doc-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpmSrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.i686.rpm, rubygems-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmeNruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm%rubygem-power_assert-2.0.1-143.module_el9.3.0+60+5ebc989a.noarch.rpmtrubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.i686.rpmSrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpmwNruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmvNruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeNruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmmUrubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.i686.rpm$`rubygem-minitest-5.15.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm&rubygem-rake-13.0.6-143.module_el9.3.0+60+5ebc989a.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmNruby-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm)Nrubygem-rss-0.2.9-143.module_el9.3.0+60+5ebc989a.noarch.rpmgrubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.i686.rpmNruby-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.i686.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpmmUrubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.x86_64.rpm($trubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm#rubygem-irb-1.4.1-143.module_el9.3.0+60+5ebc989a.noarch.rpm!Nruby-default-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpm"/rubygem-bundler-2.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm- rubygems-devel-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmvNruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmwNruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm+Trubygem-typeprof-0.21.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmgrubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpm(Grubygem-rexml-3.2.5-143.module_el9.3.0+60+5ebc989a.noarch.rpm'jrubygem-rdoc-6.4.0-143.module_el9.3.0+60+5ebc989a.noarch.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm*Srubygem-test-unit-3.5.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmeNruby-doc-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpmSrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.i686.rpm, rubygems-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmeNruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpm%rubygem-power_assert-2.0.1-143.module_el9.3.0+60+5ebc989a.noarch.rpmtrubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.i686.rpmSrubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpmwNruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmvNruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeNruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmmUrubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.i686.rpm$`rubygem-minitest-5.15.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm&rubygem-rake-13.0.6-143.module_el9.3.0+60+5ebc989a.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmNruby-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm)Nrubygem-rss-0.2.9-143.module_el9.3.0+60+5ebc989a.noarch.rpmgrubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.i686.rpmNruby-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.i686.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpmmUrubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.x86_64.rpmL kcBBBBBBBBBsecurityImportant: nodejs:20 security updateqUhttps://access.redhat.com/errata/RHSA-2024:1688RHSA-2024:1688RHSA-2024:1688 https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21890CVE-2024-21890CVE-2024-21890https://access.redhat.com/security/cve/CVE-2024-21891CVE-2024-21891CVE-2024-21891https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-21896CVE-2024-21896CVE-2024-21896https://access.redhat.com/security/cve/CVE-2024-22017CVE-2024-22017CVE-2024-22017https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://bugzilla.redhat.com/22657172265717https://bugzilla.redhat.com/22657202265720https://bugzilla.redhat.com/22657222265722https://bugzilla.redhat.com/22657272265727https://errata.almalinux.org/9/ALSA-2024-1688.htmlALSA-2024:1688ALSA-2024:1688 5(LRnodejs-docs-20.11.1-1.module_el9.3.0+88+29afeaa2.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpm5Rnodejs-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm"Rnodejs-devel-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm{enodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmeRnodejs-full-i18n-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpmanpm-10.2.4-1.20.11.1.1.module_el9.3.0+88+29afeaa2.x86_64.rpm5(LRnodejs-docs-20.11.1-1.module_el9.3.0+88+29afeaa2.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpm5Rnodejs-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm"Rnodejs-devel-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm{enodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmeRnodejs-full-i18n-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpmanpm-10.2.4-1.20.11.1.1.module_el9.3.0+88+29afeaa2.x86_64.rpmիv  YBBBsecurityImportant: varnish security updateFthttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691 https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691 vvarnish-6.6.2-4.el9_3.1.i686.rpmvvarnish-6.6.2-4.el9_3.1.x86_64.rpm?varnish-docs-6.6.2-4.el9_3.1.x86_64.rpmvvarnish-6.6.2-4.el9_3.1.i686.rpmvvarnish-6.6.2-4.el9_3.1.x86_64.rpm?varnish-docs-6.6.2-4.el9_3.1.x86_64.rpm>! &_BBBBBsecurityImportant: unbound security update:6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750 https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750 5Aunbound-libs-1.16.2-3.el9_3.5.x86_64.rpmRApython3-unbound-1.16.2-3.el9_3.5.x86_64.rpmUAunbound-1.16.2-3.el9_3.5.x86_64.rpm5Aunbound-libs-1.16.2-3.el9_3.5.i686.rpm5Aunbound-libs-1.16.2-3.el9_3.5.x86_64.rpmRApython3-unbound-1.16.2-3.el9_3.5.x86_64.rpmUAunbound-1.16.2-3.el9_3.5.x86_64.rpm5Aunbound-libs-1.16.2-3.el9_3.5.i686.rpmH" 6gBBBBBBBBBBBBBsecurityImportant: bind security updatepGhttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789 -Jbind-license-9.16.23-14.el9_3.4.noarch.rpm9Jpython3-bind-9.16.23-14.el9_3.4.noarch.rpm\Jbind-9.16.23-14.el9_3.4.x86_64.rpm^Jbind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpm,Jbind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpm]Jbind-chroot-9.16.23-14.el9_3.4.x86_64.rpmoZbind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpm`Jbind-utils-9.16.23-14.el9_3.4.x86_64.rpm_Jbind-libs-9.16.23-14.el9_3.4.x86_64.rpm -Jbind-license-9.16.23-14.el9_3.4.noarch.rpm9Jpython3-bind-9.16.23-14.el9_3.4.noarch.rpm\Jbind-9.16.23-14.el9_3.4.x86_64.rpm^Jbind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpm,Jbind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpm]Jbind-chroot-9.16.23-14.el9_3.4.x86_64.rpmoZbind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpm`Jbind-utils-9.16.23-14.el9_3.4.x86_64.rpm_Jbind-libs-9.16.23-14.el9_3.4.x86_64.rpm# wBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update7 https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818 <4java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm84java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm54java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm74java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm64java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm;4java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm44java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm<4java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm84java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm54java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm74java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm64java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm;4java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm44java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpmy$ DBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateVn https://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822 s~java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpmr~java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpmv~java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpmq~java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpmp~java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpmu~java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpmw~java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpmo~java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpmt~java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm s~java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpmr~java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpmv~java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpmq~java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpmp~java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpmu~java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpmw~java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpmo~java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpmt~java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpmO% )WBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateD$ https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825  java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm  java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm$&  IBBBBBBBsecurityModerate: podman security updateOthttps://access.redhat.com/errata/RHSA-2024:2193RHSA-2024:2193RHSA-2024:2193 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2193.htmlALSA-2024:2193ALSA-2024:2193 fGpodman-docker-4.9.4-0.1.el9.noarch.rpm%Gpodman-remote-4.9.4-0.1.el9.x86_64.rpm$Gpodman-plugins-4.9.4-0.1.el9.x86_64.rpm&Gpodman-tests-4.9.4-0.1.el9.x86_64.rpm#Gpodman-4.9.4-0.1.el9.x86_64.rpmfGpodman-docker-4.9.4-0.1.el9.noarch.rpm%Gpodman-remote-4.9.4-0.1.el9.x86_64.rpm$Gpodman-plugins-4.9.4-0.1.el9.x86_64.rpm&Gpodman-tests-4.9.4-0.1.el9.x86_64.rpm#Gpodman-4.9.4-0.1.el9.x86_64.rpm\? SBBBBBBBBBsecurityImportant: pmix security updateC:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199 https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199 k]pmix-devel-3.2.3-5.el9.x86_64.rpml]pmix-pmi-3.2.3-5.el9.i686.rpmj]pmix-3.2.3-5.el9.x86_64.rpml]pmix-pmi-3.2.3-5.el9.x86_64.rpmj]pmix-3.2.3-5.el9.i686.rpmp]pmix-tools-3.2.3-5.el9.x86_64.rpmk]pmix-devel-3.2.3-5.el9.i686.rpmk]pmix-devel-3.2.3-5.el9.x86_64.rpml]pmix-pmi-3.2.3-5.el9.i686.rpmj]pmix-3.2.3-5.el9.x86_64.rpml]pmix-pmi-3.2.3-5.el9.x86_64.rpmj]pmix-3.2.3-5.el9.i686.rpmp]pmix-tools-3.2.3-5.el9.x86_64.rpmk]pmix-devel-3.2.3-5.el9.i686.rpm@ '_BBBBBBsecurityModerate: libnbd security update}<https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204 https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204 <}libnbd-1.18.1-3.el9.x86_64.rpmz}python3-libnbd-1.18.1-3.el9.x86_64.rpms}nbdfuse-1.18.1-3.el9.x86_64.rpmf}libnbd-bash-completion-1.18.1-3.el9.noarch.rpm<}libnbd-1.18.1-3.el9.i686.rpm<}libnbd-1.18.1-3.el9.x86_64.rpmz}python3-libnbd-1.18.1-3.el9.x86_64.rpms}nbdfuse-1.18.1-3.el9.x86_64.rpmf}libnbd-bash-completion-1.18.1-3.el9.noarch.rpm<}libnbd-1.18.1-3.el9.i686.rpm6A 0hBBBBBBsecurityModerate: freerdp security update9ihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208 https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208 Pfreerdp-2.11.2-1.el9.x86_64.rpmblibwinpr-2.11.2-1.el9.i686.rpm\freerdp-libs-2.11.2-1.el9.x86_64.rpmblibwinpr-2.11.2-1.el9.x86_64.rpm\freerdp-libs-2.11.2-1.el9.i686.rpmPfreerdp-2.11.2-1.el9.x86_64.rpmblibwinpr-2.11.2-1.el9.i686.rpm\freerdp-libs-2.11.2-1.el9.x86_64.rpmblibwinpr-2.11.2-1.el9.x86_64.rpm\freerdp-libs-2.11.2-1.el9.i686.rpm2B 3qsecurityModerate: tcpdump security update"hhttps://access.redhat.com/errata/RHSA-2024:2211RHSA-2024:2211RHSA-2024:2211 https://access.redhat.com/security/cve/CVE-2021-41043CVE-2021-41043CVE-2021-41043https://bugzilla.redhat.com/20403922040392https://errata.almalinux.org/9/ALSA-2024-2211.htmlALSA-2024:2211ALSA-2024:2211 stcpdump-4.99.0-9.el9.x86_64.rpmstcpdump-4.99.0-9.el9.x86_64.rpmC tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: pcp security update Mhttps://access.redhat.com/errata/RHSA-2024:2213RHSA-2024:2213RHSA-2024:2213 https://access.redhat.com/security/cve/CVE-2023-6917CVE-2023-6917CVE-2023-6917https://bugzilla.redhat.com/22549832254983https://errata.almalinux.org/9/ALSA-2024-2213.htmlALSA-2024:2213ALSA-2024:2213 l2pcp-selinux-6.2.0-1.el9.x86_64.rpm}pcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpm/pcp-pmda-weblog-6.2.0-1.el9.x86_64.rpmpcp-pmda-podman-6.2.0-1.el9.x86_64.rpmlpcp-pmda-bind2-6.2.0-1.el9.x86_64.rpmpcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpm pcp-pmda-memcache-6.2.0-1.el9.x86_64.rpmwpcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpmtpcp-pmda-dm-6.2.0-1.el9.x86_64.rpmepcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpmfpcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpm&pcp-pmda-slurm-6.2.0-1.el9.x86_64.rpmpcp-pmda-mysql-6.2.0-1.el9.x86_64.rpmXpcp-conf-6.2.0-1.el9.x86_64.rpmfpcp-testsuite-6.2.0-1.el9.x86_64.rpmpcp-pmda-oracle-6.2.0-1.el9.x86_64.rpmpcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpm8perl-PCP-PMDA-6.2.0-1.el9.x86_64.rpm6perl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpmpcp-pmda-named-6.2.0-1.el9.x86_64.rpm0pcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpmpcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpmpcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpm{pcp-pmda-gluster-6.2.0-1.el9.x86_64.rpmcpcp-devel-6.2.0-1.el9.i686.rpmYpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpmZpcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpm4pcp-zeroconf-6.2.0-1.el9.x86_64.rpmopcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpm!pcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpmpcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm;python3-pcp-6.2.0-1.el9.x86_64.rpm"pcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpmpcp-pmda-json-6.2.0-1.el9.x86_64.rpm_pcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpmypcp-pmda-farm-6.2.0-1.el9.x86_64.rpmpcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpmapcp-geolocate-6.2.0-1.el9.x86_64.rpmqpcp-pmda-cisco-6.2.0-1.el9.x86_64.rpm*pcp-pmda-statsd-6.2.0-1.el9.x86_64.rpmcpcp-devel-6.2.0-1.el9.x86_64.rpmWpcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-redis-6.2.0-1.el9.x86_64.rpmpcp-pmda-nginx-6.2.0-1.el9.x86_64.rpmcpcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpm'pcp-pmda-smart-6.2.0-1.el9.x86_64.rpmNpcp-doc-6.2.0-1.el9.noarch.rpmpcp-pmda-pdns-6.2.0-1.el9.x86_64.rpm pcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpmepcp-libs-devel-6.2.0-1.el9.x86_64.rpm#pcp-pmda-samba-6.2.0-1.el9.x86_64.rpm|pcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpmpcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpm\pcp-export-pcp2json-6.2.0-1.el9.x86_64.rpmkpcp-pmda-bcc-6.2.0-1.el9.x86_64.rpm pcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpmepcp-libs-devel-6.2.0-1.el9.i686.rpmdpcp-libs-6.2.0-1.el9.x86_64.rpmpcp-pmda-lio-6.2.0-1.el9.x86_64.rpmpcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpm%pcp-pmda-shping-6.2.0-1.el9.x86_64.rpmdpcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpmmpcp-pmda-bonding-6.2.0-1.el9.x86_64.rpmpcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpm.pcp-pmda-unbound-6.2.0-1.el9.x86_64.rpm3pcp-system-tools-6.2.0-1.el9.x86_64.rpmpcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpm$pcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpmupcp-pmda-docker-6.2.0-1.el9.x86_64.rpm^pcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpm pcp-pmda-mounts-6.2.0-1.el9.x86_64.rpmspcp-pmda-denki-6.2.0-1.el9.x86_64.rpm pcp-pmda-mssql-6.2.0-1.el9.x86_64.rpm]pcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpmgpcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpmhpcp-pmda-activemq-6.2.0-1.el9.x86_64.rpm-pcp-pmda-trace-6.2.0-1.el9.x86_64.rpm,pcp-pmda-systemd-6.2.0-1.el9.x86_64.rpmipcp-pmda-apache-6.2.0-1.el9.x86_64.rpmpcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpm7perl-PCP-MMV-6.2.0-1.el9.x86_64.rpm(pcp-pmda-snmp-6.2.0-1.el9.x86_64.rpm`pcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpmjpcp-pmda-bash-6.2.0-1.el9.x86_64.rpmxpcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpmpcp-pmda-news-6.2.0-1.el9.x86_64.rpm+pcp-pmda-summary-6.2.0-1.el9.x86_64.rpmvpcp-pmda-ds389-6.2.0-1.el9.x86_64.rpm1pcp-pmda-zswap-6.2.0-1.el9.x86_64.rpmnpcp-pmda-bpf-6.2.0-1.el9.x86_64.rpm~pcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpmpcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpmbpcp-gui-6.2.0-1.el9.x86_64.rpmpcp-pmda-logger-6.2.0-1.el9.x86_64.rpmpcp-pmda-mailq-6.2.0-1.el9.x86_64.rpm)pcp-pmda-sockets-6.2.0-1.el9.x86_64.rpmrpcp-pmda-dbping-6.2.0-1.el9.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpmppcp-pmda-cifs-6.2.0-1.el9.x86_64.rpmfpcp-testsuite-6.2.0-1.el9.i686.rpmdpcp-libs-6.2.0-1.el9.i686.rpmpcp-pmda-postfix-6.2.0-1.el9.x86_64.rpmpcp-pmda-lustre-6.2.0-1.el9.x86_64.rpm pcp-pmda-mic-6.2.0-1.el9.x86_64.rpm[pcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpmpcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpm5perl-PCP-LogImport-6.2.0-1.el9.x86_64.rpmzpcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpml2pcp-selinux-6.2.0-1.el9.x86_64.rpm}pcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpm/pcp-pmda-weblog-6.2.0-1.el9.x86_64.rpmpcp-pmda-podman-6.2.0-1.el9.x86_64.rpmlpcp-pmda-bind2-6.2.0-1.el9.x86_64.rpmpcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpm pcp-pmda-memcache-6.2.0-1.el9.x86_64.rpmwpcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpmtpcp-pmda-dm-6.2.0-1.el9.x86_64.rpmepcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpmfpcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpm&pcp-pmda-slurm-6.2.0-1.el9.x86_64.rpmpcp-pmda-mysql-6.2.0-1.el9.x86_64.rpmXpcp-conf-6.2.0-1.el9.x86_64.rpmfpcp-testsuite-6.2.0-1.el9.x86_64.rpmpcp-pmda-oracle-6.2.0-1.el9.x86_64.rpmpcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpm8perl-PCP-PMDA-6.2.0-1.el9.x86_64.rpm6perl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpmpcp-pmda-named-6.2.0-1.el9.x86_64.rpm0pcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpmpcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpmpcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpm{pcp-pmda-gluster-6.2.0-1.el9.x86_64.rpmcpcp-devel-6.2.0-1.el9.i686.rpmYpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpmZpcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpm4pcp-zeroconf-6.2.0-1.el9.x86_64.rpmopcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpm!pcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpmpcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm;python3-pcp-6.2.0-1.el9.x86_64.rpm"pcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpmpcp-pmda-json-6.2.0-1.el9.x86_64.rpm_pcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpmypcp-pmda-farm-6.2.0-1.el9.x86_64.rpmpcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpmapcp-geolocate-6.2.0-1.el9.x86_64.rpmqpcp-pmda-cisco-6.2.0-1.el9.x86_64.rpm*pcp-pmda-statsd-6.2.0-1.el9.x86_64.rpmcpcp-devel-6.2.0-1.el9.x86_64.rpmWpcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-redis-6.2.0-1.el9.x86_64.rpmpcp-pmda-nginx-6.2.0-1.el9.x86_64.rpmcpcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpm'pcp-pmda-smart-6.2.0-1.el9.x86_64.rpmNpcp-doc-6.2.0-1.el9.noarch.rpmpcp-pmda-pdns-6.2.0-1.el9.x86_64.rpm pcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpmepcp-libs-devel-6.2.0-1.el9.x86_64.rpm#pcp-pmda-samba-6.2.0-1.el9.x86_64.rpm|pcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpmpcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpm\pcp-export-pcp2json-6.2.0-1.el9.x86_64.rpmkpcp-pmda-bcc-6.2.0-1.el9.x86_64.rpm pcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpmepcp-libs-devel-6.2.0-1.el9.i686.rpmdpcp-libs-6.2.0-1.el9.x86_64.rpmpcp-pmda-lio-6.2.0-1.el9.x86_64.rpmpcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpm%pcp-pmda-shping-6.2.0-1.el9.x86_64.rpmdpcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpmmpcp-pmda-bonding-6.2.0-1.el9.x86_64.rpmpcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpm.pcp-pmda-unbound-6.2.0-1.el9.x86_64.rpm3pcp-system-tools-6.2.0-1.el9.x86_64.rpmpcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpm$pcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpmupcp-pmda-docker-6.2.0-1.el9.x86_64.rpm^pcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpm pcp-pmda-mounts-6.2.0-1.el9.x86_64.rpmspcp-pmda-denki-6.2.0-1.el9.x86_64.rpm pcp-pmda-mssql-6.2.0-1.el9.x86_64.rpm]pcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpmgpcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpmhpcp-pmda-activemq-6.2.0-1.el9.x86_64.rpm-pcp-pmda-trace-6.2.0-1.el9.x86_64.rpm,pcp-pmda-systemd-6.2.0-1.el9.x86_64.rpmipcp-pmda-apache-6.2.0-1.el9.x86_64.rpmpcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpm7perl-PCP-MMV-6.2.0-1.el9.x86_64.rpm(pcp-pmda-snmp-6.2.0-1.el9.x86_64.rpm`pcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpmjpcp-pmda-bash-6.2.0-1.el9.x86_64.rpmxpcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpmpcp-pmda-news-6.2.0-1.el9.x86_64.rpm+pcp-pmda-summary-6.2.0-1.el9.x86_64.rpmvpcp-pmda-ds389-6.2.0-1.el9.x86_64.rpm1pcp-pmda-zswap-6.2.0-1.el9.x86_64.rpmnpcp-pmda-bpf-6.2.0-1.el9.x86_64.rpm~pcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpmpcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpmbpcp-gui-6.2.0-1.el9.x86_64.rpmpcp-pmda-logger-6.2.0-1.el9.x86_64.rpmpcp-pmda-mailq-6.2.0-1.el9.x86_64.rpm)pcp-pmda-sockets-6.2.0-1.el9.x86_64.rpmrpcp-pmda-dbping-6.2.0-1.el9.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpmppcp-pmda-cifs-6.2.0-1.el9.x86_64.rpmfpcp-testsuite-6.2.0-1.el9.i686.rpmdpcp-libs-6.2.0-1.el9.i686.rpmpcp-pmda-postfix-6.2.0-1.el9.x86_64.rpmpcp-pmda-lustre-6.2.0-1.el9.x86_64.rpm pcp-pmda-mic-6.2.0-1.el9.x86_64.rpm[pcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpmpcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpm5perl-PCP-LogImport-6.2.0-1.el9.x86_64.rpmzpcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpmYD HBBBBsecurityModerate: motif security updateW$https://access.redhat.com/errata/RHSA-2024:2217RHSA-2024:2217RHSA-2024:2217 https://access.redhat.com/security/cve/CVE-2023-43788CVE-2023-43788CVE-2023-43788https://access.redhat.com/security/cve/CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/22422482242248https://bugzilla.redhat.com/22422492242249https://errata.almalinux.org/9/ALSA-2024-2217.htmlALSA-2024:2217ALSA-2024:2217 ^ motif-2.3.4-28.el9.i686.rpm_ motif-devel-2.3.4-28.el9.i686.rpm_ motif-devel-2.3.4-28.el9.x86_64.rpm^ motif-2.3.4-28.el9.x86_64.rpm^ motif-2.3.4-28.el9.i686.rpm_ motif-devel-2.3.4-28.el9.i686.rpm_ motif-devel-2.3.4-28.el9.x86_64.rpm^ motif-2.3.4-28.el9.x86_64.rpmE OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: perl security update{3https://access.redhat.com/errata/RHSA-2024:2228RHSA-2024:2228RHSA-2024:2228 https://access.redhat.com/security/cve/CVE-2023-47038CVE-2023-47038CVE-2023-47038https://bugzilla.redhat.com/22495232249523https://errata.almalinux.org/9/ALSA-2024-2228.htmlALSA-2024:2228ALSA-2024:2228 fb+perl-NDBM_File-1.15-481.el9.x86_64.rpm:mperl-Net-1.02-481.el9.noarch.rpm%Zperl-ExtUtils-Constant-0.25-481.el9.noarch.rpm4uperl-IPC-Open3-1.21-481.el9.noarch.rpmfperl-Attribute-Handlers-1.01-481.el9.noarch.rpmZ|perl-libnetcfg-5.32.1-481.el9.noarch.rpmY{perl-less-0.03-481.el9.noarch.rpm&perl-AutoSplit-5.74-481.el9.noarch.rpmeperl-vars-1.05-481.el9.noarch.rpm!perl-Devel-SelfStubber-1.06-481.el9.noarch.rpmJiperl-Tie-Memoize-1.1-481.el9.noarch.rpmG)perl-Thread-Semaphore-2.13-481.el9.noarch.rpm&perl-ExtUtils-Embed-1.35-481.el9.noarch.rpmi|perl-interpreter-5.32.1-481.el9.x86_64.rpm2mperl-I18N-Collate-1.02-481.el9.noarch.rpm.#perl-FileHandle-2.03-481.el9.noarch.rpm-lperl-FileCache-1.10-481.el9.noarch.rpmW=perl-filetest-1.03-481.el9.noarch.rpm`Fperl-overloading-0.02-481.el9.noarch.rpmg|perl-libs-5.32.1-481.el9.x86_64.rpmeJperl-POSIX-1.94-481.el9.x86_64.rpm_5perl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpmEmperl-Text-Abbrev-1.02-481.el9.noarch.rpmXBperl-DynaLoader-1.47-481.el9.x86_64.rpm7=perl-Memoize-1.03-481.el9.noarch.rpm"perl-DirHandle-1.05-481.el9.noarch.rpmperl-Search-Dict-1.07-481.el9.noarch.rpm&perl-AutoLoader-5.74-481.el9.noarch.rpmb$perl-sort-2.04-481.el9.noarch.rpm#@perl-Dumpvalue-2.27-481.el9.noarch.rpm@wperl-SelfLoader-1.26-481.el9.noarch.rpmliperl-ph-5.32.1-481.el9.x86_64.rpmTiperl-doc-5.32.1-481.el9.noarch.rpm,nperl-File-stat-1.09-481.el9.noarch.rpmf|perl-devel-5.32.1-481.el9.i686.rpmBperl-Term-Complete-1.403-481.el9.noarch.rpmSperl-diagnostics-1.37-481.el9.noarch.rpm'nperl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpmf|perl-devel-5.32.1-481.el9.x86_64.rpmV@perl-fields-2.27-481.el9.noarch.rpm]iperl-meta-notation-5.32.1-481.el9.noarch.rpm`perl-Benchmark-1.23-481.el9.noarch.rpmW:perl-Devel-Peek-1.28-481.el9.x86_64.rpmdiperl-utils-5.32.1-481.el9.noarch.rpmO@perl-base-2.27-481.el9.noarch.rpmFDperl-Thread-3.05-481.el9.noarch.rpmUFperl-B-1.80-481.el9.x86_64.rpmk`perl-mro-1.23-481.el9.x86_64.rpmY=perl-Errno-1.30-481.el9.x86_64.rpmDperl-Test-1.31-481.el9.noarch.rpmc=perl-subs-1.03-481.el9.noarch.rpm{perl-Config-Extensions-0.03-481.el9.noarch.rpm^%perl-Hash-Util-0.23-481.el9.x86_64.rpmK=perl-Time-1.03-481.el9.noarch.rpm9bperl-NEXT-0.67-481.el9.noarch.rpmRGperl-deprecate-0.04-481.el9.noarch.rpm_perl-overload-1.31-481.el9.noarch.rpmg`perl-Sys-Hostname-1.23-481.el9.x86_64.rpm6 perl-Math-Complex-1.59-481.el9.noarch.rpmdCperl-Opcode-1.48-481.el9.x86_64.rpm3_perl-I18N-LangTags-0.44-481.el9.noarch.rpmT|perl-5.32.1-481.el9.x86_64.rpm?mperl-SelectSaver-1.02-481.el9.noarch.rpm*2perl-File-Copy-2.34-481.el9.noarch.rpmHYperl-Tie-4.6-481.el9.noarch.rpm/ perl-FindBin-1.51-481.el9.noarch.rpmIperl-Tie-File-1.06-481.el9.noarch.rpm`"perl-I18N-Langinfo-0.19-481.el9.x86_64.rpm^Eperl-open-1.12-481.el9.noarch.rpmaAperl-IO-1.43-481.el9.x86_64.rpmfgperl-vmsish-1.04-481.el9.noarch.rpmLcperl-Unicode-UCD-0.75-481.el9.noarch.rpm$perl-English-1.11-481.el9.noarch.rpmh>perl-Time-Piece-1.3401-481.el9.x86_64.rpmfb+perl-NDBM_File-1.15-481.el9.x86_64.rpm:mperl-Net-1.02-481.el9.noarch.rpm%Zperl-ExtUtils-Constant-0.25-481.el9.noarch.rpm4uperl-IPC-Open3-1.21-481.el9.noarch.rpmfperl-Attribute-Handlers-1.01-481.el9.noarch.rpmZ|perl-libnetcfg-5.32.1-481.el9.noarch.rpmY{perl-less-0.03-481.el9.noarch.rpm&perl-AutoSplit-5.74-481.el9.noarch.rpmeperl-vars-1.05-481.el9.noarch.rpm!perl-Devel-SelfStubber-1.06-481.el9.noarch.rpmJiperl-Tie-Memoize-1.1-481.el9.noarch.rpmG)perl-Thread-Semaphore-2.13-481.el9.noarch.rpm&perl-ExtUtils-Embed-1.35-481.el9.noarch.rpmi|perl-interpreter-5.32.1-481.el9.x86_64.rpm2mperl-I18N-Collate-1.02-481.el9.noarch.rpm.#perl-FileHandle-2.03-481.el9.noarch.rpm-lperl-FileCache-1.10-481.el9.noarch.rpmW=perl-filetest-1.03-481.el9.noarch.rpm`Fperl-overloading-0.02-481.el9.noarch.rpmg|perl-libs-5.32.1-481.el9.x86_64.rpmeJperl-POSIX-1.94-481.el9.x86_64.rpm_5perl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpmEmperl-Text-Abbrev-1.02-481.el9.noarch.rpmXBperl-DynaLoader-1.47-481.el9.x86_64.rpm7=perl-Memoize-1.03-481.el9.noarch.rpm"perl-DirHandle-1.05-481.el9.noarch.rpmperl-Search-Dict-1.07-481.el9.noarch.rpm&perl-AutoLoader-5.74-481.el9.noarch.rpmb$perl-sort-2.04-481.el9.noarch.rpm#@perl-Dumpvalue-2.27-481.el9.noarch.rpm@wperl-SelfLoader-1.26-481.el9.noarch.rpmliperl-ph-5.32.1-481.el9.x86_64.rpmTiperl-doc-5.32.1-481.el9.noarch.rpm,nperl-File-stat-1.09-481.el9.noarch.rpmf|perl-devel-5.32.1-481.el9.i686.rpmBperl-Term-Complete-1.403-481.el9.noarch.rpmSperl-diagnostics-1.37-481.el9.noarch.rpm'nperl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpmf|perl-devel-5.32.1-481.el9.x86_64.rpmV@perl-fields-2.27-481.el9.noarch.rpm]iperl-meta-notation-5.32.1-481.el9.noarch.rpm`perl-Benchmark-1.23-481.el9.noarch.rpmW:perl-Devel-Peek-1.28-481.el9.x86_64.rpmdiperl-utils-5.32.1-481.el9.noarch.rpmO@perl-base-2.27-481.el9.noarch.rpmFDperl-Thread-3.05-481.el9.noarch.rpmUFperl-B-1.80-481.el9.x86_64.rpmk`perl-mro-1.23-481.el9.x86_64.rpmY=perl-Errno-1.30-481.el9.x86_64.rpmDperl-Test-1.31-481.el9.noarch.rpmc=perl-subs-1.03-481.el9.noarch.rpm{perl-Config-Extensions-0.03-481.el9.noarch.rpm^%perl-Hash-Util-0.23-481.el9.x86_64.rpmK=perl-Time-1.03-481.el9.noarch.rpm9bperl-NEXT-0.67-481.el9.noarch.rpmRGperl-deprecate-0.04-481.el9.noarch.rpm_perl-overload-1.31-481.el9.noarch.rpmg`perl-Sys-Hostname-1.23-481.el9.x86_64.rpm6 perl-Math-Complex-1.59-481.el9.noarch.rpmdCperl-Opcode-1.48-481.el9.x86_64.rpm3_perl-I18N-LangTags-0.44-481.el9.noarch.rpmT|perl-5.32.1-481.el9.x86_64.rpm?mperl-SelectSaver-1.02-481.el9.noarch.rpm*2perl-File-Copy-2.34-481.el9.noarch.rpmHYperl-Tie-4.6-481.el9.noarch.rpm/ perl-FindBin-1.51-481.el9.noarch.rpmIperl-Tie-File-1.06-481.el9.noarch.rpm`"perl-I18N-Langinfo-0.19-481.el9.x86_64.rpm^Eperl-open-1.12-481.el9.noarch.rpmaAperl-IO-1.43-481.el9.x86_64.rpmfgperl-vmsish-1.04-481.el9.noarch.rpmLcperl-Unicode-UCD-0.75-481.el9.noarch.rpm$perl-English-1.11-481.el9.noarch.rpmh>perl-Time-Piece-1.3401-481.el9.x86_64.rpmF NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update.https://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236 https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236 C/libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpmD/libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpmB/libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpmS/libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpmE/libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpmF/libvirt-daemon-proxy-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-kvm-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-client-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-interface-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-config-network-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-core-10.0.0-6.el9_4.alma.1.x86_64.rpm!/libvirt-nss-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-config-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4.alma.1.x86_64.rpmC/libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpmD/libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpmB/libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpmS/libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpmE/libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpmF/libvirt-daemon-proxy-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-kvm-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-client-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-interface-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-config-network-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-core-10.0.0-6.el9_4.alma.1.x86_64.rpm!/libvirt-nss-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-config-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4.alma.1.x86_64.rpm|G GBBsecurityModerate: skopeo security updateD\https://access.redhat.com/errata/RHSA-2024:2239RHSA-2024:2239RHSA-2024:2239 https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://errata.almalinux.org/9/ALSA-2024-2239.htmlALSA-2024:2239ALSA-2024:2239 ;5skopeo-tests-1.14.3-0.1.el9.x86_64.rpm:5skopeo-1.14.3-0.1.el9.x86_64.rpm;5skopeo-tests-1.14.3-0.1.el9.x86_64.rpm:5skopeo-1.14.3-0.1.el9.x86_64.rpmH LBBsecurityModerate: buildah security update https://access.redhat.com/errata/RHSA-2024:2245RHSA-2024:2245RHSA-2024:2245 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2245.htmlALSA-2024:2245ALSA-2024:2245 7?buildah-1.33.6-2.el9.x86_64.rpm8?buildah-tests-1.33.6-2.el9.x86_64.rpm7?buildah-1.33.6-2.el9.x86_64.rpm8?buildah-tests-1.33.6-2.el9.x86_64.rpmDI QBBsecurityModerate: ansible-core bug fix, enhancement, and security update*https://access.redhat.com/errata/RHSA-2024:2246RHSA-2024:2246RHSA-2024:2246 https://access.redhat.com/security/cve/CVE-2024-0690CVE-2024-0690CVE-2024-0690https://bugzilla.redhat.com/22590132259013https://errata.almalinux.org/9/ALSA-2024-2246.htmlALSA-2024:2246ALSA-2024:2246 6ansible-core-2.14.14-1.el9.x86_64.rpm7ansible-test-2.14.14-1.el9.x86_64.rpm6ansible-core-2.14.14-1.el9.x86_64.rpm7ansible-test-2.14.14-1.el9.x86_64.rpm'J securityImportant: edk2 security updateXhttps://access.redhat.com/errata/RHSA-2024:2562RHSA-2024:2562RHSA-2024:2562 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-24784CVE-2024-24784CVE-2024-24784https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22680212268021https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2562.htmlALSA-2024:2562ALSA-2024:2562 @vgolang-bin-1.21.9-2.el9_4.x86_64.rpmpvgo-toolset-1.21.9-2.el9_4.x86_64.rpmvgolang-misc-1.21.9-2.el9_4.noarch.rpmvgolang-tests-1.21.9-2.el9_4.noarch.rpmvgolang-src-1.21.9-2.el9_4.noarch.rpm?vgolang-1.21.9-2.el9_4.x86_64.rpmvgolang-docs-1.21.9-2.el9_4.noarch.rpm@vgolang-bin-1.21.9-2.el9_4.x86_64.rpmpvgo-toolset-1.21.9-2.el9_4.x86_64.rpmvgolang-misc-1.21.9-2.el9_4.noarch.rpmvgolang-tests-1.21.9-2.el9_4.noarch.rpmvgolang-src-1.21.9-2.el9_4.noarch.rpm?vgolang-1.21.9-2.el9_4.x86_64.rpmvgolang-docs-1.21.9-2.el9_4.noarch.rpm?l FsecurityModerate: mod_http2 security updatehttps://access.redhat.com/errata/RHSA-2024:2564RHSA-2024:2564RHSA-2024:2564 https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-2564.htmlALSA-2024:2564ALSA-2024:2564 ` mod_http2-2.0.26-2.el9_4.x86_64.rpm` mod_http2-2.0.26-2.el9_4.x86_64.rpmm IsecurityModerate: libreswan security updateNhttps://access.redhat.com/errata/RHSA-2024:2565RHSA-2024:2565RHSA-2024:2565 https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2565.htmlALSA-2024:2565ALSA-2024:2565 _jlibreswan-4.12-2.el9_4.alma.1.x86_64.rpm_jlibreswan-4.12-2.el9_4.alma.1.x86_64.rpmn LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security, bug fix, and enhancement updateeMhttps://access.redhat.com/errata/RHSA-2024:2566RHSA-2024:2566RHSA-2024:2566 https://access.redhat.com/security/cve/CVE-2024-3019CVE-2024-3019CVE-2024-3019https://bugzilla.redhat.com/22718982271898https://errata.almalinux.org/9/ALSA-2024-2566.htmlALSA-2024:2566ALSA-2024:2566 l_pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm,pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpmcpcp-devel-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm^pcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpmcpcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpmepcp-libs-devel-6.2.0-2.el9_4.i686.rpmmpcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm`pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm6perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm.pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-news-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpmspcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpmwpcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpmdpcp-libs-6.2.0-2.el9_4.i686.rpm5perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpmnpcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpmcpcp-devel-6.2.0-2.el9_4.i686.rpmzpcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpmxpcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm2pcp-selinux-6.2.0-2.el9_4.x86_64.rpmdpcp-libs-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm{pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm;python3-pcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm~pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpmppcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm+pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm/pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm*pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm)pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm3pcp-system-tools-6.2.0-2.el9_4.x86_64.rpmfpcp-testsuite-6.2.0-2.el9_4.i686.rpmdpcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpmfpcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpmtpcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm%pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpmbpcp-gui-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm8perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm|pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm(pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm}pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpmrpcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm$pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpmqpcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpmlpcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpmkpcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpmvpcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpmWpcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm]pcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm-pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpmhpcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm'pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm4pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpmepcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm[pcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm"pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpmipcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpmopcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpmupcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpmXpcp-conf-6.2.0-2.el9_4.x86_64.rpm\pcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpmypcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpmgpcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpmapcp-geolocate-6.2.0-2.el9_4.x86_64.rpm!pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpmfpcp-testsuite-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpmYpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpmNpcp-doc-6.2.0-2.el9_4.noarch.rpmjpcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm0pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm&pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm7perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm1pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpmZpcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm#pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpmepcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpml_pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm,pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpmcpcp-devel-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm^pcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpmcpcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpmepcp-libs-devel-6.2.0-2.el9_4.i686.rpmmpcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm`pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm6perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm.pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-news-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpmspcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpmwpcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpmdpcp-libs-6.2.0-2.el9_4.i686.rpm5perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpmnpcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpmcpcp-devel-6.2.0-2.el9_4.i686.rpmzpcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpmxpcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm2pcp-selinux-6.2.0-2.el9_4.x86_64.rpmdpcp-libs-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm{pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm;python3-pcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm~pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpmppcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm+pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm/pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm*pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm)pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm3pcp-system-tools-6.2.0-2.el9_4.x86_64.rpmfpcp-testsuite-6.2.0-2.el9_4.i686.rpmdpcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpmfpcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpmtpcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm%pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpmbpcp-gui-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm8perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm|pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm(pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm}pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpmrpcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm$pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpmqpcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpmlpcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpmkpcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpmvpcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpmWpcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm]pcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm-pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpmhpcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm'pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm4pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpmepcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm[pcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm"pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpmipcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpmopcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpmupcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpmXpcp-conf-6.2.0-2.el9_4.x86_64.rpm\pcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpmypcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpmgpcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpmapcp-geolocate-6.2.0-2.el9_4.x86_64.rpm!pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpmfpcp-testsuite-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpmYpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpmNpcp-doc-6.2.0-2.el9_4.noarch.rpmjpcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm0pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm&pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm7perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm1pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpmZpcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm#pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpmepcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpmo $`BBsecurityModerate: grafana security update2jhttps://access.redhat.com/errata/RHSA-2024:2568RHSA-2024:2568RHSA-2024:2568 https://access.redhat.com/security/cve/CVE-2024-1313CVE-2024-1313CVE-2024-1313https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22719032271903https://errata.almalinux.org/9/ALSA-2024-2568.htmlALSA-2024:2568ALSA-2024:2568 qjgrafana-9.2.10-16.el9_4.alma.1.x86_64.rpm!jgrafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpmqjgrafana-9.2.10-16.el9_4.alma.1.x86_64.rpm!jgrafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpmAp 'esecurityImportant: grafana-pcp security updatexhttps://access.redhat.com/errata/RHSA-2024:2569RHSA-2024:2569RHSA-2024:2569 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-2569.htmlALSA-2024:2569ALSA-2024:2569 grafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpmgrafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpmq 3hBBBBBBBBBsecurityModerate: gnutls security updatehttps://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570 https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570 bgnutls-utils-3.8.3-4.el9_4.x86_64.rpmbgnutls-devel-3.8.3-4.el9_4.x86_64.rpmbgnutls-c++-3.8.3-4.el9_4.i686.rpmbgnutls-devel-3.8.3-4.el9_4.i686.rpmbgnutls-c++-3.8.3-4.el9_4.x86_64.rpmbgnutls-dane-3.8.3-4.el9_4.x86_64.rpmbgnutls-dane-3.8.3-4.el9_4.i686.rpmbgnutls-utils-3.8.3-4.el9_4.x86_64.rpmbgnutls-devel-3.8.3-4.el9_4.x86_64.rpmbgnutls-c++-3.8.3-4.el9_4.i686.rpmbgnutls-devel-3.8.3-4.el9_4.i686.rpmbgnutls-c++-3.8.3-4.el9_4.x86_64.rpmbgnutls-dane-3.8.3-4.el9_4.x86_64.rpmbgnutls-dane-3.8.3-4.el9_4.i686.rpmKr 6tsecurityModerate: sssd security and bug fix update%Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571 8sssd-idp-2.9.4-6.el9_4.x86_64.rpm8sssd-idp-2.9.4-6.el9_4.x86_64.rpms wBBBBBBBBBsecurityImportant: tigervnc security updatemhttps://access.redhat.com/errata/RHSA-2024:2616RHSA-2024:2616RHSA-2024:2616 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-2616.htmlALSA-2024:2616ALSA-2024:2616 NWtigervnc-server-1.13.1-8.el9_4.3.x86_64.rpmMWtigervnc-1.13.1-8.el9_4.3.x86_64.rpm'Wtigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm&Wtigervnc-license-1.13.1-8.el9_4.3.noarch.rpm%Wtigervnc-icons-1.13.1-8.el9_4.3.noarch.rpmOWtigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpmPWtigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpmNWtigervnc-server-1.13.1-8.el9_4.3.x86_64.rpmMWtigervnc-1.13.1-8.el9_4.3.x86_64.rpm'Wtigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm&Wtigervnc-license-1.13.1-8.el9_4.3.noarch.rpm%Wtigervnc-icons-1.13.1-8.el9_4.3.noarch.rpmOWtigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpmPWtigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm7t CBsecurityModerate: libxml2 security updatesnhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679 https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679 9alibxml2-devel-2.9.13-6.el9_4.i686.rpm9alibxml2-devel-2.9.13-6.el9_4.x86_64.rpm9alibxml2-devel-2.9.13-6.el9_4.i686.rpm9alibxml2-devel-2.9.13-6.el9_4.x86_64.rpmju GsecurityImportant: git-lfs security updatea( https://access.redhat.com/errata/RHSA-2024:2724RHSA-2024:2724RHSA-2024:2724 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2724.htmlALSA-2024:2724ALSA-2024:2724 FUgit-lfs-3.4.1-2.el9_4.x86_64.rpmFUgit-lfs-3.4.1-2.el9_4.x86_64.rpmiv JBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update &https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758 https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743 %)perf-5.14.0-427.16.1.el9_4.x86_64.rpm)kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm!)kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm#)kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm$)kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm))rv-5.14.0-427.16.1.el9_4.x86_64.rpm")kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm')rtla-5.14.0-427.16.1.el9_4.x86_64.rpm&)kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm %)perf-5.14.0-427.16.1.el9_4.x86_64.rpm)kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm!)kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm#)kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm$)kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm))rv-5.14.0-427.16.1.el9_4.x86_64.rpm")kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm')rtla-5.14.0-427.16.1.el9_4.x86_64.rpm&)kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpmpw %_BFxBBBBBBBsecurityImportant: nodejs:18 security update/P https://access.redhat.com/errata/RHSA-2024:2779RHSA-2024:2779RHSA-2024:2779 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2779.htmlALSA-2024:2779ALSA-2024:2779 57("Onodejs-devel-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpmLOnodejs-docs-18.20.2-2.module_el9.4.0+99+a01f7676.noarch.rpmeOnodejs-full-i18n-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmanpm-10.5.0-1.18.20.2.2.module_el9.4.0+99+a01f7676.x86_64.rpm5Onodejs-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm57("Onodejs-devel-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpmLOnodejs-docs-18.20.2-2.module_el9.4.0+99+a01f7676.noarch.rpmeOnodejs-full-i18n-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmanpm-10.5.0-1.18.20.2.2.module_el9.4.0+99+a01f7676.x86_64.rpm5Onodejs-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm@x fBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update"https://access.redhat.com/errata/RHSA-2024:2842RHSA-2024:2842RHSA-2024:2842 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2842.htmlALSA-2024:2842ALSA-2024:2842 Jydotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmDdotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmFydotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpmBdotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpmynetstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmdotnet-host-8.0.5-1.el9_4.x86_64.rpm-ydotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm Jydotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmDdotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmFydotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpmBdotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpmynetstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmdotnet-host-8.0.5-1.el9_4.x86_64.rpm-ydotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmKy ABBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update!#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843 =aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm;aspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmEgdotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpmCdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmIgdotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpmAdotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm=aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm;aspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmEgdotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpmCdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmIgdotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpmAdotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm?dotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpmGdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpmoz kBQWBBBBBBBsecurityImportant: nodejs:20 security updateDO https://access.redhat.com/errata/RHSA-2024:2853RHSA-2024:2853RHSA-2024:2853 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2853.htmlALSA-2024:2853ALSA-2024:2853 5(LSnodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm5Snodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm{enodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm"Snodejs-devel-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmanpm-10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528.x86_64.rpmeSnodejs-full-i18n-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm5(LSnodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm5Snodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm{enodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm"Snodejs-devel-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmanpm-10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528.x86_64.rpmeSnodejs-full-i18n-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm { \BBsecurityImportant: firefox security update https://access.redhat.com/errata/RHSA-2024:2883RHSA-2024:2883RHSA-2024:2883 https://access.redhat.com/security/cve/CVE-2024-4367CVE-2024-4367CVE-2024-4367https://access.redhat.com/security/cve/CVE-2024-4767CVE-2024-4767CVE-2024-4767https://access.redhat.com/security/cve/CVE-2024-4768CVE-2024-4768CVE-2024-4768https://access.redhat.com/security/cve/CVE-2024-4769CVE-2024-4769CVE-2024-4769https://access.redhat.com/security/cve/CVE-2024-4770CVE-2024-4770CVE-2024-4770https://access.redhat.com/security/cve/CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/22803822280382https://bugzilla.redhat.com/22803832280383https://bugzilla.redhat.com/22803842280384https://bugzilla.redhat.com/22803852280385https://bugzilla.redhat.com/22803862280386https://bugzilla.redhat.com/22803872280387https://errata.almalinux.org/9/ALSA-2024-2883.htmlALSA-2024:2883ALSA-2024:2883 Oyfirefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm9yfirefox-115.11.0-1.el9_4.alma.1.x86_64.rpmOyfirefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm9yfirefox-115.11.0-1.el9_4.alma.1.x86_64.rpmB| #asecurityImportant: thunderbird security update Yhttps://access.redhat.com/errata/RHSA-2024:2888RHSA-2024:2888RHSA-2024:2888 https://access.redhat.com/security/cve/CVE-2024-4367CVE-2024-4367CVE-2024-4367https://access.redhat.com/security/cve/CVE-2024-4767CVE-2024-4767CVE-2024-4767https://access.redhat.com/security/cve/CVE-2024-4768CVE-2024-4768CVE-2024-4768https://access.redhat.com/security/cve/CVE-2024-4769CVE-2024-4769CVE-2024-4769https://access.redhat.com/security/cve/CVE-2024-4770CVE-2024-4770CVE-2024-4770https://access.redhat.com/security/cve/CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/22803822280382https://bugzilla.redhat.com/22803832280383https://bugzilla.redhat.com/22803842280384https://bugzilla.redhat.com/22803852280385https://bugzilla.redhat.com/22803862280386https://bugzilla.redhat.com/22803872280387https://errata.almalinux.org/9/ALSA-2024-2888.htmlALSA-2024:2888ALSA-2024:2888 :ythunderbird-115.11.0-1.el9_4.alma.1.x86_64.rpm:ythunderbird-115.11.0-1.el9_4.alma.1.x86_64.rpmM} .dBBBBBBBBsecurityImportant: nodejs security updateyP https://access.redhat.com/errata/RHSA-2024:2910RHSA-2024:2910RHSA-2024:2910 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2910.htmlALSA-2024:2910ALSA-2024:2910 anpm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm nodejs-libs-16.20.2-8.el9_4.x86_64.rpm5 nodejs-16.20.2-8.el9_4.x86_64.rpme nodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpmL nodejs-docs-16.20.2-8.el9_4.noarch.rpm nodejs-libs-16.20.2-8.el9_4.i686.rpmanpm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm nodejs-libs-16.20.2-8.el9_4.x86_64.rpm5 nodejs-16.20.2-8.el9_4.x86_64.rpme nodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpmL nodejs-docs-16.20.2-8.el9_4.noarch.rpm nodejs-libs-16.20.2-8.el9_4.i686.rpmc~ oBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix updateIx https://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306 https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890 #*kernel-devel-5.14.0-427.18.1.el9_4.x86_64.rpm)*rv-5.14.0-427.18.1.el9_4.x86_64.rpm*kernel-doc-5.14.0-427.18.1.el9_4.noarch.rpm"*kernel-debug-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm$*kernel-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm'*rtla-5.14.0-427.18.1.el9_4.x86_64.rpm!*kernel-debug-devel-5.14.0-427.18.1.el9_4.x86_64.rpm&*kernel-headers-5.14.0-427.18.1.el9_4.x86_64.rpm%*perf-5.14.0-427.18.1.el9_4.x86_64.rpm #*kernel-devel-5.14.0-427.18.1.el9_4.x86_64.rpm)*rv-5.14.0-427.18.1.el9_4.x86_64.rpm*kernel-doc-5.14.0-427.18.1.el9_4.noarch.rpm"*kernel-debug-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm$*kernel-devel-matched-5.14.0-427.18.1.el9_4.x86_64.rpm'*rtla-5.14.0-427.18.1.el9_4.x86_64.rpm!*kernel-debug-devel-5.14.0-427.18.1.el9_4.x86_64.rpm&*kernel-headers-5.14.0-427.18.1.el9_4.x86_64.rpm%*perf-5.14.0-427.18.1.el9_4.x86_64.rpm ABBBBBBsecurityImportant: tomcat security and bug fix updateA}https://access.redhat.com/errata/RHSA-2024:3307RHSA-2024:3307RHSA-2024:3307 https://access.redhat.com/security/cve/CVE-2024-23672CVE-2024-23672CVE-2024-23672https://access.redhat.com/security/cve/CVE-2024-24549CVE-2024-24549CVE-2024-24549https://bugzilla.redhat.com/22696072269607https://bugzilla.redhat.com/22696082269608https://errata.almalinux.org/9/ALSA-2024-3307.htmlALSA-2024:3307ALSA-2024:3307 =}tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpmA}tomcat-lib-9.0.87-1.el9_4.1.noarch.rpmB}tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm>}tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm@}tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm?}tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm<}tomcat-9.0.87-1.el9_4.1.noarch.rpmC}tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm=}tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpmA}tomcat-lib-9.0.87-1.el9_4.1.noarch.rpmB}tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm>}tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm@}tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm?}tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm<}tomcat-9.0.87-1.el9_4.1.noarch.rpmC}tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm  JBBBBBBBBsecurityImportant: glibc security update> https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339  8glibc-devel-2.34-100.el9_4.2.i686.rpmV8glibc-utils-2.34-100.el9_4.2.x86_64.rpm 8glibc-devel-2.34-100.el9_4.2.x86_64.rpmJ8glibc-doc-2.34-100.el9_4.2.noarch.rpmU8glibc-locale-source-2.34-100.el9_4.2.x86_64.rpmT8glibc-headers-2.34-100.el9_4.2.x86_64.rpm 8glibc-devel-2.34-100.el9_4.2.i686.rpmV8glibc-utils-2.34-100.el9_4.2.x86_64.rpm 8glibc-devel-2.34-100.el9_4.2.x86_64.rpmJ8glibc-doc-2.34-100.el9_4.2.noarch.rpmU8glibc-locale-source-2.34-100.el9_4.2.x86_64.rpmT8glibc-headers-2.34-100.el9_4.2.x86_64.rpm| &UBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix updateNbhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619 &+kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm'+rtla-5.14.0-427.20.1.el9_4.x86_64.rpm)+rv-5.14.0-427.20.1.el9_4.x86_64.rpm#+kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm"+kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm+kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm!+kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$+kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm%+perf-5.14.0-427.20.1.el9_4.x86_64.rpm &+kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm'+rtla-5.14.0-427.20.1.el9_4.x86_64.rpm)+rv-5.14.0-427.20.1.el9_4.x86_64.rpm#+kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm"+kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm+kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm!+kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$+kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm%+perf-5.14.0-427.20.1.el9_4.x86_64.rpmL GBBBBB\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement update0/https://access.redhat.com/errata/RHSA-2024:3668RHSA-2024:3668RHSA-2024:3668 https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3668.htmlALSA-2024:3668ALSA-2024:3668  (*Trubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm+Urubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm&rubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpm!?ruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmfrubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpmm6rubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpm"0rubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm$arubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpm%rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm'lrubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm?ruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm&rubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpm,!rubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpme?ruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmv?ruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm)Orubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmw?ruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm(Hrubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmMrubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm#rubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm5rubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpme?ruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm-!rubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm (*Trubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm+Urubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm&rubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpm!?ruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmfrubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpmm6rubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpm"0rubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm$arubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpm%rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm'lrubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm?ruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm&rubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpm,!rubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpme?ruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmv?ruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm)Orubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmw?ruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm(Hrubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmMrubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm#rubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm5rubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpme?ruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm-!rubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm^ 4mBBOBEGBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security, bug fix, and enhancement update_/https://access.redhat.com/errata/RHSA-2024:3671RHSA-2024:3671RHSA-2024:3671 https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3671.htmlALSA-2024:3671ALSA-2024:3671  (&vrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpm-%rubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm3[rubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpmePruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm"6rubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm)[rubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpm5Drubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm{8rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpmmmrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpmWrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm{8rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpmvPruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm'nrubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmPruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm&rubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpmr[rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm*Vrubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpmvPruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm(Mrubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpm4Drubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm#nrubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpmePruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm!Pruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmePruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmwPruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmWrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpm% rubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpmirubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpmwPruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm+Wrubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpmmmrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpmvrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpm,%rubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmPruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm$crubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpmirubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpm (&vrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpm-%rubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm3[rubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpmePruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm"6rubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm)[rubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpm5Drubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm{8rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpmmmrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpmWrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm{8rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpmvPruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm'nrubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmPruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm&rubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpmr[rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm*Vrubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpmvPruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm(Mrubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpm4Drubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm#nrubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpmePruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm!Pruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmePruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmwPruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmWrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpm% rubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpmirubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpmwPruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm+Wrubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpmmmrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpmvrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpm,%rubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmPruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm$crubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpmirubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpmf uBBBBBBBBBBBBBBBBsecurityImportant: ipa security updatewhttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754 https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754 5ipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpm 5ipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpm5python3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpm5python3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpm 5ipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpm5ipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpm 5ipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpm5ipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpm5python3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-common-4.11.0-15.el9_4.alma.1.noarch.rpm 5ipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpm 5ipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpm5python3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpm5python3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpm 5ipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpm5ipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpm 5ipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpm5ipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpm5python3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpm5ipa-common-4.11.0-15.el9_4.alma.1.noarch.rpmѧ| HBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update3https://access.redhat.com/errata/RHSA-2024:3820RHSA-2024:3820RHSA-2024:3820 https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-3820.htmlALSA-2024:3820ALSA-2024:3820 dfence-virt-4.10.0-62.el9_4.3.x86_64.rpm/fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm0fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpmcfence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpmffence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpmgfence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpmhfence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpmifence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm1fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpmjfence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpmefence-virtd-4.10.0-62.el9_4.3.x86_64.rpm.fence-agents-common-4.10.0-62.el9_4.3.noarch.rpmbfence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm dfence-virt-4.10.0-62.el9_4.3.x86_64.rpm/fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm0fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpmcfence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpmffence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpmgfence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpmhfence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpmifence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm1fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpmjfence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpmefence-virtd-4.10.0-62.el9_4.3.x86_64.rpm.fence-agents-common-4.10.0-62.el9_4.3.noarch.rpmbfence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm) $_BBBsecurityModerate: rpm-ostree security update8https://access.redhat.com/errata/RHSA-2024:3823RHSA-2024:3823RHSA-2024:3823 https://access.redhat.com/security/cve/CVE-2024-2905CVE-2024-2905CVE-2024-2905https://bugzilla.redhat.com/22715852271585https://errata.almalinux.org/9/ALSA-2024-3823.htmlALSA-2024:3823ALSA-2024:3823 C|rpm-ostree-libs-2024.3-3.el9_4.x86_64.rpmC|rpm-ostree-libs-2024.3-3.el9_4.i686.rpm|rpm-ostree-2024.3-3.el9_4.x86_64.rpmC|rpm-ostree-libs-2024.3-3.el9_4.x86_64.rpmC|rpm-ostree-libs-2024.3-3.el9_4.i686.rpm|rpm-ostree-2024.3-3.el9_4.x86_64.rpmV .eBBBBBBBsecurityModerate: podman security and bug fix updateI4https://access.redhat.com/errata/RHSA-2024:3826RHSA-2024:3826RHSA-2024:3826 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-3826.htmlALSA-2024:3826ALSA-2024:3826 #Opodman-4.9.4-4.el9_4.x86_64.rpm&Opodman-tests-4.9.4-4.el9_4.x86_64.rpmfOpodman-docker-4.9.4-4.el9_4.noarch.rpm$Opodman-plugins-4.9.4-4.el9_4.x86_64.rpm%Opodman-remote-4.9.4-4.el9_4.x86_64.rpm#Opodman-4.9.4-4.el9_4.x86_64.rpm&Opodman-tests-4.9.4-4.el9_4.x86_64.rpmfOpodman-docker-4.9.4-4.el9_4.noarch.rpm$Opodman-plugins-4.9.4-4.el9_4.x86_64.rpm%Opodman-remote-4.9.4-4.el9_4.x86_64.rpmB 3oBBsecurityModerate: buildah security and bug fix update}=https://access.redhat.com/errata/RHSA-2024:3827RHSA-2024:3827RHSA-2024:3827 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-3827.htmlALSA-2024:3827ALSA-2024:3827 8Abuildah-tests-1.33.7-2.el9_4.x86_64.rpm7Abuildah-1.33.7-2.el9_4.x86_64.rpm8Abuildah-tests-1.33.7-2.el9_4.x86_64.rpm7Abuildah-1.33.7-2.el9_4.x86_64.rpm)  6tsecurityModerate: gvisor-tap-vsock security and bug fix update:{https://access.redhat.com/errata/RHSA-2024:3830RHSA-2024:3830RHSA-2024:3830 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://bugzilla.redhat.com/22680172268017https://errata.almalinux.org/9/ALSA-2024-3830.htmlALSA-2024:3830ALSA-2024:3830 9 gvisor-tap-vsock-0.7.3-3.el9_4.alma.1.x86_64.rpm9 gvisor-tap-vsock-0.7.3-3.el9_4.alma.1.x86_64.rpmr  9wsecurityModerate: containernetworking-plugins security and bug fix update5;https://access.redhat.com/errata/RHSA-2024:3831RHSA-2024:3831RHSA-2024:3831 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://bugzilla.redhat.com/22680172268017https://errata.almalinux.org/9/ALSA-2024-3831.htmlALSA-2024:3831ALSA-2024:3831 aycontainernetworking-plugins-1.4.0-3.el9_4.x86_64.rpmaycontainernetworking-plugins-1.4.0-3.el9_4.x86_64.rpm:  zBBBBBBBsecurityModerate: gdk-pixbuf2 security updatepAhttps://access.redhat.com/errata/RHSA-2024:3834RHSA-2024:3834RHSA-2024:3834 https://access.redhat.com/security/cve/CVE-2022-48622CVE-2022-48622CVE-2022-48622https://bugzilla.redhat.com/22605452260545https://errata.almalinux.org/9/ALSA-2024-3834.htmlALSA-2024:3834ALSA-2024:3834  gdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm gdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm!gdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpmgdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpmgdk-pixbuf2-2.42.6-4.el9_4.i686.rpm!gdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm gdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm gdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm!gdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpmgdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpmgdk-pixbuf2-2.42.6-4.el9_4.i686.rpm!gdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm  >DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libreoffice security update1Xhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835 1Plibreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmglibreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpmJlibreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpm)autocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpm autocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpm]libreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm4autocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpmKlibreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpm<libreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpmwlibreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpmllibreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm5autocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpm6libreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpm}libreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpm.autocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpmYlibreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"autocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpmXlibreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpmrlibreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%autocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm/autocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpmMlibreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm{libreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhlibreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmHlibreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmAlibreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmklibreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpmclibreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&autocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUlibreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpm*libreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"libreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8autocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpmDlibreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm0libreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmvlibreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_libreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!autocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpmOlibreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,autocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpmWlibreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpm~libreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm`libreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpmelibreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmblibreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm6autocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+autocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpm7autocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpm$autocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpm)libreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm|libreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-autocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpm'libreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpmslibreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmylibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmYlibreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*autocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpmolibreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpmClibreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpm#autocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpmAlibreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpmilibreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZlibreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmplibreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpmXlibreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpm;libreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3autocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpmflibreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(autocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpmBlibreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpmalibreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1autocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpmulibreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm0autocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2autocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpmWlibreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1Plibreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmglibreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpmJlibreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpm)autocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpm autocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpm]libreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm4autocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpmKlibreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpm<libreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpmwlibreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpmllibreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm5autocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpm6libreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpm}libreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpm.autocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpmYlibreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"autocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpmXlibreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpmrlibreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%autocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm/autocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpmMlibreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm{libreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhlibreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmHlibreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmAlibreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmklibreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpmclibreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&autocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUlibreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpm*libreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"libreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8autocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpmDlibreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm0libreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmvlibreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_libreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!autocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpmOlibreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,autocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpmWlibreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpm~libreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm`libreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpmelibreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmblibreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm6autocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+autocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpm7autocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpm$autocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpm)libreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm|libreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-autocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpm'libreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpmslibreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmylibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmYlibreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*autocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpmolibreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpmClibreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpm#autocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpmAlibreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpmilibreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZlibreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmplibreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpmXlibreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpm;libreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3autocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpmflibreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(autocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpmBlibreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpmalibreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1autocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpmulibreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm0autocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2autocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpmWlibreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3  BBBsecurityImportant: 389-ds-base security update mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837 https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837 Rypython3-lib389-2.4.5-8.el9_4.noarch.rpm7y389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm6y389-ds-base-2.4.5-8.el9_4.x86_64.rpmRypython3-lib389-2.4.5-8.el9_4.noarch.rpm7y389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm6y389-ds-base-2.4.5-8.el9_4.x86_64.rpm  $EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security updatevXhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838 mrubygem-rbs-1.4.0-162.el9_4.noarch.rpm#rubygem-irb-1.3.5-162.el9_4.noarch.rpm)Rrubygem-rss-0.2.9-162.el9_4.noarch.rpmwruby-libs-3.0.7-162.el9_4.i686.rpm2rubygem-json-2.5.1-162.el9_4.x86_64.rpmvruby-devel-3.0.7-162.el9_4.i686.rpm,rubygems-3.2.33-162.el9_4.noarch.rpm&rubygem-rake-13.0.3-162.el9_4.noarch.rpmJrubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpm",rubygem-bundler-2.2.33-162.el9_4.noarch.rpm+Lrubygem-typeprof-0.15.2-162.el9_4.noarch.rpm'hrubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpm(rubygem-io-console-0.5.7-162.el9_4.x86_64.rpmSrubygem-psych-3.3.2-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.i686.rpm-rubygems-devel-3.2.33-162.el9_4.noarch.rpm$^rubygem-minitest-5.14.2-162.el9_4.noarch.rpmvruby-devel-3.0.7-162.el9_4.x86_64.rpm%srubygem-power_assert-1.2.1-162.el9_4.noarch.rpm(Krubygem-rexml-3.2.5-162.el9_4.noarch.rpmwruby-libs-3.0.7-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.x86_64.rpm*Prubygem-test-unit-3.3.7-162.el9_4.noarch.rpm!ruby-default-gems-3.0.7-162.el9_4.noarch.rpmmrubygem-rbs-1.4.0-162.el9_4.noarch.rpm#rubygem-irb-1.3.5-162.el9_4.noarch.rpm)Rrubygem-rss-0.2.9-162.el9_4.noarch.rpmwruby-libs-3.0.7-162.el9_4.i686.rpm2rubygem-json-2.5.1-162.el9_4.x86_64.rpmvruby-devel-3.0.7-162.el9_4.i686.rpm,rubygems-3.2.33-162.el9_4.noarch.rpm&rubygem-rake-13.0.3-162.el9_4.noarch.rpmJrubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpm",rubygem-bundler-2.2.33-162.el9_4.noarch.rpm+Lrubygem-typeprof-0.15.2-162.el9_4.noarch.rpm'hrubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpm(rubygem-io-console-0.5.7-162.el9_4.x86_64.rpmSrubygem-psych-3.3.2-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.i686.rpm-rubygems-devel-3.2.33-162.el9_4.noarch.rpm$^rubygem-minitest-5.14.2-162.el9_4.noarch.rpmvruby-devel-3.0.7-162.el9_4.x86_64.rpm%srubygem-power_assert-1.2.1-162.el9_4.noarch.rpm(Krubygem-rexml-3.2.5-162.el9_4.noarch.rpmwruby-libs-3.0.7-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.x86_64.rpm*Prubygem-test-unit-3.3.7-162.el9_4.noarch.rpm!ruby-default-gems-3.0.7-162.el9_4.noarch.rpmF (eBsecurityLow: c-ares security update/Nhttps://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842 https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842 `(c-ares-devel-1.19.1-2.el9_4.x86_64.rpm`(c-ares-devel-1.19.1-2.el9_4.i686.rpm`(c-ares-devel-1.19.1-2.el9_4.x86_64.rpm`(c-ares-devel-1.19.1-2.el9_4.i686.rpmW -iBBsecurityModerate: cockpit security updatePEhttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843 https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843 6Kcockpit-storaged-311.2-1.el9_4.noarch.rpm4Kcockpit-packagekit-311.2-1.el9_4.noarch.rpm5Kcockpit-pcp-311.2-1.el9_4.x86_64.rpm6Kcockpit-storaged-311.2-1.el9_4.noarch.rpm4Kcockpit-packagekit-311.2-1.el9_4.noarch.rpm5Kcockpit-pcp-311.2-1.el9_4.x86_64.rpmb 2nBBsecurityImportant: firefox security update/https://access.redhat.com/errata/RHSA-2024:3955RHSA-2024:3955RHSA-2024:3955 https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-3955.htmlALSA-2024:3955ALSA-2024:3955 9firefox-115.12.0-1.el9_4.alma.1.x86_64.rpmOfirefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpm9firefox-115.12.0-1.el9_4.alma.1.x86_64.rpmOfirefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpmv ;sBBBBBBsecurityImportant: flatpak security updateD|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959 https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959 6zflatpak-selinux-1.12.9-1.el9_4.noarch.rpmNzflatpak-1.12.9-1.el9_4.x86_64.rpm[zflatpak-libs-1.12.9-1.el9_4.x86_64.rpmOzflatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm[zflatpak-libs-1.12.9-1.el9_4.i686.rpm6zflatpak-selinux-1.12.9-1.el9_4.noarch.rpmNzflatpak-1.12.9-1.el9_4.x86_64.rpm[zflatpak-libs-1.12.9-1.el9_4.x86_64.rpmOzflatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm[zflatpak-libs-1.12.9-1.el9_4.i686.rpmB |BBBBBBBBBBBBsecurityImportant: ghostscript security update@qhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999 https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999 ?(libgs-9.54.0-16.el9_4.x86_64.rpm>(ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm;(ghostscript-9.54.0-16.el9_4.x86_64.rpm=(ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm (ghostscript-doc-9.54.0-16.el9_4.noarch.rpm?(ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm?(libgs-9.54.0-16.el9_4.i686.rpm<(ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm?(libgs-9.54.0-16.el9_4.x86_64.rpm>(ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm;(ghostscript-9.54.0-16.el9_4.x86_64.rpm=(ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm (ghostscript-doc-9.54.0-16.el9_4.noarch.rpm?(ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm?(libgs-9.54.0-16.el9_4.i686.rpm<(ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpmЧ KsecurityImportant: thunderbird security update1https://access.redhat.com/errata/RHSA-2024:4002RHSA-2024:4002RHSA-2024:4002 https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-4002.htmlALSA-2024:4002ALSA-2024:4002 :^thunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpm:^thunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpmE NsecurityModerate: libreswan security updateGOhttps://access.redhat.com/errata/RHSA-2024:4050RHSA-2024:4050RHSA-2024:4050 https://access.redhat.com/security/cve/CVE-2024-3652CVE-2024-3652CVE-2024-3652https://bugzilla.redhat.com/22744482274448https://errata.almalinux.org/9/ALSA-2024-4050.htmlALSA-2024:4050ALSA-2024:4050 _ilibreswan-4.12-2.el9_4.1.x86_64.rpm_ilibreswan-4.12-2.el9_4.1.x86_64.rpmk QBBBBBBBBsecurityImportant: python3.11 security update0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077 kHpython3.11-3.11.7-1.el9_4.1.x86_64.rpmbHpython3.11-devel-3.11.7-1.el9_4.1.i686.rpmcHpython3.11-libs-3.11.7-1.el9_4.1.i686.rpmcHpython3.11-libs-3.11.7-1.el9_4.1.x86_64.rpmlHpython3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpmbHpython3.11-devel-3.11.7-1.el9_4.1.x86_64.rpmkHpython3.11-3.11.7-1.el9_4.1.x86_64.rpmbHpython3.11-devel-3.11.7-1.el9_4.1.i686.rpmcHpython3.11-libs-3.11.7-1.el9_4.1.i686.rpmcHpython3.11-libs-3.11.7-1.el9_4.1.x86_64.rpmlHpython3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpmbHpython3.11-devel-3.11.7-1.el9_4.1.x86_64.rpmI "\BBBBsecurityImportant: python3.9 security updateFhttps://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078 W*python3-devel-3.9.18-3.el9_4.1.i686.rpmj*python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm=*python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmW*python3-devel-3.9.18-3.el9_4.1.x86_64.rpmW*python3-devel-3.9.18-3.el9_4.1.i686.rpmj*python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm=*python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmW*python3-devel-3.9.18-3.el9_4.1.x86_64.rpm' 7cBBBBBBBBBBBBBBBBBBsecurityImportant: git security update[ https://access.redhat.com/errata/RHSA-2024:4083RHSA-2024:4083RHSA-2024:4083 https://access.redhat.com/security/cve/CVE-2024-32002CVE-2024-32002CVE-2024-32002https://access.redhat.com/security/cve/CVE-2024-32004CVE-2024-32004CVE-2024-32004https://access.redhat.com/security/cve/CVE-2024-32020CVE-2024-32020CVE-2024-32020https://access.redhat.com/security/cve/CVE-2024-32021CVE-2024-32021CVE-2024-32021https://access.redhat.com/security/cve/CVE-2024-32465CVE-2024-32465CVE-2024-32465https://bugzilla.redhat.com/22804212280421https://bugzilla.redhat.com/22804282280428https://bugzilla.redhat.com/22804462280446https://bugzilla.redhat.com/22804662280466https://bugzilla.redhat.com/22804842280484https://errata.almalinux.org/9/ALSA-2024-4083.htmlALSA-2024:4083ALSA-2024:4083 Pperl-Git-2.43.5-1.el9_4.noarch.rpmEgit-instaweb-2.43.5-1.el9_4.noarch.rpmSgit-subtree-2.43.5-1.el9_4.x86_64.rpmRgit-daemon-2.43.5-1.el9_4.x86_64.rpmCgit-email-2.43.5-1.el9_4.noarch.rpmGgit-svn-2.43.5-1.el9_4.noarch.rpmQgit-credential-libsecret-2.43.5-1.el9_4.x86_64.rpmBgit-core-doc-2.43.5-1.el9_4.noarch.rpmQperl-Git-SVN-2.43.5-1.el9_4.noarch.rpmIgitweb-2.43.5-1.el9_4.noarch.rpmPgit-core-2.43.5-1.el9_4.x86_64.rpmDgit-gui-2.43.5-1.el9_4.noarch.rpmAgit-all-2.43.5-1.el9_4.noarch.rpmHgitk-2.43.5-1.el9_4.noarch.rpmOgit-2.43.5-1.el9_4.x86_64.rpmPperl-Git-2.43.5-1.el9_4.noarch.rpmEgit-instaweb-2.43.5-1.el9_4.noarch.rpmSgit-subtree-2.43.5-1.el9_4.x86_64.rpmRgit-daemon-2.43.5-1.el9_4.x86_64.rpmCgit-email-2.43.5-1.el9_4.noarch.rpmGgit-svn-2.43.5-1.el9_4.noarch.rpmQgit-credential-libsecret-2.43.5-1.el9_4.x86_64.rpmBgit-core-doc-2.43.5-1.el9_4.noarch.rpmQperl-Git-SVN-2.43.5-1.el9_4.noarch.rpmIgitweb-2.43.5-1.el9_4.noarch.rpmPgit-core-2.43.5-1.el9_4.x86_64.rpmDgit-gui-2.43.5-1.el9_4.noarch.rpmAgit-all-2.43.5-1.el9_4.noarch.rpmHgitk-2.43.5-1.el9_4.noarch.rpmOgit-2.43.5-1.el9_4.x86_64.rpmT xBBBBBBBBsecurityImportant: pki-core security updatez https://access.redhat.com/errata/RHSA-2024:4165RHSA-2024:4165RHSA-2024:4165 https://access.redhat.com/security/cve/CVE-2023-4727CVE-2023-4727CVE-2023-4727https://bugzilla.redhat.com/22322182232218https://errata.almalinux.org/9/ALSA-2024-4165.htmlALSA-2024:4165ALSA-2024:4165 N^idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpmM^idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpmx^python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpmQ^idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpmK^idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpmR^idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpmP^idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpmL^idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpmO^idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm N^idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpmM^idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpmx^python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpmQ^idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpmK^idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpmR^idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpmP^idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpmL^idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpmO^idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm) CBBBBBBBBsecurityModerate: golang security updateMhttps://access.redhat.com/errata/RHSA-2024:4212RHSA-2024:4212RHSA-2024:4212 https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://errata.almalinux.org/9/ALSA-2024-4212.htmlALSA-2024:4212ALSA-2024:4212 sgolang-src-1.21.11-1.el9_4.noarch.rpmsgolang-docs-1.21.11-1.el9_4.noarch.rpm?sgolang-1.21.11-1.el9_4.x86_64.rpmsgolang-tests-1.21.11-1.el9_4.noarch.rpmsgolang-misc-1.21.11-1.el9_4.noarch.rpmpsgo-toolset-1.21.11-1.el9_4.x86_64.rpm@sgolang-bin-1.21.11-1.el9_4.x86_64.rpmsgolang-src-1.21.11-1.el9_4.noarch.rpmsgolang-docs-1.21.11-1.el9_4.noarch.rpm?sgolang-1.21.11-1.el9_4.x86_64.rpmsgolang-tests-1.21.11-1.el9_4.noarch.rpmsgolang-misc-1.21.11-1.el9_4.noarch.rpmpsgo-toolset-1.21.11-1.el9_4.x86_64.rpm@sgolang-bin-1.21.11-1.el9_4.x86_64.rpm^ 4NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security updateQrhttps://access.redhat.com/errata/RHSA-2024:4278RHSA-2024:4278RHSA-2024:4278 https://access.redhat.com/security/cve/CVE-2024-4467CVE-2024-4467CVE-2024-4467https://bugzilla.redhat.com/22788752278875https://errata.almalinux.org/9/ALSA-2024-4278.htmlALSA-2024:4278ALSA-2024:4278 ^Zqemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpmYZqemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpm`Zqemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpm]Zqemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpmUZqemu-kvm-8.2.0-11.el9_4.4.x86_64.rpmdZqemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpmWZqemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpmVZqemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpmTZqemu-img-8.2.0-11.el9_4.4.x86_64.rpm_Zqemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpmZZqemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpmaspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmJzdotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm-zdotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm Bdotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpmdotnet-host-8.0.7-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpmDdotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpmznetstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpmFzdotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmJzdotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm-zdotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm$ %aBBsecurityModerate: openssh security update https://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457 https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457 1pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm0!openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm0!openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpmߴ% *fBBsecurityImportant: firefox security update4https://access.redhat.com/errata/RHSA-2024:4500RHSA-2024:4500RHSA-2024:4500 https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4500.htmlALSA-2024:4500ALSA-2024:4500 9zfirefox-115.13.0-3.el9_4.alma.1.x86_64.rpmOzfirefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm9zfirefox-115.13.0-3.el9_4.alma.1.x86_64.rpmOzfirefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm߱m& /kBBsecurityImportant: skopeo security updateGNhttps://access.redhat.com/errata/RHSA-2024:4502RHSA-2024:4502RHSA-2024:4502 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4502.htmlALSA-2024:4502ALSA-2024:4502 :7skopeo-1.14.3-3.el9_4.x86_64.rpm;7skopeo-tests-1.14.3-3.el9_4.x86_64.rpm:7skopeo-1.14.3-3.el9_4.x86_64.rpm;7skopeo-tests-1.14.3-3.el9_4.x86_64.rpm߱ ' libreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpmklibreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm`libreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpm libreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm\libreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmblibreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmrlibreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm(autocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.autocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpmYlibreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpmylibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpmulibreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4autocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpm.libreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmclibreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpmflibreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpmllibreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!autocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpm\libreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm|libreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmolibreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&autocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpm#autocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmFlibreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmalibreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1]libreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpmLlibreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmKlibreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpm0autocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpm:libreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"autocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpm%libreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmHlibreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUlibreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm?libreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpm}libreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmvlibreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm~libreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpm8autocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpmXlibreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm+autocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmmlibreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-autocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpm libreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpmJlibreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpmelibreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm6autocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpm'libreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*autocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpmIlibreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm)autocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpm/autocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpm"libreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpmZlibreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,autocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpm_libreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpm0libreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm[libreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpm7autocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpm{libreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpmOlibreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm@libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3autocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpm2autocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpmilibreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$autocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm[libreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpmslibreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmxlibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpmGlibreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPlibreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm^libreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1autocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmplibreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpmAlibreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpmwlibreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm5autocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYlibreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpm autocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpm%autocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpm$libreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpm8libreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpmklibreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm`libreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpm libreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm\libreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmblibreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmrlibreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm(autocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.autocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpmYlibreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTlibreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpmylibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpmulibreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4autocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpm.libreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmclibreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmzlibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpmflibreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpmllibreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!autocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpm\libreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm|libreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmolibreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&autocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpm#autocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmFlibreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmalibreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]libreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVlibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmb1 ;xBsecurityModerate: libuv security update7whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756 https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756 [@libuv-1.42.0-2.el9_4.i686.rpm[@libuv-1.42.0-2.el9_4.x86_64.rpm[@libuv-1.42.0-2.el9_4.i686.rpm[@libuv-1.42.0-2.el9_4.x86_64.rpm02 4|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update.\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757 https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757  .libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpmF.libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm!.libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpmE.libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpmD.libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpmC.libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpmS.libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpmB.libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpmF.libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm!.libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpmE.libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpmD.libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpmC.libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpmS.libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpmB.libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm 3 7usecurityImportant: containernetworking-plugins security update https://access.redhat.com/errata/RHSA-2024:4761RHSA-2024:4761RHSA-2024:4761 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4761.htmlALSA-2024:4761ALSA-2024:4761 azcontainernetworking-plugins-1.4.0-4.el9_4.x86_64.rpmazcontainernetworking-plugins-1.4.0-4.el9_4.x86_64.rpmf4 :xsecurityImportant: runc security update1https://access.redhat.com/errata/RHSA-2024:4762RHSA-2024:4762RHSA-2024:4762 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4762.htmlALSA-2024:4762ALSA-2024:4762 $trunc-1.1.12-3.el9_4.x86_64.rpm$trunc-1.1.12-3.el9_4.x86_64.rpmW5 {BBBBBBBBsecurityLow: python3 security update/B,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766 cIpython3.11-libs-3.11.7-1.el9_4.3.i686.rpmbIpython3.11-devel-3.11.7-1.el9_4.3.i686.rpmcIpython3.11-libs-3.11.7-1.el9_4.3.x86_64.rpmlIpython3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpmkIpython3.11-3.11.7-1.el9_4.3.x86_64.rpmbIpython3.11-devel-3.11.7-1.el9_4.3.x86_64.rpmcIpython3.11-libs-3.11.7-1.el9_4.3.i686.rpmbIpython3.11-devel-3.11.7-1.el9_4.3.i686.rpmcIpython3.11-libs-3.11.7-1.el9_4.3.x86_64.rpmlIpython3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpmkIpython3.11-3.11.7-1.el9_4.3.x86_64.rpmbIpython3.11-devel-3.11.7-1.el9_4.3.x86_64.rpm6 FBBBBBBBBBBBBsecurityModerate: cups security updaten https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776 https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776  cups-devel-2.3.3op2-27.el9_4.i686.rpmJ cups-client-2.3.3op2-27.el9_4.x86_64.rpmM cups-printerapp-2.3.3op2-27.el9_4.x86_64.rpm9 cups-filesystem-2.3.3op2-27.el9_4.noarch.rpmK cups-ipptool-2.3.3op2-27.el9_4.x86_64.rpm cups-devel-2.3.3op2-27.el9_4.x86_64.rpmI cups-2.3.3op2-27.el9_4.x86_64.rpmL cups-lpd-2.3.3op2-27.el9_4.x86_64.rpm cups-devel-2.3.3op2-27.el9_4.i686.rpmJ cups-client-2.3.3op2-27.el9_4.x86_64.rpmM cups-printerapp-2.3.3op2-27.el9_4.x86_64.rpm9 cups-filesystem-2.3.3op2-27.el9_4.noarch.rpmK cups-ipptool-2.3.3op2-27.el9_4.x86_64.rpm cups-devel-2.3.3op2-27.el9_4.x86_64.rpmI cups-2.3.3op2-27.el9_4.x86_64.rpmL cups-lpd-2.3.3op2-27.el9_4.x86_64.rpm7 UBBBBsecurityLow: python3 security update/x,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 W+python3-devel-3.9.18-3.el9_4.3.x86_64.rpmj+python-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm=+python3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmW+python3-devel-3.9.18-3.el9_4.3.i686.rpmW+python3-devel-3.9.18-3.el9_4.3.x86_64.rpmj+python-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm=+python3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmW+python3-devel-3.9.18-3.el9_4.3.i686.rpm78 \securityModerate: squid security update$~https://access.redhat.com/errata/RHSA-2024:4861RHSA-2024:4861RHSA-2024:4861 https://access.redhat.com/security/cve/CVE-2024-23638CVE-2024-23638CVE-2024-23638https://access.redhat.com/security/cve/CVE-2024-37894CVE-2024-37894CVE-2024-37894https://bugzilla.redhat.com/22600512260051https://bugzilla.redhat.com/22943532294353https://errata.almalinux.org/9/ALSA-2024-4861.htmlALSA-2024:4861ALSA-2024:4861  squid-5.5-13.el9_4.x86_64.rpm squid-5.5-13.el9_4.x86_64.rpmI9 0_BBBBBBBBBBBBBBBsecurityModerate: kernel security update"1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928 %.perf-5.14.0-427.28.1.el9_4.x86_64.rpm$.kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm#.kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm.kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm'.rtla-5.14.0-427.28.1.el9_4.x86_64.rpm".kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm&.kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm!.kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm).rv-5.14.0-427.28.1.el9_4.x86_64.rpm %.perf-5.14.0-427.28.1.el9_4.x86_64.rpm$.kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm#.kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm.kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm'.rtla-5.14.0-427.28.1.el9_4.x86_64.rpm".kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm&.kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm!.kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm).rv-5.14.0-427.28.1.el9_4.x86_64.rpmM: ?qBBBBBBBBBBBBsecurityImportant: freeradius security updateSGhttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935 G{freeradius-krb5-3.0.21-40.el9_4.x86_64.rpmE{freeradius-devel-3.0.21-40.el9_4.x86_64.rpmw{python3-freeradius-3.0.21-40.el9_4.x86_64.rpmF{freeradius-doc-3.0.21-40.el9_4.x86_64.rpmH{freeradius-ldap-3.0.21-40.el9_4.x86_64.rpmI{freeradius-utils-3.0.21-40.el9_4.x86_64.rpmD{freeradius-3.0.21-40.el9_4.x86_64.rpmG{freeradius-krb5-3.0.21-40.el9_4.x86_64.rpmE{freeradius-devel-3.0.21-40.el9_4.x86_64.rpmw{python3-freeradius-3.0.21-40.el9_4.x86_64.rpmF{freeradius-doc-3.0.21-40.el9_4.x86_64.rpmH{freeradius-ldap-3.0.21-40.el9_4.x86_64.rpmI{freeradius-utils-3.0.21-40.el9_4.x86_64.rpmD{freeradius-3.0.21-40.el9_4.x86_64.rpmʚN; @BBBBBBBBBBBBBBBBBBsecurityImportant: httpd security update.https://access.redhat.com/errata/RHSA-2024:5138RHSA-2024:5138RHSA-2024:5138 https://access.redhat.com/security/cve/CVE-2024-38476CVE-2024-38476CVE-2024-38476https://bugzilla.redhat.com/22950152295015https://errata.almalinux.org/9/ALSA-2024-5138.htmlALSA-2024:5138ALSA-2024:5138 Gmod_ldap-2.4.57-11.el9_4.1.x86_64.rpmkGhttpd-2.4.57-11.el9_4.1.x86_64.rpm$mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm3Ghttpd-manual-2.4.57-11.el9_4.1.noarch.rpmmGhttpd-devel-2.4.57-11.el9_4.1.x86_64.rpm2Ghttpd-filesystem-2.4.57-11.el9_4.1.noarch.rpmGmod_lua-2.4.57-11.el9_4.1.x86_64.rpmGmod_session-2.4.57-11.el9_4.1.x86_64.rpmlGhttpd-core-2.4.57-11.el9_4.1.x86_64.rpm$mod_ssl-2.4.57-11.el9_4.1.x86_64.rpmnGhttpd-tools-2.4.57-11.el9_4.1.x86_64.rpm Gmod_ldap-2.4.57-11.el9_4.1.x86_64.rpmkGhttpd-2.4.57-11.el9_4.1.x86_64.rpm$mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm3Ghttpd-manual-2.4.57-11.el9_4.1.noarch.rpmmGhttpd-devel-2.4.57-11.el9_4.1.x86_64.rpm2Ghttpd-filesystem-2.4.57-11.el9_4.1.noarch.rpmGmod_lua-2.4.57-11.el9_4.1.x86_64.rpmGmod_session-2.4.57-11.el9_4.1.x86_64.rpmlGhttpd-core-2.4.57-11.el9_4.1.x86_64.rpm$mod_ssl-2.4.57-11.el9_4.1.x86_64.rpmnGhttpd-tools-2.4.57-11.el9_4.1.x86_64.rpmԫ}< UBBBsecurityModerate: 389-ds-base security updateHjhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192 https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192 6z389-ds-base-2.4.5-9.el9_4.x86_64.rpmRzpython3-lib389-2.4.5-9.el9_4.noarch.rpm7z389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm6z389-ds-base-2.4.5-9.el9_4.x86_64.rpmRzpython3-lib389-2.4.5-9.el9_4.noarch.rpm7z389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm>= *[BBBBBBBBBBBBBsecurityImportant: bind and bind-dyndb-ldap security update2"https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231 https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231 _Lbind-libs-9.16.23-18.el9_4.6.x86_64.rpm`Lbind-utils-9.16.23-18.el9_4.6.x86_64.rpm9Lpython3-bind-9.16.23-18.el9_4.6.noarch.rpm]Lbind-chroot-9.16.23-18.el9_4.6.x86_64.rpmoYbind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpm,Lbind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm-Lbind-license-9.16.23-18.el9_4.6.noarch.rpm\Lbind-9.16.23-18.el9_4.6.x86_64.rpm^Lbind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm _Lbind-libs-9.16.23-18.el9_4.6.x86_64.rpm`Lbind-utils-9.16.23-18.el9_4.6.x86_64.rpm9Lpython3-bind-9.16.23-18.el9_4.6.noarch.rpm]Lbind-chroot-9.16.23-18.el9_4.6.x86_64.rpmoYbind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpm,Lbind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm-Lbind-license-9.16.23-18.el9_4.6.noarch.rpm\Lbind-9.16.23-18.el9_4.6.x86_64.rpm^Lbind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpmq> -ksecurityImportant: python3.11-setuptools security updateThttps://access.redhat.com/errata/RHSA-2024:5279RHSA-2024:5279RHSA-2024:5279 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5279.htmlALSA-2024:5279ALSA-2024:5279 |'python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm{'python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm|'python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm{'python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm5? 2nBBsecurityImportant: firefox security updatekhttps://access.redhat.com/errata/RHSA-2024:5322RHSA-2024:5322RHSA-2024:5322 https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7524CVE-2024-7524CVE-2024-7524https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031412303141https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5322.htmlALSA-2024:5322ALSA-2024:5322 Ofirefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm9firefox-115.14.0-2.el9_4.alma.1.x86_64.rpmOfirefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm9firefox-115.14.0-2.el9_4.alma.1.x86_64.rpm^@ sBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security update|}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334 https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334 J{dotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpm{netstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpm-{dotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpmBdotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmF{dotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpmDdotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmdotnet-host-8.0.8-1.el9_4.x86_64.rpm J{dotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpm{netstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpm-{dotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpmBdotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmF{dotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpmDdotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmdotnet-host-8.0.8-1.el9_4.x86_64.rpmVA NBBBBBBBBBBBBBBBsecurityImportant: kernel security updatey4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363 $/kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm&/kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm)/rv-5.14.0-427.31.1.el9_4.x86_64.rpm#/kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm'/rtla-5.14.0-427.31.1.el9_4.x86_64.rpm"/kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm/kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm%/perf-5.14.0-427.31.1.el9_4.x86_64.rpm!/kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm $/kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm&/kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm)/rv-5.14.0-427.31.1.el9_4.x86_64.rpm#/kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm'/rtla-5.14.0-427.31.1.el9_4.x86_64.rpm"/kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm/kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm%/perf-5.14.0-427.31.1.el9_4.x86_64.rpm!/kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpmyB "`securityImportant: thunderbird security update-https://access.redhat.com/errata/RHSA-2024:5392RHSA-2024:5392RHSA-2024:5392 https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5392.htmlALSA-2024:5392ALSA-2024:5392 :_thunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpm:_thunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpmfC &cBsecurityModerate: curl security updateD(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529 https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529 libcurl-devel-7.76.1-29.el9_4.1.i686.rpmlibcurl-devel-7.76.1-29.el9_4.1.x86_64.rpmlibcurl-devel-7.76.1-29.el9_4.1.i686.rpmlibcurl-devel-7.76.1-29.el9_4.1.x86_64.rpm*D ('securityImportant: python3.12-setuptools security updatelhttps://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533 ~qpython3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm~qpython3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm_E #iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583 https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583 1xlibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-autocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpm\libreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpmplibreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm8autocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpm)autocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpmHlibreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmylibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpmclibreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmulibreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm autocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpm[libreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm`libreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmblibreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm(autocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpmZlibreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmllibreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpmelibreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,autocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpm"libreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmilibreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%autocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpm!autocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpmrlibreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7autocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpm libreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpmhlibreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm|libreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmAlibreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpm{libreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm3autocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpmolibreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpmVlibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm"autocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpm0libreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm~libreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0autocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpmzlibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/autocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpm]libreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmslibreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*autocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpmklibreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm[libreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\libreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&autocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpmMlibreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpm?libreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmalibreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]libreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$autocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpm(libreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpmwlibreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpmmlibreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpm_libreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4autocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpm.autocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpm'libreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm6autocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpm/libreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1autocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm@libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#autocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmUlibreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpmvlibreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpmflibreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpm5autocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpmPlibreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpm2autocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpmTlibreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+autocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpmGlibreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpmLlibreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm}libreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1xlibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmBlibreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-autocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpm\libreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpmplibreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm8autocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpm)autocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpmHlibreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmylibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpmclibreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmulibreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm autocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpm[libreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm`libreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmblibreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm(autocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpmZlibreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmllibreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpmelibreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,autocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpm"libreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmilibreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%autocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpm!autocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpmrlibreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7autocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpm libreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpmhlibreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm|libreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdlibreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmAlibreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpm{libreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm<libreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm3autocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpmolibreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSlibreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpmVlibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm"autocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpm0libreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpmClibreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm~libreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0autocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpmzlibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/autocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpm]libreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmslibreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmIlibreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*autocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpmtlibreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpmklibreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm[libreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNlibreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\libreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&autocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpmMlibreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm;libreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpm?libreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjlibreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmalibreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpmnlibreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmRlibreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]libreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$autocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpm(libreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmZlibreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpmwlibreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpmmlibreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#libreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpm_libreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4autocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpm.autocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpm'libreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm6autocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpm/libreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1autocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm@libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#autocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmUlibreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpmvlibreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpmflibreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmLlibreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpm5autocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpmPlibreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpm2autocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpmTlibreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+autocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpmGlibreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpmqlibreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpmLlibreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm}libreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOlibreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmF ,dBBBBBBsecurityImportant: tomcat security update~|https://access.redhat.com/errata/RHSA-2024:5693RHSA-2024:5693RHSA-2024:5693 https://access.redhat.com/security/cve/CVE-2024-34750CVE-2024-34750CVE-2024-34750https://bugzilla.redhat.com/22956512295651https://errata.almalinux.org/9/ALSA-2024-5693.htmlALSA-2024:5693ALSA-2024:5693 >~tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm@~tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpmA~tomcat-lib-9.0.87-1.el9_4.2.noarch.rpmB~tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpmC~tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm=~tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm?~tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm<~tomcat-9.0.87-1.el9_4.2.noarch.rpm>~tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm@~tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpmA~tomcat-lib-9.0.87-1.el9_4.2.noarch.rpmB~tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpmC~tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm=~tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm?~tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm<~tomcat-9.0.87-1.el9_4.2.noarch.rpmG 6kBQrBBBBBBBsecurityModerate: nodejs:20 security updatez(https://access.redhat.com/errata/RHSA-2024:5815RHSA-2024:5815RHSA-2024:5815 https://access.redhat.com/security/cve/CVE-2024-22018CVE-2024-22018CVE-2024-22018https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-36137CVE-2024-36137CVE-2024-36137https://bugzilla.redhat.com/22964172296417https://bugzilla.redhat.com/22969902296990https://bugzilla.redhat.com/22992812299281https://errata.almalinux.org/9/ALSA-2024-5815.htmlALSA-2024:5815ALSA-2024:5815 5 (eTnodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpmLTnodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm5Tnodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm"Tnodejs-devel-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm{enodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmanpm-10.8.1-1.20.16.0.1.module_el9.4.0+107+dbd477e4.x86_64.rpm5 (eTnodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpmLTnodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm5Tnodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm"Tnodejs-devel-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm{enodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmanpm-10.8.1-1.20.16.0.1.module_el9.4.0+107+dbd477e4.x86_64.rpmiH wBBBBBBBBBBBBBBBsecurityImportant: kernel security update"Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928 $0kernel-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm"0kernel-debug-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm#0kernel-devel-5.14.0-427.33.1.el9_4.x86_64.rpm&0kernel-headers-5.14.0-427.33.1.el9_4.x86_64.rpm%0perf-5.14.0-427.33.1.el9_4.x86_64.rpm'0rtla-5.14.0-427.33.1.el9_4.x86_64.rpm!0kernel-debug-devel-5.14.0-427.33.1.el9_4.x86_64.rpm0kernel-doc-5.14.0-427.33.1.el9_4.noarch.rpm)0rv-5.14.0-427.33.1.el9_4.x86_64.rpm $0kernel-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm"0kernel-debug-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm#0kernel-devel-5.14.0-427.33.1.el9_4.x86_64.rpm&0kernel-headers-5.14.0-427.33.1.el9_4.x86_64.rpm%0perf-5.14.0-427.33.1.el9_4.x86_64.rpm'0rtla-5.14.0-427.33.1.el9_4.x86_64.rpm!0kernel-debug-devel-5.14.0-427.33.1.el9_4.x86_64.rpm0kernel-doc-5.14.0-427.33.1.el9_4.noarch.rpm)0rv-5.14.0-427.33.1.el9_4.x86_64.rpm&I (tBBBSBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update:lhttps://access.redhat.com/errata/RHSA-2024:5929RHSA-2024:5929RHSA-2024:5929 https://access.redhat.com/security/cve/CVE-2024-4317CVE-2024-4317CVE-2024-4317https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/22799352279935https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5929.htmlALSA-2024:5929ALSA-2024:5929 ` (upostgresql-server-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-upgrade-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm,upostgresql-server-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-test-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm)upostgresql-plpython3-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm`upostgresql-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-static-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm+upostgresql-private-libs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmkupostgresql-test-rpm-macros-16.4-1.module_el9.4.0+109+624ac33a.noarch.rpm(upostgresql-plperl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm*upostgresql-pltcl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm-upostgresql-upgrade-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm upostgresql-docs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm'upostgresql-contrib-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-private-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm @pg_repack-1.4.8-1.module_el9.4.0+66+eb9878bc.x86_64.rpm` (upostgresql-server-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-upgrade-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm,upostgresql-server-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-test-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm)upostgresql-plpython3-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm`upostgresql-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-static-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm+upostgresql-private-libs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmkupostgresql-test-rpm-macros-16.4-1.module_el9.4.0+109+624ac33a.noarch.rpm(upostgresql-plperl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm*upostgresql-pltcl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm-upostgresql-upgrade-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm upostgresql-docs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm'upostgresql-contrib-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmupostgresql-private-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm @pg_repack-1.4.8-1.module_el9.4.0+66+eb9878bc.x86_64.rpmJ 9iBBBBBBBBBBBBBBsecurityImportant: postgresql security update&https://access.redhat.com/errata/RHSA-2024:5999RHSA-2024:5999RHSA-2024:5999 https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5999.htmlALSA-2024:5999ALSA-2024:5999 *wpostgresql-pltcl-13.16-1.el9_4.x86_64.rpm)wpostgresql-plpython3-13.16-1.el9_4.x86_64.rpm'wpostgresql-contrib-13.16-1.el9_4.x86_64.rpm`wpostgresql-13.16-1.el9_4.x86_64.rpm,wpostgresql-server-13.16-1.el9_4.x86_64.rpm-wpostgresql-upgrade-13.16-1.el9_4.x86_64.rpm+wpostgresql-private-libs-13.16-1.el9_4.x86_64.rpm(wpostgresql-plperl-13.16-1.el9_4.x86_64.rpm*wpostgresql-pltcl-13.16-1.el9_4.x86_64.rpm)wpostgresql-plpython3-13.16-1.el9_4.x86_64.rpm'wpostgresql-contrib-13.16-1.el9_4.x86_64.rpm`wpostgresql-13.16-1.el9_4.x86_64.rpm,wpostgresql-server-13.16-1.el9_4.x86_64.rpm-wpostgresql-upgrade-13.16-1.el9_4.x86_64.rpm+wpostgresql-private-libs-13.16-1.el9_4.x86_64.rpm(wpostgresql-plperl-13.16-1.el9_4.x86_64.rpmzK pBBBHBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update+lhttps://access.redhat.com/errata/RHSA-2024:6020RHSA-2024:6020RHSA-2024:6020 https://access.redhat.com/security/cve/CVE-2024-4317CVE-2024-4317CVE-2024-4317https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/22799352279935https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-6020.htmlALSA-2024:6020ALSA-2024:6020 ` ()rpostgresql-plpython3-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmrpostgresql-upgrade-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm`rpostgresql-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm(rpostgresql-plperl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm,rpostgresql-server-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm rpostgresql-docs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm*rpostgresql-pltcl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm ?pg_repack-1.4.8-1.module_el9.3.0+52+21733919.x86_64.rpm+rpostgresql-private-libs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmrpostgresql-private-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm-rpostgresql-upgrade-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmrpostgresql-server-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmrpostgresql-static-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm'rpostgresql-contrib-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmkrpostgresql-test-rpm-macros-15.8-1.module_el9.4.0+111+667b9e9e.noarch.rpmrpostgresql-test-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm` ()rpostgresql-plpython3-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmrpostgresql-upgrade-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm`rpostgresql-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm(rpostgresql-plperl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm,rpostgresql-server-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm rpostgresql-docs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm*rpostgresql-pltcl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm ?pg_repack-1.4.8-1.module_el9.3.0+52+21733919.x86_64.rpm+rpostgresql-private-libs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmrpostgresql-private-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm-rpostgresql-upgrade-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmrpostgresql-server-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmrpostgresql-static-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm'rpostgresql-contrib-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmkrpostgresql-test-rpm-macros-15.8-1.module_el9.4.0+111+667b9e9e.noarch.rpmrpostgresql-test-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmKL $ZBBBBBBBBsecurityModerate: python3.12 security updatehttps://access.redhat.com/errata/RHSA-2024:6146RHSA-2024:6146RHSA-2024:6146 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6146.htmlALSA-2024:6146ALSA-2024:6146 #Ppython3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpmPpython3.12-devel-3.12.1-4.el9_4.3.x86_64.rpmPpython3.12-libs-3.12.1-4.el9_4.3.i686.rpmPpython3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm"Ppython3.12-3.12.1-4.el9_4.3.x86_64.rpmPpython3.12-devel-3.12.1-4.el9_4.3.i686.rpm#Ppython3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpmPpython3.12-devel-3.12.1-4.el9_4.3.x86_64.rpmPpython3.12-libs-3.12.1-4.el9_4.3.i686.rpmPpython3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm"Ppython3.12-3.12.1-4.el9_4.3.x86_64.rpmPpython3.12-devel-3.12.1-4.el9_4.3.i686.rpm&M ._BFABBBBBBBsecurityModerate: nodejs:18 security update3https://access.redhat.com/errata/RHSA-2024:6147RHSA-2024:6147RHSA-2024:6147 https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-28863CVE-2024-28863CVE-2024-28863https://bugzilla.redhat.com/22932002293200https://bugzilla.redhat.com/22964172296417https://errata.almalinux.org/9/ALSA-2024-6147.htmlALSA-2024:6147ALSA-2024:6147 57({hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmePnodejs-full-i18n-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm5Pnodejs-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpmLPnodejs-docs-18.20.4-1.module_el9.4.0+112+bb28ff81.noarch.rpmanpm-10.7.0-1.18.20.4.1.module_el9.4.0+112+bb28ff81.x86_64.rpm"Pnodejs-devel-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm57({hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm onodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmePnodejs-full-i18n-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm onodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm5Pnodejs-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpmLPnodejs-docs-18.20.4-1.module_el9.4.0+112+bb28ff81.noarch.rpmanpm-10.7.0-1.18.20.4.1.module_el9.4.0+112+bb28ff81.x86_64.rpm"Pnodejs-devel-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpmܕN 5oBBBBsecurityModerate: python3.9 security updateGhhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163 W,python3-devel-3.9.18-3.el9_4.5.x86_64.rpm=,python3-tkinter-3.9.18-3.el9_4.5.x86_64.rpmW,python3-devel-3.9.18-3.el9_4.5.i686.rpmj,python-unversioned-command-3.9.18-3.el9_4.5.noarch.rpmW,python3-devel-3.9.18-3.el9_4.5.x86_64.rpm=,python3-tkinter-3.9.18-3.el9_4.5.x86_64.rpmW,python3-devel-3.9.18-3.el9_4.5.i686.rpmj,python-unversioned-command-3.9.18-3.el9_4.5.noarch.rpmO 9vBsecurityModerate: krb5 security update/https://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166 https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166 >-krb5-devel-1.21.1-2.el9_4.i686.rpm>-krb5-devel-1.21.1-2.el9_4.x86_64.rpm>-krb5-devel-1.21.1-2.el9_4.i686.rpm>-krb5-devel-1.21.1-2.el9_4.x86_64.rpmP zBBBBBBBBsecurityModerate: python3.11 security update5hhttps://access.redhat.com/errata/RHSA-2024:6179RHSA-2024:6179RHSA-2024:6179 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6179.htmlALSA-2024:6179ALSA-2024:6179 cJpython3.11-libs-3.11.7-1.el9_4.5.i686.rpmbJpython3.11-devel-3.11.7-1.el9_4.5.x86_64.rpmbJpython3.11-devel-3.11.7-1.el9_4.5.i686.rpmkJpython3.11-3.11.7-1.el9_4.5.x86_64.rpmcJpython3.11-libs-3.11.7-1.el9_4.5.x86_64.rpmlJpython3.11-tkinter-3.11.7-1.el9_4.5.x86_64.rpmcJpython3.11-libs-3.11.7-1.el9_4.5.i686.rpmbJpython3.11-devel-3.11.7-1.el9_4.5.x86_64.rpmbJpython3.11-devel-3.11.7-1.el9_4.5.i686.rpmkJpython3.11-3.11.7-1.el9_4.5.x86_64.rpmcJpython3.11-libs-3.11.7-1.el9_4.5.x86_64.rpmlJpython3.11-tkinter-3.11.7-1.el9_4.5.x86_64.rpm7Q EBBBBBBsecurityModerate: orc security updateQhttps://access.redhat.com/errata/RHSA-2024:6184RHSA-2024:6184RHSA-2024:6184 https://access.redhat.com/security/cve/CVE-2024-40897CVE-2024-40897CVE-2024-40897https://bugzilla.redhat.com/23000102300010https://errata.almalinux.org/9/ALSA-2024-6184.htmlALSA-2024:6184ALSA-2024:6184 eworc-devel-0.4.31-7.el9_4.i686.rpmdworc-0.4.31-7.el9_4.x86_64.rpmeworc-devel-0.4.31-7.el9_4.x86_64.rpmPworc-compiler-0.4.31-7.el9_4.x86_64.rpmdworc-0.4.31-7.el9_4.i686.rpmeworc-devel-0.4.31-7.el9_4.i686.rpmdworc-0.4.31-7.el9_4.x86_64.rpmeworc-devel-0.4.31-7.el9_4.x86_64.rpmPworc-compiler-0.4.31-7.el9_4.x86_64.rpmdworc-0.4.31-7.el9_4.i686.rpm,R NsecurityModerate: containernetworking-plugins security updatenhttps://access.redhat.com/errata/RHSA-2024:6186RHSA-2024:6186RHSA-2024:6186 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6186.htmlALSA-2024:6186ALSA-2024:6186 a{containernetworking-plugins-1.4.0-5.el9_4.x86_64.rpma{containernetworking-plugins-1.4.0-5.el9_4.x86_64.rpmmS QsecurityModerate: gvisor-tap-vsock security update}Ohttps://access.redhat.com/errata/RHSA-2024:6187RHSA-2024:6187RHSA-2024:6187 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6187.htmlALSA-2024:6187ALSA-2024:6187 9 gvisor-tap-vsock-0.7.3-5.el9_4.alma.1.x86_64.rpm9 gvisor-tap-vsock-0.7.3-5.el9_4.alma.1.x86_64.rpmܜQT TsecurityModerate: runc security updateL9https://access.redhat.com/errata/RHSA-2024:6188RHSA-2024:6188RHSA-2024:6188 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6188.htmlALSA-2024:6188ALSA-2024:6188 $urunc-1.1.12-4.el9_4.x86_64.rpm$urunc-1.1.12-4.el9_4.x86_64.rpm:U WBBsecurityModerate: buildah security updatehttps://access.redhat.com/errata/RHSA-2024:6189RHSA-2024:6189RHSA-2024:6189 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6189.htmlALSA-2024:6189ALSA-2024:6189 8Cbuildah-tests-1.33.7-4.el9_4.x86_64.rpm7Cbuildah-1.33.7-4.el9_4.x86_64.rpm8Cbuildah-tests-1.33.7-4.el9_4.x86_64.rpm7Cbuildah-1.33.7-4.el9_4.x86_64.rpmܛ}V \securityModerate: wget security updatehttps://access.redhat.com/errata/RHSA-2024:6192RHSA-2024:6192RHSA-2024:6192 https://access.redhat.com/security/cve/CVE-2024-38428CVE-2024-38428CVE-2024-38428https://bugzilla.redhat.com/22928362292836https://errata.almalinux.org/9/ALSA-2024-6192.htmlALSA-2024:6192ALSA-2024:6192 B6wget-1.21.1-8.el9_4.x86_64.rpmB6wget-1.21.1-8.el9_4.x86_64.rpmfW (_BBBBBBBsecurityImportant: podman security update=https://access.redhat.com/errata/RHSA-2024:6194RHSA-2024:6194RHSA-2024:6194 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-37298CVE-2024-37298CVE-2024-37298https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22950102295010https://errata.almalinux.org/9/ALSA-2024-6194.htmlALSA-2024:6194ALSA-2024:6194 #Kpodman-4.9.4-10.el9_4.x86_64.rpm&Kpodman-tests-4.9.4-10.el9_4.x86_64.rpm%Kpodman-remote-4.9.4-10.el9_4.x86_64.rpmfKpodman-docker-4.9.4-10.el9_4.noarch.rpm$Kpodman-plugins-4.9.4-10.el9_4.x86_64.rpm#Kpodman-4.9.4-10.el9_4.x86_64.rpm&Kpodman-tests-4.9.4-10.el9_4.x86_64.rpm%Kpodman-remote-4.9.4-10.el9_4.x86_64.rpmfKpodman-docker-4.9.4-10.el9_4.noarch.rpm$Kpodman-plugins-4.9.4-10.el9_4.x86_64.rpmX -iBBsecurityModerate: skopeo security update[Vhttps://access.redhat.com/errata/RHSA-2024:6195RHSA-2024:6195RHSA-2024:6195 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6195.htmlALSA-2024:6195ALSA-2024:6195 :8skopeo-1.14.5-1.el9_4.x86_64.rpm;8skopeo-tests-1.14.5-1.el9_4.x86_64.rpm:8skopeo-1.14.5-1.el9_4.x86_64.rpm;8skopeo-tests-1.14.5-1.el9_4.x86_64.rpmܛ'Y )ghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm=)ghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm?)libgs-9.54.0-17.el9_4.x86_64.rpm;)ghostscript-9.54.0-17.el9_4.x86_64.rpm )ghostscript-doc-9.54.0-17.el9_4.noarch.rpm?)ghostscript-x11-9.54.0-17.el9_4.x86_64.rpm<)ghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm?)libgs-9.54.0-17.el9_4.i686.rpm>)ghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm=)ghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm?)libgs-9.54.0-17.el9_4.x86_64.rpm;)ghostscript-9.54.0-17.el9_4.x86_64.rpm )ghostscript-doc-9.54.0-17.el9_4.noarch.rpm?)ghostscript-x11-9.54.0-17.el9_4.x86_64.rpm<)ghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm?)libgs-9.54.0-17.el9_4.i686.rpm1Z }BBBBBBsecurityImportant: bubblewrap and flatpak security update~Jhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356 [{flatpak-libs-1.12.9-3.el9_4.x86_64.rpm6{flatpak-selinux-1.12.9-3.el9_4.noarch.rpmO{flatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm[{flatpak-libs-1.12.9-3.el9_4.i686.rpmN{flatpak-1.12.9-3.el9_4.x86_64.rpm[{flatpak-libs-1.12.9-3.el9_4.x86_64.rpm6{flatpak-selinux-1.12.9-3.el9_4.noarch.rpmO{flatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm[{flatpak-libs-1.12.9-3.el9_4.i686.rpmN{flatpak-1.12.9-3.el9_4.x86_64.rpmi[ FBBBBsecurityModerate: glib2 security updateH https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464 https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464 8glib2-doc-2.68.4-14.el9_4.1.noarch.rpm]glib2-devel-2.68.4-14.el9_4.1.i686.rpm]glib2-devel-2.68.4-14.el9_4.1.x86_64.rpmQglib2-tests-2.68.4-14.el9_4.1.x86_64.rpm8glib2-doc-2.68.4-14.el9_4.1.noarch.rpm]glib2-devel-2.68.4-14.el9_4.1.i686.rpm]glib2-devel-2.68.4-14.el9_4.1.x86_64.rpmQglib2-tests-2.68.4-14.el9_4.1.x86_64.rpm3\ MBBBBBBBsecurityModerate: emacs security updateUjhttps://access.redhat.com/errata/RHSA-2024:6510RHSA-2024:6510RHSA-2024:6510 https://access.redhat.com/security/cve/CVE-2024-39331CVE-2024-39331CVE-2024-39331https://bugzilla.redhat.com/22939422293942https://errata.almalinux.org/9/ALSA-2024-6510.htmlALSA-2024:6510ALSA-2024:6510 =emacs-lucid-27.2-10.el9_4.x86_64.rpm=emacs-27.2-10.el9_4.x86_64.rpm=emacs-common-27.2-10.el9_4.x86_64.rpm=emacs-nox-27.2-10.el9_4.x86_64.rpm=emacs-filesystem-27.2-10.el9_4.noarch.rpm=emacs-lucid-27.2-10.el9_4.x86_64.rpm=emacs-27.2-10.el9_4.x86_64.rpm=emacs-common-27.2-10.el9_4.x86_64.rpm=emacs-nox-27.2-10.el9_4.x86_64.rpm=emacs-filesystem-27.2-10.el9_4.noarch.rpm] WBBBBBBsecurityModerate: dovecot security update?,https://access.redhat.com/errata/RHSA-2024:6529RHSA-2024:6529RHSA-2024:6529 https://access.redhat.com/security/cve/CVE-2024-23184CVE-2024-23184CVE-2024-23184https://access.redhat.com/security/cve/CVE-2024-23185CVE-2024-23185CVE-2024-23185https://bugzilla.redhat.com/23059092305909https://bugzilla.redhat.com/23059102305910https://errata.almalinux.org/9/ALSA-2024-6529.htmlALSA-2024:6529ALSA-2024:6529 >tdovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm=tdovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpmtdovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm=tdovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpmtBBBBBBBBsecurityModerate: golang security updateeMhttps://access.redhat.com/errata/RHSA-2024:7550RHSA-2024:7550RHSA-2024:7550 https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2024-7550.htmlALSA-2024:7550ALSA-2024:7550 pugo-toolset-1.21.13-4.el9_4.x86_64.rpmugolang-misc-1.21.13-4.el9_4.noarch.rpmugolang-tests-1.21.13-4.el9_4.noarch.rpm?ugolang-1.21.13-4.el9_4.x86_64.rpmugolang-src-1.21.13-4.el9_4.noarch.rpm@ugolang-bin-1.21.13-4.el9_4.x86_64.rpmugolang-docs-1.21.13-4.el9_4.noarch.rpmpugo-toolset-1.21.13-4.el9_4.x86_64.rpmugolang-misc-1.21.13-4.el9_4.noarch.rpmugolang-tests-1.21.13-4.el9_4.noarch.rpm?ugolang-1.21.13-4.el9_4.x86_64.rpmugolang-src-1.21.13-4.el9_4.noarch.rpm@ugolang-bin-1.21.13-4.el9_4.x86_64.rpmugolang-docs-1.21.13-4.el9_4.noarch.rpmr securityImportant: thunderbird security update2`https://access.redhat.com/errata/RHSA-2024:7552RHSA-2024:7552RHSA-2024:7552 https://access.redhat.com/security/cve/CVE-2024-9392CVE-2024-9392CVE-2024-9392https://access.redhat.com/security/cve/CVE-2024-9393CVE-2024-9393CVE-2024-9393https://access.redhat.com/security/cve/CVE-2024-9394CVE-2024-9394CVE-2024-9394https://access.redhat.com/security/cve/CVE-2024-9396CVE-2024-9396CVE-2024-9396https://access.redhat.com/security/cve/CVE-2024-9397CVE-2024-9397CVE-2024-9397https://access.redhat.com/security/cve/CVE-2024-9398CVE-2024-9398CVE-2024-9398https://access.redhat.com/security/cve/CVE-2024-9399CVE-2024-9399CVE-2024-9399https://access.redhat.com/security/cve/CVE-2024-9400CVE-2024-9400CVE-2024-9400https://access.redhat.com/security/cve/CVE-2024-9401CVE-2024-9401CVE-2024-9401https://access.redhat.com/security/cve/CVE-2024-9402CVE-2024-9402CVE-2024-9402https://access.redhat.com/security/cve/CVE-2024-9403CVE-2024-9403CVE-2024-9403https://bugzilla.redhat.com/23159452315945https://bugzilla.redhat.com/23159472315947https://bugzilla.redhat.com/23159492315949https://bugzilla.redhat.com/23159502315950https://bugzilla.redhat.com/23159512315951https://bugzilla.redhat.com/23159522315952https://bugzilla.redhat.com/23159532315953https://bugzilla.redhat.com/23159542315954https://bugzilla.redhat.com/23159562315956https://bugzilla.redhat.com/23159572315957https://bugzilla.redhat.com/23159592315959https://errata.almalinux.org/9/ALSA-2024-7552.htmlALSA-2024:7552ALSA-2024:7552 :thunderbird-128.3.0-1.el9_4.alma.1.x86_64.rpm:thunderbird-128.3.0-1.el9_4.alma.1.x86_64.rpm5s BBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update"https://access.redhat.com/errata/RHSA-2024:7867RHSA-2024:7867RHSA-2024:7867 https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://errata.almalinux.org/9/ALSA-2024-7867.htmlALSA-2024:7867ALSA-2024:7867 dotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpmaspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpmdotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm `dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm`dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpmdotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpmdotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpmaspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpmdotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm `dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm`dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpmdotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm3t -SBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update4 https://access.redhat.com/errata/RHSA-2024:7869RHSA-2024:7869RHSA-2024:7869 https://access.redhat.com/security/cve/CVE-2024-38229CVE-2024-38229CVE-2024-38229https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://bugzilla.redhat.com/23161612316161https://errata.almalinux.org/9/ALSA-2024-7869.htmlALSA-2024:7869ALSA-2024:7869 Ddotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpmdotnet-host-8.0.10-1.el9_4.x86_64.rpmBdotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpmJ|dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpmF|dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm|netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm-|dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm Ddotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpmdotnet-host-8.0.10-1.el9_4.x86_64.rpmBdotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpmJ|dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpmF|dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm|netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm<aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm-|dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpmQu 2nBBsecurityImportant: firefox security updateJhttps://access.redhat.com/errata/RHSA-2024:7958RHSA-2024:7958RHSA-2024:7958 https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-7958.htmlALSA-2024:7958ALSA-2024:7958 9firefox-128.3.1-2.el9_4.alma.1.x86_64.rpmOfirefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpm9firefox-128.3.1-2.el9_4.alma.1.x86_64.rpmOfirefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpmZv 5ssecurityImportant: thunderbird security updatedihttps://access.redhat.com/errata/RHSA-2024:8025RHSA-2024:8025RHSA-2024:8025 https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-8025.htmlALSA-2024:8025ALSA-2024:8025 :hthunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm:hthunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm@w ?vBBBBBBBsecurityModerate: OpenIPMI security updateM:https://access.redhat.com/errata/RHSA-2024:8037RHSA-2024:8037RHSA-2024:8037 https://access.redhat.com/security/cve/CVE-2024-42934CVE-2024-42934CVE-2024-42934https://bugzilla.redhat.com/23083752308375https://errata.almalinux.org/9/ALSA-2024-8037.htmlALSA-2024:8037ALSA-2024:8037  OpenIPMI-2.0.32-5.el9_4.i686.rpm OpenIPMI-2.0.32-5.el9_4.x86_64.rpm OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpmOpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpmOpenIPMI-libs-2.0.32-5.el9_4.i686.rpm OpenIPMI-2.0.32-5.el9_4.i686.rpm OpenIPMI-2.0.32-5.el9_4.x86_64.rpm OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpmOpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpmOpenIPMI-libs-2.0.32-5.el9_4.i686.rpm`x @BBBBBBBsecurityImportant: podman security update\ https://access.redhat.com/errata/RHSA-2024:8039RHSA-2024:8039RHSA-2024:8039 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8039.htmlALSA-2024:8039ALSA-2024:8039 %Lpodman-remote-4.9.4-13.el9_4.x86_64.rpm#Lpodman-4.9.4-13.el9_4.x86_64.rpm&Lpodman-tests-4.9.4-13.el9_4.x86_64.rpm$Lpodman-plugins-4.9.4-13.el9_4.x86_64.rpmfLpodman-docker-4.9.4-13.el9_4.noarch.rpm%Lpodman-remote-4.9.4-13.el9_4.x86_64.rpm#Lpodman-4.9.4-13.el9_4.x86_64.rpm&Lpodman-tests-4.9.4-13.el9_4.x86_64.rpm$Lpodman-plugins-4.9.4-13.el9_4.x86_64.rpmfLpodman-docker-4.9.4-13.el9_4.noarch.rpm*y JsecurityImportant: containernetworking-plugins security updatecChttps://access.redhat.com/errata/RHSA-2024:8110RHSA-2024:8110RHSA-2024:8110 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8110.htmlALSA-2024:8110ALSA-2024:8110 a|containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpma|containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpmz MBBsecurityImportant: skopeo security update& https://access.redhat.com/errata/RHSA-2024:8111RHSA-2024:8111RHSA-2024:8111 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8111.htmlALSA-2024:8111ALSA-2024:8111 ;9skopeo-tests-1.14.5-2.el9_4.x86_64.rpm:9skopeo-1.14.5-2.el9_4.x86_64.rpm;9skopeo-tests-1.14.5-2.el9_4.x86_64.rpm:9skopeo-1.14.5-2.el9_4.x86_64.rpmy{ RBBsecurityImportant: buildah security update0r https://access.redhat.com/errata/RHSA-2024:8112RHSA-2024:8112RHSA-2024:8112 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8112.htmlALSA-2024:8112ALSA-2024:8112 8Dbuildah-tests-1.33.9-1.el9_4.x86_64.rpm7Dbuildah-1.33.9-1.el9_4.x86_64.rpm8Dbuildah-tests-1.33.9-1.el9_4.x86_64.rpm7Dbuildah-1.33.9-1.el9_4.x86_64.rpmg| #WBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update"r https://access.redhat.com/errata/RHSA-2024:8117RHSA-2024:8117RHSA-2024:8117 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8117.htmlALSA-2024:8117ALSA-2024:8117 56java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm76java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm<6java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm86java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm66java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm;6java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm46java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm56java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm76java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm<6java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm86java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm66java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm;6java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm46java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpmv} 6dBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateq https://access.redhat.com/errata/RHSA-2024:8121RHSA-2024:8121RHSA-2024:8121 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8121.htmlALSA-2024:8121ALSA-2024:8121 tjava-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpmsjava-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpmojava-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpmpjava-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpmvjava-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpmwjava-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpmrjava-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpmujava-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpmqjava-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm tjava-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpmsjava-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpmojava-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpmpjava-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpmvjava-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpmwjava-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpmrjava-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpmujava-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpmqjava-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpmf~ wBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateq https://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124 java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpml JBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatev https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127 ~java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm ~java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm^ .]BBBBBBBBBBBBBBBsecurityModerate: kernel security update <https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162 $3kernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm)3rv-5.14.0-427.40.1.el9_4.x86_64.rpm!3kernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm3kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm'3rtla-5.14.0-427.40.1.el9_4.x86_64.rpm&3kernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm%3perf-5.14.0-427.40.1.el9_4.x86_64.rpm"3kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm#3kernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm $3kernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm)3rv-5.14.0-427.40.1.el9_4.x86_64.rpm!3kernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm3kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm'3rtla-5.14.0-427.40.1.el9_4.x86_64.rpm&3kernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm%3perf-5.14.0-427.40.1.el9_4.x86_64.rpm"3kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm#3kernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm ;oBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateHnhttps://access.redhat.com/errata/RHSA-2024:8180RHSA-2024:8180RHSA-2024:8180 https://access.redhat.com/security/cve/CVE-2024-23271CVE-2024-23271CVE-2024-23271https://access.redhat.com/security/cve/CVE-2024-27820CVE-2024-27820CVE-2024-27820https://access.redhat.com/security/cve/CVE-2024-27838CVE-2024-27838CVE-2024-27838https://access.redhat.com/security/cve/CVE-2024-27851CVE-2024-27851CVE-2024-27851https://access.redhat.com/security/cve/CVE-2024-40776CVE-2024-40776CVE-2024-40776https://access.redhat.com/security/cve/CVE-2024-40779CVE-2024-40779CVE-2024-40779https://access.redhat.com/security/cve/CVE-2024-40780CVE-2024-40780CVE-2024-40780https://access.redhat.com/security/cve/CVE-2024-40782CVE-2024-40782CVE-2024-40782https://access.redhat.com/security/cve/CVE-2024-40789CVE-2024-40789CVE-2024-40789https://access.redhat.com/security/cve/CVE-2024-40866CVE-2024-40866CVE-2024-40866https://access.redhat.com/security/cve/CVE-2024-44187CVE-2024-44187CVE-2024-44187https://bugzilla.redhat.com/23018412301841https://bugzilla.redhat.com/23020672302067https://bugzilla.redhat.com/23020692302069https://bugzilla.redhat.com/23020702302070https://bugzilla.redhat.com/23020712302071https://bugzilla.redhat.com/23127242312724https://bugzilla.redhat.com/23146962314696https://bugzilla.redhat.com/23146982314698https://bugzilla.redhat.com/23147022314702https://bugzilla.redhat.com/23147042314704https://bugzilla.redhat.com/23147062314706https://errata.almalinux.org/9/ALSA-2024-8180.htmlALSA-2024:8180ALSA-2024:8180 4lwebkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm4lwebkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm1lwebkit2gtk3-2.46.1-2.el9_4.x86_64.rpm1lwebkit2gtk3-2.46.1-2.el9_4.i686.rpm2lwebkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm3lwebkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm2lwebkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm3lwebkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm4lwebkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm4lwebkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm1lwebkit2gtk3-2.46.1-2.el9_4.x86_64.rpm1lwebkit2gtk3-2.46.1-2.el9_4.i686.rpm2lwebkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm3lwebkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm2lwebkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm3lwebkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpmi |BBBBBBBBsecurityModerate: python3.11 security update6Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374 cKpython3.11-libs-3.11.7-1.el9_4.6.i686.rpmcKpython3.11-libs-3.11.7-1.el9_4.6.x86_64.rpmkKpython3.11-3.11.7-1.el9_4.6.x86_64.rpmbKpython3.11-devel-3.11.7-1.el9_4.6.x86_64.rpmbKpython3.11-devel-3.11.7-1.el9_4.6.i686.rpmlKpython3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpmcKpython3.11-libs-3.11.7-1.el9_4.6.i686.rpmcKpython3.11-libs-3.11.7-1.el9_4.6.x86_64.rpmkKpython3.11-3.11.7-1.el9_4.6.x86_64.rpmbKpython3.11-devel-3.11.7-1.el9_4.6.x86_64.rpmbKpython3.11-devel-3.11.7-1.el9_4.6.i686.rpmlKpython3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpmv GBBBBsecurityModerate: python3.9 security update \https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 W-python3-devel-3.9.18-3.el9_4.6.i686.rpm=-python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpmj-python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpmW-python3-devel-3.9.18-3.el9_4.6.x86_64.rpmW-python3-devel-3.9.18-3.el9_4.6.i686.rpm=-python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpmj-python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpmW-python3-devel-3.9.18-3.el9_4.6.x86_64.rpm! NBBBBBBBBsecurityModerate: python3.12 security updatef https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447 Qpython3.12-libs-3.12.1-4.el9_4.4.i686.rpmQpython3.12-devel-3.12.1-4.el9_4.4.i686.rpmQpython3.12-devel-3.12.1-4.el9_4.4.x86_64.rpmQpython3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm#Qpython3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm"Qpython3.12-3.12.1-4.el9_4.4.x86_64.rpmQpython3.12-libs-3.12.1-4.el9_4.4.i686.rpmQpython3.12-devel-3.12.1-4.el9_4.4.i686.rpmQpython3.12-devel-3.12.1-4.el9_4.4.x86_64.rpmQpython3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm#Qpython3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm"Qpython3.12-3.12.1-4.el9_4.4.x86_64.rpm YBBsecurityImportant: buildah security updatesthttps://access.redhat.com/errata/RHSA-2024:8563RHSA-2024:8563RHSA-2024:8563 https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://bugzilla.redhat.com/23174582317458https://errata.almalinux.org/9/ALSA-2024-8563.htmlALSA-2024:8563ALSA-2024:8563 8>buildah-tests-1.33.10-1.el9_4.x86_64.rpm7>buildah-1.33.10-1.el9_4.x86_64.rpm8>buildah-tests-1.33.10-1.el9_4.x86_64.rpm7>buildah-1.33.10-1.el9_4.x86_64.rpm. /^BBBBBBBBBBBBBBBsecurityModerate: kernel security updateg>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617 !4kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm4kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm$4kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm&4kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm"4kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm)4rv-5.14.0-427.42.1.el9_4.x86_64.rpm%4perf-5.14.0-427.42.1.el9_4.x86_64.rpm#4kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm'4rtla-5.14.0-427.42.1.el9_4.x86_64.rpm !4kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm4kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm$4kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm&4kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm"4kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm)4rv-5.14.0-427.42.1.el9_4.x86_64.rpm%4perf-5.14.0-427.42.1.el9_4.x86_64.rpm#4kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm'4rtla-5.14.0-427.42.1.el9_4.x86_64.rpmB 4pBBsecurityImportant: grafana security update%Khttps://access.redhat.com/errata/RHSA-2024:8678RHSA-2024:8678RHSA-2024:8678 https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-8678.htmlALSA-2024:8678ALSA-2024:8678 !lgrafana-selinux-9.2.10-19.el9_4.x86_64.rpmqlgrafana-9.2.10-19.el9_4.x86_64.rpm!lgrafana-selinux-9.2.10-19.el9_4.x86_64.rpmqlgrafana-9.2.10-19.el9_4.x86_64.rpm 7usecurityLow: mod_http2 security update/phttps://access.redhat.com/errata/RHSA-2024:8680RHSA-2024:8680RHSA-2024:8680 https://access.redhat.com/security/cve/CVE-2024-36387CVE-2024-36387CVE-2024-36387https://bugzilla.redhat.com/22950062295006https://errata.almalinux.org/9/ALSA-2024-8680.htmlALSA-2024:8680ALSA-2024:8680 `!mod_http2-2.0.26-2.el9_4.1.x86_64.rpm`!mod_http2-2.0.26-2.el9_4.1.x86_64.rpm@  edk2-ovmf-20240524-6.el9_5.noarch.rpm>edk2-ovmf-20240524-6.el9_5.noarch.rpm  \securityModerate: containernetworking-plugins security update%yhttps://access.redhat.com/errata/RHSA-2024:9089RHSA-2024:9089RHSA-2024:9089 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9089.htmlALSA-2024:9089ALSA-2024:9089 a}containernetworking-plugins-1.5.1-2.el9.x86_64.rpma}containernetworking-plugins-1.5.1-2.el9.x86_64.rpm, !_securityModerate: xorg-x11-server-Xwayland security update:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093 k@xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpmk@xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm, &bBBsecurityModerate: buildah security updateX}https://access.redhat.com/errata/RHSA-2024:9097RHSA-2024:9097RHSA-2024:9097 https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9097.htmlALSA-2024:9097ALSA-2024:9097 8Ebuildah-tests-1.37.2-1.el9.x86_64.rpm7Ebuildah-1.37.2-1.el9.x86_64.rpm8Ebuildah-tests-1.37.2-1.el9.x86_64.rpm7Ebuildah-1.37.2-1.el9.x86_64.rpmh +gBBsecurityModerate: skopeo security updateUq https://access.redhat.com/errata/RHSA-2024:9098RHSA-2024:9098RHSA-2024:9098 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9098.htmlALSA-2024:9098ALSA-2024:9098 ::skopeo-1.16.1-1.el9.x86_64.rpm;:skopeo-tests-1.16.1-1.el9.x86_64.rpm::skopeo-1.16.1-1.el9.x86_64.rpm;:skopeo-tests-1.16.1-1.el9.x86_64.rpm< lBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gnome-shell and gnome-shell-extensions security updateFhttps://access.redhat.com/errata/RHSA-2024:9114RHSA-2024:9114RHSA-2024:9114 https://access.redhat.com/security/cve/CVE-2024-36472CVE-2024-36472CVE-2024-36472https://bugzilla.redhat.com/22837502283750https://errata.almalinux.org/9/ALSA-2024-9114.htmlALSA-2024:9114ALSA-2024:9114 _gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm_gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpmy_gnome-shell-extension-common-40.7-19.el9.noarch.rpm _gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm_gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm_gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpmx_gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm}_gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpmtognome-shell-40.10-21.el9.x86_64.rpm_gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm _gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpmz_gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm{_gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm _gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm_gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm _gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpmu_gnome-classic-session-40.7-19.el9.noarch.rpmv_gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm_gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm_gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm_gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm~_gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm_gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm|_gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpmw_gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm_gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm_gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpmy_gnome-shell-extension-common-40.7-19.el9.noarch.rpm _gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm_gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm_gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpmx_gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm}_gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpmtognome-shell-40.10-21.el9.x86_64.rpm_gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm _gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpmz_gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm{_gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm _gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm_gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm _gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpmu_gnome-classic-session-40.7-19.el9.noarch.rpmv_gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm_gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm_gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm_gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm~_gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm_gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm|_gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpmw_gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpmX GBBsecurityModerate: grafana security updateF4 https://access.redhat.com/errata/RHSA-2024:9115RHSA-2024:9115RHSA-2024:9115 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9115.htmlALSA-2024:9115ALSA-2024:9115 !}grafana-selinux-10.2.6-4.el9.x86_64.rpmq}grafana-10.2.6-4.el9.x86_64.rpm!}grafana-selinux-10.2.6-4.el9.x86_64.rpmq}grafana-10.2.6-4.el9.x86_64.rpm LBBBBBBBBBBsecurityModerate: xorg-x11-server security updatez)https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122 glxorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpmhlxorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpmllxorg-x11-server-common-1.20.11-26.el9.x86_64.rpmjlxorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpmilxorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpmflxorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpmglxorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpmhlxorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpmllxorg-x11-server-common-1.20.11-26.el9.x86_64.rpmjlxorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpmilxorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpmflxorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update#|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128 https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128 D,libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpmE,libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpmB,libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpmS,libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpmE,libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpmC,libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm!,libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpmF,libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpmD,libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpmE,libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpmB,libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpmS,libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpmE,libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpmC,libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm!,libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpmF,libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpmv TBBsecurityModerate: toolbox security updateh https://access.redhat.com/errata/RHSA-2024:9135RHSA-2024:9135RHSA-2024:9135 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9135.htmlALSA-2024:9135ALSA-2024:9135 6ntoolbox-0.0.99.5-5.el9.x86_64.rpm7ntoolbox-tests-0.0.99.5-5.el9.x86_64.rpm6ntoolbox-0.0.99.5-5.el9.x86_64.rpm7ntoolbox-tests-0.0.99.5-5.el9.x86_64.rpm= ?YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security updateahttps://access.redhat.com/errata/RHSA-2024:9136RHSA-2024:9136RHSA-2024:9136 https://access.redhat.com/security/cve/CVE-2024-26327CVE-2024-26327CVE-2024-26327https://access.redhat.com/security/cve/CVE-2024-3446CVE-2024-3446CVE-2024-3446https://access.redhat.com/security/cve/CVE-2024-7409CVE-2024-7409CVE-2024-7409https://bugzilla.redhat.com/22648442264844https://bugzilla.redhat.com/22742112274211https://bugzilla.redhat.com/23024872302487https://errata.almalinux.org/9/ALSA-2024-9136.htmlALSA-2024:9136ALSA-2024:9136 d[qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm`[qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpma[qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm\[qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpmc[qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpmX[qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpmU[qemu-kvm-9.0.0-10.el9_5.x86_64.rpm[[qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpmY[qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpmV[qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpmb[qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm][qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpmS[qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpmW[qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm<[qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm^[qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm_[qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpmZ[qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpmT[qemu-img-9.0.0-10.el9_5.x86_64.rpmd[qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm`[qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpma[qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm\[qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpmc[qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpmX[qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpmU[qemu-kvm-9.0.0-10.el9_5.x86_64.rpm[[qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpmY[qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpmV[qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpmb[qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm][qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpmS[qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpmW[qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm<[qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm^[qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm_[qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpmZ[qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpmT[qemu-img-9.0.0-10.el9_5.x86_64.rpm8 @BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2024:9144RHSA-2024:9144RHSA-2024:9144 https://access.redhat.com/security/cve/CVE-2023-42843CVE-2023-42843CVE-2023-42843https://access.redhat.com/security/cve/CVE-2023-42950CVE-2023-42950CVE-2023-42950https://access.redhat.com/security/cve/CVE-2023-42956CVE-2023-42956CVE-2023-42956https://access.redhat.com/security/cve/CVE-2024-4558CVE-2024-4558CVE-2024-4558https://bugzilla.redhat.com/22717172271717https://bugzilla.redhat.com/22717182271718https://bugzilla.redhat.com/22717192271719https://bugzilla.redhat.com/22796892279689https://errata.almalinux.org/9/ALSA-2024-9144.htmlALSA-2024:9144ALSA-2024:9144 3kwebkit2gtk3-jsc-2.44.3-2.el9.i686.rpm1kwebkit2gtk3-2.44.3-2.el9.i686.rpm2kwebkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm4kwebkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm1kwebkit2gtk3-2.44.3-2.el9.x86_64.rpm4kwebkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm2kwebkit2gtk3-devel-2.44.3-2.el9.i686.rpm3kwebkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm3kwebkit2gtk3-jsc-2.44.3-2.el9.i686.rpm1kwebkit2gtk3-2.44.3-2.el9.i686.rpm2kwebkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm4kwebkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm1kwebkit2gtk3-2.44.3-2.el9.x86_64.rpm4kwebkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm2kwebkit2gtk3-devel-2.44.3-2.el9.i686.rpm3kwebkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm  securityModerate: python-jinja2 security updatewhttps://access.redhat.com/errata/RHSA-2024:9150RHSA-2024:9150RHSA-2024:9150 https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-9150.htmlALSA-2024:9150ALSA-2024:9150 P&python3-jinja2-2.11.3-6.el9.noarch.rpmP&python3-jinja2-2.11.3-6.el9.noarch.rpm OBBBBsecurityModerate: lldpd security update~Mhttps://access.redhat.com/errata/RHSA-2024:9158RHSA-2024:9158RHSA-2024:9158 https://access.redhat.com/security/cve/CVE-2020-27827CVE-2020-27827CVE-2020-27827https://access.redhat.com/security/cve/CVE-2021-43612CVE-2021-43612CVE-2021-43612https://access.redhat.com/security/cve/CVE-2023-41910CVE-2023-41910CVE-2023-41910https://bugzilla.redhat.com/19214381921438https://bugzilla.redhat.com/20403882040388https://bugzilla.redhat.com/22374112237411https://errata.almalinux.org/9/ALSA-2024-9158.htmlALSA-2024:9158ALSA-2024:9158 \lldpd-1.0.18-4.el9.x86_64.rpm]lldpd-devel-1.0.18-4.el9.x86_64.rpm]lldpd-devel-1.0.18-4.el9.i686.rpm\lldpd-1.0.18-4.el9.i686.rpm\lldpd-1.0.18-4.el9.x86_64.rpm]lldpd-devel-1.0.18-4.el9.x86_64.rpm]lldpd-devel-1.0.18-4.el9.i686.rpm\lldpd-1.0.18-4.el9.i686.rpm $VBBBBBBBBBBBBsecurityModerate: poppler security updateK+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167 https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167 g}poppler-21.01.0-21.el9.i686.rpmi}poppler-glib-21.01.0-21.el9.i686.rpmg}poppler-21.01.0-21.el9.x86_64.rpmh}poppler-cpp-21.01.0-21.el9.i686.rpmi}poppler-glib-21.01.0-21.el9.x86_64.rpmj}poppler-qt5-21.01.0-21.el9.i686.rpm:}poppler-utils-21.01.0-21.el9.x86_64.rpmh}poppler-cpp-21.01.0-21.el9.x86_64.rpmj}poppler-qt5-21.01.0-21.el9.x86_64.rpm g}poppler-21.01.0-21.el9.i686.rpmi}poppler-glib-21.01.0-21.el9.i686.rpmg}poppler-21.01.0-21.el9.x86_64.rpmh}poppler-cpp-21.01.0-21.el9.i686.rpmi}poppler-glib-21.01.0-21.el9.x86_64.rpmj}poppler-qt5-21.01.0-21.el9.i686.rpm:}poppler-utils-21.01.0-21.el9.x86_64.rpmh}poppler-cpp-21.01.0-21.el9.x86_64.rpmj}poppler-qt5-21.01.0-21.el9.x86_64.rpm  'esecurityModerate: mod_auth_openidc security updatev$https://access.redhat.com/errata/RHSA-2024:9180RHSA-2024:9180RHSA-2024:9180 https://access.redhat.com/security/cve/CVE-2024-24814CVE-2024-24814CVE-2024-24814https://bugzilla.redhat.com/22640922264092https://errata.almalinux.org/9/ALSA-2024-9180.htmlALSA-2024:9180ALSA-2024:9180 T)mod_auth_openidc-2.4.10-1.el9.x86_64.rpmT)mod_auth_openidc-2.4.10-1.el9.x86_64.rpm/ -hBBBsecurityModerate: jose security updateRhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181 https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181 0hjose-14-1.el9.x86_64.rpmKhlibjose-14-1.el9.i686.rpmKhlibjose-14-1.el9.x86_64.rpm0hjose-14-1.el9.x86_64.rpmKhlibjose-14-1.el9.i686.rpmKhlibjose-14-1.el9.x86_64.rpmb  8nBBBBBBBBsecurityModerate: gtk3 security updatel+https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184 https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184 =[gtk3-devel-3.24.31-5.el9.x86_64.rpmy[gtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm=[gtk3-devel-3.24.31-5.el9.i686.rpmz[gtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm<[gtk3-3.24.31-5.el9.i686.rpm<[gtk3-3.24.31-5.el9.x86_64.rpm=[gtk3-devel-3.24.31-5.el9.x86_64.rpmy[gtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm=[gtk3-devel-3.24.31-5.el9.i686.rpmz[gtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm<[gtk3-3.24.31-5.el9.i686.rpm<[gtk3-3.24.31-5.el9.x86_64.rpm! .krb5-devel-1.21.1-3.el9.x86_64.rpm>.krb5-devel-1.21.1-3.el9.i686.rpm>.krb5-devel-1.21.1-3.el9.x86_64.rpm>.krb5-devel-1.21.1-3.el9.i686.rpmd1 5pBBBsecurityLow: openssl security update/L https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333 https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333  popenssl-devel-3.2.2-6.el9_5.x86_64.rpmLpopenssl-perl-3.2.2-6.el9_5.x86_64.rpm popenssl-devel-3.2.2-6.el9_5.i686.rpm popenssl-devel-3.2.2-6.el9_5.x86_64.rpmLpopenssl-perl-3.2.2-6.el9_5.x86_64.rpm popenssl-devel-3.2.2-6.el9_5.i686.rpme2  YBBsecurityImportant: buildah security updateiVhttps://access.redhat.com/errata/RHSA-2024:9459RHSA-2024:9459RHSA-2024:9459 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9459.htmlALSA-2024:9459ALSA-2024:9459 7Fbuildah-1.37.5-1.el9_5.x86_64.rpm8Fbuildah-tests-1.37.5-1.el9_5.x86_64.rpm7Fbuildah-1.37.5-1.el9_5.x86_64.rpm8Fbuildah-tests-1.37.5-1.el9_5.x86_64.rpmR? $^BBBBsecurityModerate: python3.9 security update?\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468 W/python3-devel-3.9.19-8.el9_5.1.x86_64.rpmj/python-unversioned-command-3.9.19-8.el9_5.1.noarch.rpm=/python3-tkinter-3.9.19-8.el9_5.1.x86_64.rpmW/python3-devel-3.9.19-8.el9_5.1.i686.rpmW/python3-devel-3.9.19-8.el9_5.1.x86_64.rpmj/python-unversioned-command-3.9.19-8.el9_5.1.noarch.rpm=/python3-tkinter-3.9.19-8.el9_5.1.x86_64.rpmW/python3-devel-3.9.19-8.el9_5.1.i686.rpmV@ 3eBBBBBBBBBBBBsecurityLow: cups security update/)https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470 https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470 !cups-devel-2.3.3op2-31.el9_5.x86_64.rpmL!cups-lpd-2.3.3op2-31.el9_5.x86_64.rpmI!cups-2.3.3op2-31.el9_5.x86_64.rpmM!cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm!cups-devel-2.3.3op2-31.el9_5.i686.rpmJ!cups-client-2.3.3op2-31.el9_5.x86_64.rpm9!cups-filesystem-2.3.3op2-31.el9_5.noarch.rpmK!cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpm!cups-devel-2.3.3op2-31.el9_5.x86_64.rpmL!cups-lpd-2.3.3op2-31.el9_5.x86_64.rpmI!cups-2.3.3op2-31.el9_5.x86_64.rpmM!cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm!cups-devel-2.3.3op2-31.el9_5.i686.rpmJ!cups-client-2.3.3op2-31.el9_5.x86_64.rpm9!cups-filesystem-2.3.3op2-31.el9_5.noarch.rpmK!cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpmPA 6tsecurityImportant: grafana-pcp security updateDDhttps://access.redhat.com/errata/RHSA-2024:9472RHSA-2024:9472RHSA-2024:9472 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-9472.htmlALSA-2024:9472ALSA-2024:9472 grafana-pcp-5.1.1-9.el9_5.x86_64.rpmgrafana-pcp-5.1.1-9.el9_5.x86_64.rpm8B ;wBBsecurityImportant: grafana security update1https://access.redhat.com/errata/RHSA-2024:9473RHSA-2024:9473RHSA-2024:9473 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-9473.htmlALSA-2024:9473ALSA-2024:9473 !~grafana-selinux-10.2.6-7.el9_5.x86_64.rpmq~grafana-10.2.6-7.el9_5.x86_64.rpm!~grafana-selinux-10.2.6-7.el9_5.x86_64.rpmq~grafana-10.2.6-7.el9_5.x86_64.rpmTC ?|BsecurityImportant: krb5 security update9Shttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474 >/krb5-devel-1.21.1-4.el9_5.i686.rpm>/krb5-devel-1.21.1-4.el9_5.x86_64.rpm>/krb5-devel-1.21.1-4.el9_5.i686.rpm>/krb5-devel-1.21.1-4.el9_5.x86_64.rpmTD @BsecurityModerate: expat security update Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541 https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541 uOexpat-devel-2.5.0-3.el9_5.1.x86_64.rpmuOexpat-devel-2.5.0-3.el9_5.1.i686.rpmuOexpat-devel-2.5.0-3.el9_5.1.x86_64.rpmuOexpat-devel-2.5.0-3.el9_5.1.i686.rpmUE DBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security updateSfhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543 https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543 4dotnet-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpmdotnet-host-9.0.0-1.el9_5.x86_64.rpm,aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm&netstandard-targeting-pack-2.1-9.0.100-1.el9_5.x86_64.rpm/dotnet-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm2&dotnet-sdk-aot-9.0-9.0.100-1.el9_5.x86_64.rpm5&dotnet-templates-9.0-9.0.100-1.el9_5.x86_64.rpm.dotnet-hostfxr-9.0-9.0.0-1.el9_5.x86_64.rpm3&dotnet-sdk-dbg-9.0-9.0.100-1.el9_5.x86_64.rpm-dotnet-apphost-pack-9.0-9.0.0-1.el9_5.x86_64.rpm+aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm*aspnetcore-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm1&dotnet-sdk-9.0-9.0.100-1.el9_5.x86_64.rpm0dotnet-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm4dotnet-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpmdotnet-host-9.0.0-1.el9_5.x86_64.rpm,aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm&netstandard-targeting-pack-2.1-9.0.100-1.el9_5.x86_64.rpm/dotnet-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm2&dotnet-sdk-aot-9.0-9.0.100-1.el9_5.x86_64.rpm5&dotnet-templates-9.0-9.0.100-1.el9_5.x86_64.rpm.dotnet-hostfxr-9.0-9.0.0-1.el9_5.x86_64.rpm3&dotnet-sdk-dbg-9.0-9.0.100-1.el9_5.x86_64.rpm-dotnet-apphost-pack-9.0-9.0.0-1.el9_5.x86_64.rpm+aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm*aspnetcore-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm1&dotnet-sdk-9.0-9.0.100-1.el9_5.x86_64.rpm0dotnet-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpmUF &aBBBsecurityImportant: openexr security update9:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548 A openexr-libs-3.1.1-2.el9_5.1.i686.rpmt openexr-3.1.1-2.el9_5.1.x86_64.rpmA openexr-libs-3.1.1-2.el9_5.1.x86_64.rpmA openexr-libs-3.1.1-2.el9_5.1.i686.rpmt openexr-3.1.1-2.el9_5.1.x86_64.rpmA openexr-libs-3.1.1-2.el9_5.1.x86_64.rpmG )gsecurityImportant: thunderbird security updatesvhttps://access.redhat.com/errata/RHSA-2024:9552RHSA-2024:9552RHSA-2024:9552 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-9552.htmlALSA-2024:9552ALSA-2024:9552 :jthunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpm:jthunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpmH 6jBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateio https://access.redhat.com/errata/RHSA-2024:9553RHSA-2024:9553RHSA-2024:9553 https://access.redhat.com/security/cve/CVE-2024-40866CVE-2024-40866CVE-2024-40866https://access.redhat.com/security/cve/CVE-2024-44185CVE-2024-44185CVE-2024-44185https://access.redhat.com/security/cve/CVE-2024-44187CVE-2024-44187CVE-2024-44187https://access.redhat.com/security/cve/CVE-2024-44244CVE-2024-44244CVE-2024-44244https://access.redhat.com/security/cve/CVE-2024-44296CVE-2024-44296CVE-2024-44296https://bugzilla.redhat.com/23127242312724https://bugzilla.redhat.com/23147062314706https://bugzilla.redhat.com/23232632323263https://bugzilla.redhat.com/23232782323278https://bugzilla.redhat.com/23232892323289https://errata.almalinux.org/9/ALSA-2024-9553.htmlALSA-2024:9553ALSA-2024:9553 3mwebkit2gtk3-jsc-2.46.3-1.el9_5.x86_64.rpm2mwebkit2gtk3-devel-2.46.3-1.el9_5.i686.rpm3mwebkit2gtk3-jsc-2.46.3-1.el9_5.i686.rpm1mwebkit2gtk3-2.46.3-1.el9_5.x86_64.rpm4mwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.i686.rpm2mwebkit2gtk3-devel-2.46.3-1.el9_5.x86_64.rpm1mwebkit2gtk3-2.46.3-1.el9_5.i686.rpm4mwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.x86_64.rpm3mwebkit2gtk3-jsc-2.46.3-1.el9_5.x86_64.rpm2mwebkit2gtk3-devel-2.46.3-1.el9_5.i686.rpm3mwebkit2gtk3-jsc-2.46.3-1.el9_5.i686.rpm1mwebkit2gtk3-2.46.3-1.el9_5.x86_64.rpm4mwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.i686.rpm2mwebkit2gtk3-devel-2.46.3-1.el9_5.x86_64.rpm1mwebkit2gtk3-2.46.3-1.el9_5.i686.rpm4mwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.x86_64.rpmI ;wBBsecurityImportant: firefox security updateX'https://access.redhat.com/errata/RHSA-2024:9554RHSA-2024:9554RHSA-2024:9554 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-9554.htmlALSA-2024:9554ALSA-2024:9554 9firefox-128.4.0-1.el9_5.x86_64.rpmOfirefox-x11-128.4.0-1.el9_5.x86_64.rpm9firefox-128.4.0-1.el9_5.x86_64.rpmOfirefox-x11-128.4.0-1.el9_5.x86_64.rpmRJ |BBsecurityImportant: NetworkManager-libreswan security update$https://access.redhat.com/errata/RHSA-2024:9555RHSA-2024:9555RHSA-2024:9555 https://access.redhat.com/security/cve/CVE-2024-9050CVE-2024-9050CVE-2024-9050https://bugzilla.redhat.com/23138282313828https://errata.almalinux.org/9/ALSA-2024-9555.htmlALSA-2024:9555ALSA-2024:9555 3rNetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm2rNetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm3rNetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm2rNetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm:K ABBBBsecurityImportant: libsoup security update#Whttps://access.redhat.com/errata/RHSA-2024:9559RHSA-2024:9559RHSA-2024:9559 https://access.redhat.com/security/cve/CVE-2024-52530CVE-2024-52530CVE-2024-52530https://access.redhat.com/security/cve/CVE-2024-52532CVE-2024-52532CVE-2024-52532https://bugzilla.redhat.com/23252762325276https://bugzilla.redhat.com/23252842325284https://errata.almalinux.org/9/ALSA-2024-9559.htmlALSA-2024:9559ALSA-2024:9559 libsoup-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.2.i686.rpmlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-2.72.0-8.el9_5.2.i686.rpmlibsoup-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.2.i686.rpmlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-2.72.0-8.el9_5.2.i686.rpmEL HBBBBBBBBBBBBBBBsecurityModerate: kernel security updatez'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605 "5kernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm5kernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm)5rv-5.14.0-503.14.1.el9_5.x86_64.rpm$5kernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm!5kernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm%5perf-5.14.0-503.14.1.el9_5.x86_64.rpm'5rtla-5.14.0-503.14.1.el9_5.x86_64.rpm#5kernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm&5kernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpm "5kernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm5kernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm)5rv-5.14.0-503.14.1.el9_5.x86_64.rpm$5kernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm!5kernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm%5perf-5.14.0-503.14.1.el9_5.x86_64.rpm'5rtla-5.14.0-503.14.1.el9_5.x86_64.rpm#5kernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm&5kernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpmBM ZsecurityImportant: squid security update!https://access.redhat.com/errata/RHSA-2024:9625RHSA-2024:9625RHSA-2024:9625 https://access.redhat.com/security/cve/CVE-2024-45802CVE-2024-45802CVE-2024-45802https://bugzilla.redhat.com/23221542322154https://errata.almalinux.org/9/ALSA-2024-9625.htmlALSA-2024:9625ALSA-2024:9625  squid-5.5-14.el9_5.3.x86_64.rpm squid-5.5-14.el9_5.3.x86_64.rpm:N ]BsecurityModerate: libvpx security update8>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827 https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827 g<libvpx-1.9.0-8.el9_5.x86_64.rpmg<libvpx-1.9.0-8.el9_5.i686.rpmg<libvpx-1.9.0-8.el9_5.x86_64.rpmg<libvpx-1.9.0-8.el9_5.i686.rpmYO 2aBBBBBBBBBBBBBBBsecurityImportant: kernel security updatev https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059 https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059 !9kernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm$9kernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm"9kernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm#9kernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpm9kernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm&9kernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm'9rtla-5.14.0-503.21.1.el9_5.x86_64.rpm%9perf-5.14.0-503.21.1.el9_5.x86_64.rpm)9rv-5.14.0-503.21.1.el9_5.x86_64.rpm !9kernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm$9kernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm"9kernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm#9kernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpm9kernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm&9kernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm'9rtla-5.14.0-503.21.1.el9_5.x86_64.rpm%9perf-5.14.0-503.21.1.el9_5.x86_64.rpm)9rv-5.14.0-503.21.1.el9_5.x86_64.rpm:P 7sBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2025:0080RHSA-2025:0080RHSA-2025:0080 https://access.redhat.com/security/cve/CVE-2025-0237CVE-2025-0237CVE-2025-0237https://access.redhat.com/security/cve/CVE-2025-0238CVE-2025-0238CVE-2025-0238https://access.redhat.com/security/cve/CVE-2025-0239CVE-2025-0239CVE-2025-0239https://access.redhat.com/security/cve/CVE-2025-0240CVE-2025-0240CVE-2025-0240https://access.redhat.com/security/cve/CVE-2025-0241CVE-2025-0241CVE-2025-0241https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361652336165https://bugzilla.redhat.com/23361682336168https://bugzilla.redhat.com/23361702336170https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://bugzilla.redhat.com/23361822336182https://bugzilla.redhat.com/23361882336188https://errata.almalinux.org/9/ALSA-2025-0080.htmlALSA-2025:0080ALSA-2025:0080 Ofirefox-x11-128.6.0-1.el9_5.x86_64.rpm9firefox-128.6.0-1.el9_5.x86_64.rpmOfirefox-x11-128.6.0-1.el9_5.x86_64.rpm9firefox-128.6.0-1.el9_5.x86_64.rpmLQ xBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2025:0146RHSA-2025:0146RHSA-2025:0146 https://access.redhat.com/security/cve/CVE-2024-54479CVE-2024-54479CVE-2024-54479https://access.redhat.com/security/cve/CVE-2024-54502CVE-2024-54502CVE-2024-54502https://access.redhat.com/security/cve/CVE-2024-54505CVE-2024-54505CVE-2024-54505https://access.redhat.com/security/cve/CVE-2024-54508CVE-2024-54508CVE-2024-54508https://bugzilla.redhat.com/23338412333841https://bugzilla.redhat.com/23338432333843https://bugzilla.redhat.com/23338442333844https://bugzilla.redhat.com/23338452333845https://errata.almalinux.org/9/ALSA-2025-0146.htmlALSA-2025:0146ALSA-2025:0146 4owebkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm1owebkit2gtk3-2.46.5-1.el9_5.x86_64.rpm4owebkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm3owebkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm2owebkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm3owebkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm2owebkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm1owebkit2gtk3-2.46.5-1.el9_5.i686.rpm4owebkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm1owebkit2gtk3-2.46.5-1.el9_5.x86_64.rpm4owebkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm3owebkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm2owebkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm3owebkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm2owebkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm1owebkit2gtk3-2.46.5-1.el9_5.i686.rpmR EsecurityImportant: thunderbird security updateYhttps://access.redhat.com/errata/RHSA-2025:0147RHSA-2025:0147RHSA-2025:0147 https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://errata.almalinux.org/9/ALSA-2025-0147.htmlALSA-2025:0147ALSA-2025:0147 :lthunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm:lthunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm9S HBsecurityImportant: iperf3 security update`Uhttps://access.redhat.com/errata/RHSA-2025:0161RHSA-2025:0161RHSA-2025:0161 https://access.redhat.com/security/cve/CVE-2024-53580CVE-2024-53580CVE-2024-53580https://bugzilla.redhat.com/23331462333146https://errata.almalinux.org/9/ALSA-2025-0161.htmlALSA-2025:0161ALSA-2025:0161 ariperf3-3.9-13.el9_5.1.i686.rpmariperf3-3.9-13.el9_5.1.x86_64.rpmariperf3-3.9-13.el9_5.1.i686.rpmariperf3-3.9-13.el9_5.1.x86_64.rpmT LBBBBBsecurityImportant: dpdk security update5Rhttps://access.redhat.com/errata/RHSA-2025:0210RHSA-2025:0210RHSA-2025:0210 https://access.redhat.com/security/cve/CVE-2024-11614CVE-2024-11614CVE-2024-11614https://bugzilla.redhat.com/23279552327955https://errata.almalinux.org/9/ALSA-2025-0210.htmlALSA-2025:0210ALSA-2025:0210 B^dpdk-tools-23.11-2.el9_5.x86_64.rpm?^dpdk-23.11-2.el9_5.x86_64.rpmA^dpdk-doc-23.11-2.el9_5.noarch.rpm@^dpdk-devel-23.11-2.el9_5.x86_64.rpmB^dpdk-tools-23.11-2.el9_5.x86_64.rpm?^dpdk-23.11-2.el9_5.x86_64.rpmA^dpdk-doc-23.11-2.el9_5.noarch.rpm@^dpdk-devel-23.11-2.el9_5.x86_64.rpmU *TBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security updateZhttps://access.redhat.com/errata/RHSA-2025:0308RHSA-2025:0308RHSA-2025:0308 https://access.redhat.com/security/cve/CVE-2024-56201CVE-2024-56201CVE-2024-56201https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://errata.almalinux.org/9/ALSA-2025-0308.htmlALSA-2025:0308ALSA-2025:0308 efence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpmcfence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmffence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpmjfence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpmdfence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmhfence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm.fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm/fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm0fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm1fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpmbfence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpmgfence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmifence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpm efence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpmcfence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmffence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpmjfence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpmdfence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmhfence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm.fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm/fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm0fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm1fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpmbfence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpmgfence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmifence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpmV .kBsecurityImportant: raptor2 security updatea@https://access.redhat.com/errata/RHSA-2025:0312RHSA-2025:0312RHSA-2025:0312 https://access.redhat.com/security/cve/CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/23369212336921https://errata.almalinux.org/9/ALSA-2025-0312.htmlALSA-2025:0312ALSA-2025:0312 oBraptor2-2.0.15-32.el9_5.x86_64.rpmoBraptor2-2.0.15-32.el9_5.i686.rpmoBraptor2-2.0.15-32.el9_5.x86_64.rpmoBraptor2-2.0.15-32.el9_5.i686.rpm@W 0/securityImportant: rsync security update!8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324 https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324 gFrsync-daemon-3.2.3-20.el9_5.1.noarch.rpmgFrsync-daemon-3.2.3-20.el9_5.1.noarch.rpmeX qBBBBBBBBBBBBBBBBBBsecurityModerate: ipa security updateYahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334 https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334 ipa-server-dns-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaserver-4.12.2-1.el9_5.3.noarch.rpmpython3-ipalib-4.12.2-1.el9_5.3.noarch.rpmipa-selinux-4.12.2-1.el9_5.3.noarch.rpmipa-common-4.12.2-1.el9_5.3.noarch.rpmipa-server-common-4.12.2-1.el9_5.3.noarch.rpm;ipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpmipa-client-common-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaclient-4.12.2-1.el9_5.3.noarch.rpm ipa-server-4.12.2-1.el9_5.3.x86_64.rpm:ipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpmipa-client-4.12.2-1.el9_5.3.x86_64.rpm ipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpm ipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpmipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpmipa-server-dns-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaserver-4.12.2-1.el9_5.3.noarch.rpmpython3-ipalib-4.12.2-1.el9_5.3.noarch.rpmipa-selinux-4.12.2-1.el9_5.3.noarch.rpmipa-common-4.12.2-1.el9_5.3.noarch.rpmipa-server-common-4.12.2-1.el9_5.3.noarch.rpm;ipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpmipa-client-common-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaclient-4.12.2-1.el9_5.3.noarch.rpm ipa-server-4.12.2-1.el9_5.3.x86_64.rpm:ipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpmipa-client-4.12.2-1.el9_5.3.x86_64.rpm ipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpm ipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpmipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpmY FBBBBBBsecurityModerate: Security and bug fixes for NetworkManager:Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 1NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm.NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm-NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm0NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm/NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm1NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm.NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm-NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm0NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm/NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm%Z !OBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5fhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422 java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpmO[ 4bBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5lhttps://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426 zjava-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpm zjava-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpmɲ"\ uBBBBBBBBBBBBBBBsecurityModerate: kernel security updateoEhttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578 !:kernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm):rv-5.14.0-503.22.1.el9_5.x86_64.rpm#:kernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm&:kernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm$:kernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm:kernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm':rtla-5.14.0-503.22.1.el9_5.x86_64.rpm%:perf-5.14.0-503.22.1.el9_5.x86_64.rpm":kernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm !:kernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm):rv-5.14.0-503.22.1.el9_5.x86_64.rpm#:kernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm&:kernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm$:kernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm:kernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm':rtla-5.14.0-503.22.1.el9_5.x86_64.rpm%:perf-5.14.0-503.22.1.el9_5.x86_64.rpm":kernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpmՕ] securityImportant: python-jinja2 security update4Whttps://access.redhat.com/errata/RHSA-2025:0667RHSA-2025:0667RHSA-2025:0667 https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://bugzilla.redhat.com/23338562333856https://errata.almalinux.org/9/ALSA-2025-0667.htmlALSA-2025:0667ALSA-2025:0667 P'python3-jinja2-2.11.3-7.el9_5.noarch.rpmP'python3-jinja2-2.11.3-7.el9_5.noarch.rpmR^ IsecurityImportant: git-lfs security update shttps://access.redhat.com/errata/RHSA-2025:0673RHSA-2025:0673RHSA-2025:0673 https://access.redhat.com/security/cve/CVE-2024-53263CVE-2024-53263CVE-2024-53263https://bugzilla.redhat.com/23380022338002https://errata.almalinux.org/9/ALSA-2025-0673.htmlALSA-2025:0673ALSA-2025:0673 FWgit-lfs-3.4.1-4.el9_5.x86_64.rpmFWgit-lfs-3.4.1-4.el9_5.x86_64.rpme_ LBBBsecurityImportant: redis:7 security update~\https://access.redhat.com/errata/RHSA-2025:0692RHSA-2025:0692RHSA-2025:0692 https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://access.redhat.com/security/cve/CVE-2024-51741CVE-2024-51741CVE-2024-51741https://bugzilla.redhat.com/23360042336004https://bugzilla.redhat.com/23360072336007https://errata.almalinux.org/9/ALSA-2025-0692.htmlALSA-2025:0692ALSA-2025:0692 $(@redis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm$redis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpmredis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpm$(@redis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm$redis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpmredis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpmX` RBBBBsecurityImportant: redis security updateZ\ https://access.redhat.com/errata/RHSA-2025:0693RHSA-2025:0693RHSA-2025:0693 https://access.redhat.com/security/cve/CVE-2022-24834CVE-2022-24834CVE-2022-24834https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://bugzilla.redhat.com/22216622221662https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://bugzilla.redhat.com/23360042336004https://errata.almalinux.org/9/ALSA-2025-0693.htmlALSA-2025:0693ALSA-2025:0693 $Dredis-6.2.17-1.el9_5.x86_64.rpmDredis-doc-6.2.17-1.el9_5.noarch.rpm@Dredis-devel-6.2.17-1.el9_5.i686.rpm@Dredis-devel-6.2.17-1.el9_5.x86_64.rpm$Dredis-6.2.17-1.el9_5.x86_64.rpmDredis-doc-6.2.17-1.el9_5.noarch.rpm@Dredis-devel-6.2.17-1.el9_5.i686.rpm@Dredis-devel-6.2.17-1.el9_5.x86_64.rpm'a YBBBBsecurityImportant: libsoup security update6 https://access.redhat.com/errata/RHSA-2025:0791RHSA-2025:0791RHSA-2025:0791 https://access.redhat.com/security/cve/CVE-2024-52531CVE-2024-52531CVE-2024-52531https://bugzilla.redhat.com/23252772325277https://errata.almalinux.org/9/ALSA-2025-0791.htmlALSA-2025:0791ALSA-2025:0791 libsoup-2.72.0-8.el9_5.3.i686.rpmlibsoup-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.i686.rpmlibsoup-2.72.0-8.el9_5.3.i686.rpmlibsoup-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.i686.rpmb <[BEBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: mariadb:10.11 security updateBhttps://access.redhat.com/errata/RHSA-2025:0912RHSA-2025:0912RHSA-2025:0912 https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0912.htmlALSA-2025:0912ALSA-2025:0912 .K,(mariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm&mariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm'mariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm"mariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm%mariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm7galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm#mariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm(mariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm*mariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm)mariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm.mariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm$mariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm+mariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm.K,(mariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm&mariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm'mariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm"mariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm%mariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm7galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm#mariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm(mariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm*mariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm)mariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm.mariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm$mariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm+mariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmc }BBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security updateT4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914 https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914 $1mariadb-embedded-10.5.27-1.el9_5.x86_64.rpm.1mariadb-10.5.27-1.el9_5.x86_64.rpm)1mariadb-server-10.5.27-1.el9_5.x86_64.rpm&1mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm"1mariadb-backup-10.5.27-1.el9_5.x86_64.rpm*1mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpm7Egalera-26.4.20-1.el9_5.x86_64.rpm(1mariadb-pam-10.5.27-1.el9_5.x86_64.rpm%1mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpm+1mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm#1mariadb-common-10.5.27-1.el9_5.x86_64.rpm'1mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm $1mariadb-embedded-10.5.27-1.el9_5.x86_64.rpm.1mariadb-10.5.27-1.el9_5.x86_64.rpm)1mariadb-server-10.5.27-1.el9_5.x86_64.rpm&1mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm"1mariadb-backup-10.5.27-1.el9_5.x86_64.rpm*1mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpm7Egalera-26.4.20-1.el9_5.x86_64.rpm(1mariadb-pam-10.5.27-1.el9_5.x86_64.rpm%1mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpm+1mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm#1mariadb-common-10.5.27-1.el9_5.x86_64.rpm'1mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm8d VsecurityModerate: keepalived security updateUhttps://access.redhat.com/errata/RHSA-2025:0917RHSA-2025:0917RHSA-2025:0917 https://access.redhat.com/security/cve/CVE-2024-41184CVE-2024-41184CVE-2024-41184https://bugzilla.redhat.com/22985322298532https://errata.almalinux.org/9/ALSA-2025-0917.htmlALSA-2025:0917ALSA-2025:0917 1&keepalived-2.2.8-4.el9_5.x86_64.rpm1&keepalived-2.2.8-4.el9_5.x86_64.rpmce "YBBBBBBBsecurityImportant: podman security update] https://access.redhat.com/errata/RHSA-2025:0922RHSA-2025:0922RHSA-2025:0922 https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0922.htmlALSA-2025:0922ALSA-2025:0922 #Qpodman-5.2.2-13.el9_5.x86_64.rpm&Qpodman-tests-5.2.2-13.el9_5.x86_64.rpmfQpodman-docker-5.2.2-13.el9_5.noarch.rpm$Qpodman-plugins-5.2.2-13.el9_5.x86_64.rpm%Qpodman-remote-5.2.2-13.el9_5.x86_64.rpm#Qpodman-5.2.2-13.el9_5.x86_64.rpm&Qpodman-tests-5.2.2-13.el9_5.x86_64.rpmfQpodman-docker-5.2.2-13.el9_5.noarch.rpm$Qpodman-plugins-5.2.2-13.el9_5.x86_64.rpm%Qpodman-remote-5.2.2-13.el9_5.x86_64.rpmZf 'cBBsecurityImportant: buildah security update}6https://access.redhat.com/errata/RHSA-2025:0923RHSA-2025:0923RHSA-2025:0923 https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0923.htmlALSA-2025:0923ALSA-2025:0923 7Gbuildah-1.37.6-1.el9_5.x86_64.rpm8Gbuildah-tests-1.37.6-1.el9_5.x86_64.rpm7Gbuildah-1.37.6-1.el9_5.x86_64.rpm8Gbuildah-tests-1.37.6-1.el9_5.x86_64.rpm%g +hBsecurityModerate: bzip2 security update3https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925 https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925 #bzip2-devel-1.0.8-10.el9_5.x86_64.rpm#bzip2-devel-1.0.8-10.el9_5.i686.rpm#bzip2-devel-1.0.8-10.el9_5.x86_64.rpm#bzip2-devel-1.0.8-10.el9_5.i686.rpmh 0lBBsecurityImportant: firefox security updateD? https://access.redhat.com/errata/RHSA-2025:10072RHSA-2025:10072RHSA-2025:10072 https://access.redhat.com/security/cve/CVE-2025-6424CVE-2025-6424CVE-2025-6424https://access.redhat.com/security/cve/CVE-2025-6425CVE-2025-6425CVE-2025-6425https://access.redhat.com/security/cve/CVE-2025-6429CVE-2025-6429CVE-2025-6429https://access.redhat.com/security/cve/CVE-2025-6430CVE-2025-6430CVE-2025-6430https://bugzilla.redhat.com/23745552374555https://bugzilla.redhat.com/23745592374559https://bugzilla.redhat.com/23745612374561https://bugzilla.redhat.com/23745622374562https://errata.almalinux.org/9/ALSA-2025-10072.htmlALSA-2025:10072ALSA-2025:10072 Ofirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm9firefox-128.12.0-1.el9_6.alma.1.x86_64.rpmOfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm9firefox-128.12.0-1.el9_6.alma.1.x86_64.rpmÐKi 7qBBBBsecurityImportant: python3.9 security updateg https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 =2python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmj2python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmW2python3-devel-3.9.21-2.el9_6.1.x86_64.rpmW2python3-devel-3.9.21-2.el9_6.1.i686.rpm=2python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmj2python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmW2python3-devel-3.9.21-2.el9_6.1.x86_64.rpmW2python3-devel-3.9.21-2.el9_6.1.i686.rpmÓ=j xBBBBBBBBsecurityImportant: python3.11 security updatejg https://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148 lApython3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpmkApython3.11-3.11.11-2.el9_6.1.x86_64.rpmbApython3.11-devel-3.11.11-2.el9_6.1.x86_64.rpmcApython3.11-libs-3.11.11-2.el9_6.1.i686.rpmbApython3.11-devel-3.11.11-2.el9_6.1.i686.rpmcApython3.11-libs-3.11.11-2.el9_6.1.x86_64.rpmlApython3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpmkApython3.11-3.11.11-2.el9_6.1.x86_64.rpmbApython3.11-devel-3.11.11-2.el9_6.1.x86_64.rpmcApython3.11-libs-3.11.11-2.el9_6.1.i686.rpmbApython3.11-devel-3.11.11-2.el9_6.1.i686.rpmcApython3.11-libs-3.11.11-2.el9_6.1.x86_64.rpmÔok CBBBBBBBBsecurityImportant: python3.12 security updateQg https://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189 Ypython3.12-libs-3.12.9-1.el9_6.1.i686.rpm"Ypython3.12-3.12.9-1.el9_6.1.x86_64.rpmYpython3.12-devel-3.12.9-1.el9_6.1.i686.rpmYpython3.12-libs-3.12.9-1.el9_6.1.x86_64.rpmYpython3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm#Ypython3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpmYpython3.12-libs-3.12.9-1.el9_6.1.i686.rpm"Ypython3.12-3.12.9-1.el9_6.1.x86_64.rpmYpython3.12-devel-3.12.9-1.el9_6.1.i686.rpmYpython3.12-libs-3.12.9-1.el9_6.1.x86_64.rpmYpython3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm#Ypython3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpmÔcl NsecurityImportant: thunderbird security update8https://access.redhat.com/errata/RHSA-2025:10196RHSA-2025:10196RHSA-2025:10196 https://access.redhat.com/security/cve/CVE-2025-5986CVE-2025-5986CVE-2025-5986https://bugzilla.redhat.com/23722812372281https://errata.almalinux.org/9/ALSA-2025-10196.htmlALSA-2025:10196ALSA-2025:10196 :thunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpm:thunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpmØm QsecurityModerate: socat security updateOvhttps://access.redhat.com/errata/RHSA-2025:10353RHSA-2025:10353RHSA-2025:10353 https://access.redhat.com/security/cve/CVE-2024-54661CVE-2024-54661CVE-2024-54661https://bugzilla.redhat.com/23302972330297https://errata.almalinux.org/9/ALSA-2025-10353.htmlALSA-2025:10353ALSA-2025:10353 Dsocat-1.7.4.1-6.el9_6.1.x86_64.rpmDsocat-1.7.4.1-6.el9_6.1.x86_64.rpmøJn 'TBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateE] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379 "Jkernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpmJkernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm)Jrv-5.14.0-570.25.1.el9_6.x86_64.rpm&Jkernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm'Jrtla-5.14.0-570.25.1.el9_6.x86_64.rpmTJpython3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm$Jkernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm!Jkernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm%Jperf-5.14.0-570.25.1.el9_6.x86_64.rpm#Jkernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm "Jkernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpmJkernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm)Jrv-5.14.0-570.25.1.el9_6.x86_64.rpm&Jkernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm'Jrtla-5.14.0-570.25.1.el9_6.x86_64.rpmTJpython3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm$Jkernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm!Jkernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm%Jperf-5.14.0-570.25.1.el9_6.x86_64.rpm#Jkernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpmÿo 1hBBBBBBBsecurityImportant: podman security update"Thttps://access.redhat.com/errata/RHSA-2025:10550RHSA-2025:10550RHSA-2025:10550 https://access.redhat.com/security/cve/CVE-2025-6032CVE-2025-6032CVE-2025-6032https://bugzilla.redhat.com/23725012372501https://errata.almalinux.org/9/ALSA-2025-10550.htmlALSA-2025:10550ALSA-2025:10550 $Tpodman-plugins-5.4.0-12.el9_6.x86_64.rpm%Tpodman-remote-5.4.0-12.el9_6.x86_64.rpm&Tpodman-tests-5.4.0-12.el9_6.x86_64.rpmfTpodman-docker-5.4.0-12.el9_6.noarch.rpm#Tpodman-5.4.0-12.el9_6.x86_64.rpm$Tpodman-plugins-5.4.0-12.el9_6.x86_64.rpm%Tpodman-remote-5.4.0-12.el9_6.x86_64.rpm&Tpodman-tests-5.4.0-12.el9_6.x86_64.rpmfTpodman-docker-5.4.0-12.el9_6.noarch.rpm#Tpodman-5.4.0-12.el9_6.x86_64.rpmø p 4rsecurityModerate: gnome-remote-desktop security updatev%https://access.redhat.com/errata/RHSA-2025:10631RHSA-2025:10631RHSA-2025:10631 https://access.redhat.com/security/cve/CVE-2025-5024CVE-2025-5024CVE-2025-5024https://bugzilla.redhat.com/23677172367717https://errata.almalinux.org/9/ALSA-2025-10631.htmlALSA-2025:10631ALSA-2025:10631 sngnome-remote-desktop-40.0-11.el9_6.x86_64.rpmsngnome-remote-desktop-40.0-11.el9_6.x86_64.rpmþq 9uBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2025:1066RHSA-2025:1066RHSA-2025:1066 https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1066.htmlALSA-2025:1066ALSA-2025:1066 Ofirefox-x11-128.7.0-1.el9_5.x86_64.rpm9firefox-128.7.0-1.el9_5.x86_64.rpmOfirefox-x11-128.7.0-1.el9_5.x86_64.rpm9firefox-128.7.0-1.el9_5.x86_64.rpm$r zBBBBBBBBBBsecurityModerate: golang security update:https://access.redhat.com/errata/RHSA-2025:10676RHSA-2025:10676RHSA-2025:10676 https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-10676.htmlALSA-2025:10676ALSA-2025:10676 ?Xgolang-1.24.4-1.el9_6.x86_64.rpmpXgo-toolset-1.24.4-1.el9_6.x86_64.rpmXgolang-misc-1.24.4-1.el9_6.noarch.rpmKXgolang-race-1.24.4-1.el9_6.x86_64.rpmXgolang-docs-1.24.4-1.el9_6.noarch.rpmXgolang-tests-1.24.4-1.el9_6.noarch.rpm@Xgolang-bin-1.24.4-1.el9_6.x86_64.rpmXgolang-src-1.24.4-1.el9_6.noarch.rpm?Xgolang-1.24.4-1.el9_6.x86_64.rpmpXgo-toolset-1.24.4-1.el9_6.x86_64.rpmXgolang-misc-1.24.4-1.el9_6.noarch.rpmKXgolang-race-1.24.4-1.el9_6.x86_64.rpmXgolang-docs-1.24.4-1.el9_6.noarch.rpmXgolang-tests-1.24.4-1.el9_6.noarch.rpm@Xgolang-bin-1.24.4-1.el9_6.x86_64.rpmXgolang-src-1.24.4-1.el9_6.noarch.rpm\s GBsecurityImportant: libxml2 security update>Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699 https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699 9Zlibxml2-devel-2.9.13-10.el9_6.x86_64.rpm9Zlibxml2-devel-2.9.13-10.el9_6.i686.rpm9Zlibxml2-devel-2.9.13-10.el9_6.x86_64.rpm9Zlibxml2-devel-2.9.13-10.el9_6.i686.rpmþ#t KBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837 "Kkernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpmKkernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm%Kperf-5.14.0-570.26.1.el9_6.x86_64.rpm!Kkernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm)Krv-5.14.0-570.26.1.el9_6.x86_64.rpm'Krtla-5.14.0-570.26.1.el9_6.x86_64.rpmTKpython3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm$Kkernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm&Kkernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm#Kkernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm "Kkernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpmKkernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm%Kperf-5.14.0-570.26.1.el9_6.x86_64.rpm!Kkernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm)Krv-5.14.0-570.26.1.el9_6.x86_64.rpm'Krtla-5.14.0-570.26.1.el9_6.x86_64.rpmTKpython3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm$Kkernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm&Kkernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm#Kkernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpmhu securityImportant: cloud-init security updatelhttps://access.redhat.com/errata/RHSA-2025:10848RHSA-2025:10848RHSA-2025:10848 https://access.redhat.com/security/cve/CVE-2024-6174CVE-2024-6174CVE-2024-6174https://bugzilla.redhat.com/23749242374924https://errata.almalinux.org/9/ALSA-2025-10848.htmlALSA-2025:10848ALSA-2025:10848 3Acloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm3Acloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm{v -aBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update ahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862 68java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpm<8java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpm48java-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpm88java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpm;8java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpm58java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpm78java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm68java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpm<8java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpm48java-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpm88java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpm;8java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpm58java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpm78java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm,w nBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updatek https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867 java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm޿ix ABBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatexqhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873 zjava-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpm zjava-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpmĨny TBBBBsecurityModerate: glib2 security updateihttps://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140 8glib2-doc-2.68.4-16.el9_6.2.noarch.rpmQglib2-tests-2.68.4-16.el9_6.2.x86_64.rpm]glib2-devel-2.68.4-16.el9_6.2.i686.rpm]glib2-devel-2.68.4-16.el9_6.2.x86_64.rpm8glib2-doc-2.68.4-16.el9_6.2.noarch.rpmQglib2-tests-2.68.4-16.el9_6.2.x86_64.rpm]glib2-devel-2.68.4-16.el9_6.2.i686.rpm]glib2-devel-2.68.4-16.el9_6.2.x86_64.rpm޽5z #[BBBBBBsecurityImportant: tomcat security updatemhttps://access.redhat.com/errata/RHSA-2025:11335RHSA-2025:11335RHSA-2025:11335 https://access.redhat.com/security/cve/CVE-2024-56337CVE-2024-56337CVE-2024-56337https://access.redhat.com/security/cve/CVE-2025-31650CVE-2025-31650CVE-2025-31650https://bugzilla.redhat.com/23335212333521https://bugzilla.redhat.com/23627832362783https://errata.almalinux.org/9/ALSA-2025-11335.htmlALSA-2025:11335ALSA-2025:11335 Ctomcat-webapps-9.0.87-3.el9_6.1.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm<tomcat-9.0.87-3.el9_6.1.noarch.rpm>tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpmAtomcat-lib-9.0.87-3.el9_6.1.noarch.rpm?tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm@tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm=tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpmCtomcat-webapps-9.0.87-3.el9_6.1.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm<tomcat-9.0.87-3.el9_6.1.noarch.rpm>tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpmAtomcat-lib-9.0.87-3.el9_6.1.noarch.rpm?tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm@tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm=tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm-{ 7dBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateoVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411 %Lperf-5.14.0-570.28.1.el9_6.x86_64.rpm)Lrv-5.14.0-570.28.1.el9_6.x86_64.rpm"Lkernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm'Lrtla-5.14.0-570.28.1.el9_6.x86_64.rpm!Lkernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm#Lkernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpmLkernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm&Lkernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm$Lkernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpmTLpython3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm %Lperf-5.14.0-570.28.1.el9_6.x86_64.rpm)Lrv-5.14.0-570.28.1.el9_6.x86_64.rpm"Lkernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm'Lrtla-5.14.0-570.28.1.el9_6.x86_64.rpm!Lkernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm#Lkernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpmLkernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm&Lkernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm$Lkernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpmTLpython3-perf-5.14.0-570.28.1.el9_6.x86_64.rpmĂ>| xBBBBBBBBBBBBBBBBBBsecurityImportant: git security updateEMhttps://access.redhat.com/errata/RHSA-2025:11462RHSA-2025:11462RHSA-2025:11462 https://access.redhat.com/security/cve/CVE-2024-50349CVE-2024-50349CVE-2024-50349https://access.redhat.com/security/cve/CVE-2024-52006CVE-2024-52006CVE-2024-52006https://access.redhat.com/security/cve/CVE-2025-27613CVE-2025-27613CVE-2025-27613https://access.redhat.com/security/cve/CVE-2025-27614CVE-2025-27614CVE-2025-27614https://access.redhat.com/security/cve/CVE-2025-46835CVE-2025-46835CVE-2025-46835https://access.redhat.com/security/cve/CVE-2025-48384CVE-2025-48384CVE-2025-48384https://access.redhat.com/security/cve/CVE-2025-48385CVE-2025-48385CVE-2025-48385https://bugzilla.redhat.com/23378242337824https://bugzilla.redhat.com/23379562337956https://bugzilla.redhat.com/23788062378806https://bugzilla.redhat.com/23788082378808https://bugzilla.redhat.com/23791242379124https://bugzilla.redhat.com/23791252379125https://bugzilla.redhat.com/23793262379326https://errata.almalinux.org/9/ALSA-2025-11462.htmlALSA-2025:11462ALSA-2025:11462 Pgit-core-2.47.3-1.el9_6.x86_64.rpmGgit-svn-2.47.3-1.el9_6.noarch.rpmBgit-core-doc-2.47.3-1.el9_6.noarch.rpmCgit-email-2.47.3-1.el9_6.noarch.rpmQperl-Git-SVN-2.47.3-1.el9_6.noarch.rpmIgitweb-2.47.3-1.el9_6.noarch.rpmOgit-2.47.3-1.el9_6.x86_64.rpmPperl-Git-2.47.3-1.el9_6.noarch.rpmDgit-gui-2.47.3-1.el9_6.noarch.rpmSgit-subtree-2.47.3-1.el9_6.x86_64.rpmHgitk-2.47.3-1.el9_6.noarch.rpmAgit-all-2.47.3-1.el9_6.noarch.rpmEgit-instaweb-2.47.3-1.el9_6.noarch.rpmQgit-credential-libsecret-2.47.3-1.el9_6.x86_64.rpmRgit-daemon-2.47.3-1.el9_6.x86_64.rpmPgit-core-2.47.3-1.el9_6.x86_64.rpmGgit-svn-2.47.3-1.el9_6.noarch.rpmBgit-core-doc-2.47.3-1.el9_6.noarch.rpmCgit-email-2.47.3-1.el9_6.noarch.rpmQperl-Git-SVN-2.47.3-1.el9_6.noarch.rpmIgitweb-2.47.3-1.el9_6.noarch.rpmOgit-2.47.3-1.el9_6.x86_64.rpmPperl-Git-2.47.3-1.el9_6.noarch.rpmDgit-gui-2.47.3-1.el9_6.noarch.rpmSgit-subtree-2.47.3-1.el9_6.x86_64.rpmHgitk-2.47.3-1.el9_6.noarch.rpmAgit-all-2.47.3-1.el9_6.noarch.rpmEgit-instaweb-2.47.3-1.el9_6.noarch.rpmQgit-credential-libsecret-2.47.3-1.el9_6.x86_64.rpmRgit-daemon-2.47.3-1.el9_6.x86_64.rpm@} MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security updatehttps://access.redhat.com/errata/RHSA-2025:11463RHSA-2025:11463RHSA-2025:11463 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-11463.htmlALSA-2025:11463ALSA-2025:11463 6_ fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpmF fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpme fence-virtd-4.10.0-86.el9_6.7.x86_64.rpmS fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpmY fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpmb fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpmM fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm\ fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpmX fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm] fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpmZ fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpmD fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpmd fence-virt-4.10.0-86.el9_6.7.x86_64.rpmU fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm0 fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm/ fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpmQ fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm^ fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpmb fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpmT fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpm~ fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpmI fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpmO fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpmx fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm1 fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpmK fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpmE fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpmN fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpmC fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpmi fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpmg fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpmR fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpm| fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpmj fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpmH fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpmP fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpmw fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpmW fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm. fence-agents-common-4.10.0-86.el9_6.7.noarch.rpm{ fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpmf fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpm} fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpmL fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpmJ fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpmV fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpmc fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpmG fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpmy fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm[ fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpma fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpmz fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpmh fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpm ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm` fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm6_ fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpmF fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpme fence-virtd-4.10.0-86.el9_6.7.x86_64.rpmS fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpmY fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpmb fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpmM fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm\ fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpmX fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm] fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpmZ fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpmD fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpmd fence-virt-4.10.0-86.el9_6.7.x86_64.rpmU fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm0 fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm/ fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpmQ fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm^ fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpmb fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpmT fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpm~ fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpmI fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpmO fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpmx fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm1 fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpmK fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpmE fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpmN fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpmC fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpmi fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpmg fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpmR fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpm| fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpmj fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpmH fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpmP fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpmw fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpmW fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm. fence-agents-common-4.10.0-86.el9_6.7.noarch.rpm{ fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpmf fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpm} fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpmL fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpmJ fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpmV fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpmc fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpmG fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpmy fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm[ fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpma fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpmz fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpmh fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpm ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm` fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm~ VBBsecurityImportant: firefox security update:https://access.redhat.com/errata/RHSA-2025:11748RHSA-2025:11748RHSA-2025:11748 https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-11748.htmlALSA-2025:11748ALSA-2025:11748 9 firefox-128.13.0-1.el9_6.alma.1.x86_64.rpmO firefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpm9 firefox-128.13.0-1.el9_6.alma.1.x86_64.rpmO firefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpmĨD [securityImportant: thunderbird security updateP https://access.redhat.com/errata/RHSA-2025:1184RHSA-2025:1184RHSA-2025:1184 https://access.redhat.com/security/cve/CVE-2025-0510CVE-2025-0510CVE-2025-0510https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1015CVE-2025-1015CVE-2025-1015https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437592343759https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437622343762https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1184.htmlALSA-2025:1184ALSA-2025:1184 :mthunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm:mthunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm( '^BBBBBBBsecurityImportant: unbound security update[hhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849 https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849 55unbound-libs-1.16.2-19.el9_6.1.x86_64.rpmU5unbound-1.16.2-19.el9_6.1.x86_64.rpm55unbound-libs-1.16.2-19.el9_6.1.i686.rpm85unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpmR5python3-unbound-1.16.2-19.el9_6.1.x86_64.rpm55unbound-libs-1.16.2-19.el9_6.1.x86_64.rpmU5unbound-1.16.2-19.el9_6.1.x86_64.rpm55unbound-libs-1.16.2-19.el9_6.1.i686.rpm85unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpmR5python3-unbound-1.16.2-19.el9_6.1.x86_64.rpmĞ_ ;hBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateChttps://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861 %Mperf-5.14.0-570.30.1.el9_6.x86_64.rpm$Mkernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm'Mrtla-5.14.0-570.30.1.el9_6.x86_64.rpm!Mkernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpmTMpython3-perf-5.14.0-570.30.1.el9_6.x86_64.rpmMkernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm"Mkernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm#Mkernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm&Mkernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm)Mrv-5.14.0-570.30.1.el9_6.x86_64.rpm %Mperf-5.14.0-570.30.1.el9_6.x86_64.rpm$Mkernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm'Mrtla-5.14.0-570.30.1.el9_6.x86_64.rpm!Mkernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpmTMpython3-perf-5.14.0-570.30.1.el9_6.x86_64.rpmMkernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm"Mkernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm#Mkernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm&Mkernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm)Mrv-5.14.0-570.30.1.el9_6.x86_64.rpmį' |BBBBsecurityImportant: sqlite security updateQ https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992 https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992 ssqlite-3.34.1-8.el9_6.i686.rpmssqlite-3.34.1-8.el9_6.x86_64.rpmtsqlite-devel-3.34.1-8.el9_6.i686.rpmtsqlite-devel-3.34.1-8.el9_6.x86_64.rpmssqlite-3.34.1-8.el9_6.i686.rpmssqlite-3.34.1-8.el9_6.x86_64.rpmtsqlite-devel-3.34.1-8.el9_6.i686.rpmtsqlite-devel-3.34.1-8.el9_6.x86_64.rpmĢ CBBBsecurityImportant: redis:7 security updateZthttps://access.redhat.com/errata/RHSA-2025:12008RHSA-2025:12008RHSA-2025:12008 https://access.redhat.com/security/cve/CVE-2025-27151CVE-2025-27151CVE-2025-27151https://access.redhat.com/security/cve/CVE-2025-32023CVE-2025-32023CVE-2025-32023https://access.redhat.com/security/cve/CVE-2025-48367CVE-2025-48367CVE-2025-48367https://bugzilla.redhat.com/23691532369153https://errata.almalinux.org/9/ALSA-2025-12008.htmlALSA-2025:12008ALSA-2025:12008 $ ($redis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm@redis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpmredis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpm$ ($redis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm@redis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpmredis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpmĢ, IBBBsecurityModerate: icu security updateNhttps://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083 https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083 Glibicu-devel-67.1-10.el9_6.x86_64.rpm}icu-67.1-10.el9_6.x86_64.rpmGlibicu-devel-67.1-10.el9_6.i686.rpmGlibicu-devel-67.1-10.el9_6.x86_64.rpm}icu-67.1-10.el9_6.x86_64.rpmGlibicu-devel-67.1-10.el9_6.i686.rpmħH OBBBBBBBBsecurityModerate: tbb security update`ahttps://access.redhat.com/errata/RHSA-2025:1210RHSA-2025:1210RHSA-2025:1210 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1210.htmlALSA-2025:1210ALSA-2025:1210 t>tbb-2020.3-8.el9_5.1.i686.rpm>python3-tbb-2020.3-8.el9_5.1.x86_64.rpmu>tbb-devel-2020.3-8.el9_5.1.i686.rpmt>tbb-2020.3-8.el9_5.1.x86_64.rpmu>tbb-devel-2020.3-8.el9_5.1.x86_64.rpm>tbb-doc-2020.3-8.el9_5.1.x86_64.rpmt>tbb-2020.3-8.el9_5.1.i686.rpm>python3-tbb-2020.3-8.el9_5.1.x86_64.rpmu>tbb-devel-2020.3-8.el9_5.1.i686.rpmt>tbb-2020.3-8.el9_5.1.x86_64.rpmu>tbb-devel-2020.3-8.el9_5.1.x86_64.rpm>tbb-doc-2020.3-8.el9_5.1.x86_64.rpm ZBsecurityModerate: libtpms security updateAhttps://access.redhat.com/errata/RHSA-2025:12100RHSA-2025:12100RHSA-2025:12100 https://access.redhat.com/security/cve/CVE-2025-49133CVE-2025-49133CVE-2025-49133https://bugzilla.redhat.com/23715852371585https://errata.almalinux.org/9/ALSA-2025-12100.htmlALSA-2025:12100ALSA-2025:12100 >!libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm>!libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm>!libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm>!libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpmħD ^securityImportant: thunderbird security updateE https://access.redhat.com/errata/RHSA-2025:12187RHSA-2025:12187RHSA-2025:12187 https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-12187.htmlALSA-2025:12187ALSA-2025:12187 :fthunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpm:fthunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpmĨH 'aBBBBsecurityImportant: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security updateNhttps://access.redhat.com/errata/RHSA-2025:12280RHSA-2025:12280RHSA-2025:12280 https://access.redhat.com/security/cve/CVE-2025-52999CVE-2025-52999CVE-2025-52999https://bugzilla.redhat.com/23748042374804https://errata.almalinux.org/9/ALSA-2025-12280.htmlALSA-2025:12280ALSA-2025:12280 k pki-jackson-annotations-2.19.1-1.el9_6.noarch.rpml pki-jackson-core-2.19.1-1.el9_6.noarch.rpmm pki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpmn pki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpmu pki-jackson-databind-2.19.1-1.el9_6.noarch.rpmo pki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpmk pki-jackson-annotations-2.19.1-1.el9_6.noarch.rpml pki-jackson-core-2.19.1-1.el9_6.noarch.rpmm pki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpmn pki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpmu pki-jackson-databind-2.19.1-1.el9_6.noarch.rpmo pki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpmݘ   +hBsecurityImportant: libxml2 security updated!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447 https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447 9[libxml2-devel-2.9.13-11.el9_6.x86_64.rpm9[libxml2-devel-2.9.13-11.el9_6.i686.rpm9[libxml2-devel-2.9.13-11.el9_6.x86_64.rpm9[libxml2-devel-2.9.13-11.el9_6.i686.rpmijx  .lsecurityModerate: python-requests security updateRhttps://access.redhat.com/errata/RHSA-2025:12519RHSA-2025:12519RHSA-2025:12519 https://access.redhat.com/security/cve/CVE-2024-47081CVE-2024-47081CVE-2024-47081https://bugzilla.redhat.com/23712722371272https://errata.almalinux.org/9/ALSA-2025-12519.htmlALSA-2025:12519ALSA-2025:12519 f python3-requests+socks-2.25.1-10.el9_6.noarch.rpme python3-requests+security-2.25.1-10.el9_6.noarch.rpmf python3-requests+socks-2.25.1-10.el9_6.noarch.rpme python3-requests+security-2.25.1-10.el9_6.noarch.rpmh  oBBBBBBBBBBBBBBBsecurityImportant: kernel security updateWhttps://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262 https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262 !;kernel-debug-devel-5.14.0-503.23.2.el9_5.x86_64.rpm&;kernel-headers-5.14.0-503.23.2.el9_5.x86_64.rpm%;perf-5.14.0-503.23.2.el9_5.x86_64.rpm";kernel-debug-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm;kernel-doc-5.14.0-503.23.2.el9_5.noarch.rpm$;kernel-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm';rtla-5.14.0-503.23.2.el9_5.x86_64.rpm);rv-5.14.0-503.23.2.el9_5.x86_64.rpm#;kernel-devel-5.14.0-503.23.2.el9_5.x86_64.rpm !;kernel-debug-devel-5.14.0-503.23.2.el9_5.x86_64.rpm&;kernel-headers-5.14.0-503.23.2.el9_5.x86_64.rpm%;perf-5.14.0-503.23.2.el9_5.x86_64.rpm";kernel-debug-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm;kernel-doc-5.14.0-503.23.2.el9_5.noarch.rpm$;kernel-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm';rtla-5.14.0-503.23.2.el9_5.x86_64.rpm);rv-5.14.0-503.23.2.el9_5.x86_64.rpm#;kernel-devel-5.14.0-503.23.2.el9_5.x86_64.rpm~  ABBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatetohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746 https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746 "Nkernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpmNkernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm&Nkernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm)Nrv-5.14.0-570.32.1.el9_6.x86_64.rpm#Nkernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm'Nrtla-5.14.0-570.32.1.el9_6.x86_64.rpm!Nkernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpmTNpython3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm$Nkernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm%Nperf-5.14.0-570.32.1.el9_6.x86_64.rpm "Nkernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpmNkernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm&Nkernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm)Nrv-5.14.0-570.32.1.el9_6.x86_64.rpm#Nkernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm'Nrtla-5.14.0-570.32.1.el9_6.x86_64.rpm!Nkernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpmTNpython3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm$Nkernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm%Nperf-5.14.0-570.32.1.el9_6.x86_64.rpmҚ  UsecurityModerate: opentelemetry-collector security updatechttps://access.redhat.com/errata/RHSA-2025:12831RHSA-2025:12831RHSA-2025:12831 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-12831.htmlALSA-2025:12831ALSA-2025:12831 Vopentelemetry-collector-0.127.0-1.el9_6.x86_64.rpmVopentelemetry-collector-0.127.0-1.el9_6.x86_64.rpmD securityModerate: python3.12-setuptools security updatezJhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834 ~rpython3.12-setuptools-68.2.2-5.el9_6.noarch.rpm~rpython3.12-setuptools-68.2.2-5.el9_6.noarch.rpms ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-14-gcc security updateDhttps://access.redhat.com/errata/RHSA-2025:1300RHSA-2025:1300RHSA-2025:1300 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1300.htmlALSA-2025:1300ALSA-2025:1300 h8gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm*8libasan8-14.2.1-1.3.el9_5.x86_64.rpm38gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm38gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpmf8gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm48gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm08gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpmd8gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm-8gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpmg8gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm.8gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpme8gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm48gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpmj8gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm-8gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm/8gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm28gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpmh8libtsan2-14.2.1-1.3.el9_5.x86_64.rpm/8gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm*8libasan8-14.2.1-1.3.el9_5.i686.rpmi8gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm.8gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm28gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm18gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpmk8gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm08gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm,8gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm,8gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm18gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpmh8gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm*8libasan8-14.2.1-1.3.el9_5.x86_64.rpm38gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm38gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpmf8gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm48gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm08gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpmd8gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm-8gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpmg8gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm.8gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpme8gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm48gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpmj8gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm-8gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm/8gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm28gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpmh8libtsan2-14.2.1-1.3.el9_5.x86_64.rpm/8gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm*8libasan8-14.2.1-1.3.el9_5.i686.rpmi8gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm.8gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm28gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm18gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpmk8gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm08gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm,8gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm,8gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm18gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm# ;KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-13-gcc security update`https://access.redhat.com/errata/RHSA-2025:1309RHSA-2025:1309RHSA-2025:1309 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1309.htmlALSA-2025:1309ALSA-2025:1309 %7gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm#7gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm#7gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm*7gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm]7gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm*7libasan8-13.3.1-2.2.el9_5.x86_64.rpm[7gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm\7gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm$7gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm*7gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm%7gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm_7gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm*7libasan8-13.3.1-2.2.el9_5.i686.rpm"7gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpmZ7gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm$7gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm&7gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm(7gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm"7gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm'7gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm&7gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm`7gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm(7gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpmh7libtsan2-13.3.1-2.2.el9_5.x86_64.rpm)7gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm'7gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpmY7gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm)7gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm^7gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm%7gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm#7gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm#7gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm*7gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm]7gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm*7libasan8-13.3.1-2.2.el9_5.x86_64.rpm[7gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm\7gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm$7gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm*7gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm%7gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm_7gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm*7libasan8-13.3.1-2.2.el9_5.i686.rpm"7gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpmZ7gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm$7gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm&7gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm(7gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm"7gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm'7gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm&7gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm`7gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm(7gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpmh7libtsan2-13.3.1-2.2.el9_5.x86_64.rpm)7gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm'7gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpmY7gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm)7gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm^7gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm0 |BBBsecurityImportant: openssl security update|qhttps://access.redhat.com/errata/RHSA-2025:1330RHSA-2025:1330RHSA-2025:1330 https://access.redhat.com/security/cve/CVE-2024-12797CVE-2024-12797CVE-2024-12797https://bugzilla.redhat.com/23427572342757https://errata.almalinux.org/9/ALSA-2025-1330.htmlALSA-2025:1330ALSA-2025:1330  qopenssl-devel-3.2.2-6.el9_5.1.i686.rpmLqopenssl-perl-3.2.2-6.el9_5.1.x86_64.rpm qopenssl-devel-3.2.2-6.el9_5.1.x86_64.rpm qopenssl-devel-3.2.2-6.el9_5.1.i686.rpmLqopenssl-perl-3.2.2-6.el9_5.1.x86_64.rpm qopenssl-devel-3.2.2-6.el9_5.1.x86_64.rpm] BBsecurityModerate: libxml2 security updatemhttps://access.redhat.com/errata/RHSA-2025:13428RHSA-2025:13428RHSA-2025:13428 https://access.redhat.com/security/cve/CVE-2025-32414CVE-2025-32414CVE-2025-32414https://access.redhat.com/security/cve/CVE-2025-32415CVE-2025-32415CVE-2025-32415https://bugzilla.redhat.com/23581212358121https://bugzilla.redhat.com/23607682360768https://errata.almalinux.org/9/ALSA-2025-13428.htmlALSA-2025:13428ALSA-2025:13428 9\libxml2-devel-2.9.13-12.el9_6.i686.rpm9\libxml2-devel-2.9.13-12.el9_6.x86_64.rpm9\libxml2-devel-2.9.13-12.el9_6.i686.rpm9\libxml2-devel-2.9.13-12.el9_6.x86_64.rpmԼ> 2FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc security updateKhttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 XKlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpmIKlibitm-11.5.0-5.el9_5.alma.1.x86_64.rpmRKlibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpmSKgcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpmDKlibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpmXKlibubsan-11.5.0-5.el9_5.alma.1.i686.rpmRKgcc-11.5.0-5.el9_5.alma.1.x86_64.rpmDKlibgccjit-11.5.0-5.el9_5.alma.1.i686.rpmRKlibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmIKlibitm-11.5.0-5.el9_5.alma.1.i686.rpmJKcpp-11.5.0-5.el9_5.alma.1.x86_64.rpmEKlibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmTKgcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpmVKgcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpm?Klibasan-11.5.0-5.el9_5.alma.1.x86_64.rpmEKlibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm7Klibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpmWKlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmJKlibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmJKlibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm?Kliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpmUKgcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpmDKlibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpm?Klibasan-11.5.0-5.el9_5.alma.1.i686.rpmWKlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpmCKlibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpmXKlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpmIKlibitm-11.5.0-5.el9_5.alma.1.x86_64.rpmRKlibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpmSKgcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpmDKlibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpmXKlibubsan-11.5.0-5.el9_5.alma.1.i686.rpmRKgcc-11.5.0-5.el9_5.alma.1.x86_64.rpmDKlibgccjit-11.5.0-5.el9_5.alma.1.i686.rpmRKlibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmIKlibitm-11.5.0-5.el9_5.alma.1.i686.rpmJKcpp-11.5.0-5.el9_5.alma.1.x86_64.rpmEKlibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmTKgcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpmVKgcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpm?Klibasan-11.5.0-5.el9_5.alma.1.x86_64.rpmEKlibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm7Klibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpmWKlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmJKlibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmJKlibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm?Kliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpmUKgcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpmDKlibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpm?Klibasan-11.5.0-5.el9_5.alma.1.i686.rpmWKlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpmCKlibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpm 6sBsecurityImportant: libxml2 security updateM~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350 https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350 9blibxml2-devel-2.9.13-6.el9_5.1.i686.rpm9blibxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm9blibxml2-devel-2.9.13-6.el9_5.1.i686.rpm9blibxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm  9wsecurityModerate: python3.11-setuptools security updateK3https://access.redhat.com/errata/RHSA-2025:13578RHSA-2025:13578RHSA-2025:13578 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-13578.htmlALSA-2025:13578ALSA-2025:13578 {(python3.11-setuptools-65.5.1-4.el9_6.noarch.rpm|(python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm{(python3.11-setuptools-65.5.1-4.el9_6.noarch.rpm|(python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm8 zBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update~Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602 )Orv-5.14.0-570.33.2.el9_6.x86_64.rpmTOpython3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm$Okernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm'Ortla-5.14.0-570.33.2.el9_6.x86_64.rpm!Okernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpmOkernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm#Okernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm%Operf-5.14.0-570.33.2.el9_6.x86_64.rpm&Okernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm )Orv-5.14.0-570.33.2.el9_6.x86_64.rpmTOpython3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm$Okernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm'Ortla-5.14.0-570.33.2.el9_6.x86_64.rpm!Okernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpmOkernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm#Okernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm%Operf-5.14.0-570.33.2.el9_6.x86_64.rpm&Okernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm NBBsecurityImportant: toolbox security updateFhttps://access.redhat.com/errata/RHSA-2025:13673RHSA-2025:13673RHSA-2025:13673 https://access.redhat.com/security/cve/CVE-2025-23266CVE-2025-23266CVE-2025-23266https://bugzilla.redhat.com/23817942381794https://errata.almalinux.org/9/ALSA-2025-13673.htmlALSA-2025:13673ALSA-2025:13673 6otoolbox-0.2-1.el9_6.x86_64.rpm7otoolbox-tests-0.2-1.el9_6.x86_64.rpm6otoolbox-0.2-1.el9_6.x86_64.rpm7otoolbox-tests-0.2-1.el9_6.x86_64.rpmD SBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateWJhttps://access.redhat.com/errata/RHSA-2025:13782RHSA-2025:13782RHSA-2025:13782 https://access.redhat.com/security/cve/CVE-2025-31273CVE-2025-31273CVE-2025-31273https://access.redhat.com/security/cve/CVE-2025-31278CVE-2025-31278CVE-2025-31278https://access.redhat.com/security/cve/CVE-2025-43211CVE-2025-43211CVE-2025-43211https://access.redhat.com/security/cve/CVE-2025-43212CVE-2025-43212CVE-2025-43212https://access.redhat.com/security/cve/CVE-2025-43216CVE-2025-43216CVE-2025-43216https://access.redhat.com/security/cve/CVE-2025-43227CVE-2025-43227CVE-2025-43227https://access.redhat.com/security/cve/CVE-2025-43240CVE-2025-43240CVE-2025-43240https://access.redhat.com/security/cve/CVE-2025-43265CVE-2025-43265CVE-2025-43265https://access.redhat.com/security/cve/CVE-2025-6558CVE-2025-6558CVE-2025-6558https://bugzilla.redhat.com/23802542380254https://bugzilla.redhat.com/23843852384385https://bugzilla.redhat.com/23862682386268https://bugzilla.redhat.com/23862692386269https://bugzilla.redhat.com/23862702386270https://bugzilla.redhat.com/23862712386271https://bugzilla.redhat.com/23862732386273https://bugzilla.redhat.com/23862742386274https://bugzilla.redhat.com/23862762386276https://errata.almalinux.org/9/ALSA-2025-13782.htmlALSA-2025:13782ALSA-2025:13782 4uwebkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm3uwebkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm4uwebkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm1uwebkit2gtk3-2.48.5-1.el9_6.x86_64.rpm1uwebkit2gtk3-2.48.5-1.el9_6.i686.rpm3uwebkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm2uwebkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm2uwebkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm4uwebkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm3uwebkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm4uwebkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm1uwebkit2gtk3-2.48.5-1.el9_6.x86_64.rpm1uwebkit2gtk3-2.48.5-1.el9_6.i686.rpm3uwebkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm2uwebkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm2uwebkit2gtk3-devel-2.48.5-1.el9_6.i686.rpmb ,`BBBBBBBBBBsecurityImportant: golang security update!]https://access.redhat.com/errata/RHSA-2025:13935RHSA-2025:13935RHSA-2025:13935 https://access.redhat.com/security/cve/CVE-2025-4674CVE-2025-4674CVE-2025-4674https://bugzilla.redhat.com/23843292384329https://errata.almalinux.org/9/ALSA-2025-13935.htmlALSA-2025:13935ALSA-2025:13935 @Ygolang-bin-1.24.6-1.el9_6.x86_64.rpm?Ygolang-1.24.6-1.el9_6.x86_64.rpmYgolang-tests-1.24.6-1.el9_6.noarch.rpmYgolang-misc-1.24.6-1.el9_6.noarch.rpmYgolang-docs-1.24.6-1.el9_6.noarch.rpmYgolang-src-1.24.6-1.el9_6.noarch.rpmKYgolang-race-1.24.6-1.el9_6.x86_64.rpmpYgo-toolset-1.24.6-1.el9_6.x86_64.rpm@Ygolang-bin-1.24.6-1.el9_6.x86_64.rpm?Ygolang-1.24.6-1.el9_6.x86_64.rpmYgolang-tests-1.24.6-1.el9_6.noarch.rpmYgolang-misc-1.24.6-1.el9_6.noarch.rpmYgolang-docs-1.24.6-1.el9_6.noarch.rpmYgolang-src-1.24.6-1.el9_6.noarch.rpmKYgolang-race-1.24.6-1.el9_6.x86_64.rpmpYgo-toolset-1.24.6-1.el9_6.x86_64.rpmŌY mBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update~https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 %Pperf-5.14.0-570.35.1.el9_6.x86_64.rpm&Pkernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm#Pkernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpmTPpython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm$Pkernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm'Prtla-5.14.0-570.35.1.el9_6.x86_64.rpmPkernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm!Pkernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm)Prv-5.14.0-570.35.1.el9_6.x86_64.rpm"Pkernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm %Pperf-5.14.0-570.35.1.el9_6.x86_64.rpm&Pkernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm#Pkernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpmTPpython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm$Pkernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm'Prtla-5.14.0-570.35.1.el9_6.x86_64.rpmPkernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm!Pkernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm)Prv-5.14.0-570.35.1.el9_6.x86_64.rpm"Pkernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpmŠ} ABBsecurityModerate: xterm security update^https://access.redhat.com/errata/RHSA-2025:14075RHSA-2025:14075RHSA-2025:14075 https://access.redhat.com/security/cve/CVE-2022-24130CVE-2022-24130CVE-2022-24130https://bugzilla.redhat.com/20486762048676https://errata.almalinux.org/9/ALSA-2025-14075.htmlALSA-2025:14075ALSA-2025:14075  Rxterm-366-12.el9_6.x86_64.rpm Rxterm-resize-366-12.el9_6.x86_64.rpm Rxterm-366-12.el9_6.x86_64.rpm Rxterm-resize-366-12.el9_6.x86_64.rpmőI FBBBsecurityImportant: libarchive security updatem}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130 https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130 M bsdtar-3.5.3-6.el9_6.x86_64.rpmj libarchive-devel-3.5.3-6.el9_6.i686.rpmj libarchive-devel-3.5.3-6.el9_6.x86_64.rpmM bsdtar-3.5.3-6.el9_6.x86_64.rpmj libarchive-devel-3.5.3-6.el9_6.i686.rpmj libarchive-devel-3.5.3-6.el9_6.x86_64.rpmŗl LBBBBBBsecurityImportant: tomcat security updatejNhttps://access.redhat.com/errata/RHSA-2025:14181RHSA-2025:14181RHSA-2025:14181 https://access.redhat.com/security/cve/CVE-2025-48976CVE-2025-48976CVE-2025-48976https://access.redhat.com/security/cve/CVE-2025-48988CVE-2025-48988CVE-2025-48988https://access.redhat.com/security/cve/CVE-2025-48989CVE-2025-48989CVE-2025-48989https://access.redhat.com/security/cve/CVE-2025-49125CVE-2025-49125CVE-2025-49125https://access.redhat.com/security/cve/CVE-2025-52434CVE-2025-52434CVE-2025-52434https://access.redhat.com/security/cve/CVE-2025-52520CVE-2025-52520CVE-2025-52520https://access.redhat.com/security/cve/CVE-2025-53506CVE-2025-53506CVE-2025-53506https://bugzilla.redhat.com/23730152373015https://bugzilla.redhat.com/23730182373018https://bugzilla.redhat.com/23730202373020https://bugzilla.redhat.com/23733092373309https://bugzilla.redhat.com/23793742379374https://bugzilla.redhat.com/23793822379382https://bugzilla.redhat.com/23793862379386https://errata.almalinux.org/9/ALSA-2025-14181.htmlALSA-2025:14181ALSA-2025:14181 @tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm=tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm?tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpmAtomcat-lib-9.0.87-3.el9_6.3.noarch.rpm>tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm<tomcat-9.0.87-3.el9_6.3.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpmCtomcat-webapps-9.0.87-3.el9_6.3.noarch.rpm@tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm=tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm?tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpmAtomcat-lib-9.0.87-3.el9_6.3.noarch.rpm>tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm<tomcat-9.0.87-3.el9_6.3.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpmCtomcat-webapps-9.0.87-3.el9_6.3.noarch.rpmš# UBBsecurityImportant: firefox security update8J https://access.redhat.com/errata/RHSA-2025:14416RHSA-2025:14416RHSA-2025:14416 https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14416.htmlALSA-2025:14416ALSA-2025:14416 9 firefox-128.14.0-2.el9_6.alma.1.x86_64.rpmO firefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpm9 firefox-128.14.0-2.el9_6.alma.1.x86_64.rpmO firefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpmŻt -ZBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420 )Qrv-5.14.0-570.37.1.el9_6.x86_64.rpm"Qkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm#Qkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm'Qrtla-5.14.0-570.37.1.el9_6.x86_64.rpm!Qkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm&Qkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm$Qkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%Qperf-5.14.0-570.37.1.el9_6.x86_64.rpmQkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpmTQpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm )Qrv-5.14.0-570.37.1.el9_6.x86_64.rpm"Qkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm#Qkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm'Qrtla-5.14.0-570.37.1.el9_6.x86_64.rpm!Qkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm&Qkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm$Qkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%Qperf-5.14.0-570.37.1.el9_6.x86_64.rpmQkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpmTQpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpmŻs  7eHlXBBBBBBBsecurityImportant: nodejs:20 security update#Khttps://access.redhat.com/errata/RHSA-2025:1443RHSA-2025:1443RHSA-2025:1443 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1443.htmlALSA-2025:1443ALSA-2025:1443 5(eUnodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm5Unodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmLUnodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmanpm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm"Unodejs-devel-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm5(eUnodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm5Unodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm{hnodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm nodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmLUnodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmanpm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm"Unodejs-devel-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm4! WBB`BBBBBBBsecurityModerate: nodejs:18 security updatenwhttps://access.redhat.com/errata/RHSA-2025:1446RHSA-2025:1446RHSA-2025:1446 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1446.htmlALSA-2025:1446ALSA-2025:1446 57-(LQnodejs-docs-18.20.6-1.module_el9.5.0+136+92f38f3c.noarch.rpmanpm-10.8.2-1.18.20.6.1.module_el9.5.0+136+92f38f3c.x86_64.rpm5Qnodejs-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm"Qnodejs-devel-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmeQnodejs-full-i18n-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm57-(LQnodejs-docs-18.20.6-1.module_el9.5.0+136+92f38f3c.noarch.rpmanpm-10.8.2-1.18.20.6.1.module_el9.5.0+136+92f38f3c.x86_64.rpm5Qnodejs-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm"Qnodejs-devel-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmeQnodejs-full-i18n-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpmO" BsecurityImportant: aide security updateedhttps://access.redhat.com/errata/RHSA-2025:14493RHSA-2025:14493RHSA-2025:14493 https://access.redhat.com/security/cve/CVE-2025-54389CVE-2025-54389CVE-2025-54389https://bugzilla.redhat.com/23880192388019https://errata.almalinux.org/9/ALSA-2025-14493.htmlALSA-2025:14493ALSA-2025:14493 5 aide-0.16-103.el9_6.2.x86_64.rpm5 aide-0.16-103.el9_6.2.x86_64.rpmŻT# EsecurityImportant: thunderbird security updateI https://access.redhat.com/errata/RHSA-2025:14640RHSA-2025:14640RHSA-2025:14640 https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14640.htmlALSA-2025:14640ALSA-2025:14640 :gthunderbird-128.14.0-3.el9_6.alma.1.x86_64.rpm:gthunderbird-128.14.0-3.el9_6.alma.1.x86_64.rpmb$ %tBBBfBBBjBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security updatebNhttps://access.redhat.com/errata/RHSA-2025:14827RHSA-2025:14827RHSA-2025:14827 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14827.htmlALSA-2025:14827ALSA-2025:14827 ` .(9~pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm*spostgresql-pltcl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm+spostgresql-private-libs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-upgrade-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-static-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm-spostgresql-upgrade-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm(spostgresql-plperl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm)spostgresql-plpython3-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-private-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm,spostgresql-server-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmkspostgresql-test-rpm-macros-16.10-1.module_el9.6.0+174+80cb77f0.noarch.rpm spostgresql-docs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm'spostgresql-contrib-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-test-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm`spostgresql-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-server-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm` .(9~pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm*spostgresql-pltcl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm+spostgresql-private-libs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-upgrade-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-static-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm-spostgresql-upgrade-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm(spostgresql-plperl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm)spostgresql-plpython3-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-private-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm,spostgresql-server-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmkspostgresql-test-rpm-macros-16.10-1.module_el9.6.0+174+80cb77f0.noarch.rpm spostgresql-docs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm'spostgresql-contrib-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-test-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm`spostgresql-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmspostgresql-server-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmƈ;% pBBBnBFBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update0Nhttps://access.redhat.com/errata/RHSA-2025:14862RHSA-2025:14862RHSA-2025:14862 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14862.htmlALSA-2025:14862ALSA-2025:14862 ` +(+mpostgresql-private-libs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm mpostgresql-docs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmmpostgresql-server-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm-mpostgresql-upgrade-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm`mpostgresql-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-private-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-test-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmkmpostgresql-test-rpm-macros-15.14-1.module_el9.6.0+176+c508cfa2.noarch.rpm'mpostgresql-contrib-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm)mpostgresql-plpython3-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm,mpostgresql-server-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm(mpostgresql-plperl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm*mpostgresql-pltcl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-static-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-upgrade-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm` +(+mpostgresql-private-libs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm mpostgresql-docs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmmpostgresql-server-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm-mpostgresql-upgrade-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm`mpostgresql-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-private-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-test-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmkmpostgresql-test-rpm-macros-15.14-1.module_el9.6.0+176+c508cfa2.noarch.rpm'mpostgresql-contrib-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm)mpostgresql-plpython3-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm,mpostgresql-server-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm(mpostgresql-plperl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm*mpostgresql-pltcl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-static-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmmpostgresql-upgrade-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmۓ*& DBBBBBBBBBBBBBBsecurityImportant: postgresql security update~Nhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878 )ypostgresql-plpython3-13.22-1.el9_6.x86_64.rpm-ypostgresql-upgrade-13.22-1.el9_6.x86_64.rpm,ypostgresql-server-13.22-1.el9_6.x86_64.rpm*ypostgresql-pltcl-13.22-1.el9_6.x86_64.rpm(ypostgresql-plperl-13.22-1.el9_6.x86_64.rpm+ypostgresql-private-libs-13.22-1.el9_6.x86_64.rpm'ypostgresql-contrib-13.22-1.el9_6.x86_64.rpm`ypostgresql-13.22-1.el9_6.x86_64.rpm)ypostgresql-plpython3-13.22-1.el9_6.x86_64.rpm-ypostgresql-upgrade-13.22-1.el9_6.x86_64.rpm,ypostgresql-server-13.22-1.el9_6.x86_64.rpm*ypostgresql-pltcl-13.22-1.el9_6.x86_64.rpm(ypostgresql-plperl-13.22-1.el9_6.x86_64.rpm+ypostgresql-private-libs-13.22-1.el9_6.x86_64.rpm'ypostgresql-contrib-13.22-1.el9_6.x86_64.rpm`ypostgresql-13.22-1.el9_6.x86_64.rpmŚg' UsecurityModerate: mod_http2 security updateLVhttps://access.redhat.com/errata/RHSA-2025:14983RHSA-2025:14983RHSA-2025:14983 https://access.redhat.com/security/cve/CVE-2025-49630CVE-2025-49630CVE-2025-49630https://bugzilla.redhat.com/23745782374578https://errata.almalinux.org/9/ALSA-2025-14983.htmlALSA-2025:14983ALSA-2025:14983 `"mod_http2-2.0.26-4.el9_6.1.x86_64.rpm`"mod_http2-2.0.26-4.el9_6.1.x86_64.rpmے ( "XBBBBBBBBsecurityModerate: python3.12 security update";https://access.redhat.com/errata/RHSA-2025:15007RHSA-2025:15007RHSA-2025:15007 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15007.htmlALSA-2025:15007ALSA-2025:15007 Zpython3.12-devel-3.12.9-1.el9_6.2.x86_64.rpm"Zpython3.12-3.12.9-1.el9_6.2.x86_64.rpmZpython3.12-libs-3.12.9-1.el9_6.2.i686.rpmZpython3.12-devel-3.12.9-1.el9_6.2.i686.rpmZpython3.12-libs-3.12.9-1.el9_6.2.x86_64.rpm#Zpython3.12-tkinter-3.12.9-1.el9_6.2.x86_64.rpmZpython3.12-devel-3.12.9-1.el9_6.2.x86_64.rpm"Zpython3.12-3.12.9-1.el9_6.2.x86_64.rpmZpython3.12-libs-3.12.9-1.el9_6.2.i686.rpmZpython3.12-devel-3.12.9-1.el9_6.2.i686.rpmZpython3.12-libs-3.12.9-1.el9_6.2.x86_64.rpm#Zpython3.12-tkinter-3.12.9-1.el9_6.2.x86_64.rpm$) -cBBBBBBBBsecurityModerate: python3.11 security update];https://access.redhat.com/errata/RHSA-2025:15010RHSA-2025:15010RHSA-2025:15010 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15010.htmlALSA-2025:15010ALSA-2025:15010 cBpython3.11-libs-3.11.11-2.el9_6.2.x86_64.rpmkBpython3.11-3.11.11-2.el9_6.2.x86_64.rpmcBpython3.11-libs-3.11.11-2.el9_6.2.i686.rpmlBpython3.11-tkinter-3.11.11-2.el9_6.2.x86_64.rpmbBpython3.11-devel-3.11.11-2.el9_6.2.x86_64.rpmbBpython3.11-devel-3.11.11-2.el9_6.2.i686.rpmcBpython3.11-libs-3.11.11-2.el9_6.2.x86_64.rpmkBpython3.11-3.11.11-2.el9_6.2.x86_64.rpmcBpython3.11-libs-3.11.11-2.el9_6.2.i686.rpmlBpython3.11-tkinter-3.11.11-2.el9_6.2.x86_64.rpmbBpython3.11-devel-3.11.11-2.el9_6.2.x86_64.rpmbBpython3.11-devel-3.11.11-2.el9_6.2.i686.rpm * nBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011 https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684 TRpython3-perf-5.14.0-570.39.1.el9_6.x86_64.rpm&Rkernel-headers-5.14.0-570.39.1.el9_6.x86_64.rpm)Rrv-5.14.0-570.39.1.el9_6.x86_64.rpm!Rkernel-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm'Rrtla-5.14.0-570.39.1.el9_6.x86_64.rpm"Rkernel-debug-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm#Rkernel-devel-5.14.0-570.39.1.el9_6.x86_64.rpmRkernel-doc-5.14.0-570.39.1.el9_6.noarch.rpm$Rkernel-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm%Rperf-5.14.0-570.39.1.el9_6.x86_64.rpm TRpython3-perf-5.14.0-570.39.1.el9_6.x86_64.rpm&Rkernel-headers-5.14.0-570.39.1.el9_6.x86_64.rpm)Rrv-5.14.0-570.39.1.el9_6.x86_64.rpm!Rkernel-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm'Rrtla-5.14.0-570.39.1.el9_6.x86_64.rpm"Rkernel-debug-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm#Rkernel-devel-5.14.0-570.39.1.el9_6.x86_64.rpmRkernel-doc-5.14.0-570.39.1.el9_6.noarch.rpm$Rkernel-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm%Rperf-5.14.0-570.39.1.el9_6.x86_64.rpm#+ BBBBBBBBBBsecurityImportant: udisks2 security update/https://access.redhat.com/errata/RHSA-2025:15018RHSA-2025:15018RHSA-2025:15018 https://access.redhat.com/security/cve/CVE-2025-8067CVE-2025-8067CVE-2025-8067https://bugzilla.redhat.com/23886232388623https://errata.almalinux.org/9/ALSA-2025-15018.htmlALSA-2025:15018ALSA-2025:15018 Y%libudisks2-2.9.4-11.el9_6.1.i686.rpm5%udisks2-iscsi-2.9.4-11.el9_6.1.x86_64.rpm6%udisks2-lsm-2.9.4-11.el9_6.1.x86_64.rpmY%libudisks2-2.9.4-11.el9_6.1.x86_64.rpm4%udisks2-2.9.4-11.el9_6.1.x86_64.rpm7%udisks2-lvm2-2.9.4-11.el9_6.1.x86_64.rpmY%libudisks2-2.9.4-11.el9_6.1.i686.rpm5%udisks2-iscsi-2.9.4-11.el9_6.1.x86_64.rpm6%udisks2-lsm-2.9.4-11.el9_6.1.x86_64.rpmY%libudisks2-2.9.4-11.el9_6.1.x86_64.rpm4%udisks2-2.9.4-11.el9_6.1.x86_64.rpm7%udisks2-lvm2-2.9.4-11.el9_6.1.x86_64.rpmX, NBBBBsecurityModerate: python3.9 security updateE;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019 =3python3-tkinter-3.9.21-2.el9_6.2.x86_64.rpmj3python-unversioned-command-3.9.21-2.el9_6.2.noarch.rpmW3python3-devel-3.9.21-2.el9_6.2.i686.rpmW3python3-devel-3.9.21-2.el9_6.2.x86_64.rpm=3python3-tkinter-3.9.21-2.el9_6.2.x86_64.rpmj3python-unversioned-command-3.9.21-2.el9_6.2.noarch.rpmW3python3-devel-3.9.21-2.el9_6.2.i686.rpmW3python3-devel-3.9.21-2.el9_6.2.x86_64.rpm- )UBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security updateMhttps://access.redhat.com/errata/RHSA-2025:15023RHSA-2025:15023RHSA-2025:15023 https://access.redhat.com/security/cve/CVE-2024-47252CVE-2024-47252CVE-2024-47252https://access.redhat.com/security/cve/CVE-2025-23048CVE-2025-23048CVE-2025-23048https://access.redhat.com/security/cve/CVE-2025-49812CVE-2025-49812CVE-2025-49812https://bugzilla.redhat.com/23745712374571https://bugzilla.redhat.com/23745762374576https://bugzilla.redhat.com/23745802374580https://errata.almalinux.org/9/ALSA-2025-15023.htmlALSA-2025:15023ALSA-2025:15023 (mod_proxy_html-2.4.62-4.el9_6.4.x86_64.rpmmKhttpd-devel-2.4.62-4.el9_6.4.x86_64.rpmKmod_lua-2.4.62-4.el9_6.4.x86_64.rpmnKhttpd-tools-2.4.62-4.el9_6.4.x86_64.rpm2Khttpd-filesystem-2.4.62-4.el9_6.4.noarch.rpmKmod_session-2.4.62-4.el9_6.4.x86_64.rpm(mod_ssl-2.4.62-4.el9_6.4.x86_64.rpmkKhttpd-2.4.62-4.el9_6.4.x86_64.rpmlKhttpd-core-2.4.62-4.el9_6.4.x86_64.rpmKmod_ldap-2.4.62-4.el9_6.4.x86_64.rpm3Khttpd-manual-2.4.62-4.el9_6.4.noarch.rpm (mod_proxy_html-2.4.62-4.el9_6.4.x86_64.rpmmKhttpd-devel-2.4.62-4.el9_6.4.x86_64.rpmKmod_lua-2.4.62-4.el9_6.4.x86_64.rpmnKhttpd-tools-2.4.62-4.el9_6.4.x86_64.rpm2Khttpd-filesystem-2.4.62-4.el9_6.4.noarch.rpmKmod_session-2.4.62-4.el9_6.4.x86_64.rpm(mod_ssl-2.4.62-4.el9_6.4.x86_64.rpmkKhttpd-2.4.62-4.el9_6.4.x86_64.rpmlKhttpd-core-2.4.62-4.el9_6.4.x86_64.rpmKmod_ldap-2.4.62-4.el9_6.4.x86_64.rpm3Khttpd-manual-2.4.62-4.el9_6.4.noarch.rpmY. /jBBBsecurityImportant: pam security updateMphttps://access.redhat.com/errata/RHSA-2025:15099RHSA-2025:15099RHSA-2025:15099 https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://access.redhat.com/security/cve/CVE-2025-8941CVE-2025-8941CVE-2025-8941https://bugzilla.redhat.com/23725122372512https://bugzilla.redhat.com/23882202388220https://errata.almalinux.org/9/ALSA-2025-15099.htmlALSA-2025:15099ALSA-2025:15099 4gpam-devel-1.5.1-26.el9_6.i686.rpm4gpam-devel-1.5.1-26.el9_6.x86_64.rpmMgpam-docs-1.5.1-26.el9_6.x86_64.rpm4gpam-devel-1.5.1-26.el9_6.i686.rpm4gpam-devel-1.5.1-26.el9_6.x86_64.rpmMgpam-docs-1.5.1-26.el9_6.x86_64.rpm/ pBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update=Whttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429 https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429 Skernel-doc-5.14.0-570.41.1.el9_6.noarch.rpm'Srtla-5.14.0-570.41.1.el9_6.x86_64.rpm&Skernel-headers-5.14.0-570.41.1.el9_6.x86_64.rpm!Skernel-debug-devel-5.14.0-570.41.1.el9_6.x86_64.rpm)Srv-5.14.0-570.41.1.el9_6.x86_64.rpm%Sperf-5.14.0-570.41.1.el9_6.x86_64.rpm$Skernel-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpmTSpython3-perf-5.14.0-570.41.1.el9_6.x86_64.rpm#Skernel-devel-5.14.0-570.41.1.el9_6.x86_64.rpm"Skernel-debug-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpm Skernel-doc-5.14.0-570.41.1.el9_6.noarch.rpm'Srtla-5.14.0-570.41.1.el9_6.x86_64.rpm&Skernel-headers-5.14.0-570.41.1.el9_6.x86_64.rpm!Skernel-debug-devel-5.14.0-570.41.1.el9_6.x86_64.rpm)Srv-5.14.0-570.41.1.el9_6.x86_64.rpm%Sperf-5.14.0-570.41.1.el9_6.x86_64.rpm$Skernel-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpmTSpython3-perf-5.14.0-570.41.1.el9_6.x86_64.rpm#Skernel-devel-5.14.0-570.41.1.el9_6.x86_64.rpm"Skernel-debug-devel-matched-5.14.0-570.41.1.el9_6.x86_64.rpmƟ'0 DsecurityImportant: python3.12-cryptography security update5https://access.redhat.com/errata/RHSA-2025:15608RHSA-2025:15608RHSA-2025:15608 https://access.redhat.com/security/cve/CVE-2024-26130CVE-2024-26130CVE-2024-26130https://bugzilla.redhat.com/22696172269617https://errata.almalinux.org/9/ALSA-2025-15608.htmlALSA-2025:15608ALSA-2025:15608 }qpython3.12-cryptography-41.0.7-2.el9_6.1.x86_64.rpm}qpython3.12-cryptography-41.0.7-2.el9_6.1.x86_64.rpmƆ1 GBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateI https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661 https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661 &Tkernel-headers-5.14.0-570.42.2.el9_6.x86_64.rpm'Trtla-5.14.0-570.42.2.el9_6.x86_64.rpm"Tkernel-debug-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm)Trv-5.14.0-570.42.2.el9_6.x86_64.rpmTTpython3-perf-5.14.0-570.42.2.el9_6.x86_64.rpm!Tkernel-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm%Tperf-5.14.0-570.42.2.el9_6.x86_64.rpm$Tkernel-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpmTkernel-doc-5.14.0-570.42.2.el9_6.noarch.rpm#Tkernel-devel-5.14.0-570.42.2.el9_6.x86_64.rpm &Tkernel-headers-5.14.0-570.42.2.el9_6.x86_64.rpm'Trtla-5.14.0-570.42.2.el9_6.x86_64.rpm"Tkernel-debug-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm)Trv-5.14.0-570.42.2.el9_6.x86_64.rpmTTpython3-perf-5.14.0-570.42.2.el9_6.x86_64.rpm!Tkernel-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm%Tperf-5.14.0-570.42.2.el9_6.x86_64.rpm$Tkernel-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpmTkernel-doc-5.14.0-570.42.2.el9_6.noarch.rpm#Tkernel-devel-5.14.0-570.42.2.el9_6.x86_64.rpmƤQ2 )[BBBBBBBBBBBBsecurityImportant: cups security updatec https://access.redhat.com/errata/RHSA-2025:15700RHSA-2025:15700RHSA-2025:15700 https://access.redhat.com/security/cve/CVE-2025-58060CVE-2025-58060CVE-2025-58060https://access.redhat.com/security/cve/CVE-2025-58364CVE-2025-58364CVE-2025-58364https://bugzilla.redhat.com/23925952392595https://bugzilla.redhat.com/23930782393078https://errata.almalinux.org/9/ALSA-2025-15700.htmlALSA-2025:15700ALSA-2025:15700 I"cups-2.3.3op2-33.el9_6.1.x86_64.rpmJ"cups-client-2.3.3op2-33.el9_6.1.x86_64.rpmM"cups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpmK"cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm"cups-devel-2.3.3op2-33.el9_6.1.i686.rpm9"cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm"cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpmL"cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpmI"cups-2.3.3op2-33.el9_6.1.x86_64.rpmJ"cups-client-2.3.3op2-33.el9_6.1.x86_64.rpmM"cups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpmK"cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm"cups-devel-2.3.3op2-33.el9_6.1.i686.rpm9"cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm"cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpmL"cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpmV3 =jBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatephttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740 https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740 $Ukernel-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm"Ukernel-debug-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpmUkernel-doc-5.14.0-570.44.1.el9_6.noarch.rpm'Urtla-5.14.0-570.44.1.el9_6.x86_64.rpm&Ukernel-headers-5.14.0-570.44.1.el9_6.x86_64.rpm!Ukernel-debug-devel-5.14.0-570.44.1.el9_6.x86_64.rpm#Ukernel-devel-5.14.0-570.44.1.el9_6.x86_64.rpm%Uperf-5.14.0-570.44.1.el9_6.x86_64.rpmTUpython3-perf-5.14.0-570.44.1.el9_6.x86_64.rpm)Urv-5.14.0-570.44.1.el9_6.x86_64.rpm $Ukernel-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm"Ukernel-debug-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpmUkernel-doc-5.14.0-570.44.1.el9_6.noarch.rpm'Urtla-5.14.0-570.44.1.el9_6.x86_64.rpm&Ukernel-headers-5.14.0-570.44.1.el9_6.x86_64.rpm!Ukernel-debug-devel-5.14.0-570.44.1.el9_6.x86_64.rpm#Ukernel-devel-5.14.0-570.44.1.el9_6.x86_64.rpm%Uperf-5.14.0-570.44.1.el9_6.x86_64.rpmTUpython3-perf-5.14.0-570.44.1.el9_6.x86_64.rpm)Urv-5.14.0-570.44.1.el9_6.x86_64.rpmԃ:4 ~securityModerate: opentelemetry-collector security updatephttps://access.redhat.com/errata/RHSA-2025:15887RHSA-2025:15887RHSA-2025:15887 https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-15887.htmlALSA-2025:15887ALSA-2025:15887 Vopentelemetry-collector-0.127.0-2.el9_6.x86_64.rpmVopentelemetry-collector-0.127.0-2.el9_6.x86_64.rpmƯz5 ABBBBBBBsecurityImportant: podman security updatefhttps://access.redhat.com/errata/RHSA-2025:15900RHSA-2025:15900RHSA-2025:15900 https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-15900.htmlALSA-2025:15900ALSA-2025:15900 fUpodman-docker-5.4.0-13.el9_6.noarch.rpm$Upodman-plugins-5.4.0-13.el9_6.x86_64.rpm#Upodman-5.4.0-13.el9_6.x86_64.rpm&Upodman-tests-5.4.0-13.el9_6.x86_64.rpm%Upodman-remote-5.4.0-13.el9_6.x86_64.rpmfUpodman-docker-5.4.0-13.el9_6.noarch.rpm$Upodman-plugins-5.4.0-13.el9_6.x86_64.rpm#Upodman-5.4.0-13.el9_6.x86_64.rpm&Upodman-tests-5.4.0-13.el9_6.x86_64.rpm%Upodman-remote-5.4.0-13.el9_6.x86_64.rpm~6 oBDBBBBBDBDMBBBBBBBBBBBsecurityModerate: mysql:8.4 security updateg khttps://access.redhat.com/errata/RHSA-2025:16046RHSA-2025:16046RHSA-2025:16046 https://access.redhat.com/security/cve/CVE-2024-13176CVE-2024-13176CVE-2024-13176https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-21588CVE-2025-21588CVE-2025-21588https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-5399CVE-2025-5399CVE-2025-5399https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599112359911https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23709202370920https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16046.htmlALSA-2025:16046ALSA-2025:16046 !(NQmysql-server-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm_rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm0Qmysql-errmsg-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmUQmysql-libs-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm/Qmysql-common-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmlmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmilmecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmkmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmqQmysql-test-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmjlmecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmQmysql-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmpQmysql-devel-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmrQmysql-test-data-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm_rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm!(NQmysql-server-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm_rapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm0Qmysql-errmsg-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmUQmysql-libs-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm/Qmysql-common-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmlmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmilmecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmkmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmqQmysql-test-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmjlmecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmQmysql-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmpQmysql-devel-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmrQmysql-test-data-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpm_rapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpmƯh7 #YBBBBBBBBsecurityModerate: mysql security updatephhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086 https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086 N$mysql-server-8.0.43-1.el9_6.x86_64.rpm0$mysql-errmsg-8.0.43-1.el9_6.x86_64.rpmU$mysql-libs-8.0.43-1.el9_6.x86_64.rpm/$mysql-common-8.0.43-1.el9_6.x86_64.rpm$mysql-8.0.43-1.el9_6.x86_64.rpmN$mysql-server-8.0.43-1.el9_6.x86_64.rpm0$mysql-errmsg-8.0.43-1.el9_6.x86_64.rpmU$mysql-libs-8.0.43-1.el9_6.x86_64.rpm/$mysql-common-8.0.43-1.el9_6.x86_64.rpm$mysql-8.0.43-1.el9_6.x86_64.rpmp8 (dBBsecurityImportant: firefox security updatevRhttps://access.redhat.com/errata/RHSA-2025:16108RHSA-2025:16108RHSA-2025:16108 https://access.redhat.com/security/cve/CVE-2025-10527CVE-2025-10527CVE-2025-10527https://access.redhat.com/security/cve/CVE-2025-10528CVE-2025-10528CVE-2025-10528https://access.redhat.com/security/cve/CVE-2025-10529CVE-2025-10529CVE-2025-10529https://access.redhat.com/security/cve/CVE-2025-10532CVE-2025-10532CVE-2025-10532https://access.redhat.com/security/cve/CVE-2025-10533CVE-2025-10533CVE-2025-10533https://access.redhat.com/security/cve/CVE-2025-10536CVE-2025-10536CVE-2025-10536https://access.redhat.com/security/cve/CVE-2025-10537CVE-2025-10537CVE-2025-10537https://bugzilla.redhat.com/23957452395745https://bugzilla.redhat.com/23957542395754https://bugzilla.redhat.com/23957552395755https://bugzilla.redhat.com/23957562395756https://bugzilla.redhat.com/23957592395759https://bugzilla.redhat.com/23957642395764https://bugzilla.redhat.com/23957662395766https://errata.almalinux.org/9/ALSA-2025-16108.htmlALSA-2025:16108ALSA-2025:16108 9 firefox-140.3.0-1.el9_6.alma.1.x86_64.rpmO firefox-x11-140.3.0-1.el9_6.alma.1.x86_64.rpm9 firefox-140.3.0-1.el9_6.alma.1.x86_64.rpmO firefox-x11-140.3.0-1.el9_6.alma.1.x86_64.rpmQ9 4iBBBBBBBBBsecurityModerate: gnutls security, bug fix, and enhancement updateH https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116 https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116 dgnutls-c++-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-devel-3.8.3-6.el9_6.2.i686.rpmdgnutls-dane-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-utils-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-devel-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-dane-3.8.3-6.el9_6.2.i686.rpmdgnutls-c++-3.8.3-6.el9_6.2.i686.rpmdgnutls-c++-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-devel-3.8.3-6.el9_6.2.i686.rpmdgnutls-dane-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-utils-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-devel-3.8.3-6.el9_6.2.x86_64.rpmdgnutls-dane-3.8.3-6.el9_6.2.i686.rpmdgnutls-c++-3.8.3-6.el9_6.2.i686.rpm : z_B]BBBBBBBBBBBsecurityImportant: nodejs:22 security updateYKhttps://access.redhat.com/errata/RHSA-2025:1613RHSA-2025:1613RHSA-2025:1613 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1613.htmlALSA-2025:1613ALSA-2025:1613 57-( 58nodejs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm>av8-12.4-devel-12.4.254.21-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm 8nodejs-libs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmL8nodejs-docs-22.13.1-1.module_el9.5.0+139+09296491.noarch.rpm"8nodejs-devel-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpme8nodejs-full-i18n-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpma npm-10.9.2-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm57-( 58nodejs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm>av8-12.4-devel-12.4.254.21-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm 8nodejs-libs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmL8nodejs-docs-22.13.1-1.module_el9.5.0+139+09296491.noarch.rpm"8nodejs-devel-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpme8nodejs-full-i18n-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpma npm-10.9.2-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm7; CsecurityImportant: thunderbird security update$!https://access.redhat.com/errata/RHSA-2025:16156RHSA-2025:16156RHSA-2025:16156 https://access.redhat.com/security/cve/CVE-2025-10527CVE-2025-10527CVE-2025-10527https://access.redhat.com/security/cve/CVE-2025-10528CVE-2025-10528CVE-2025-10528https://access.redhat.com/security/cve/CVE-2025-10529CVE-2025-10529CVE-2025-10529https://access.redhat.com/security/cve/CVE-2025-10532CVE-2025-10532CVE-2025-10532https://access.redhat.com/security/cve/CVE-2025-10533CVE-2025-10533CVE-2025-10533https://access.redhat.com/security/cve/CVE-2025-10536CVE-2025-10536CVE-2025-10536https://access.redhat.com/security/cve/CVE-2025-10537CVE-2025-10537CVE-2025-10537https://bugzilla.redhat.com/23957452395745https://bugzilla.redhat.com/23957542395754https://bugzilla.redhat.com/23957552395755https://bugzilla.redhat.com/23957562395756https://bugzilla.redhat.com/23957592395759https://bugzilla.redhat.com/23957642395764https://bugzilla.redhat.com/23957662395766https://errata.almalinux.org/9/ALSA-2025-16156.htmlALSA-2025:16156ALSA-2025:16156 : thunderbird-140.3.0-1.el9_6.alma.1.x86_64.rpm: thunderbird-140.3.0-1.el9_6.alma.1.x86_64.rpm < FBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateE https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398 https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398 $Vkernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm'Vrtla-5.14.0-570.46.1.el9_6.x86_64.rpm#Vkernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm%Vperf-5.14.0-570.46.1.el9_6.x86_64.rpm&Vkernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpmVkernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm"Vkernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpmTVpython3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm!Vkernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm)Vrv-5.14.0-570.46.1.el9_6.x86_64.rpm $Vkernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm'Vrtla-5.14.0-570.46.1.el9_6.x86_64.rpm#Vkernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm%Vperf-5.14.0-570.46.1.el9_6.x86_64.rpm&Vkernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpmVkernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm"Vkernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpmTVpython3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm!Vkernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm)Vrv-5.14.0-570.46.1.el9_6.x86_64.rpmm= +ZBBBBBBBBBBBBBBBsecurityModerate: kernel security updateLhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659 https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659 !<kernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm#<kernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpm<kernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm%<perf-5.14.0-503.26.1.el9_5.x86_64.rpm)<rv-5.14.0-503.26.1.el9_5.x86_64.rpm"<kernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm'<rtla-5.14.0-503.26.1.el9_5.x86_64.rpm$<kernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm&<kernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm !<kernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm#<kernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpm<kernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm%<perf-5.14.0-503.26.1.el9_5.x86_64.rpm)<rv-5.14.0-503.26.1.el9_5.x86_64.rpm"<kernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm'<rtla-5.14.0-503.26.1.el9_5.x86_64.rpm$<kernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm&<kernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm@> 6lBBBBBBBBsecurityImportant: bind9.18 security update]rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670 r!bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpmt!bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpmq!bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpms!bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpmp!bind9.18-9.18.29-1.el9_5.1.x86_64.rpmr!bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpmt!bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpmq!bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpms!bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpmp!bind9.18-9.18.29-1.el9_5.1.x86_64.rpm/? ?wBBBBBBsecurityImportant: mysql security updateO*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671 https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671 Nmysql-server-8.0.41-2.el9_5.x86_64.rpm/mysql-common-8.0.41-2.el9_5.x86_64.rpm0mysql-errmsg-8.0.41-2.el9_5.x86_64.rpmmysql-8.0.41-2.el9_5.x86_64.rpmNmysql-server-8.0.41-2.el9_5.x86_64.rpm/mysql-common-8.0.41-2.el9_5.x86_64.rpm0mysql-errmsg-8.0.41-2.el9_5.x86_64.rpmmysql-8.0.41-2.el9_5.x86_64.rpm݄d@ @BBBBBBBBBBBsecurityImportant: bind security updateyXhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681 ^Mbind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm9Mpython3-bind-9.16.23-24.el9_5.3.noarch.rpm,Mbind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm-Mbind-license-9.16.23-24.el9_5.3.noarch.rpm_Mbind-libs-9.16.23-24.el9_5.3.x86_64.rpm\Mbind-9.16.23-24.el9_5.3.x86_64.rpm`Mbind-utils-9.16.23-24.el9_5.3.x86_64.rpm]Mbind-chroot-9.16.23-24.el9_5.3.x86_64.rpm^Mbind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm9Mpython3-bind-9.16.23-24.el9_5.3.noarch.rpm,Mbind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm-Mbind-license-9.16.23-24.el9_5.3.noarch.rpm_Mbind-libs-9.16.23-24.el9_5.3.x86_64.rpm\Mbind-9.16.23-24.el9_5.3.x86_64.rpm`Mbind-utils-9.16.23-24.el9_5.3.x86_64.rpm]Mbind-chroot-9.16.23-24.el9_5.3.x86_64.rpmܴ A !NBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateQi https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880 https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880 %Wperf-5.14.0-570.49.1.el9_6.x86_64.rpm"Wkernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmTWpython3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm)Wrv-5.14.0-570.49.1.el9_6.x86_64.rpm&Wkernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm#Wkernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm!Wkernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm$Wkernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmWkernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm'Wrtla-5.14.0-570.49.1.el9_6.x86_64.rpm %Wperf-5.14.0-570.49.1.el9_6.x86_64.rpm"Wkernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmTWpython3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm)Wrv-5.14.0-570.49.1.el9_6.x86_64.rpm&Wkernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm#Wkernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm!Wkernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm$Wkernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmWkernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm'Wrtla-5.14.0-570.49.1.el9_6.x86_64.rpm-B :bBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update:ghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084  }ipa-server-4.12.2-14.el9_6.5.x86_64.rpm}python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpm}ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm}python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm}ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm }ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm:}ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm}python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm;}ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm}ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm}ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm}ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpm}ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm}ipa-common-4.12.2-14.el9_6.5.noarch.rpm}ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm}ipa-client-4.12.2-14.el9_6.5.x86_64.rpm }ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm }ipa-server-4.12.2-14.el9_6.5.x86_64.rpm}python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpm}ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm}python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm}ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm }ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm:}ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm}python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm;}ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm}ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm}ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm}ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpm}ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm}ipa-common-4.12.2-14.el9_6.5.noarch.rpm}ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm}ipa-client-4.12.2-14.el9_6.5.x86_64.rpm }ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpmC {BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update!Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377 https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377 Xkernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm$Xkernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm&Xkernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm'Xrtla-5.14.0-570.51.1.el9_6.x86_64.rpm#Xkernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm"Xkernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpmTXpython3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm!Xkernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm)Xrv-5.14.0-570.51.1.el9_6.x86_64.rpm%Xperf-5.14.0-570.51.1.el9_6.x86_64.rpm Xkernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm$Xkernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm&Xkernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm'Xrtla-5.14.0-570.51.1.el9_6.x86_64.rpm#Xkernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm"Xkernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpmTXpython3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm!Xkernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm)Xrv-5.14.0-570.51.1.el9_6.x86_64.rpm%Xperf-5.14.0-570.51.1.el9_6.x86_64.rpmǝND OBBBBsecurityImportant: libpq security updategRhttps://access.redhat.com/errata/RHSA-2025:1738RHSA-2025:1738RHSA-2025:1738 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1738.htmlALSA-2025:1738ALSA-2025:1738 f libpq-devel-13.20-1.el9_5.x86_64.rpme libpq-13.20-1.el9_5.x86_64.rpmf libpq-devel-13.20-1.el9_5.i686.rpme libpq-13.20-1.el9_5.i686.rpmf libpq-devel-13.20-1.el9_5.x86_64.rpme libpq-13.20-1.el9_5.x86_64.rpmf libpq-devel-13.20-1.el9_5.i686.rpme libpq-13.20-1.el9_5.i686.rpm;E 3pBBBWBMBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update9'https://access.redhat.com/errata/RHSA-2025:1741RHSA-2025:1741RHSA-2025:1741 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1741.htmlALSA-2025:1741ALSA-2025:1741 ` ('lpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm)lpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmlpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmlpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm,lpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmklpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpmlpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmlpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm*lpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpmlpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm(lpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm-lpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm`lpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm lpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm+lpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm` ('lpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm)lpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmlpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmlpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm,lpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmklpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpmlpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmlpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm*lpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpmlpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm(lpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm-lpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm`lpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm lpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm+lpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmF tBBBBBBBBBBBBBBsecurityImportant: postgresql security update`'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742 , postgresql-server-13.20-1.el9_5.x86_64.rpm* postgresql-pltcl-13.20-1.el9_5.x86_64.rpm` postgresql-13.20-1.el9_5.x86_64.rpm+ postgresql-private-libs-13.20-1.el9_5.x86_64.rpm- postgresql-upgrade-13.20-1.el9_5.x86_64.rpm) postgresql-plpython3-13.20-1.el9_5.x86_64.rpm( postgresql-plperl-13.20-1.el9_5.x86_64.rpm' postgresql-contrib-13.20-1.el9_5.x86_64.rpm, postgresql-server-13.20-1.el9_5.x86_64.rpm* postgresql-pltcl-13.20-1.el9_5.x86_64.rpm` postgresql-13.20-1.el9_5.x86_64.rpm+ postgresql-private-libs-13.20-1.el9_5.x86_64.rpm- postgresql-upgrade-13.20-1.el9_5.x86_64.rpm) postgresql-plpython3-13.20-1.el9_5.x86_64.rpm( postgresql-plperl-13.20-1.el9_5.x86_64.rpm' postgresql-contrib-13.20-1.el9_5.x86_64.rpmsG EBBBBBBBBsecurityImportant: open-vm-tools security updatehttps://access.redhat.com/errata/RHSA-2025:17428RHSA-2025:17428RHSA-2025:17428 https://access.redhat.com/security/cve/CVE-2025-41244CVE-2025-41244CVE-2025-41244https://bugzilla.redhat.com/23977522397752https://errata.almalinux.org/9/ALSA-2025-17428.htmlALSA-2025:17428ALSA-2025:17428 aopen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm-open-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm.open-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm/open-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm,open-vm-tools-12.5.0-1.el9_6.2.x86_64.rpmaopen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm-open-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm.open-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm/open-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm,open-vm-tools-12.5.0-1.el9_6.2.x86_64.rpmDzH -tBBBUBBBCBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update 'https://access.redhat.com/errata/RHSA-2025:1743RHSA-2025:1743RHSA-2025:1743 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1743.htmlALSA-2025:1743ALSA-2025:1743 ` ( vpostgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpmvpostgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmvpostgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm,vpostgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm(vpostgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm-vpostgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm)vpostgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm'vpostgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm9}pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm+vpostgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm`vpostgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmkvpostgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm*vpostgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm` ( vpostgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpmvpostgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmvpostgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm,vpostgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm(vpostgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm-vpostgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm)vpostgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm'vpostgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm9}pgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm+vpostgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm`vpostgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmkvpostgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm*vpostgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmWI 0nsecurityModerate: iputils security update2ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558 https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558 S;iputils-ninfod-20210202-11.el9_6.3.x86_64.rpmS;iputils-ninfod-20210202-11.el9_6.3.x86_64.rpmDz^J 7qBBBBsecurityModerate: vim security updatezhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742 https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742 8vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm:vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm9vim-common-8.2.2637-22.el9_6.1.x86_64.rpm8vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm:vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm9vim-common-8.2.2637-22.el9_6.1.x86_64.rpmǹ K xBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updated https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760 https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760 'Yrtla-5.14.0-570.52.1.el9_6.x86_64.rpmYkernel-doc-5.14.0-570.52.1.el9_6.noarch.rpmTYpython3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm#Ykernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm%Yperf-5.14.0-570.52.1.el9_6.x86_64.rpm!Ykernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm"Ykernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm)Yrv-5.14.0-570.52.1.el9_6.x86_64.rpm$Ykernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm&Ykernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm 'Yrtla-5.14.0-570.52.1.el9_6.x86_64.rpmYkernel-doc-5.14.0-570.52.1.el9_6.noarch.rpmTYpython3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm#Ykernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm%Yperf-5.14.0-570.52.1.el9_6.x86_64.rpm!Ykernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm"Ykernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm)Yrv-5.14.0-570.52.1.el9_6.x86_64.rpm$Ykernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm&Ykernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm¿.L LBBBBBBBBBBsecurityImportant: webkit2gtk3 security updatewa https://access.redhat.com/errata/RHSA-2025:18097RHSA-2025:18097RHSA-2025:18097 https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-18097.htmlALSA-2025:18097ALSA-2025:18097 3vwebkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm3vwebkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm4vwebkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm1vwebkit2gtk3-2.50.1-0.el9_6.x86_64.rpm2vwebkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm4vwebkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm2vwebkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm1vwebkit2gtk3-2.50.1-0.el9_6.i686.rpm3vwebkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm3vwebkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm4vwebkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm1vwebkit2gtk3-2.50.1-0.el9_6.x86_64.rpm2vwebkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm4vwebkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm2vwebkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm1vwebkit2gtk3-2.50.1-0.el9_6.i686.rpm-M /YBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updateXMhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149 +aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpmJ)dotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmF)dotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm<aspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm-)dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpmBdotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpmDdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm +aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpmJ)dotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmF)dotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm<aspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm-)dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpmBdotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpmDdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm_N pBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update%Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151 . dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm0 dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm+ aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm2*dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm- dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm*netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm1*dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm* aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm5*dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm, aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm4 dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm3*dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm dotnet-host-9.0.10-1.el9_6.x86_64.rpm/ dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm. dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm0 dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm+ aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm2*dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm- dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm*netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm1*dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm* aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm5*dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm, aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm4 dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm3*dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm dotnet-host-9.0.10-1.el9_6.x86_64.rpm/ dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpmȡlO MBBsecurityImportant: firefox security updaterDhttps://access.redhat.com/errata/RHSA-2025:18155RHSA-2025:18155RHSA-2025:18155 https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18155.htmlALSA-2025:18155ALSA-2025:18155 9firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmOfirefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm9firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmOfirefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm.P RBsecurityModerate: libssh security update6 https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275 https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:18275 3libssh-devel-0.10.4-15.el9_6.i686.rpm3libssh-devel-0.10.4-15.el9_6.x86_64.rpm3libssh-devel-0.10.4-15.el9_6.i686.rpm3libssh-devel-0.10.4-15.el9_6.x86_64.rpmQ )VBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateAhttps://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281 https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281 'Zrtla-5.14.0-570.55.1.el9_6.x86_64.rpmZkernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm&Zkernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpmTZpython3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm"Zkernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm$Zkernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm%Zperf-5.14.0-570.55.1.el9_6.x86_64.rpm#Zkernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm!Zkernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm)Zrv-5.14.0-570.55.1.el9_6.x86_64.rpm 'Zrtla-5.14.0-570.55.1.el9_6.x86_64.rpmZkernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm&Zkernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpmTZpython3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm"Zkernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm$Zkernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm%Zperf-5.14.0-570.55.1.el9_6.x86_64.rpm#Zkernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm!Zkernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm)Zrv-5.14.0-570.55.1.el9_6.x86_64.rpmxR ,jsecurityImportant: thunderbird security updateVhttps://access.redhat.com/errata/RHSA-2025:18321RHSA-2025:18321RHSA-2025:18321 https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18321.htmlALSA-2025:18321ALSA-2025:18321 :rthunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm:rthunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpmS 9mBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updatei\https://access.redhat.com/errata/RHSA-2025:18815RHSA-2025:18815RHSA-2025:18815 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18815.htmlALSA-2025:18815ALSA-2025:18815 <9java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpm69java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm49java-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm89java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm59java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm79java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm;9java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpm<9java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpm69java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm49java-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm89java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm59java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm79java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm;9java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpmȍJT zBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateEhttps://access.redhat.com/errata/RHSA-2025:18821RHSA-2025:18821RHSA-2025:18821 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18821.htmlALSA-2025:18821ALSA-2025:18821 java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpmȌhU MBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updateJlhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824 java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpm java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpmȌSV &`BBBBsecurityImportant: libtiff security update6<https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113 j>libtiff-devel-4.4.0-13.el9_6.2.i686.rpmj>libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpmi>libtiff-4.4.0-13.el9_6.2.x86_64.rpmi>libtiff-4.4.0-13.el9_6.2.i686.rpmj>libtiff-devel-4.4.0-13.el9_6.2.i686.rpmj>libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpmi>libtiff-4.4.0-13.el9_6.2.x86_64.rpmi>libtiff-4.4.0-13.el9_6.2.i686.rpmȁ2W 0gBBBBBBBsecurityImportant: emacs security updaterthttps://access.redhat.com/errata/RHSA-2025:1915RHSA-2025:1915RHSA-2025:1915 https://access.redhat.com/security/cve/CVE-2025-1244CVE-2025-1244CVE-2025-1244https://bugzilla.redhat.com/23451502345150https://errata.almalinux.org/9/ALSA-2025-1915.htmlALSA-2025:1915ALSA-2025:1915 >emacs-nox-27.2-11.el9_5.1.x86_64.rpm>emacs-filesystem-27.2-11.el9_5.1.noarch.rpm>emacs-27.2-11.el9_5.1.x86_64.rpm>emacs-lucid-27.2-11.el9_5.1.x86_64.rpm>emacs-common-27.2-11.el9_5.1.x86_64.rpm>emacs-nox-27.2-11.el9_5.1.x86_64.rpm>emacs-filesystem-27.2-11.el9_5.1.noarch.rpm>emacs-27.2-11.el9_5.1.x86_64.rpm>emacs-lucid-27.2-11.el9_5.1.x86_64.rpm>emacs-common-27.2-11.el9_5.1.x86_64.rpm0X 7qBBBBsecurityImportant: redis security updatef https://access.redhat.com/errata/RHSA-2025:19237RHSA-2025:19237RHSA-2025:19237 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19237.htmlALSA-2025:19237ALSA-2025:19237 @Fredis-devel-6.2.20-1.el9_6.i686.rpmFredis-doc-6.2.20-1.el9_6.noarch.rpm$Fredis-6.2.20-1.el9_6.x86_64.rpm@Fredis-devel-6.2.20-1.el9_6.x86_64.rpm@Fredis-devel-6.2.20-1.el9_6.i686.rpmFredis-doc-6.2.20-1.el9_6.noarch.rpm$Fredis-6.2.20-1.el9_6.x86_64.rpm@Fredis-devel-6.2.20-1.el9_6.x86_64.rpmȌZY 8RBBBsecurityImportant: redis:7 security update https://access.redhat.com/errata/RHSA-2025:19345RHSA-2025:19345RHSA-2025:19345 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19345.htmlALSA-2025:19345ALSA-2025:19345 $/(@qredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm$qredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmqredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm$/(@qredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm$qredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmqredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpmȷ>Z yBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409 https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409 '[rtla-5.14.0-570.60.1.el9_6.x86_64.rpm%[perf-5.14.0-570.60.1.el9_6.x86_64.rpm)[rv-5.14.0-570.60.1.el9_6.x86_64.rpm"[kernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm[kernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm&[kernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm#[kernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpmT[python3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm![kernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm$[kernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm '[rtla-5.14.0-570.60.1.el9_6.x86_64.rpm%[perf-5.14.0-570.60.1.el9_6.x86_64.rpm)[rv-5.14.0-570.60.1.el9_6.x86_64.rpm"[kernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm[kernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm&[kernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm#[kernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpmT[python3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm![kernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm$[kernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpmȷD[ MBBBBBBBBBsecurityImportant: tigervnc security update thttps://access.redhat.com/errata/RHSA-2025:19489RHSA-2025:19489RHSA-2025:19489 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-19489.htmlALSA-2025:19489ALSA-2025:19489 P[tigervnc-server-module-1.14.1-9.el9_6.x86_64.rpmO[tigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpmN[tigervnc-server-1.14.1-9.el9_6.x86_64.rpm%[tigervnc-icons-1.14.1-9.el9_6.noarch.rpm&[tigervnc-license-1.14.1-9.el9_6.noarch.rpm'[tigervnc-selinux-1.14.1-9.el9_6.noarch.rpmM[tigervnc-1.14.1-9.el9_6.x86_64.rpmP[tigervnc-server-module-1.14.1-9.el9_6.x86_64.rpmO[tigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpmN[tigervnc-server-1.14.1-9.el9_6.x86_64.rpm%[tigervnc-icons-1.14.1-9.el9_6.noarch.rpm&[tigervnc-license-1.14.1-9.el9_6.noarch.rpm'[tigervnc-selinux-1.14.1-9.el9_6.noarch.rpmM[tigervnc-1.14.1-9.el9_6.x86_64.rpmȷG\ 1YBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security update! https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584 .2mariadb-10.5.29-2.el9_6.x86_64.rpm+2mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm$2mariadb-embedded-10.5.29-2.el9_6.x86_64.rpm'2mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpm&2mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpm%2mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpm*2mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpm(2mariadb-pam-10.5.29-2.el9_6.x86_64.rpm)2mariadb-server-10.5.29-2.el9_6.x86_64.rpm7Fgalera-26.4.22-1.el9_6.x86_64.rpm"2mariadb-backup-10.5.29-2.el9_6.x86_64.rpm#2mariadb-common-10.5.29-2.el9_6.x86_64.rpm .2mariadb-10.5.29-2.el9_6.x86_64.rpm+2mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm$2mariadb-embedded-10.5.29-2.el9_6.x86_64.rpm'2mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpm&2mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpm%2mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpm*2mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpm(2mariadb-pam-10.5.29-2.el9_6.x86_64.rpm)2mariadb-server-10.5.29-2.el9_6.x86_64.rpm7Fgalera-26.4.22-1.el9_6.x86_64.rpm"2mariadb-backup-10.5.29-2.el9_6.x86_64.rpm#2mariadb-common-10.5.29-2.el9_6.x86_64.rpmȶ ] 4rsecurityImportant: runc security update5https://access.redhat.com/errata/RHSA-2025:19927RHSA-2025:19927RHSA-2025:19927 https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-19927.htmlALSA-2025:19927ALSA-2025:19927 $zrunc-1.2.5-3.el9_6.x86_64.rpm$zrunc-1.2.5-3.el9_6.x86_64.rpmO^ uBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateT9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930 https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930 "\kernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm\kernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm#\kernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm&\kernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm!\kernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm%\perf-5.14.0-570.62.1.el9_6.x86_64.rpm$\kernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmT\python3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm'\rtla-5.14.0-570.62.1.el9_6.x86_64.rpm)\rv-5.14.0-570.62.1.el9_6.x86_64.rpm "\kernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm\kernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm#\kernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm&\kernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm!\kernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm%\perf-5.14.0-570.62.1.el9_6.x86_64.rpm$\kernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmT\python3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm'\rtla-5.14.0-570.62.1.el9_6.x86_64.rpm)\rv-5.14.0-570.62.1.el9_6.x86_64.rpmѳ_ IBBBBBBBBsecurityImportant: bind9.18 security update phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950 q"bind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpmp"bind9.18-9.18.29-4.el9_6.2.x86_64.rpmr"bind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpmt"bind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpms"bind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpmq"bind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpmp"bind9.18-9.18.29-4.el9_6.2.x86_64.rpmr"bind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpmt"bind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpms"bind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpm/` TBBBBBBBBBBsecurityImportant: webkit2gtk3 security update}# https://access.redhat.com/errata/RHSA-2025:2035RHSA-2025:2035RHSA-2025:2035 https://access.redhat.com/security/cve/CVE-2024-54543CVE-2024-54543CVE-2024-54543https://access.redhat.com/security/cve/CVE-2025-24143CVE-2025-24143CVE-2025-24143https://access.redhat.com/security/cve/CVE-2025-24150CVE-2025-24150CVE-2025-24150https://access.redhat.com/security/cve/CVE-2025-24158CVE-2025-24158CVE-2025-24158https://access.redhat.com/security/cve/CVE-2025-24162CVE-2025-24162CVE-2025-24162https://bugzilla.redhat.com/23446192344619https://bugzilla.redhat.com/23446212344621https://bugzilla.redhat.com/23446222344622https://bugzilla.redhat.com/23446232344623https://bugzilla.redhat.com/23446242344624https://errata.almalinux.org/9/ALSA-2025-2035.htmlALSA-2025:2035ALSA-2025:2035 1pwebkit2gtk3-2.46.6-1.el9_5.x86_64.rpm2pwebkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm4pwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm3pwebkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm3pwebkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm2pwebkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm1pwebkit2gtk3-2.46.6-1.el9_5.i686.rpm4pwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm1pwebkit2gtk3-2.46.6-1.el9_5.x86_64.rpm2pwebkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm4pwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm3pwebkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm3pwebkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm2pwebkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm1pwebkit2gtk3-2.46.6-1.el9_5.i686.rpm4pwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm)a 4aBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518 https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396 &gkernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm$gkernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm%gperf-5.14.0-611.5.1.el9_7.x86_64.rpm)grv-5.14.0-611.5.1.el9_7.x86_64.rpmTgpython3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm!gkernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpmgkernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm"gkernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm'grtla-5.14.0-611.5.1.el9_7.x86_64.rpm#gkernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpm &gkernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm$gkernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm%gperf-5.14.0-611.5.1.el9_7.x86_64.rpm)grv-5.14.0-611.5.1.el9_7.x86_64.rpmTgpython3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm!gkernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpmgkernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm"gkernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm'grtla-5.14.0-611.5.1.el9_7.x86_64.rpm#gkernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpmAb :uBBBsecurityModerate: zziplib security updatexhttps://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838 https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838 DXzziplib-0.13.71-12.el9.x86_64.rpmXzziplib-utils-0.13.71-12.el9.x86_64.rpmDXzziplib-0.13.71-12.el9.i686.rpmDXzziplib-0.13.71-12.el9.x86_64.rpmXzziplib-utils-0.13.71-12.el9.x86_64.rpmDXzziplib-0.13.71-12.el9.i686.rpmtc {BBBBBBBsecurityImportant: podman security update &https://access.redhat.com/errata/RHSA-2025:20909RHSA-2025:20909RHSA-2025:20909 https://access.redhat.com/security/cve/CVE-2025-47907CVE-2025-47907CVE-2025-47907https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23870832387083https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-20909.htmlALSA-2025:20909ALSA-2025:20909 fXpodman-docker-5.6.0-6.el9_7.noarch.rpm#Xpodman-5.6.0-6.el9_7.x86_64.rpm%Xpodman-remote-5.6.0-6.el9_7.x86_64.rpm&Xpodman-tests-5.6.0-6.el9_7.x86_64.rpm$Xpodman-plugins-5.6.0-6.el9_7.x86_64.rpmfXpodman-docker-5.6.0-6.el9_7.noarch.rpm#Xpodman-5.6.0-6.el9_7.x86_64.rpm%Xpodman-remote-5.6.0-6.el9_7.x86_64.rpm&Xpodman-tests-5.6.0-6.el9_7.x86_64.rpm$Xpodman-plugins-5.6.0-6.el9_7.x86_64.rpmɑzd EBBBBBBBBBBsecurityImportant: webkit2gtk3 security update0a https://access.redhat.com/errata/RHSA-2025:20922RHSA-2025:20922RHSA-2025:20922 https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-20922.htmlALSA-2025:20922ALSA-2025:20922 3wwebkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm4wwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm2wwebkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm1wwebkit2gtk3-2.50.1-1.el9_7.x86_64.rpm1wwebkit2gtk3-2.50.1-1.el9_7.i686.rpm2wwebkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm3wwebkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm4wwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm3wwebkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm4wwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm2wwebkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm1wwebkit2gtk3-2.50.1-1.el9_7.x86_64.rpm1wwebkit2gtk3-2.50.1-1.el9_7.i686.rpm2wwebkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm3wwebkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm4wwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm>e RBBBBsecurityImportant: redis security update https://access.redhat.com/errata/RHSA-2025:20926RHSA-2025:20926RHSA-2025:20926 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20926.htmlALSA-2025:20926ALSA-2025:20926 @Gredis-devel-6.2.20-2.el9_7.x86_64.rpmGredis-doc-6.2.20-2.el9_7.noarch.rpm$Gredis-6.2.20-2.el9_7.x86_64.rpm@Gredis-devel-6.2.20-2.el9_7.i686.rpm@Gredis-devel-6.2.20-2.el9_7.x86_64.rpmGredis-doc-6.2.20-2.el9_7.noarch.rpm$Gredis-6.2.20-2.el9_7.x86_64.rpm@Gredis-devel-6.2.20-2.el9_7.i686.rpmf 1YBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update,ghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928 ~python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm~ipa-common-4.12.2-22.el9_7.1.noarch.rpm~ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm~ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm~ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm:~ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm~python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm~ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm~ipa-selinux-4.12.2-22.el9_7.1.noarch.rpm~ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm~ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm;~ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm ~ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm~ipa-client-4.12.2-22.el9_7.1.x86_64.rpm~python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm ~ipa-server-4.12.2-22.el9_7.1.x86_64.rpm ~ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpm~python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm~ipa-common-4.12.2-22.el9_7.1.noarch.rpm~ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm~ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm~ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm:~ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm~python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm~ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm~ipa-selinux-4.12.2-22.el9_7.1.noarch.rpm~ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm~ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm;~ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm ~ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm~ipa-client-4.12.2-22.el9_7.1.x86_64.rpm~python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm ~ipa-server-4.12.2-22.el9_7.1.x86_64.rpm ~ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpmɵ`g 4rsecurityImportant: squid security updateFhttps://access.redhat.com/errata/RHSA-2025:20935RHSA-2025:20935RHSA-2025:20935 https://access.redhat.com/security/cve/CVE-2025-62168CVE-2025-62168CVE-2025-62168https://bugzilla.redhat.com/24047362404736https://errata.almalinux.org/9/ALSA-2025-20935.htmlALSA-2025:20935ALSA-2025:20935  squid-5.5-22.el9_7.1.x86_64.rpm squid-5.5-22.el9_7.1.x86_64.rpmDh ;uBBBBsecurityImportant: sqlite security updateY https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936 https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936 ssqlite-3.34.1-9.el9_7.i686.rpmssqlite-3.34.1-9.el9_7.x86_64.rpmtsqlite-devel-3.34.1-9.el9_7.i686.rpmtsqlite-devel-3.34.1-9.el9_7.x86_64.rpmssqlite-3.34.1-9.el9_7.i686.rpmssqlite-3.34.1-9.el9_7.x86_64.rpmtsqlite-devel-3.34.1-9.el9_7.i686.rpmtsqlite-devel-3.34.1-9.el9_7.x86_64.rpmi ?|BsecurityModerate: libssh security updateb https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943 https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:20943 3libssh-devel-0.10.4-15.el9_7.i686.rpm3libssh-devel-0.10.4-15.el9_7.x86_64.rpm3libssh-devel-0.10.4-15.el9_7.i686.rpm3libssh-devel-0.10.4-15.el9_7.x86_64.rpmBj @BBBBsecurityModerate: vim security updatemzhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945 https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945 9vim-common-8.2.2637-23.el9_7.x86_64.rpm:vim-enhanced-8.2.2637-23.el9_7.x86_64.rpm8vim-X11-8.2.2637-23.el9_7.x86_64.rpm9vim-common-8.2.2637-23.el9_7.x86_64.rpm:vim-enhanced-8.2.2637-23.el9_7.x86_64.rpm8vim-X11-8.2.2637-23.el9_7.x86_64.rpmSk GsecurityImportant: sssd security updateg/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954 https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954 9sssd-idp-2.9.7-4.el9_7.1.x86_64.rpm9sssd-idp-2.9.7-4.el9_7.1.x86_64.rpmɵl RBBBsecurityImportant: redis:7 security update https://access.redhat.com/errata/RHSA-2025:20955RHSA-2025:20955RHSA-2025:20955 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20955.htmlALSA-2025:20955ALSA-2025:20955 $/(@qredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm$qredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmqredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm$/(@qredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm$qredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmqredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpmm KBBBBsecurityImportant: libtiff security update1<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956 i?libtiff-4.4.0-15.el9_7.2.i686.rpmj?libtiff-devel-4.4.0-15.el9_7.2.i686.rpmi?libtiff-4.4.0-15.el9_7.2.x86_64.rpmj?libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpmi?libtiff-4.4.0-15.el9_7.2.i686.rpmj?libtiff-devel-4.4.0-15.el9_7.2.i686.rpmi?libtiff-4.4.0-15.el9_7.2.x86_64.rpmj?libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpm0n RsecurityImportant: runc security updatemhttps://access.redhat.com/errata/RHSA-2025:20957RHSA-2025:20957RHSA-2025:20957 https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-20957.htmlALSA-2025:20957ALSA-2025:20957 ${runc-1.3.0-4.el9_7.x86_64.rpm${runc-1.3.0-4.el9_7.x86_64.rpmjo UBBBBBBBBBsecurityImportant: tigervnc security update thttps://access.redhat.com/errata/RHSA-2025:20958RHSA-2025:20958RHSA-2025:20958 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20958.htmlALSA-2025:20958ALSA-2025:20958 %\tigervnc-icons-1.15.0-6.el9_7.noarch.rpm&\tigervnc-license-1.15.0-6.el9_7.noarch.rpmO\tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpmM\tigervnc-1.15.0-6.el9_7.x86_64.rpmN\tigervnc-server-1.15.0-6.el9_7.x86_64.rpmP\tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm'\tigervnc-selinux-1.15.0-6.el9_7.noarch.rpm%\tigervnc-icons-1.15.0-6.el9_7.noarch.rpm&\tigervnc-license-1.15.0-6.el9_7.noarch.rpmO\tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpmM\tigervnc-1.15.0-6.el9_7.x86_64.rpmN\tigervnc-server-1.15.0-6.el9_7.x86_64.rpmP\tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm'\tigervnc-selinux-1.15.0-6.el9_7.noarch.rpmɵzp 'aBBBBsecurityImportant: libsoup security update_https://access.redhat.com/errata/RHSA-2025:20959RHSA-2025:20959RHSA-2025:20959 https://access.redhat.com/security/cve/CVE-2025-11021CVE-2025-11021CVE-2025-11021https://access.redhat.com/security/cve/CVE-2025-4945CVE-2025-4945CVE-2025-4945https://bugzilla.redhat.com/23671752367175https://bugzilla.redhat.com/23996272399627https://errata.almalinux.org/9/ALSA-2025-20959.htmlALSA-2025:20959ALSA-2025:20959 libsoup-2.72.0-12.el9_7.1.i686.rpmlibsoup-devel-2.72.0-12.el9_7.1.i686.rpmlibsoup-2.72.0-12.el9_7.1.x86_64.rpmlibsoup-devel-2.72.0-12.el9_7.1.x86_64.rpmlibsoup-2.72.0-12.el9_7.1.i686.rpmlibsoup-devel-2.72.0-12.el9_7.1.i686.rpmlibsoup-2.72.0-12.el9_7.1.x86_64.rpmlibsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm+q *hsecurityModerate: xorg-x11-server-Xwayland security update_ https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960 kCxorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpmkCxorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm1r 7kBBBBBBBBBBsecurityModerate: xorg-x11-server security updateiyhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961 hoxorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpmgoxorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpmjoxorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpmloxorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpmfoxorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpmioxorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpmhoxorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpmgoxorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpmjoxorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpmloxorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpmfoxorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpmioxorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpms xBBBBBBsecurityModerate: qt5-qt3d security updatebYhttps://access.redhat.com/errata/RHSA-2025:20963RHSA-2025:20963RHSA-2025:20963 https://access.redhat.com/security/cve/CVE-2025-11277CVE-2025-11277CVE-2025-11277https://bugzilla.redhat.com/24016222401622https://errata.almalinux.org/9/ALSA-2025-20963.htmlALSA-2025:20963ALSA-2025:20963 mqt5-qt3d-5.15.9-2.el9_7.1.i686.rpmmqt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpmnqt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpmnqt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpmmqt5-qt3d-5.15.9-2.el9_7.1.i686.rpmmqt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpmnqt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpmnqt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpmSt ABBBBBBBBBBBsecurityImportant: bind security update;~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110 ,Nbind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm^Nbind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm`Nbind-utils-9.16.23-34.el9_7.1.x86_64.rpm_Nbind-libs-9.16.23-34.el9_7.1.x86_64.rpm-Nbind-license-9.16.23-34.el9_7.1.noarch.rpm]Nbind-chroot-9.16.23-34.el9_7.1.x86_64.rpm\Nbind-9.16.23-34.el9_7.1.x86_64.rpm9Npython3-bind-9.16.23-34.el9_7.1.noarch.rpm,Nbind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm^Nbind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm`Nbind-utils-9.16.23-34.el9_7.1.x86_64.rpm_Nbind-libs-9.16.23-34.el9_7.1.x86_64.rpm-Nbind-license-9.16.23-34.el9_7.1.noarch.rpm]Nbind-chroot-9.16.23-34.el9_7.1.x86_64.rpm\Nbind-9.16.23-34.el9_7.1.x86_64.rpm9Npython3-bind-9.16.23-34.el9_7.1.noarch.rpm>u OBBBBBBBBsecurityImportant: bind9.18 security update9phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111 q#bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpmr#bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpmt#bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpms#bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpmp#bind9.18-9.18.29-5.el9_7.2.x86_64.rpmq#bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpmr#bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpmt#bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpms#bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpmp#bind9.18-9.18.29-5.el9_7.2.x86_64.rpmɵv securityImportant: python-kdcproxy security update)https://access.redhat.com/errata/RHSA-2025:21139RHSA-2025:21139RHSA-2025:21139 https://access.redhat.com/security/cve/CVE-2025-59088CVE-2025-59088CVE-2025-59088https://access.redhat.com/security/cve/CVE-2025-59089CVE-2025-59089CVE-2025-59089https://bugzilla.redhat.com/23939552393955https://bugzilla.redhat.com/23939582393958https://errata.almalinux.org/9/ALSA-2025-21139.htmlALSA-2025:21139ALSA-2025:21139 tepython3-kdcproxy-1.0.0-9.el9_7.noarch.rpmtepython3-kdcproxy-1.0.0-9.el9_7.noarch.rpmKw !\BBBsecurityModerate: openssl security updateHZhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255  uopenssl-devel-3.5.1-4.el9_7.i686.rpm uopenssl-devel-3.5.1-4.el9_7.x86_64.rpmLuopenssl-perl-3.5.1-4.el9_7.x86_64.rpm uopenssl-devel-3.5.1-4.el9_7.i686.rpm uopenssl-devel-3.5.1-4.el9_7.x86_64.rpmLuopenssl-perl-3.5.1-4.el9_7.x86_64.rpmɵsx &bBBsecurityImportant: firefox security update"https://access.redhat.com/errata/RHSA-2025:21280RHSA-2025:21280RHSA-2025:21280 https://access.redhat.com/security/cve/CVE-2025-13012CVE-2025-13012CVE-2025-13012https://access.redhat.com/security/cve/CVE-2025-13013CVE-2025-13013CVE-2025-13013https://access.redhat.com/security/cve/CVE-2025-13014CVE-2025-13014CVE-2025-13014https://access.redhat.com/security/cve/CVE-2025-13015CVE-2025-13015CVE-2025-13015https://access.redhat.com/security/cve/CVE-2025-13016CVE-2025-13016CVE-2025-13016https://access.redhat.com/security/cve/CVE-2025-13017CVE-2025-13017CVE-2025-13017https://access.redhat.com/security/cve/CVE-2025-13018CVE-2025-13018CVE-2025-13018https://access.redhat.com/security/cve/CVE-2025-13019CVE-2025-13019CVE-2025-13019https://access.redhat.com/security/cve/CVE-2025-13020CVE-2025-13020CVE-2025-13020https://bugzilla.redhat.com/24140792414079https://bugzilla.redhat.com/24140802414080https://bugzilla.redhat.com/24140832414083https://bugzilla.redhat.com/24140842414084https://bugzilla.redhat.com/24140852414085https://bugzilla.redhat.com/24140862414086https://bugzilla.redhat.com/24140902414090https://bugzilla.redhat.com/24140912414091https://bugzilla.redhat.com/24140922414092https://errata.almalinux.org/9/ALSA-2025-21280.htmlALSA-2025:21280ALSA-2025:21280 9firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmOfirefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpm9firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmOfirefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpmɑ>y ,gBBBsecurityCritical: lasso security update =$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462 https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462 >{lasso-2.7.0-11.el9_7.3.x86_64.rpm>{lasso-2.7.0-11.el9_7.3.i686.rpm{python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm>{lasso-2.7.0-11.el9_7.3.x86_64.rpm>{lasso-2.7.0-11.el9_7.3.i686.rpm{python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm z /msecurityImportant: haproxy security updatea$https://access.redhat.com/errata/RHSA-2025:21693RHSA-2025:21693RHSA-2025:21693 https://access.redhat.com/security/cve/CVE-2025-11230CVE-2025-11230CVE-2025-11230https://bugzilla.redhat.com/24130032413003https://errata.almalinux.org/9/ALSA-2025-21693.htmlALSA-2025:21693ALSA-2025:21693 R7haproxy-2.8.14-1.el9_7.1.x86_64.rpmR7haproxy-2.8.14-1.el9_7.1.x86_64.rpmy{ 9pBBBBBBBsecurityImportant: podman security updatehttps://access.redhat.com/errata/RHSA-2025:21702RHSA-2025:21702RHSA-2025:21702 https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-21702.htmlALSA-2025:21702ALSA-2025:21702 &Ypodman-tests-5.6.0-7.el9_7.x86_64.rpmfYpodman-docker-5.6.0-7.el9_7.noarch.rpm%Ypodman-remote-5.6.0-7.el9_7.x86_64.rpm#Ypodman-5.6.0-7.el9_7.x86_64.rpm$Ypodman-plugins-5.6.0-7.el9_7.x86_64.rpm&Ypodman-tests-5.6.0-7.el9_7.x86_64.rpmfYpodman-docker-5.6.0-7.el9_7.noarch.rpm%Ypodman-remote-5.6.0-7.el9_7.x86_64.rpm#Ypodman-5.6.0-7.el9_7.x86_64.rpm$Ypodman-plugins-5.6.0-7.el9_7.x86_64.rpm1| zBBBBBBBBBBBBsecurityModerate: delve and golang security updatePhttps://access.redhat.com/errata/RHSA-2025:21815RHSA-2025:21815RHSA-2025:21815 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-21815.htmlALSA-2025:21815ALSA-2025:21815 KZgolang-race-1.25.3-1.el9_7.x86_64.rpmZgolang-misc-1.25.3-1.el9_7.noarch.rpmZgolang-docs-1.25.3-1.el9_7.noarch.rpmZgolang-src-1.25.3-1.el9_7.noarch.rpm:9delve-1.25.2-1.el9_7.x86_64.rpm?Zgolang-1.25.3-1.el9_7.x86_64.rpmpZgo-toolset-1.25.3-1.el9_7.x86_64.rpmZgolang-tests-1.25.3-1.el9_7.noarch.rpm@Zgolang-bin-1.25.3-1.el9_7.x86_64.rpm KZgolang-race-1.25.3-1.el9_7.x86_64.rpmZgolang-misc-1.25.3-1.el9_7.noarch.rpmZgolang-docs-1.25.3-1.el9_7.noarch.rpmZgolang-src-1.25.3-1.el9_7.noarch.rpm:9delve-1.25.2-1.el9_7.x86_64.rpm?Zgolang-1.25.3-1.el9_7.x86_64.rpmpZgo-toolset-1.25.3-1.el9_7.x86_64.rpmZgolang-tests-1.25.3-1.el9_7.noarch.rpm@Zgolang-bin-1.25.3-1.el9_7.x86_64.rpm(} IBBsecurityImportant: valkey security updatei: https://access.redhat.com/errata/RHSA-2025:21916RHSA-2025:21916RHSA-2025:21916 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-21916.htmlALSA-2025:21916ALSA-2025:21916 >hvalkey-8.0.6-2.el9_7.x86_64.rpm?hvalkey-devel-8.0.6-2.el9_7.x86_64.rpm>hvalkey-8.0.6-2.el9_7.x86_64.rpm?hvalkey-devel-8.0.6-2.el9_7.x86_64.rpmɵ(~ !NBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update#https://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926 https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926 Thpython3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm$hkernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm%hperf-5.14.0-611.9.1.el9_7.x86_64.rpmhkernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm)hrv-5.14.0-611.9.1.el9_7.x86_64.rpm"hkernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm'hrtla-5.14.0-611.9.1.el9_7.x86_64.rpm!hkernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm&hkernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm#hkernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpm Thpython3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm$hkernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm%hperf-5.14.0-611.9.1.el9_7.x86_64.rpmhkernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm)hrv-5.14.0-611.9.1.el9_7.x86_64.rpm"hkernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm'hrtla-5.14.0-611.9.1.el9_7.x86_64.rpm!hkernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm&hkernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm#hkernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpmɵB 'bBBBsecurityImportant: gimp security update"\https://access.redhat.com/errata/RHSA-2025:21968RHSA-2025:21968RHSA-2025:21968 https://access.redhat.com/security/cve/CVE-2025-10920CVE-2025-10920CVE-2025-10920https://access.redhat.com/security/cve/CVE-2025-10921CVE-2025-10921CVE-2025-10921https://access.redhat.com/security/cve/CVE-2025-10922CVE-2025-10922CVE-2025-10922https://access.redhat.com/security/cve/CVE-2025-10923CVE-2025-10923CVE-2025-10923https://access.redhat.com/security/cve/CVE-2025-10924CVE-2025-10924CVE-2025-10924https://access.redhat.com/security/cve/CVE-2025-10925CVE-2025-10925CVE-2025-10925https://access.redhat.com/security/cve/CVE-2025-10934CVE-2025-10934CVE-2025-10934https://bugzilla.redhat.com/24071882407188https://bugzilla.redhat.com/24071912407191https://bugzilla.redhat.com/24071922407192https://bugzilla.redhat.com/24071942407194https://bugzilla.redhat.com/24071992407199https://bugzilla.redhat.com/24072002407200https://bugzilla.redhat.com/24072332407233https://errata.almalinux.org/9/ALSA-2025-21968.htmlALSA-2025:21968ALSA-2025:21968 @gimp-3.0.4-1.el9_7.1.x86_64.rpmogimp-libs-3.0.4-1.el9_7.1.x86_64.rpmogimp-libs-3.0.4-1.el9_7.1.i686.rpm@gimp-3.0.4-1.el9_7.1.x86_64.rpmogimp-libs-3.0.4-1.el9_7.1.x86_64.rpmogimp-libs-3.0.4-1.el9_7.1.i686.rpmɵ .hBBBBsecurityModerate: go-rpm-macros security update~https://access.redhat.com/errata/RHSA-2025:22005RHSA-2025:22005RHSA-2025:22005 https://access.redhat.com/security/cve/CVE-2025-47906CVE-2025-47906CVE-2025-47906https://bugzilla.redhat.com/23965462396546https://errata.almalinux.org/9/ALSA-2025-22005.htmlALSA-2025:22005ALSA-2025:22005 v"go-rpm-macros-3.6.0-12.el9_7.x86_64.rpm "go-rpm-templates-3.6.0-12.el9_7.noarch.rpm"go-srpm-macros-3.6.0-12.el9_7.noarch.rpmu"go-filesystem-3.6.0-12.el9_7.x86_64.rpmv"go-rpm-macros-3.6.0-12.el9_7.x86_64.rpm "go-rpm-templates-3.6.0-12.el9_7.noarch.rpm"go-srpm-macros-3.6.0-12.el9_7.noarch.rpmu"go-filesystem-3.6.0-12.el9_7.x86_64.rpmɖ& 3oBBsecurityImportant: buildah security updatehttps://access.redhat.com/errata/RHSA-2025:22011RHSA-2025:22011RHSA-2025:22011 https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24047152404715https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-22011.htmlALSA-2025:22011ALSA-2025:22011 7Jbuildah-1.41.6-1.el9_7.x86_64.rpm8Jbuildah-tests-1.41.6-1.el9_7.x86_64.rpm7Jbuildah-1.41.6-1.el9_7.x86_64.rpm8Jbuildah-tests-1.41.6-1.el9_7.x86_64.rpmɖ` 7tBsecurityImportant: expat security update&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175 https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175 uRexpat-devel-2.5.0-5.el9_7.1.x86_64.rpmuRexpat-devel-2.5.0-5.el9_7.1.i686.rpmuRexpat-devel-2.5.0-5.el9_7.1.x86_64.rpmuRexpat-devel-2.5.0-5.el9_7.1.i686.rpm ;xBsecurityModerate: libxml2 security update.,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376 https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376 9]libxml2-devel-2.9.13-14.el9_7.i686.rpm9]libxml2-devel-2.9.13-14.el9_7.x86_64.rpm9]libxml2-devel-2.9.13-14.el9_7.i686.rpm9]libxml2-devel-2.9.13-14.el9_7.x86_64.rpm |BBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateZ;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405 https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405 &]kernel-headers-5.14.0-611.11.1.el9_7.x86_64.rpm!]kernel-debug-devel-5.14.0-611.11.1.el9_7.x86_64.rpm']rtla-5.14.0-611.11.1.el9_7.x86_64.rpm#]kernel-devel-5.14.0-611.11.1.el9_7.x86_64.rpmT]python3-perf-5.14.0-611.11.1.el9_7.x86_64.rpm$]kernel-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm%]perf-5.14.0-611.11.1.el9_7.x86_64.rpm"]kernel-debug-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm)]rv-5.14.0-611.11.1.el9_7.x86_64.rpm]kernel-doc-5.14.0-611.11.1.el9_7.noarch.rpm &]kernel-headers-5.14.0-611.11.1.el9_7.x86_64.rpm!]kernel-debug-devel-5.14.0-611.11.1.el9_7.x86_64.rpm']rtla-5.14.0-611.11.1.el9_7.x86_64.rpm#]kernel-devel-5.14.0-611.11.1.el9_7.x86_64.rpmT]python3-perf-5.14.0-611.11.1.el9_7.x86_64.rpm$]kernel-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm%]perf-5.14.0-611.11.1.el9_7.x86_64.rpm"]kernel-debug-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm)]rv-5.14.0-611.11.1.el9_7.x86_64.rpm]kernel-doc-5.14.0-611.11.1.el9_7.noarch.rpmۅi PBBBBBBsecurityModerate: systemd security update)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660 https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660 systemd-boot-unsigned-252-55.el9_7.7.alma.1.x86_64.rpmusystemd-devel-252-55.el9_7.7.alma.1.x86_64.rpm=systemd-journal-remote-252-55.el9_7.7.alma.1.x86_64.rpmusystemd-devel-252-55.el9_7.7.alma.1.i686.rpm systemd-ukify-252-55.el9_7.7.alma.1.noarch.rpmsystemd-boot-unsigned-252-55.el9_7.7.alma.1.x86_64.rpmusystemd-devel-252-55.el9_7.7.alma.1.x86_64.rpm=systemd-journal-remote-252-55.el9_7.7.alma.1.x86_64.rpmusystemd-devel-252-55.el9_7.7.alma.1.i686.rpm systemd-ukify-252-55.el9_7.7.alma.1.noarch.rpmƗ@ %YBBBBBBBBBBsecurityImportant: webkit2gtk3 security update>f&https://access.redhat.com/errata/RHSA-2025:22790RHSA-2025:22790RHSA-2025:22790 https://access.redhat.com/security/cve/CVE-2023-43000CVE-2023-43000CVE-2023-43000https://access.redhat.com/security/cve/CVE-2025-13502CVE-2025-13502CVE-2025-13502https://access.redhat.com/security/cve/CVE-2025-13947CVE-2025-13947CVE-2025-13947https://access.redhat.com/security/cve/CVE-2025-43392CVE-2025-43392CVE-2025-43392https://access.redhat.com/security/cve/CVE-2025-43419CVE-2025-43419CVE-2025-43419https://access.redhat.com/security/cve/CVE-2025-43421CVE-2025-43421CVE-2025-43421https://access.redhat.com/security/cve/CVE-2025-43425CVE-2025-43425CVE-2025-43425https://access.redhat.com/security/cve/CVE-2025-43427CVE-2025-43427CVE-2025-43427https://access.redhat.com/security/cve/CVE-2025-43429CVE-2025-43429CVE-2025-43429https://access.redhat.com/security/cve/CVE-2025-43430CVE-2025-43430CVE-2025-43430https://access.redhat.com/security/cve/CVE-2025-43431CVE-2025-43431CVE-2025-43431https://access.redhat.com/security/cve/CVE-2025-43432CVE-2025-43432CVE-2025-43432https://access.redhat.com/security/cve/CVE-2025-43434CVE-2025-43434CVE-2025-43434https://access.redhat.com/security/cve/CVE-2025-43440CVE-2025-43440CVE-2025-43440https://access.redhat.com/security/cve/CVE-2025-43443CVE-2025-43443CVE-2025-43443https://access.redhat.com/security/cve/CVE-2025-43458CVE-2025-43458CVE-2025-43458https://access.redhat.com/security/cve/CVE-2025-43480CVE-2025-43480CVE-2025-43480https://access.redhat.com/security/cve/CVE-2025-66287CVE-2025-66287CVE-2025-66287https://bugzilla.redhat.com/24163002416300https://bugzilla.redhat.com/24163242416324https://bugzilla.redhat.com/24163252416325https://bugzilla.redhat.com/24163262416326https://bugzilla.redhat.com/24163272416327https://bugzilla.redhat.com/24163292416329https://bugzilla.redhat.com/24163302416330https://bugzilla.redhat.com/24163312416331https://bugzilla.redhat.com/24163322416332https://bugzilla.redhat.com/24163342416334https://bugzilla.redhat.com/24163352416335https://bugzilla.redhat.com/24163362416336https://bugzilla.redhat.com/24163372416337https://bugzilla.redhat.com/24163382416338https://bugzilla.redhat.com/24163552416355https://bugzilla.redhat.com/24185762418576https://bugzilla.redhat.com/24188552418855https://bugzilla.redhat.com/24188572418857https://errata.almalinux.org/9/ALSA-2025-22790.htmlALSA-2025:22790ALSA-2025:22790 4xwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm2xwebkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm1xwebkit2gtk3-2.50.3-1.el9_7.x86_64.rpm3xwebkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm2xwebkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm4xwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm3xwebkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm1xwebkit2gtk3-2.50.3-1.el9_7.i686.rpm4xwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm2xwebkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm1xwebkit2gtk3-2.50.3-1.el9_7.x86_64.rpm3xwebkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm2xwebkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm4xwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm3xwebkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm1xwebkit2gtk3-2.50.3-1.el9_7.i686.rpm۴8 9fBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update$Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865 https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865 ^kernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm'^rtla-5.14.0-611.13.1.el9_7.x86_64.rpm"^kernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm$^kernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm#^kernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm%^perf-5.14.0-611.13.1.el9_7.x86_64.rpm&^kernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpmT^python3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm)^rv-5.14.0-611.13.1.el9_7.x86_64.rpm!^kernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpm ^kernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm'^rtla-5.14.0-611.13.1.el9_7.x86_64.rpm"^kernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm$^kernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm#^kernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm%^perf-5.14.0-611.13.1.el9_7.x86_64.rpm&^kernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpmT^python3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm)^rv-5.14.0-611.13.1.el9_7.x86_64.rpm!^kernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpmʊ  >zBBsecurityImportant: firefox security updatewohttps://access.redhat.com/errata/RHSA-2025:23034RHSA-2025:23034RHSA-2025:23034 https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23034.htmlALSA-2025:23034ALSA-2025:23034 O firefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm9 firefox-140.6.0-1.el9_7.alma.1.x86_64.rpmO firefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm9 firefox-140.6.0-1.el9_7.alma.1.x86_64.rpm  BBBBBBsecurityImportant: tomcat security updatef https://access.redhat.com/errata/RHSA-2025:23049RHSA-2025:23049RHSA-2025:23049 https://access.redhat.com/security/cve/CVE-2025-31651CVE-2025-31651CVE-2025-31651https://access.redhat.com/security/cve/CVE-2025-55752CVE-2025-55752CVE-2025-55752https://bugzilla.redhat.com/23627822362782https://bugzilla.redhat.com/24065912406591https://errata.almalinux.org/9/ALSA-2025-23049.htmlALSA-2025:23049ALSA-2025:23049 Ctomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm<tomcat-9.0.87-6.el9_7.1.noarch.rpm@tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpmAtomcat-lib-9.0.87-6.el9_7.1.noarch.rpm>tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm?tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm=tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpmCtomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm<tomcat-9.0.87-6.el9_7.1.noarch.rpm@tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpmAtomcat-lib-9.0.87-6.el9_7.1.noarch.rpm>tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm?tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm=tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpmʊ  7mBBZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security update\o`https://access.redhat.com/errata/RHSA-2025:23063RHSA-2025:23063RHSA-2025:23063 https://access.redhat.com/security/cve/CVE-2025-24294CVE-2025-24294CVE-2025-24294https://access.redhat.com/security/cve/CVE-2025-58767CVE-2025-58767CVE-2025-58767https://access.redhat.com/security/cve/CVE-2025-61594CVE-2025-61594CVE-2025-61594https://bugzilla.redhat.com/23796842379684https://bugzilla.redhat.com/23961862396186https://errata.almalinux.org/9/ALSA-2025-23063.htmlALSA-2025:23063ALSA-2025:23063 "(&xrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpmQruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm+Yrubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpm$erubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpmrrubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpmkrubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpmmorubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpm5Drubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm&rubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpmwQruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmkrubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpmmorubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpmeQruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmYrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpm3rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm'prubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpm%"rubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpm4Drubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmQruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm,$rubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmeQruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmYrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpm"5rubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpm{:rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpm{:rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpmxrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpm#prubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpm)]rubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpm-$rubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmeQruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmwQruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpm!Qruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm(Rrubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpm*Xrubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpmvQruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmvQruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm"(&xrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpmQruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm+Yrubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpm$erubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpmrrubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpmkrubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpmmorubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpm5Drubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm&rubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpmwQruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmkrubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpmmorubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpmeQruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmYrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpm3rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm'prubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpm%"rubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpm4Drubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmQruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm,$rubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmeQruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmYrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpm"5rubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpm{:rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpm{:rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpmxrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpm#prubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpm)]rubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpm-$rubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmeQruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmwQruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpm!Qruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm(Rrubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpm*Xrubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpmvQruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmvQruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmY  keylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm=keylime-base-7.12.1-11.el9_7.3.x86_64.rpm@keylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm?keylime-tenant-7.12.1-11.el9_7.3.x86_64.rpmdkeylime-selinux-7.12.1-11.el9_7.3.noarch.rpmQpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpm<keylime-7.12.1-11.el9_7.3.x86_64.rpm>keylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm=keylime-base-7.12.1-11.el9_7.3.x86_64.rpm@keylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm?keylime-tenant-7.12.1-11.el9_7.3.x86_64.rpmdkeylime-selinux-7.12.1-11.el9_7.3.noarch.rpmʊ! =jBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatezMhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241 https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241 !_kernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm'_rtla-5.14.0-611.16.1.el9_7.x86_64.rpm)_rv-5.14.0-611.16.1.el9_7.x86_64.rpm&_kernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm%_perf-5.14.0-611.16.1.el9_7.x86_64.rpmT_python3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm$_kernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm_kernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm"_kernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm#_kernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm !_kernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm'_rtla-5.14.0-611.16.1.el9_7.x86_64.rpm)_rv-5.14.0-611.16.1.el9_7.x86_64.rpm&_kernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm%_perf-5.14.0-611.16.1.el9_7.x86_64.rpmT_python3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm$_kernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm_kernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm"_kernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm#_kernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm 0{BBBBBBBBBBBBxBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.3 security updateG+https://access.redhat.com/errata/RHSA-2025:23309RHSA-2025:23309RHSA-2025:23309 https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://errata.almalinux.org/9/ALSA-2025-23309.htmlALSA-2025:23309ALSA-2025:23309 *,( eIphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm[Iphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmbIphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm tphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmjIphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmTIphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm2+apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmcIphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmYIphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm+php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmZIphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm\Iphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmaIphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm ,php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmiIphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm_Iphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmhIphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmIphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm`Iphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm^Iphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmfIphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmSIphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm]Iphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmdIphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmgIphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmXIphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmWIphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmUIphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm+php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmVIphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm*,( eIphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm[Iphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmbIphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm tphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmjIphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmTIphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm2+apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmcIphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmYIphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm+php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmZIphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm\Iphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmaIphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm ,php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmiIphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm_Iphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmhIphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmIphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm`Iphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm^Iphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmfIphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmSIphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm]Iphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmdIphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmgIphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmXIphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmWIphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmUIphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm+php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmVIphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpmʥI ;qBBBBBBBBsecurityModerate: python3.12 security updaterghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323 https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323 #Rpython3.12-tkinter-3.12.12-1.el9_7.x86_64.rpmRpython3.12-libs-3.12.12-1.el9_7.i686.rpmRpython3.12-devel-3.12.12-1.el9_7.i686.rpmRpython3.12-libs-3.12.12-1.el9_7.x86_64.rpm"Rpython3.12-3.12.12-1.el9_7.x86_64.rpmRpython3.12-devel-3.12.12-1.el9_7.x86_64.rpm#Rpython3.12-tkinter-3.12.12-1.el9_7.x86_64.rpmRpython3.12-libs-3.12.12-1.el9_7.i686.rpmRpython3.12-devel-3.12.12-1.el9_7.i686.rpmRpython3.12-libs-3.12.12-1.el9_7.x86_64.rpm"Rpython3.12-3.12.12-1.el9_7.x86_64.rpmRpython3.12-devel-3.12.12-1.el9_7.x86_64.rpmʥ |BBBBBBBsecurityModerate: podman security updateYshttps://access.redhat.com/errata/RHSA-2025:23325RHSA-2025:23325RHSA-2025:23325 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23325.htmlALSA-2025:23325ALSA-2025:23325 %Zpodman-remote-5.6.0-9.el9_7.x86_64.rpm#Zpodman-5.6.0-9.el9_7.x86_64.rpm$Zpodman-plugins-5.6.0-9.el9_7.x86_64.rpm&Zpodman-tests-5.6.0-9.el9_7.x86_64.rpmfZpodman-docker-5.6.0-9.el9_7.noarch.rpm%Zpodman-remote-5.6.0-9.el9_7.x86_64.rpm#Zpodman-5.6.0-9.el9_7.x86_64.rpm$Zpodman-plugins-5.6.0-9.el9_7.x86_64.rpm&Zpodman-tests-5.6.0-9.el9_7.x86_64.rpmfZpodman-docker-5.6.0-9.el9_7.noarch.rpmʥ FBBsecurityModerate: skopeo security updateLLhttps://access.redhat.com/errata/RHSA-2025:23326RHSA-2025:23326RHSA-2025:23326 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23326.htmlALSA-2025:23326ALSA-2025:23326 :=skopeo-1.20.0-2.el9_7.x86_64.rpm;=skopeo-tests-1.20.0-2.el9_7.x86_64.rpm:=skopeo-1.20.0-2.el9_7.x86_64.rpm;=skopeo-tests-1.20.0-2.el9_7.x86_64.rpmʥO KBBBBBsecurityModerate: gcc-toolset-13-binutils security updateehttps://access.redhat.com/errata/RHSA-2025:23336RHSA-2025:23336RHSA-2025:23336 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23336.htmlALSA-2025:23336ALSA-2025:23336 WYgcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpm!Ygcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpmXYgcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpm!Ygcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpmWYgcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpm!Ygcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpmXYgcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpm!Ygcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpmʥo SBBBBsecurityModerate: python3.9 security update}x https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342 https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342 W4python3-devel-3.9.25-2.el9_7.x86_64.rpmj4python-unversioned-command-3.9.25-2.el9_7.noarch.rpmW4python3-devel-3.9.25-2.el9_7.i686.rpm=4python3-tkinter-3.9.25-2.el9_7.x86_64.rpmW4python3-devel-3.9.25-2.el9_7.x86_64.rpmj4python-unversioned-command-3.9.25-2.el9_7.noarch.rpmW4python3-devel-3.9.25-2.el9_7.i686.rpm=4python3-tkinter-3.9.25-2.el9_7.x86_64.rpmʥs ZBsecurityModerate: binutils security updateuhttps://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343 Hbinutils-devel-2.35.2-67.el9_7.1.i686.rpmHbinutils-devel-2.35.2-67.el9_7.1.x86_64.rpmHbinutils-devel-2.35.2-67.el9_7.1.i686.rpmHbinutils-devel-2.35.2-67.el9_7.1.x86_64.rpmʥj "^BBsecurityModerate: openssh security updatewhttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480 https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480 1pam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm0#openssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm0#openssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpmʡ &cBsecurityModerate: libssh security update&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483 https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:23483 3libssh-devel-0.10.4-17.el9_7.i686.rpm3libssh-devel-0.10.4-17.el9_7.x86_64.rpm3libssh-devel-0.10.4-17.el9_7.i686.rpm3libssh-devel-0.10.4-17.el9_7.x86_64.rpmʡ  +gBBsecurityImportant: firefox security update-nhttps://access.redhat.com/errata/RHSA-2025:2359RHSA-2025:2359RHSA-2025:2359 https://access.redhat.com/security/cve/CVE-2025-1930CVE-2025-1930CVE-2025-1930https://access.redhat.com/security/cve/CVE-2025-1931CVE-2025-1931CVE-2025-1931https://access.redhat.com/security/cve/CVE-2025-1932CVE-2025-1932CVE-2025-1932https://access.redhat.com/security/cve/CVE-2025-1933CVE-2025-1933CVE-2025-1933https://access.redhat.com/security/cve/CVE-2025-1934CVE-2025-1934CVE-2025-1934https://access.redhat.com/security/cve/CVE-2025-1935CVE-2025-1935CVE-2025-1935https://access.redhat.com/security/cve/CVE-2025-1936CVE-2025-1936CVE-2025-1936https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497862349786https://bugzilla.redhat.com/23497872349787https://bugzilla.redhat.com/23497902349790https://bugzilla.redhat.com/23497922349792https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497942349794https://bugzilla.redhat.com/23497952349795https://bugzilla.redhat.com/23497962349796https://bugzilla.redhat.com/23497972349797https://errata.almalinux.org/9/ALSA-2025-2359.htmlALSA-2025:2359ALSA-2025:2359 Ofirefox-x11-128.8.0-1.el9_5.x86_64.rpm9firefox-128.8.0-1.el9_5.x86_64.rpmOfirefox-x11-128.8.0-1.el9_5.x86_64.rpm9firefox-128.8.0-1.el9_5.x86_64.rpm2 8lBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateIhttps://access.redhat.com/errata/RHSA-2025:23700RHSA-2025:23700RHSA-2025:23700 https://access.redhat.com/security/cve/CVE-2025-43501CVE-2025-43501CVE-2025-43501https://access.redhat.com/security/cve/CVE-2025-43529CVE-2025-43529CVE-2025-43529https://access.redhat.com/security/cve/CVE-2025-43531CVE-2025-43531CVE-2025-43531https://access.redhat.com/security/cve/CVE-2025-43535CVE-2025-43535CVE-2025-43535https://access.redhat.com/security/cve/CVE-2025-43536CVE-2025-43536CVE-2025-43536https://access.redhat.com/security/cve/CVE-2025-43541CVE-2025-43541CVE-2025-43541https://bugzilla.redhat.com/24231662423166https://bugzilla.redhat.com/24231852423185https://bugzilla.redhat.com/24231872423187https://bugzilla.redhat.com/24231882423188https://bugzilla.redhat.com/24231902423190https://bugzilla.redhat.com/24231912423191https://errata.almalinux.org/9/ALSA-2025-23700.htmlALSA-2025:23700ALSA-2025:23700 3ywebkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm4ywebkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm3ywebkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm1ywebkit2gtk3-2.50.4-1.el9_7.x86_64.rpm2ywebkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm1ywebkit2gtk3-2.50.4-1.el9_7.i686.rpm2ywebkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm4ywebkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm3ywebkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm4ywebkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm3ywebkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm1ywebkit2gtk3-2.50.4-1.el9_7.x86_64.rpm2ywebkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm1ywebkit2gtk3-2.50.4-1.el9_7.i686.rpm2ywebkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm4ywebkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpmʥ" ;ysecurityImportant: opentelemetry-collector security updated#https://access.redhat.com/errata/RHSA-2025:23729RHSA-2025:23729RHSA-2025:23729 https://access.redhat.com/security/cve/CVE-2025-68156CVE-2025-68156CVE-2025-68156https://bugzilla.redhat.com/24228912422891https://errata.almalinux.org/9/ALSA-2025-23729.htmlALSA-2025:23729ALSA-2025:23729 Vopentelemetry-collector-0.135.0-2.el9_7.x86_64.rpmVopentelemetry-collector-0.135.0-2.el9_7.x86_64.rpmʪ! >|securityImportant: mod_md security updateDhttps://access.redhat.com/errata/RHSA-2025:23739RHSA-2025:23739RHSA-2025:23739 https://access.redhat.com/security/cve/CVE-2025-55753CVE-2025-55753CVE-2025-55753https://bugzilla.redhat.com/24191402419140https://errata.almalinux.org/9/ALSA-2025-23739.htmlALSA-2025:23739ALSA-2025:23739 Gmod_md-2.4.26-1.el9_7.1.x86_64.rpmGmod_md-2.4.26-1.el9_7.1.x86_64.rpmʥ~ securityImportant: git-lfs security updateKkhttps://access.redhat.com/errata/RHSA-2025:23744RHSA-2025:23744RHSA-2025:23744 https://access.redhat.com/security/cve/CVE-2025-26625CVE-2025-26625CVE-2025-26625https://bugzilla.redhat.com/24047202404720https://errata.almalinux.org/9/ALSA-2025-23744.htmlALSA-2025:23744ALSA-2025:23744 F[git-lfs-3.6.1-4.el9_7.x86_64.rpmF[git-lfs-3.6.1-4.el9_7.x86_64.rpmʤ0 BsecurityImportant: thunderbird security update6>https://access.redhat.com/errata/RHSA-2025:23856RHSA-2025:23856RHSA-2025:23856 https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23856.htmlALSA-2025:23856ALSA-2025:23856 : thunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpm: thunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpmʫ   EBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security updatet\https://access.redhat.com/errata/RHSA-2025:23919RHSA-2025:23919RHSA-2025:23919 https://access.redhat.com/security/cve/CVE-2025-58098CVE-2025-58098CVE-2025-58098https://access.redhat.com/security/cve/CVE-2025-65082CVE-2025-65082CVE-2025-65082https://access.redhat.com/security/cve/CVE-2025-66200CVE-2025-66200CVE-2025-66200https://bugzilla.redhat.com/24191392419139https://bugzilla.redhat.com/24192622419262https://bugzilla.redhat.com/24193652419365https://errata.almalinux.org/9/ALSA-2025-23919.htmlALSA-2025:23919ALSA-2025:23919 2Lhttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm)mod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpmmLhttpd-devel-2.4.62-7.el9_7.3.x86_64.rpm)mod_ssl-2.4.62-7.el9_7.3.x86_64.rpmkLhttpd-2.4.62-7.el9_7.3.x86_64.rpmLmod_session-2.4.62-7.el9_7.3.x86_64.rpmlLhttpd-core-2.4.62-7.el9_7.3.x86_64.rpmLmod_ldap-2.4.62-7.el9_7.3.x86_64.rpm3Lhttpd-manual-2.4.62-7.el9_7.3.noarch.rpmnLhttpd-tools-2.4.62-7.el9_7.3.x86_64.rpmLmod_lua-2.4.62-7.el9_7.3.x86_64.rpm 2Lhttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm)mod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpmmLhttpd-devel-2.4.62-7.el9_7.3.x86_64.rpm)mod_ssl-2.4.62-7.el9_7.3.x86_64.rpmkLhttpd-2.4.62-7.el9_7.3.x86_64.rpmLmod_session-2.4.62-7.el9_7.3.x86_64.rpmlLhttpd-core-2.4.62-7.el9_7.3.x86_64.rpmLmod_ldap-2.4.62-7.el9_7.3.x86_64.rpm3Lhttpd-manual-2.4.62-7.el9_7.3.noarch.rpmnLhttpd-tools-2.4.62-7.el9_7.3.x86_64.rpmLmod_lua-2.4.62-7.el9_7.3.x86_64.rpm+! %ZBBBBBBBBBsecurityImportant: tigervnc security updatePohttps://access.redhat.com/errata/RHSA-2025:2500RHSA-2025:2500RHSA-2025:2500 https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-2500.htmlALSA-2025:2500ALSA-2025:2500 %Ytigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm&Ytigervnc-license-1.14.1-1.el9_5.1.noarch.rpmMYtigervnc-1.14.1-1.el9_5.1.x86_64.rpmOYtigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm'Ytigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpmNYtigervnc-server-1.14.1-1.el9_5.1.x86_64.rpmPYtigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm%Ytigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm&Ytigervnc-license-1.14.1-1.el9_5.1.noarch.rpmMYtigervnc-1.14.1-1.el9_5.1.x86_64.rpmOYtigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm'Ytigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpmNYtigervnc-server-1.14.1-1.el9_5.1.x86_64.rpmPYtigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm" 7fBBBBBBBBBBBBBBBsecurityImportant: kernel security update?9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627 https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627 '=rtla-5.14.0-503.31.1.el9_5.x86_64.rpm#=kernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm"=kernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm=kernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm%=perf-5.14.0-503.31.1.el9_5.x86_64.rpm!=kernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm)=rv-5.14.0-503.31.1.el9_5.x86_64.rpm$=kernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm&=kernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpm '=rtla-5.14.0-503.31.1.el9_5.x86_64.rpm#=kernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm"=kernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm=kernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm%=perf-5.14.0-503.31.1.el9_5.x86_64.rpm!=kernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm)=rv-5.14.0-503.31.1.el9_5.x86_64.rpm$=kernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm&=kernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpmI# xBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security, bug fix, and enhancement updatex|https://access.redhat.com/errata/RHSA-2025:2668RHSA-2025:2668RHSA-2025:2668 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2668.htmlALSA-2025:2668ALSA-2025:2668 /!dotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm-!dotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm,!aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm3'dotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm+!aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm2'dotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm*!aspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm0!dotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm'netstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpm!dotnet-host-9.0.3-1.el9_5.x86_64.rpm1'dotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm5'dotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm.!dotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm4!dotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm/!dotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm-!dotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm,!aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm3'dotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm+!aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm2'dotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm*!aspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm0!dotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm'netstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpm!dotnet-host-9.0.3-1.el9_5.x86_64.rpm1'dotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm5'dotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm.!dotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm4!dotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm]$ +UBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security, bug fix, and enhancement updatet}https://access.redhat.com/errata/RHSA-2025:2669RHSA-2025:2669RHSA-2025:2669 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2669.htmlALSA-2025:2669ALSA-2025:2669 -&dotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpmDdotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm<aspnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmF&dotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpmJ&dotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpmBdotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm -&dotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpmDdotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm<aspnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmF&dotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpmJ&dotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpmBdotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmR% /lBsecurityImportant: libxml2 security updateqPhttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679 https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679 9clibxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm9clibxml2-devel-2.9.13-6.el9_5.2.i686.rpm9clibxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm9clibxml2-devel-2.9.13-6.el9_5.2.i686.rpmʏS& tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpmCtomcat-webapps-9.0.87-2.el9_5.1.noarch.rpmBtomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm@tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm=tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm?tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpmAtomcat-lib-9.0.87-2.el9_5.1.noarch.rpm<tomcat-9.0.87-2.el9_5.1.noarch.rpm>tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpmCtomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm 3 .bBBBBBBBBBBsecurityImportant: webkit2gtk3 security update https://access.redhat.com/errata/RHSA-2025:3713RHSA-2025:3713RHSA-2025:3713 https://access.redhat.com/security/cve/CVE-2024-44192CVE-2024-44192CVE-2024-44192https://access.redhat.com/security/cve/CVE-2024-54467CVE-2024-54467CVE-2024-54467https://access.redhat.com/security/cve/CVE-2024-54551CVE-2024-54551CVE-2024-54551https://access.redhat.com/security/cve/CVE-2025-24208CVE-2025-24208CVE-2025-24208https://access.redhat.com/security/cve/CVE-2025-24209CVE-2025-24209CVE-2025-24209https://access.redhat.com/security/cve/CVE-2025-24216CVE-2025-24216CVE-2025-24216https://access.redhat.com/security/cve/CVE-2025-30427CVE-2025-30427CVE-2025-30427https://bugzilla.redhat.com/23538712353871https://bugzilla.redhat.com/23538722353872https://bugzilla.redhat.com/23579092357909https://bugzilla.redhat.com/23579102357910https://bugzilla.redhat.com/23579112357911https://bugzilla.redhat.com/23579172357917https://bugzilla.redhat.com/23579192357919https://errata.almalinux.org/9/ALSA-2025-3713.htmlALSA-2025:3713ALSA-2025:3713 2rwebkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm1rwebkit2gtk3-2.48.1-1.el9_5.x86_64.rpm1rwebkit2gtk3-2.48.1-1.el9_5.i686.rpm3rwebkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm4rwebkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm3rwebkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm4rwebkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm2rwebkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm2rwebkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm1rwebkit2gtk3-2.48.1-1.el9_5.x86_64.rpm1rwebkit2gtk3-2.48.1-1.el9_5.i686.rpm3rwebkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm4rwebkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm3rwebkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm4rwebkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm2rwebkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm4 =oBBBBBBBBBBBBsecurityImportant: delve and golang security update$https://access.redhat.com/errata/RHSA-2025:3773RHSA-2025:3773RHSA-2025:3773 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2025-3773.htmlALSA-2025:3773ALSA-2025:3773 Vgolang-misc-1.23.6-2.el9_5.noarch.rpmpVgo-toolset-1.23.6-2.el9_5.x86_64.rpm?Vgolang-1.23.6-2.el9_5.x86_64.rpmVgolang-tests-1.23.6-2.el9_5.noarch.rpmVgolang-src-1.23.6-2.el9_5.noarch.rpmVgolang-docs-1.23.6-2.el9_5.noarch.rpm:8delve-1.24.1-2.el9_5.x86_64.rpmKVgolang-race-1.23.6-2.el9_5.x86_64.rpm@Vgolang-bin-1.23.6-2.el9_5.x86_64.rpm Vgolang-misc-1.23.6-2.el9_5.noarch.rpmpVgo-toolset-1.23.6-2.el9_5.x86_64.rpm?Vgolang-1.23.6-2.el9_5.x86_64.rpmVgolang-tests-1.23.6-2.el9_5.noarch.rpmVgolang-src-1.23.6-2.el9_5.noarch.rpmVgolang-docs-1.23.6-2.el9_5.noarch.rpm:8delve-1.24.1-2.el9_5.x86_64.rpmKVgolang-race-1.23.6-2.el9_5.x86_64.rpm@Vgolang-bin-1.23.6-2.el9_5.x86_64.rpm55 ~securityImportant: gvisor-tap-vsock security update:Yhttps://access.redhat.com/errata/RHSA-2025:3833RHSA-2025:3833RHSA-2025:3833 https://access.redhat.com/security/cve/CVE-2025-22869CVE-2025-22869CVE-2025-22869https://bugzilla.redhat.com/23483672348367https://errata.almalinux.org/9/ALSA-2025-3833.htmlALSA-2025:3833ALSA-2025:3833 9gvisor-tap-vsock-0.8.5-1.el9_5.x86_64.rpm9gvisor-tap-vsock-0.8.5-1.el9_5.x86_64.rpm56 ABBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updatehttps://access.redhat.com/errata/RHSA-2025:3845RHSA-2025:3845RHSA-2025:3845 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3845.htmlALSA-2025:3845ALSA-2025:3845 57java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9.x86_64.rpm47java-1.8.0-openjdk-1.8.0.452.b09-2.el9.x86_64.rpm;7java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9.noarch.rpm77java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9.x86_64.rpm<7java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9.noarch.rpm87java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9.x86_64.rpm67java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9.x86_64.rpm57java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9.x86_64.rpm47java-1.8.0-openjdk-1.8.0.452.b09-2.el9.x86_64.rpm;7java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9.noarch.rpm77java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9.x86_64.rpm<7java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9.noarch.rpm87java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9.x86_64.rpm67java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9.x86_64.rpmW7 NBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updatehttps://access.redhat.com/errata/RHSA-2025:3852RHSA-2025:3852RHSA-2025:3852 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3852.htmlALSA-2025:3852ALSA-2025:3852 java-17-openjdk-jmods-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-jmods-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-headless-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.15.0.6-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.15.0.6-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.15.0.6-2.el9.alma.1.x86_64.rpm 8 3aBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatehttps://access.redhat.com/errata/RHSA-2025:3855RHSA-2025:3855RHSA-2025:3855 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3855.htmlALSA-2025:3855ALSA-2025:3855 {java-21-openjdk-headless-21.0.7.0.6-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.7.0.6-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.7.0.6-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.7.0.6-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.7.0.6-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.7.0.6-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.7.0.6-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.7.0.6-1.el9.alma.1.x86_64.rpm {java-21-openjdk-headless-21.0.7.0.6-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.7.0.6-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.7.0.6-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.7.0.6-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.7.0.6-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.7.0.6-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.7.0.6-1.el9.alma.1.x86_64.rpm~java-21-openjdk-jmods-21.0.7.0.6-1.el9.alma.1.x86_64.rpm9 tBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:3937RHSA-2025:3937RHSA-2025:3937 https://access.redhat.com/security/cve/CVE-2024-53150CVE-2024-53150CVE-2024-53150https://bugzilla.redhat.com/23339712333971https://errata.almalinux.org/9/ALSA-2025-3937.htmlALSA-2025:3937ALSA-2025:3937 &Akernel-headers-5.14.0-503.38.1.el9_5.x86_64.rpm)Arv-5.14.0-503.38.1.el9_5.x86_64.rpmAkernel-doc-5.14.0-503.38.1.el9_5.noarch.rpm'Artla-5.14.0-503.38.1.el9_5.x86_64.rpm!Akernel-debug-devel-5.14.0-503.38.1.el9_5.x86_64.rpm$Akernel-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm"Akernel-debug-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpmTApython3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm#Akernel-devel-5.14.0-503.38.1.el9_5.x86_64.rpm%Aperf-5.14.0-503.38.1.el9_5.x86_64.rpm &Akernel-headers-5.14.0-503.38.1.el9_5.x86_64.rpm)Arv-5.14.0-503.38.1.el9_5.x86_64.rpmAkernel-doc-5.14.0-503.38.1.el9_5.noarch.rpm'Artla-5.14.0-503.38.1.el9_5.x86_64.rpm!Akernel-debug-devel-5.14.0-503.38.1.el9_5.x86_64.rpm$Akernel-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm"Akernel-debug-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpmTApython3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm#Akernel-devel-5.14.0-503.38.1.el9_5.x86_64.rpm%Aperf-5.14.0-503.38.1.el9_5.x86_64.rpm_: HBBBBsecurityImportant: libxslt security update*https://access.redhat.com/errata/RHSA-2025:4025RHSA-2025:4025RHSA-2025:4025 https://access.redhat.com/security/cve/CVE-2024-55549CVE-2024-55549CVE-2024-55549https://bugzilla.redhat.com/23524842352484https://errata.almalinux.org/9/ALSA-2025-4025.htmlALSA-2025:4025ALSA-2025:4025 ilibxslt-devel-1.1.34-9.el9_5.2.x86_64.rpmhlibxslt-1.1.34-9.el9_5.2.i686.rpmilibxslt-devel-1.1.34-9.el9_5.2.i686.rpmhlibxslt-1.1.34-9.el9_5.2.x86_64.rpmilibxslt-devel-1.1.34-9.el9_5.2.x86_64.rpmhlibxslt-1.1.34-9.el9_5.2.i686.rpmilibxslt-devel-1.1.34-9.el9_5.2.i686.rpmhlibxslt-1.1.34-9.el9_5.2.x86_64.rpm; OsecurityImportant: thunderbird security update/Rhttps://access.redhat.com/errata/RHSA-2025:4169RHSA-2025:4169RHSA-2025:4169 https://access.redhat.com/security/cve/CVE-2025-3028CVE-2025-3028CVE-2025-3028https://access.redhat.com/security/cve/CVE-2025-3029CVE-2025-3029CVE-2025-3029https://access.redhat.com/security/cve/CVE-2025-3030CVE-2025-3030CVE-2025-3030https://bugzilla.redhat.com/23565562356556https://bugzilla.redhat.com/23565622356562https://bugzilla.redhat.com/23565632356563https://errata.almalinux.org/9/ALSA-2025-4169.htmlALSA-2025:4169ALSA-2025:4169 :othunderbird-128.9.0-2.el9_5.alma.1.x86_64.rpm:othunderbird-128.9.0-2.el9_5.alma.1.x86_64.rpm< RsecurityImportant: thunderbird security update https://access.redhat.com/errata/RHSA-2025:4229RHSA-2025:4229RHSA-2025:4229 https://access.redhat.com/security/cve/CVE-2025-2830CVE-2025-2830CVE-2025-2830https://access.redhat.com/security/cve/CVE-2025-3522CVE-2025-3522CVE-2025-3522https://access.redhat.com/security/cve/CVE-2025-3523CVE-2025-3523CVE-2025-3523https://bugzilla.redhat.com/23597862359786https://bugzilla.redhat.com/23597892359789https://bugzilla.redhat.com/23597932359793https://errata.almalinux.org/9/ALSA-2025-4229.htmlALSA-2025:4229ALSA-2025:4229 :pthunderbird-128.9.2-1.el9_5.alma.1.x86_64.rpm:pthunderbird-128.9.2-1.el9_5.alma.1.x86_64.rpmb= UBBBBBBBBsecurityModerate: glibc security update!;https://access.redhat.com/errata/RHSA-2025:4244RHSA-2025:4244RHSA-2025:4244 https://access.redhat.com/security/cve/CVE-2025-0395CVE-2025-0395CVE-2025-0395https://bugzilla.redhat.com/23394602339460https://errata.almalinux.org/9/ALSA-2025-4244.htmlALSA-2025:4244ALSA-2025:4244 J9glibc-doc-2.34-125.el9_5.8.alma.1.noarch.rpmT9glibc-headers-2.34-125.el9_5.8.alma.1.x86_64.rpmU9glibc-locale-source-2.34-125.el9_5.8.alma.1.x86_64.rpmV9glibc-utils-2.34-125.el9_5.8.alma.1.x86_64.rpm 9glibc-devel-2.34-125.el9_5.8.alma.1.i686.rpm 9glibc-devel-2.34-125.el9_5.8.alma.1.x86_64.rpmJ9glibc-doc-2.34-125.el9_5.8.alma.1.noarch.rpmT9glibc-headers-2.34-125.el9_5.8.alma.1.x86_64.rpmU9glibc-locale-source-2.34-125.el9_5.8.alma.1.x86_64.rpmV9glibc-utils-2.34-125.el9_5.8.alma.1.x86_64.rpm 9glibc-devel-2.34-125.el9_5.8.alma.1.i686.rpm 9glibc-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm?> |BBBBBBBBRBKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update\3https://access.redhat.com/errata/RHSA-2025:4263RHSA-2025:4263RHSA-2025:4263 https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-4263.htmlALSA-2025:4263ALSA-2025:4263 i(hDphp-snmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmVDphp-dba-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmbDphp-mysqlnd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmYDphp-embedded-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm +php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm`Dphp-ldap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmfDphp-pgsql-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmTDphp-cli-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmXDphp-devel-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmdDphp-opcache-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmUDphp-common-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm_Dphp-intl-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmcDphp-odbc-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmiDphp-soap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm]Dphp-gd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmjDphp-xml-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmeDphp-pdo-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmaDphp-mbstring-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmSDphp-bcmath-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmZDphp-enchant-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmDphp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm[Dphp-ffi-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmgDphp-process-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm^Dphp-gmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmWDphp-dbg-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm\Dphp-fpm-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmi(hDphp-snmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmVDphp-dba-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmbDphp-mysqlnd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm Fphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmYDphp-embedded-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm +php-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm`Dphp-ldap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmfDphp-pgsql-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmTDphp-cli-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmXDphp-devel-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmdDphp-opcache-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmUDphp-common-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm_Dphp-intl-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmcDphp-odbc-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmiDphp-soap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm]Dphp-gd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmjDphp-xml-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmeDphp-pdo-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmaDphp-mbstring-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm Iphp-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmSDphp-bcmath-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmZDphp-enchant-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmDphp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm[Dphp-ffi-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmgDphp-process-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmPphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm^Dphp-gmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmWDphp-dbg-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm2Papcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm\Dphp-fpm-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmPphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm(? SBBsecurityImportant: firefox security updateg https://access.redhat.com/errata/RHSA-2025:4443RHSA-2025:4443RHSA-2025:4443 https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-4443.htmlALSA-2025:4443ALSA-2025:4443 9firefox-128.10.0-1.el9_5.alma.1.x86_64.rpmOfirefox-x11-128.10.0-1.el9_5.alma.1.x86_64.rpm9firefox-128.10.0-1.el9_5.alma.1.x86_64.rpmOfirefox-x11-128.10.0-1.el9_5.alma.1.x86_64.rpm@ XsecurityImportant: thunderbird security updatev6 https://access.redhat.com/errata/RHSA-2025:4460RHSA-2025:4460RHSA-2025:4460 https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-4460.htmlALSA-2025:4460ALSA-2025:4460 :thunderbird-128.10.0-1.el9_5.alma.1.x86_64.rpm:thunderbird-128.10.0-1.el9_5.alma.1.x86_64.rpmA GBBBBsecurityModerate: ruby:3.1 security update,ghttps://access.redhat.com/errata/RHSA-2025:4488RHSA-2025:4488RHSA-2025:4488 https://access.redhat.com/security/cve/CVE-2024-39908CVE-2024-39908CVE-2024-39908https://access.redhat.com/security/cve/CVE-2024-41123CVE-2024-41123CVE-2024-41123https://access.redhat.com/security/cve/CVE-2024-41946CVE-2024-41946CVE-2024-41946https://access.redhat.com/security/cve/CVE-2024-43398CVE-2024-43398CVE-2024-43398https://access.redhat.com/security/cve/CVE-2025-27219CVE-2025-27219CVE-2025-27219https://access.redhat.com/security/cve/CVE-2025-27220CVE-2025-27220CVE-2025-27220https://access.redhat.com/security/cve/CVE-2025-27221CVE-2025-27221CVE-2025-27221https://bugzilla.redhat.com/22982432298243https://bugzilla.redhat.com/23022682302268https://bugzilla.redhat.com/23022722302272https://bugzilla.redhat.com/23072972307297https://bugzilla.redhat.com/23496962349696https://bugzilla.redhat.com/23496992349699https://bugzilla.redhat.com/23497002349700https://errata.almalinux.org/9/ALSA-2025-4488.htmlALSA-2025:4488ALSA-2025:4488 r4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpmr4rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm56rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm34rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm46rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm`B #\BBBBBsecurityModerate: 389-ds-base security updatezhttps://access.redhat.com/errata/RHSA-2025:4491RHSA-2025:4491RHSA-2025:4491 https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-4491.htmlALSA-2025:4491ALSA-2025:4491 RZpython3-lib389-2.5.2-9.el9_5.noarch.rpm7Z389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpmSZ389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm6Z389-ds-base-2.5.2-9.el9_5.x86_64.rpmRZpython3-lib389-2.5.2-9.el9_5.noarch.rpm7Z389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpmSZ389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm6Z389-ds-base-2.5.2-9.el9_5.x86_64.rpmkC *dBBBBsecurityImportant: osbuild-composer security update Lhttps://access.redhat.com/errata/RHSA-2025:4669RHSA-2025:4669RHSA-2025:4669 https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-4669.htmlALSA-2025:4669ALSA-2025:4669 1osbuild-composer-118.2-1.el9_5.alma.1.x86_64.rpm2osbuild-composer-core-118.2-1.el9_5.alma.1.x86_64.rpm3osbuild-composer-worker-118.2-1.el9_5.alma.1.x86_64.rpm1osbuild-composer-118.2-1.el9_5.alma.1.x86_64.rpm2osbuild-composer-core-118.2-1.el9_5.alma.1.x86_64.rpm3osbuild-composer-worker-118.2-1.el9_5.alma.1.x86_64.rpm^D 4kBBBBBBBsecurityModerate: emacs security updateY`https://access.redhat.com/errata/RHSA-2025:4787RHSA-2025:4787RHSA-2025:4787 https://access.redhat.com/security/cve/CVE-2024-53920CVE-2024-53920CVE-2024-53920https://bugzilla.redhat.com/23291612329161https://errata.almalinux.org/9/ALSA-2025-4787.htmlALSA-2025:4787ALSA-2025:4787 ?emacs-common-27.2-11.el9_5.2.x86_64.rpm?emacs-lucid-27.2-11.el9_5.2.x86_64.rpm?emacs-nox-27.2-11.el9_5.2.x86_64.rpm?emacs-filesystem-27.2-11.el9_5.2.noarch.rpm?emacs-27.2-11.el9_5.2.x86_64.rpm?emacs-common-27.2-11.el9_5.2.x86_64.rpm?emacs-lucid-27.2-11.el9_5.2.x86_64.rpm?emacs-nox-27.2-11.el9_5.2.x86_64.rpm?emacs-filesystem-27.2-11.el9_5.2.noarch.rpm?emacs-27.2-11.el9_5.2.x86_64.rpmNE ;uBBBBsecurityModerate: python3.9 security update9[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977 j1python-unversioned-command-3.9.21-2.el9.noarch.rpm=1python3-tkinter-3.9.21-2.el9.x86_64.rpmW1python3-devel-3.9.21-2.el9.x86_64.rpmW1python3-devel-3.9.21-2.el9.i686.rpmj1python-unversioned-command-3.9.21-2.el9.noarch.rpm=1python3-tkinter-3.9.21-2.el9.x86_64.rpmW1python3-devel-3.9.21-2.el9.x86_64.rpmW1python3-devel-3.9.21-2.el9.i686.rpmÔtF |BBsecurityModerate: openssh security updatehttps://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993 https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993 0"openssh-askpass-8.7p1-45.el9.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm0"openssh-askpass-8.7p1-45.el9.x86_64.rpm1pam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm‡{G AsecurityModerate: python-requests security update`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049 https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:7049 epython3-requests+security-2.25.1-9.el9.noarch.rpmfpython3-requests+socks-2.25.1-9.el9.noarch.rpmepython3-requests+security-2.25.1-9.el9.noarch.rpmfpython3-requests+socks-2.25.1-9.el9.noarch.rpmÔ#H DsecurityModerate: rsync security updatet`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050 https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050 grsync-daemon-3.2.5-3.el9.noarch.rpmrsync-rrsync-3.2.5-3.el9.noarch.rpmgrsync-daemon-3.2.5-3.el9.noarch.rpmrsync-rrsync-3.2.5-3.el9.noarch.rpmÔ.I GBsecurityModerate: krb5 security updateT{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067 https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067 >0krb5-devel-1.21.1-6.el9.i686.rpm>0krb5-devel-1.21.1-6.el9.x86_64.rpm>0krb5-devel-1.21.1-6.el9.i686.rpm>0krb5-devel-1.21.1-6.el9.x86_64.rpmÔiJ KBBBBBBBBBsecurityModerate: gnutls security updateOxhttps://access.redhat.com/errata/RHSA-2025:7076RHSA-2025:7076RHSA-2025:7076 https://access.redhat.com/security/cve/CVE-2024-12243CVE-2024-12243CVE-2024-12243https://bugzilla.redhat.com/23446152344615https://errata.almalinux.org/9/ALSA-2025-7076.htmlALSA-2025:7076ALSA-2025:7076 cgnutls-c++-3.8.3-6.el9.i686.rpmcgnutls-devel-3.8.3-6.el9.x86_64.rpmcgnutls-dane-3.8.3-6.el9.x86_64.rpmcgnutls-dane-3.8.3-6.el9.i686.rpmcgnutls-c++-3.8.3-6.el9.x86_64.rpmcgnutls-utils-3.8.3-6.el9.x86_64.rpmcgnutls-devel-3.8.3-6.el9.i686.rpmcgnutls-c++-3.8.3-6.el9.i686.rpmcgnutls-devel-3.8.3-6.el9.x86_64.rpmcgnutls-dane-3.8.3-6.el9.x86_64.rpmcgnutls-dane-3.8.3-6.el9.i686.rpmcgnutls-c++-3.8.3-6.el9.x86_64.rpmcgnutls-utils-3.8.3-6.el9.x86_64.rpmcgnutls-devel-3.8.3-6.el9.i686.rpmÔwK WBBBsecurityModerate: libtasn1 security updateG4https://access.redhat.com/errata/RHSA-2025:7077RHSA-2025:7077RHSA-2025:7077 https://access.redhat.com/security/cve/CVE-2024-12133CVE-2024-12133CVE-2024-12133https://bugzilla.redhat.com/23446112344611https://errata.almalinux.org/9/ALSA-2025-7077.htmlALSA-2025:7077ALSA-2025:7077 =libtasn1-devel-4.16.0-9.el9.x86_64.rpmglibtasn1-tools-4.16.0-9.el9.x86_64.rpm=libtasn1-devel-4.16.0-9.el9.i686.rpm=libtasn1-devel-4.16.0-9.el9.x86_64.rpmglibtasn1-tools-4.16.0-9.el9.x86_64.rpm=libtasn1-devel-4.16.0-9.el9.i686.rpmÔL ]securityModerate: aardvark-dns security update{yhttps://access.redhat.com/errata/RHSA-2025:7094RHSA-2025:7094RHSA-2025:7094 https://access.redhat.com/security/cve/CVE-2024-8418CVE-2024-8418CVE-2024-8418https://bugzilla.redhat.com/23096832309683https://errata.almalinux.org/9/ALSA-2025-7094.htmlALSA-2025:7094ALSA-2025:7094 4Gaardvark-dns-1.14.0-1.el9.x86_64.rpm4Gaardvark-dns-1.14.0-1.el9.x86_64.rpmÔ+M *`BBBBBBBBsecurityModerate: python3.12 security updatet[https://access.redhat.com/errata/RHSA-2025:7107RHSA-2025:7107RHSA-2025:7107 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7107.htmlALSA-2025:7107ALSA-2025:7107 Xpython3.12-libs-3.12.9-1.el9.i686.rpm"Xpython3.12-3.12.9-1.el9.x86_64.rpm#Xpython3.12-tkinter-3.12.9-1.el9.x86_64.rpmXpython3.12-devel-3.12.9-1.el9.x86_64.rpmXpython3.12-libs-3.12.9-1.el9.x86_64.rpmXpython3.12-devel-3.12.9-1.el9.i686.rpmXpython3.12-libs-3.12.9-1.el9.i686.rpm"Xpython3.12-3.12.9-1.el9.x86_64.rpm#Xpython3.12-tkinter-3.12.9-1.el9.x86_64.rpmXpython3.12-devel-3.12.9-1.el9.x86_64.rpmXpython3.12-libs-3.12.9-1.el9.x86_64.rpmXpython3.12-devel-3.12.9-1.el9.i686.rpmÔN 5kBBBBBBBBsecurityModerate: python3.11 security updateO[https://access.redhat.com/errata/RHSA-2025:7109RHSA-2025:7109RHSA-2025:7109 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7109.htmlALSA-2025:7109ALSA-2025:7109 l@python3.11-tkinter-3.11.11-2.el9.x86_64.rpmb@python3.11-devel-3.11.11-2.el9.i686.rpmk@python3.11-3.11.11-2.el9.x86_64.rpmc@python3.11-libs-3.11.11-2.el9.i686.rpmc@python3.11-libs-3.11.11-2.el9.x86_64.rpmb@python3.11-devel-3.11.11-2.el9.x86_64.rpml@python3.11-tkinter-3.11.11-2.el9.x86_64.rpmb@python3.11-devel-3.11.11-2.el9.i686.rpmk@python3.11-3.11.11-2.el9.x86_64.rpmc@python3.11-libs-3.11.11-2.el9.i686.rpmc@python3.11-libs-3.11.11-2.el9.x86_64.rpmb@python3.11-devel-3.11.11-2.el9.x86_64.rpmÔOO vBBBBBBBBBBBsecurityImportant: osbuild and osbuild-composer security update*Bhttps://access.redhat.com/errata/RHSA-2025:7118RHSA-2025:7118RHSA-2025:7118 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7118.htmlALSA-2025:7118ALSA-2025:7118  osbuild-luks2-141-1.el9.alma.1.noarch.rpmw python3-osbuild-141-1.el9.alma.1.noarch.rpm osbuild-ostree-141-1.el9.alma.1.noarch.rpm1osbuild-composer-132-1.el9.alma.1.x86_64.rpm osbuild-selinux-141-1.el9.alma.1.noarch.rpm osbuild-depsolve-dnf-141-1.el9.alma.1.noarch.rpm3osbuild-composer-worker-132-1.el9.alma.1.x86_64.rpm osbuild-lvm2-141-1.el9.alma.1.noarch.rpm osbuild-141-1.el9.alma.1.noarch.rpm2osbuild-composer-core-132-1.el9.alma.1.x86_64.rpm  osbuild-luks2-141-1.el9.alma.1.noarch.rpmw python3-osbuild-141-1.el9.alma.1.noarch.rpm osbuild-ostree-141-1.el9.alma.1.noarch.rpm1osbuild-composer-132-1.el9.alma.1.x86_64.rpm osbuild-selinux-141-1.el9.alma.1.noarch.rpm osbuild-depsolve-dnf-141-1.el9.alma.1.noarch.rpm3osbuild-composer-worker-132-1.el9.alma.1.x86_64.rpm osbuild-lvm2-141-1.el9.alma.1.noarch.rpm osbuild-141-1.el9.alma.1.noarch.rpm2osbuild-composer-core-132-1.el9.alma.1.x86_64.rpmÔ\P DBBBBBsecurityModerate: protobuf security updatel:https://access.redhat.com/errata/RHSA-2025:7138RHSA-2025:7138RHSA-2025:7138 https://access.redhat.com/security/cve/CVE-2022-1941CVE-2022-1941CVE-2022-1941https://bugzilla.redhat.com/22914702291470https://errata.almalinux.org/9/ALSA-2025-7138.htmlALSA-2025:7138ALSA-2025:7138 ynprotobuf-3.14.0-16.el9.x86_64.rpmznprotobuf-lite-3.14.0-16.el9.i686.rpmynprotobuf-3.14.0-16.el9.i686.rpmdnpython3-protobuf-3.14.0-16.el9.noarch.rpmznprotobuf-lite-3.14.0-16.el9.x86_64.rpmynprotobuf-3.14.0-16.el9.x86_64.rpmznprotobuf-lite-3.14.0-16.el9.i686.rpmynprotobuf-3.14.0-16.el9.i686.rpmdnpython3-protobuf-3.14.0-16.el9.noarch.rpmznprotobuf-lite-3.14.0-16.el9.x86_64.rpmÔCQ LBBBsecurityModerate: rpm-ostree security update&phttps://access.redhat.com/errata/RHSA-2025:7147RHSA-2025:7147RHSA-2025:7147 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7147.htmlALSA-2025:7147ALSA-2025:7147 C}rpm-ostree-libs-2025.5-1.el9.i686.rpm}rpm-ostree-2025.5-1.el9.x86_64.rpmC}rpm-ostree-libs-2025.5-1.el9.x86_64.rpmC}rpm-ostree-libs-2025.5-1.el9.i686.rpm}rpm-ostree-2025.5-1.el9.x86_64.rpmC}rpm-ostree-libs-2025.5-1.el9.x86_64.rpmÔLR RBBsecurityModerate: bootc security updateZhttps://access.redhat.com/errata/RHSA-2025:7160RHSA-2025:7160RHSA-2025:7160 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7160.htmlALSA-2025:7160ALSA-2025:7160 qsystem-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpmCqbootc-1.1.6-3.el9_6.x86_64.rpmqsystem-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpmCqbootc-1.1.6-3.el9_6.x86_64.rpmÔmS #WBBBBBBBBBBsecurityModerate: xorg-x11-server security updatepshttps://access.redhat.com/errata/RHSA-2025:7163RHSA-2025:7163RHSA-2025:7163 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7163.htmlALSA-2025:7163ALSA-2025:7163 imxorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpmjmxorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpmhmxorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpmfmxorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpmlmxorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpmgmxorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpmimxorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpmjmxorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpmhmxorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpmfmxorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpmlmxorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpmgmxorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpmÔ-T &dsecurityModerate: xorg-x11-server-Xwayland security updatechttps://access.redhat.com/errata/RHSA-2025:7165RHSA-2025:7165RHSA-2025:7165 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7165.htmlALSA-2025:7165ALSA-2025:7165 kAxorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpmkAxorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpmÔU 9gBBBBBBBBBBBBBBBBsecurityModerate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security updategshttps://access.redhat.com/errata/RHSA-2025:7178RHSA-2025:7178RHSA-2025:7178 https://access.redhat.com/security/cve/CVE-2024-0444CVE-2024-0444CVE-2024-0444https://access.redhat.com/security/cve/CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/22829992282999https://bugzilla.redhat.com/22923352292335https://errata.almalinux.org/9/ALSA-2025-7178.htmlALSA-2025:7178ALSA-2025:7178 8:gstreamer1-1.22.12-3.el9.x86_64.rpm^:gstreamer1-plugins-bad-free-1.22.12-3.el9.x86_64.rpm^:gstreamer1-plugins-bad-free-1.22.12-3.el9.i686.rpm;:gstreamer1-rtsp-server-1.22.12-3.el9.i686.rpm8:gstreamer1-1.22.12-3.el9.i686.rpm":gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.x86_64.rpm":gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.i686.rpm::gstreamer1-plugins-ugly-free-1.22.12-3.el9.i686.rpm;:gstreamer1-rtsp-server-1.22.12-3.el9.x86_64.rpm9:gstreamer1-devel-1.22.12-3.el9.x86_64.rpm9:gstreamer1-devel-1.22.12-3.el9.i686.rpm::gstreamer1-plugins-ugly-free-1.22.12-3.el9.x86_64.rpm 8:gstreamer1-1.22.12-3.el9.x86_64.rpm^:gstreamer1-plugins-bad-free-1.22.12-3.el9.x86_64.rpm^:gstreamer1-plugins-bad-free-1.22.12-3.el9.i686.rpm;:gstreamer1-rtsp-server-1.22.12-3.el9.i686.rpm8:gstreamer1-1.22.12-3.el9.i686.rpm":gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.x86_64.rpm":gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.i686.rpm::gstreamer1-plugins-ugly-free-1.22.12-3.el9.i686.rpm;:gstreamer1-rtsp-server-1.22.12-3.el9.x86_64.rpm9:gstreamer1-devel-1.22.12-3.el9.x86_64.rpm9:gstreamer1-devel-1.22.12-3.el9.i686.rpm::gstreamer1-plugins-ugly-free-1.22.12-3.el9.x86_64.rpmÔ6V =zBsecurityModerate: corosync security updateZ$https://access.redhat.com/errata/RHSA-2025:7201RHSA-2025:7201RHSA-2025:7201 https://access.redhat.com/security/cve/CVE-2025-30472CVE-2025-30472CVE-2025-30472https://bugzilla.redhat.com/23542292354229https://errata.almalinux.org/9/ALSA-2025-7201.htmlALSA-2025:7201ALSA-2025:7201 lcorosynclib-3.1.9-2.el9_6.i686.rpmlcorosynclib-3.1.9-2.el9_6.x86_64.rpmlcorosynclib-3.1.9-2.el9_6.i686.rpmlcorosynclib-3.1.9-2.el9_6.x86_64.rpmÔ:W ~securityModerate: rust-bootupd security update~Shttps://access.redhat.com/errata/RHSA-2025:7241RHSA-2025:7241RHSA-2025:7241 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7241.htmlALSA-2025:7241ALSA-2025:7241 D$bootupd-0.2.27-3.el9.x86_64.rpmD$bootupd-0.2.27-3.el9.x86_64.rpmÔIX ABBBBsecurityModerate: gstreamer1-plugins-good security updateQ$https://access.redhat.com/errata/RHSA-2025:7242RHSA-2025:7242RHSA-2025:7242 https://access.redhat.com/security/cve/CVE-2024-47543CVE-2024-47543CVE-2024-47543https://access.redhat.com/security/cve/CVE-2024-47544CVE-2024-47544CVE-2024-47544https://access.redhat.com/security/cve/CVE-2024-47545CVE-2024-47545CVE-2024-47545https://access.redhat.com/security/cve/CVE-2024-47546CVE-2024-47546CVE-2024-47546https://access.redhat.com/security/cve/CVE-2024-47596CVE-2024-47596CVE-2024-47596https://access.redhat.com/security/cve/CVE-2024-47597CVE-2024-47597CVE-2024-47597https://access.redhat.com/security/cve/CVE-2024-47598CVE-2024-47598CVE-2024-47598https://access.redhat.com/security/cve/CVE-2024-47599CVE-2024-47599CVE-2024-47599https://access.redhat.com/security/cve/CVE-2024-47601CVE-2024-47601CVE-2024-47601https://access.redhat.com/security/cve/CVE-2024-47602CVE-2024-47602CVE-2024-47602https://access.redhat.com/security/cve/CVE-2024-47603CVE-2024-47603CVE-2024-47603https://access.redhat.com/security/cve/CVE-2024-47774CVE-2024-47774CVE-2024-47774https://access.redhat.com/security/cve/CVE-2024-47775CVE-2024-47775CVE-2024-47775https://access.redhat.com/security/cve/CVE-2024-47776CVE-2024-47776CVE-2024-47776https://access.redhat.com/security/cve/CVE-2024-47777CVE-2024-47777CVE-2024-47777https://access.redhat.com/security/cve/CVE-2024-47778CVE-2024-47778CVE-2024-47778https://access.redhat.com/security/cve/CVE-2024-47834CVE-2024-47834CVE-2024-47834https://bugzilla.redhat.com/23317232331723https://bugzilla.redhat.com/23317392331739https://bugzilla.redhat.com/23317412331741https://bugzilla.redhat.com/23317432331743https://bugzilla.redhat.com/23317442331744https://bugzilla.redhat.com/23317472331747https://bugzilla.redhat.com/23317482331748https://bugzilla.redhat.com/23317492331749https://bugzilla.redhat.com/23317502331750https://bugzilla.redhat.com/23317512331751https://bugzilla.redhat.com/23317522331752https://bugzilla.redhat.com/23317552331755https://bugzilla.redhat.com/23317562331756https://bugzilla.redhat.com/23317592331759https://bugzilla.redhat.com/23317612331761https://bugzilla.redhat.com/23317622331762https://bugzilla.redhat.com/23317632331763https://errata.almalinux.org/9/ALSA-2025-7242.htmlALSA-2025:7242ALSA-2025:7242 `rgstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpm_rgstreamer1-plugins-good-1.22.12-4.el9.i686.rpm_rgstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpm`rgstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpm`rgstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpm_rgstreamer1-plugins-good-1.22.12-4.el9.i686.rpm_rgstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpm`rgstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpmÔqY HBBBBBBsecurityModerate: gstreamer1-plugins-base security updateb9 https://access.redhat.com/errata/RHSA-2025:7243RHSA-2025:7243RHSA-2025:7243 https://access.redhat.com/security/cve/CVE-2024-47541CVE-2024-47541CVE-2024-47541https://access.redhat.com/security/cve/CVE-2024-47542CVE-2024-47542CVE-2024-47542https://access.redhat.com/security/cve/CVE-2024-47600CVE-2024-47600CVE-2024-47600https://access.redhat.com/security/cve/CVE-2024-47835CVE-2024-47835CVE-2024-47835https://bugzilla.redhat.com/23317172331717https://bugzilla.redhat.com/23317242331724https://bugzilla.redhat.com/23317382331738https://bugzilla.redhat.com/23317422331742https://errata.almalinux.org/9/ALSA-2025-7243.htmlALSA-2025:7243ALSA-2025:7243 crgstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpmbrgstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpmbrgstreamer1-plugins-base-1.22.12-4.el9.i686.rpmrgstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpmcrgstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpmcrgstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpmbrgstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpmbrgstreamer1-plugins-base-1.22.12-4.el9.i686.rpmrgstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpmcrgstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpmÔZ QsecurityModerate: git-lfs security updateEhttps://access.redhat.com/errata/RHSA-2025:7256RHSA-2025:7256RHSA-2025:7256 https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22953102295310https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7256.htmlALSA-2025:7256ALSA-2025:7256 FYgit-lfs-3.6.1-1.el9.x86_64.rpmFYgit-lfs-3.6.1-1.el9.x86_64.rpmÔ"[ TBsecurityModerate: openjpeg2 security update`Xhttps://access.redhat.com/errata/RHSA-2025:7309RHSA-2025:7309RHSA-2025:7309 https://access.redhat.com/security/cve/CVE-2024-56826CVE-2024-56826CVE-2024-56826https://access.redhat.com/security/cve/CVE-2024-56827CVE-2024-56827CVE-2024-56827https://bugzilla.redhat.com/23351722335172https://bugzilla.redhat.com/23351742335174https://errata.almalinux.org/9/ALSA-2025-7309.htmlALSA-2025:7309ALSA-2025:7309 BJopenjpeg2-2.4.0-8.el9.x86_64.rpmBJopenjpeg2-2.4.0-8.el9.i686.rpmBJopenjpeg2-2.4.0-8.el9.x86_64.rpmBJopenjpeg2-2.4.0-8.el9.i686.rpmÔ:\ XsecurityModerate: keylime-agent-rust security update8Whttps://access.redhat.com/errata/RHSA-2025:7313RHSA-2025:7313RHSA-2025:7313 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7313.htmlALSA-2025:7313ALSA-2025:7313 2#keylime-agent-rust-0.2.2-2.el9.x86_64.rpm2#keylime-agent-rust-0.2.2-2.el9.x86_64.rpmÔ[] [securityModerate: python3.12-cryptography security updateYhttps://access.redhat.com/errata/RHSA-2025:7317RHSA-2025:7317RHSA-2025:7317 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7317.htmlALSA-2025:7317ALSA-2025:7317 }ppython3.12-cryptography-41.0.7-2.el9.x86_64.rpm}ppython3.12-cryptography-41.0.7-2.el9.x86_64.rpmÔ^ *^BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2025:7387RHSA-2025:7387RHSA-2025:7387 https://access.redhat.com/security/cve/CVE-2024-44192CVE-2024-44192CVE-2024-44192https://access.redhat.com/security/cve/CVE-2024-54467CVE-2024-54467CVE-2024-54467https://access.redhat.com/security/cve/CVE-2024-54551CVE-2024-54551CVE-2024-54551https://access.redhat.com/security/cve/CVE-2025-24208CVE-2025-24208CVE-2025-24208https://access.redhat.com/security/cve/CVE-2025-24209CVE-2025-24209CVE-2025-24209https://access.redhat.com/security/cve/CVE-2025-24216CVE-2025-24216CVE-2025-24216https://access.redhat.com/security/cve/CVE-2025-30427CVE-2025-30427CVE-2025-30427https://bugzilla.redhat.com/23538712353871https://bugzilla.redhat.com/23538722353872https://bugzilla.redhat.com/23579092357909https://bugzilla.redhat.com/23579102357910https://bugzilla.redhat.com/23579112357911https://bugzilla.redhat.com/23579172357917https://bugzilla.redhat.com/23579192357919https://errata.almalinux.org/9/ALSA-2025-7387.htmlALSA-2025:7387ALSA-2025:7387 1swebkit2gtk3-2.48.1-1.el9_6.i686.rpm3swebkit2gtk3-jsc-2.48.1-1.el9_6.x86_64.rpm4swebkit2gtk3-jsc-devel-2.48.1-1.el9_6.i686.rpm3swebkit2gtk3-jsc-2.48.1-1.el9_6.i686.rpm2swebkit2gtk3-devel-2.48.1-1.el9_6.i686.rpm1swebkit2gtk3-2.48.1-1.el9_6.x86_64.rpm4swebkit2gtk3-jsc-devel-2.48.1-1.el9_6.x86_64.rpm2swebkit2gtk3-devel-2.48.1-1.el9_6.x86_64.rpm1swebkit2gtk3-2.48.1-1.el9_6.i686.rpm3swebkit2gtk3-jsc-2.48.1-1.el9_6.x86_64.rpm4swebkit2gtk3-jsc-devel-2.48.1-1.el9_6.i686.rpm3swebkit2gtk3-jsc-2.48.1-1.el9_6.i686.rpm2swebkit2gtk3-devel-2.48.1-1.el9_6.i686.rpm1swebkit2gtk3-2.48.1-1.el9_6.x86_64.rpm4swebkit2gtk3-jsc-devel-2.48.1-1.el9_6.x86_64.rpm2swebkit2gtk3-devel-2.48.1-1.el9_6.x86_64.rpmd_ /kBBsecurityModerate: buildah security updater~https://access.redhat.com/errata/RHSA-2025:7389RHSA-2025:7389RHSA-2025:7389 https://access.redhat.com/security/cve/CVE-2025-27144CVE-2025-27144CVE-2025-27144https://bugzilla.redhat.com/23474232347423https://errata.almalinux.org/9/ALSA-2025-7389.htmlALSA-2025:7389ALSA-2025:7389 7Hbuildah-1.39.4-1.el9_6.x86_64.rpm8Hbuildah-tests-1.39.4-1.el9_6.x86_64.rpm7Hbuildah-1.39.4-1.el9_6.x86_64.rpm8Hbuildah-tests-1.39.4-1.el9_6.x86_64.rpm` 7pBBBBBsecurityModerate: 389-ds-base security updatepzhttps://access.redhat.com/errata/RHSA-2025:7395RHSA-2025:7395RHSA-2025:7395 https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-7395.htmlALSA-2025:7395ALSA-2025:7395 7[389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpmR[python3-lib389-2.6.1-8.el9_6.noarch.rpmS[389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm6[389-ds-base-2.6.1-8.el9_6.x86_64.rpm7[389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpmR[python3-lib389-2.6.1-8.el9_6.noarch.rpmS[389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm6[389-ds-base-2.6.1-8.el9_6.x86_64.rpm!a e .hBBBBsecurityImportant: libxslt security update?https://access.redhat.com/errata/RHSA-2025:7410RHSA-2025:7410RHSA-2025:7410 https://access.redhat.com/security/cve/CVE-2024-55549CVE-2024-55549CVE-2024-55549https://bugzilla.redhat.com/23524842352484https://errata.almalinux.org/9/ALSA-2025-7410.htmlALSA-2025:7410ALSA-2025:7410 ilibxslt-devel-1.1.34-13.el9_6.x86_64.rpmhlibxslt-1.1.34-13.el9_6.i686.rpmhlibxslt-1.1.34-13.el9_6.x86_64.rpmilibxslt-devel-1.1.34-13.el9_6.i686.rpmilibxslt-devel-1.1.34-13.el9_6.x86_64.rpmhlibxslt-1.1.34-13.el9_6.i686.rpmhlibxslt-1.1.34-13.el9_6.x86_64.rpmilibxslt-devel-1.1.34-13.el9_6.i686.rpm.f 3oBBsecurityImportant: gimp security updateD, https://access.redhat.com/errata/RHSA-2025:7417RHSA-2025:7417RHSA-2025:7417 https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2025-7417.htmlALSA-2025:7417ALSA-2025:7417 @Ngimp-2.99.8-4.el9_6.x86_64.rpmoNgimp-libs-2.99.8-4.el9_6.x86_64.rpm@Ngimp-2.99.8-4.el9_6.x86_64.rpmoNgimp-libs-2.99.8-4.el9_6.x86_64.rpm+g &{BBBBBBBBBBBBnBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security updatepghttps://access.redhat.com/errata/RHSA-2025:7418RHSA-2025:7418RHSA-2025:7418 https://access.redhat.com/security/cve/CVE-2024-11235CVE-2024-11235CVE-2024-11235https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://bugzilla.redhat.com/23575312357531https://errata.almalinux.org/9/ALSA-2025-7418.htmlALSA-2025:7418ALSA-2025:7418 *,( \Hphp-fpm-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm tphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmVHphp-dba-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm]Hphp-gd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmcHphp-odbc-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmgHphp-process-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmUHphp-common-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmYHphp-embedded-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm2+apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmbHphp-mysqlnd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmiHphp-soap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmjHphp-xml-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmZHphp-enchant-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm^Hphp-gmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm+php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmXHphp-devel-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmWHphp-dbg-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmhHphp-snmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm ,php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmHphp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmSHphp-bcmath-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmaHphp-mbstring-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmdHphp-opcache-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmfHphp-pgsql-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmTHphp-cli-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm[Hphp-ffi-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm`Hphp-ldap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmeHphp-pdo-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm+php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm_Hphp-intl-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm*,( \Hphp-fpm-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm tphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmVHphp-dba-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm]Hphp-gd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmcHphp-odbc-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmgHphp-process-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmUHphp-common-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmYHphp-embedded-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm2+apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmbHphp-mysqlnd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmiHphp-soap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmjHphp-xml-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmZHphp-enchant-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm^Hphp-gmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm+php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmXHphp-devel-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmWHphp-dbg-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmhHphp-snmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm ,php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmHphp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmSHphp-bcmath-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmaHphp-mbstring-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmdHphp-opcache-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmfHphp-pgsql-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmTHphp-cli-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm[Hphp-ffi-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm`Hphp-ldap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmeHphp-pdo-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm+php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm_Hphp-intl-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpmÔkh )gsecurityImportant: mod_auth_openidc security updateWhttps://access.redhat.com/errata/RHSA-2025:7419RHSA-2025:7419RHSA-2025:7419 https://access.redhat.com/security/cve/CVE-2025-31492CVE-2025-31492CVE-2025-31492https://bugzilla.redhat.com/23577382357738https://errata.almalinux.org/9/ALSA-2025-7419.htmlALSA-2025:7419ALSA-2025:7419 T*mod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpmT*mod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm*i 8jBBBBBBBBBBBBsecurityModerate: ghostscript security updateshhttps://access.redhat.com/errata/RHSA-2025:7422RHSA-2025:7422RHSA-2025:7422 https://access.redhat.com/security/cve/CVE-2023-46751CVE-2023-46751CVE-2023-46751https://access.redhat.com/security/cve/CVE-2024-46951CVE-2024-46951CVE-2024-46951https://access.redhat.com/security/cve/CVE-2024-46952CVE-2024-46952CVE-2024-46952https://access.redhat.com/security/cve/CVE-2024-46953CVE-2024-46953CVE-2024-46953https://access.redhat.com/security/cve/CVE-2024-46954CVE-2024-46954CVE-2024-46954https://access.redhat.com/security/cve/CVE-2024-46956CVE-2024-46956CVE-2024-46956https://bugzilla.redhat.com/22533652253365https://bugzilla.redhat.com/23250412325041https://bugzilla.redhat.com/23250432325043https://bugzilla.redhat.com/23250442325044https://bugzilla.redhat.com/23250452325045https://bugzilla.redhat.com/23250472325047https://errata.almalinux.org/9/ALSA-2025-7422.htmlALSA-2025:7422ALSA-2025:7422 =*ghostscript-tools-fonts-9.54.0-18.el9_6.x86_64.rpm>*ghostscript-tools-printing-9.54.0-18.el9_6.x86_64.rpm?*libgs-9.54.0-18.el9_6.x86_64.rpm *ghostscript-doc-9.54.0-18.el9_6.noarch.rpm<*ghostscript-tools-dvipdf-9.54.0-18.el9_6.x86_64.rpm?*libgs-9.54.0-18.el9_6.i686.rpm?*ghostscript-x11-9.54.0-18.el9_6.x86_64.rpm;*ghostscript-9.54.0-18.el9_6.x86_64.rpm=*ghostscript-tools-fonts-9.54.0-18.el9_6.x86_64.rpm>*ghostscript-tools-printing-9.54.0-18.el9_6.x86_64.rpm?*libgs-9.54.0-18.el9_6.x86_64.rpm *ghostscript-doc-9.54.0-18.el9_6.noarch.rpm<*ghostscript-tools-dvipdf-9.54.0-18.el9_6.x86_64.rpm?*libgs-9.54.0-18.el9_6.i686.rpm?*ghostscript-x11-9.54.0-18.el9_6.x86_64.rpm;*ghostscript-9.54.0-18.el9_6.x86_64.rpmej yBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update[@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423 https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423 &Bkernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpmTBpython3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm!Bkernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm)Brv-5.14.0-570.16.1.el9_6.x86_64.rpmBkernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm$Bkernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm%Bperf-5.14.0-570.16.1.el9_6.x86_64.rpm'Brtla-5.14.0-570.16.1.el9_6.x86_64.rpm#Bkernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm"Bkernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm &Bkernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpmTBpython3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm!Bkernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm)Brv-5.14.0-570.16.1.el9_6.x86_64.rpmBkernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm$Bkernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm%Bperf-5.14.0-570.16.1.el9_6.x86_64.rpm'Brtla-5.14.0-570.16.1.el9_6.x86_64.rpm#Bkernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm"Bkernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpmɐ,k MBBBBsecurityImportant: osbuild-composer security updateLhttps://access.redhat.com/errata/RHSA-2025:7425RHSA-2025:7425RHSA-2025:7425 https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-7425.htmlALSA-2025:7425ALSA-2025:7425 3osbuild-composer-worker-132.2-1.el9_6.alma.1.x86_64.rpm2osbuild-composer-core-132.2-1.el9_6.alma.1.x86_64.rpm1osbuild-composer-132.2-1.el9_6.alma.1.x86_64.rpm3osbuild-composer-worker-132.2-1.el9_6.alma.1.x86_64.rpm2osbuild-composer-core-132.2-1.el9_6.alma.1.x86_64.rpm1osbuild-composer-132.2-1.el9_6.alma.1.x86_64.rpml HVBwBBBBBBBsecurityModerate: nodejs:20 security updateg+https://access.redhat.com/errata/RHSA-2025:7426RHSA-2025:7426RHSA-2025:7426 https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://bugzilla.redhat.com/23582712358271https://errata.almalinux.org/9/ALSA-2025-7426.htmlALSA-2025:7426ALSA-2025:7426 5(eVnodejs-full-i18n-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpm{fnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm Hnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmLVnodejs-docs-20.19.1-1.module_el9.6.0+163+d268fe53.noarch.rpm"Vnodejs-devel-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmanpm-10.8.2-1.20.19.1.1.module_el9.6.0+163+d268fe53.x86_64.rpm Hnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm5Vnodejs-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpm5(eVnodejs-full-i18n-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpm{fnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm Hnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmLVnodejs-docs-20.19.1-1.module_el9.6.0+163+d268fe53.noarch.rpm"Vnodejs-devel-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmanpm-10.8.2-1.20.19.1.1.module_el9.6.0+163+d268fe53.x86_64.rpm Hnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm5Vnodejs-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmÔ@m "^BBsecurityLow: xterm security update/Whttps://access.redhat.com/errata/RHSA-2025:7427RHSA-2025:7427RHSA-2025:7427 https://access.redhat.com/security/cve/CVE-2022-45063CVE-2022-45063CVE-2022-45063https://bugzilla.redhat.com/21424742142474https://errata.almalinux.org/9/ALSA-2025-7427.htmlALSA-2025:7427ALSA-2025:7427  Qxterm-resize-366-10.el9_6.x86_64.rpm Qxterm-366-10.el9_6.x86_64.rpm Qxterm-resize-366-10.el9_6.x86_64.rpm Qxterm-366-10.el9_6.x86_64.rpmnn 'cBBsecurityImportant: firefox security updateig https://access.redhat.com/errata/RHSA-2025:7428RHSA-2025:7428RHSA-2025:7428 https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-7428.htmlALSA-2025:7428ALSA-2025:7428 Ofirefox-x11-128.10.0-1.el9_6.alma.1.x86_64.rpm9firefox-128.10.0-1.el9_6.alma.1.x86_64.rpmOfirefox-x11-128.10.0-1.el9_6.alma.1.x86_64.rpm9firefox-128.10.0-1.el9_6.alma.1.x86_64.rpmno -hBBBsecurityImportant: redis:7 security updateP'https://access.redhat.com/errata/RHSA-2025:7429RHSA-2025:7429RHSA-2025:7429 https://access.redhat.com/security/cve/CVE-2025-21605CVE-2025-21605CVE-2025-21605https://bugzilla.redhat.com/23618832361883https://errata.almalinux.org/9/ALSA-2025-7429.htmlALSA-2025:7429ALSA-2025:7429 $(@redis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpmredis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm$redis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm$(@redis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpmredis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm$redis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpmp 3nBBBsecurityImportant: yelp security updatewdhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430 https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430 zyelp-libs-40.3-2.el9_6.1.x86_64.rpmzyelp-libs-40.3-2.el9_6.1.i686.rpmDyelp-40.3-2.el9_6.1.x86_64.rpmzyelp-libs-40.3-2.el9_6.1.x86_64.rpmzyelp-libs-40.3-2.el9_6.1.i686.rpmDyelp-40.3-2.el9_6.1.x86_64.rpm6q &tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security update[ https://access.redhat.com/errata/RHSA-2025:7431RHSA-2025:7431RHSA-2025:7431 https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7431.htmlALSA-2025:7431ALSA-2025:7431 V?php-dba-8.0.30-3.el9_6.x86_64.rpmc?php-odbc-8.0.30-3.el9_6.x86_64.rpme?php-pdo-8.0.30-3.el9_6.x86_64.rpm`?php-ldap-8.0.30-3.el9_6.x86_64.rpmg?php-process-8.0.30-3.el9_6.x86_64.rpmd?php-opcache-8.0.30-3.el9_6.x86_64.rpmX?php-devel-8.0.30-3.el9_6.x86_64.rpm\?php-fpm-8.0.30-3.el9_6.x86_64.rpm[?php-ffi-8.0.30-3.el9_6.x86_64.rpmS?php-bcmath-8.0.30-3.el9_6.x86_64.rpmU?php-common-8.0.30-3.el9_6.x86_64.rpmi?php-soap-8.0.30-3.el9_6.x86_64.rpmZ?php-enchant-8.0.30-3.el9_6.x86_64.rpmY?php-embedded-8.0.30-3.el9_6.x86_64.rpm?php-8.0.30-3.el9_6.x86_64.rpm^?php-gmp-8.0.30-3.el9_6.x86_64.rpm]?php-gd-8.0.30-3.el9_6.x86_64.rpmj?php-xml-8.0.30-3.el9_6.x86_64.rpmh?php-snmp-8.0.30-3.el9_6.x86_64.rpma?php-mbstring-8.0.30-3.el9_6.x86_64.rpm_?php-intl-8.0.30-3.el9_6.x86_64.rpmb?php-mysqlnd-8.0.30-3.el9_6.x86_64.rpmT?php-cli-8.0.30-3.el9_6.x86_64.rpmf?php-pgsql-8.0.30-3.el9_6.x86_64.rpmW?php-dbg-8.0.30-3.el9_6.x86_64.rpmV?php-dba-8.0.30-3.el9_6.x86_64.rpmc?php-odbc-8.0.30-3.el9_6.x86_64.rpme?php-pdo-8.0.30-3.el9_6.x86_64.rpm`?php-ldap-8.0.30-3.el9_6.x86_64.rpmg?php-process-8.0.30-3.el9_6.x86_64.rpmd?php-opcache-8.0.30-3.el9_6.x86_64.rpmX?php-devel-8.0.30-3.el9_6.x86_64.rpm\?php-fpm-8.0.30-3.el9_6.x86_64.rpm[?php-ffi-8.0.30-3.el9_6.x86_64.rpmS?php-bcmath-8.0.30-3.el9_6.x86_64.rpmU?php-common-8.0.30-3.el9_6.x86_64.rpmi?php-soap-8.0.30-3.el9_6.x86_64.rpmZ?php-enchant-8.0.30-3.el9_6.x86_64.rpmY?php-embedded-8.0.30-3.el9_6.x86_64.rpm?php-8.0.30-3.el9_6.x86_64.rpm^?php-gmp-8.0.30-3.el9_6.x86_64.rpm]?php-gd-8.0.30-3.el9_6.x86_64.rpmj?php-xml-8.0.30-3.el9_6.x86_64.rpmh?php-snmp-8.0.30-3.el9_6.x86_64.rpma?php-mbstring-8.0.30-3.el9_6.x86_64.rpm_?php-intl-8.0.30-3.el9_6.x86_64.rpmb?php-mysqlnd-8.0.30-3.el9_6.x86_64.rpmT?php-cli-8.0.30-3.el9_6.x86_64.rpmf?php-pgsql-8.0.30-3.el9_6.x86_64.rpmW?php-dbg-8.0.30-3.el9_6.x86_64.rpm r MBUBBBBBBBB~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security updateg3https://access.redhat.com/errata/RHSA-2025:7432RHSA-2025:7432RHSA-2025:7432 https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7432.htmlALSA-2025:7432ALSA-2025:7432 )+(cFphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmZFphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmYFphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmVFphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmTFphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmUFphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmbFphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmWFphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm2*apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm[Fphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmgFphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmfFphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmjFphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmFphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmeFphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm\Fphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm`Fphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmiFphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmXFphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm*php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm sphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm Ophp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmdFphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm_Fphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmSFphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmaFphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm*php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmhFphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm^Fphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm]Fphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm)+(cFphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmZFphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmYFphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmVFphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmTFphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmUFphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmbFphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmWFphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm2*apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm[Fphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmgFphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmfFphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmjFphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmFphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmeFphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm\Fphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm`Fphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmiFphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmXFphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm*php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm sphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm Ophp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmdFphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm_Fphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmSFphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmaFphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm*php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmhFphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm^Fphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm]Fphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmÔ:s 'zkBvBBBBBBBBBBBsecurityImportant: nodejs:22 security updatebhttps://access.redhat.com/errata/RHSA-2025:7433RHSA-2025:7433RHSA-2025:7433 https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://access.redhat.com/security/cve/CVE-2025-3277CVE-2025-3277CVE-2025-3277https://bugzilla.redhat.com/23582712358271https://bugzilla.redhat.com/23595532359553https://errata.almalinux.org/9/ALSA-2025-7433.htmlALSA-2025:7433ALSA-2025:7433 5( a npm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpmL9nodejs-docs-22.15.0-1.module_el9.6.0+164+2d89b8ed.noarch.rpm59nodejs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpme9nodejs-full-i18n-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm 9nodejs-libs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm>bv8-12.4-devel-12.4.254.21-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm"9nodejs-devel-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm5( a npm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpmL9nodejs-docs-22.15.0-1.module_el9.6.0+164+2d89b8ed.noarch.rpm59nodejs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpme9nodejs-full-i18n-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm 9nodejs-libs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm>bv8-12.4-devel-12.4.254.21-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm"9nodejs-devel-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm]t *hsecurityImportant: thunderbird security update| https://access.redhat.com/errata/RHSA-2025:7435RHSA-2025:7435RHSA-2025:7435 https://access.redhat.com/security/cve/CVE-2025-2830CVE-2025-2830CVE-2025-2830https://access.redhat.com/security/cve/CVE-2025-3522CVE-2025-3522CVE-2025-3522https://access.redhat.com/security/cve/CVE-2025-3523CVE-2025-3523CVE-2025-3523https://bugzilla.redhat.com/23597862359786https://bugzilla.redhat.com/23597892359789https://bugzilla.redhat.com/23597932359793https://errata.almalinux.org/9/ALSA-2025-7435.htmlALSA-2025:7435ALSA-2025:7435 :thunderbird-128.10.0-1.el9_6.alma.1.x86_64.rpm:thunderbird-128.10.0-1.el9_6.alma.1.x86_64.rpmou 1kBBBBsecurityImportant: libsoup security updateHhttps://access.redhat.com/errata/RHSA-2025:7436RHSA-2025:7436RHSA-2025:7436 https://access.redhat.com/security/cve/CVE-2025-32050CVE-2025-32050CVE-2025-32050https://access.redhat.com/security/cve/CVE-2025-32052CVE-2025-32052CVE-2025-32052https://access.redhat.com/security/cve/CVE-2025-32053CVE-2025-32053CVE-2025-32053https://access.redhat.com/security/cve/CVE-2025-32906CVE-2025-32906CVE-2025-32906https://access.redhat.com/security/cve/CVE-2025-32907CVE-2025-32907CVE-2025-32907https://access.redhat.com/security/cve/CVE-2025-32911CVE-2025-32911CVE-2025-32911https://access.redhat.com/security/cve/CVE-2025-32913CVE-2025-32913CVE-2025-32913https://access.redhat.com/security/cve/CVE-2025-46420CVE-2025-46420CVE-2025-46420https://access.redhat.com/security/cve/CVE-2025-46421CVE-2025-46421CVE-2025-46421https://bugzilla.redhat.com/23570672357067https://bugzilla.redhat.com/23570692357069https://bugzilla.redhat.com/23570702357070https://bugzilla.redhat.com/23593412359341https://bugzilla.redhat.com/23593422359342https://bugzilla.redhat.com/23593552359355https://bugzilla.redhat.com/23593572359357https://bugzilla.redhat.com/23619622361962https://bugzilla.redhat.com/23619632361963https://errata.almalinux.org/9/ALSA-2025-7436.htmlALSA-2025:7436ALSA-2025:7436 libsoup-devel-2.72.0-10.el9_6.1.i686.rpmlibsoup-devel-2.72.0-10.el9_6.1.x86_64.rpmlibsoup-2.72.0-10.el9_6.1.i686.rpmlibsoup-2.72.0-10.el9_6.1.x86_64.rpmlibsoup-devel-2.72.0-10.el9_6.1.i686.rpmlibsoup-devel-2.72.0-10.el9_6.1.x86_64.rpmlibsoup-2.72.0-10.el9_6.1.i686.rpmlibsoup-2.72.0-10.el9_6.1.x86_64.rpmv 9rBBBBBsecurityModerate: avahi security updated*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437 n<avahi-tools-0.8-22.el9_6.x86_64.rpm_<avahi-glib-0.8-22.el9_6.i686.rpm><avahi-autoipd-0.8-22.el9_6.x86_64.rpm_<avahi-glib-0.8-22.el9_6.x86_64.rpmn<avahi-tools-0.8-22.el9_6.x86_64.rpm_<avahi-glib-0.8-22.el9_6.i686.rpm><avahi-autoipd-0.8-22.el9_6.x86_64.rpm_<avahi-glib-0.8-22.el9_6.x86_64.rpmuw zBBBBsecurityImportant: redis security update'https://access.redhat.com/errata/RHSA-2025:7438RHSA-2025:7438RHSA-2025:7438 https://access.redhat.com/security/cve/CVE-2025-21605CVE-2025-21605CVE-2025-21605https://bugzilla.redhat.com/23618832361883https://errata.almalinux.org/9/ALSA-2025-7438.htmlALSA-2025:7438ALSA-2025:7438 @Eredis-devel-6.2.18-1.el9_6.i686.rpmEredis-doc-6.2.18-1.el9_6.noarch.rpm@Eredis-devel-6.2.18-1.el9_6.x86_64.rpm$Eredis-6.2.18-1.el9_6.x86_64.rpm@Eredis-devel-6.2.18-1.el9_6.i686.rpmEredis-doc-6.2.18-1.el9_6.noarch.rpm@Eredis-devel-6.2.18-1.el9_6.x86_64.rpm$Eredis-6.2.18-1.el9_6.x86_64.rpmQx ABBBBsecurityLow: vim security update/5phttps://access.redhat.com/errata/RHSA-2025:7440RHSA-2025:7440RHSA-2025:7440 https://access.redhat.com/security/cve/CVE-2023-4752CVE-2023-4752CVE-2023-4752https://bugzilla.redhat.com/22373112237311https://errata.almalinux.org/9/ALSA-2025-7440.htmlALSA-2025:7440ALSA-2025:7440 :vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm9vim-common-8.2.2637-22.el9_6.x86_64.rpm8vim-X11-8.2.2637-22.el9_6.x86_64.rpm:vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm9vim-common-8.2.2637-22.el9_6.x86_64.rpm8vim-X11-8.2.2637-22.el9_6.x86_64.rpm]y HBsecurityModerate: expat security update%lhttps://access.redhat.com/errata/RHSA-2025:7444RHSA-2025:7444RHSA-2025:7444 https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-7444.htmlALSA-2025:7444ALSA-2025:7444 uQexpat-devel-2.5.0-5.el9_6.x86_64.rpmuQexpat-devel-2.5.0-5.el9_6.i686.rpmuQexpat-devel-2.5.0-5.el9_6.x86_64.rpmuQexpat-devel-2.5.0-5.el9_6.i686.rpmUz LBBBBBBBBBBBBsecurityModerate: ghostscript security updatefhttps://access.redhat.com/errata/RHSA-2025:7586RHSA-2025:7586RHSA-2025:7586 https://access.redhat.com/security/cve/CVE-2025-27832CVE-2025-27832CVE-2025-27832https://bugzilla.redhat.com/23549492354949https://errata.almalinux.org/9/ALSA-2025-7586.htmlALSA-2025:7586ALSA-2025:7586 <+ghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm +ghostscript-doc-9.54.0-19.el9_6.noarch.rpm?+ghostscript-x11-9.54.0-19.el9_6.x86_64.rpm;+ghostscript-9.54.0-19.el9_6.x86_64.rpm?+libgs-9.54.0-19.el9_6.x86_64.rpm=+ghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm>+ghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm?+libgs-9.54.0-19.el9_6.i686.rpm<+ghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm +ghostscript-doc-9.54.0-19.el9_6.noarch.rpm?+ghostscript-x11-9.54.0-19.el9_6.x86_64.rpm;+ghostscript-9.54.0-19.el9_6.x86_64.rpm?+libgs-9.54.0-19.el9_6.x86_64.rpm=+ghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm>+ghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm?+libgs-9.54.0-19.el9_6.i686.rpmÔx{ 1[BBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updatewGhttps://access.redhat.com/errata/RHSA-2025:7598RHSA-2025:7598RHSA-2025:7598 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7598.htmlALSA-2025:7598ALSA-2025:7598 Ddotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpmJ'dotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm-'dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm<aspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpmF'dotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpmBdotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm Ddotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpmJ'dotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm-'dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm<aspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpmF'dotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpmBdotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm>aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpmM| rBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update>Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600 /"dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm5(dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm-"dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm2(dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm"dotnet-host-9.0.5-1.el9_6.x86_64.rpm,"aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm*"aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm0"dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm4"dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm+"aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm3(dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm1(dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm."dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm(netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm/"dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm5(dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm-"dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm2(dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm"dotnet-host-9.0.5-1.el9_6.x86_64.rpm,"aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm*"aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm0"dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm4"dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm+"aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm3(dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm1(dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm."dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm(netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpmÔC} securityModerate: xdg-utils security updateMhttps://access.redhat.com/errata/RHSA-2025:7672RHSA-2025:7672RHSA-2025:7672 https://access.redhat.com/security/cve/CVE-2022-4055CVE-2022-4055CVE-2022-4055https://bugzilla.redhat.com/21437922143792https://errata.almalinux.org/9/ALSA-2025-7672.htmlALSA-2025:7672ALSA-2025:7672 tjxdg-utils-1.1.3-13.el9_6.noarch.rpmtjxdg-utils-1.1.3-13.el9_6.noarch.rpmÔ@~ QBBsecurityImportant: grafana security updateQ8https://access.redhat.com/errata/RHSA-2025:7893RHSA-2025:7893RHSA-2025:7893 https://access.redhat.com/security/cve/CVE-2025-4123CVE-2025-4123CVE-2025-4123https://bugzilla.redhat.com/23646322364632https://errata.almalinux.org/9/ALSA-2025-7893.htmlALSA-2025:7893ALSA-2025:7893 !ygrafana-selinux-10.2.6-13.el9_6.x86_64.rpmqygrafana-10.2.6-13.el9_6.x86_64.rpm!ygrafana-selinux-10.2.6-13.el9_6.x86_64.rpmqygrafana-10.2.6-13.el9_6.x86_64.rpmF )VBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update 9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903 https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903 "Ckernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm)Crv-5.14.0-570.17.1.el9_6.x86_64.rpm&Ckernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm!Ckernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpmTCpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm'Crtla-5.14.0-570.17.1.el9_6.x86_64.rpm%Cperf-5.14.0-570.17.1.el9_6.x86_64.rpmCkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm$Ckernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm#Ckernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm "Ckernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm)Crv-5.14.0-570.17.1.el9_6.x86_64.rpm&Ckernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm!Ckernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpmTCpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm'Crtla-5.14.0-570.17.1.el9_6.x86_64.rpm%Cperf-5.14.0-570.17.1.el9_6.x86_64.rpmCkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm$Ckernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm#Ckernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm` -jBsecurityImportant: compat-openssl11 security updateBhttps://access.redhat.com/errata/RHSA-2025:7937RHSA-2025:7937RHSA-2025:7937 https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/21644402164440https://errata.almalinux.org/9/ALSA-2025-7937.htmlALSA-2025:7937ALSA-2025:7937 ?compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm?compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm?compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm?compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpmY :nBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateGvhttps://access.redhat.com/errata/RHSA-2025:7995RHSA-2025:7995RHSA-2025:7995 https://access.redhat.com/security/cve/CVE-2025-31205CVE-2025-31205CVE-2025-31205https://access.redhat.com/security/cve/CVE-2025-31257CVE-2025-31257CVE-2025-31257https://bugzilla.redhat.com/23665012366501https://bugzilla.redhat.com/23665042366504https://errata.almalinux.org/9/ALSA-2025-7995.htmlALSA-2025:7995ALSA-2025:7995 1twebkit2gtk3-2.48.2-1.el9_6.i686.rpm4twebkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm3twebkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm2twebkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm4twebkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm3twebkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm2twebkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm1twebkit2gtk3-2.48.2-1.el9_6.x86_64.rpm1twebkit2gtk3-2.48.2-1.el9_6.i686.rpm4twebkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm3twebkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm2twebkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm4twebkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm3twebkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm2twebkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm1twebkit2gtk3-2.48.2-1.el9_6.x86_64.rpmÔ^ ?{BBsecurityImportant: firefox security update=ghttps://access.redhat.com/errata/RHSA-2025:8049RHSA-2025:8049RHSA-2025:8049 https://access.redhat.com/security/cve/CVE-2025-4918CVE-2025-4918CVE-2025-4918https://access.redhat.com/security/cve/CVE-2025-4919CVE-2025-4919CVE-2025-4919https://bugzilla.redhat.com/23670162367016https://bugzilla.redhat.com/23670182367018https://errata.almalinux.org/9/ALSA-2025-8049.htmlALSA-2025:8049ALSA-2025:8049 O firefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm9 firefox-128.10.1-1.el9_6.alma.1.x86_64.rpmO firefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm9 firefox-128.10.1-1.el9_6.alma.1.x86_64.rpmj @BBBBsecurityImportant: libsoup security update$k https://access.redhat.com/errata/RHSA-2025:8126RHSA-2025:8126RHSA-2025:8126 https://access.redhat.com/security/cve/CVE-2025-2784CVE-2025-2784CVE-2025-2784https://access.redhat.com/security/cve/CVE-2025-32049CVE-2025-32049CVE-2025-32049https://access.redhat.com/security/cve/CVE-2025-32914CVE-2025-32914CVE-2025-32914https://access.redhat.com/security/cve/CVE-2025-4948CVE-2025-4948CVE-2025-4948https://bugzilla.redhat.com/23546692354669https://bugzilla.redhat.com/23570662357066https://bugzilla.redhat.com/23593582359358https://bugzilla.redhat.com/23671832367183https://errata.almalinux.org/9/ALSA-2025-8126.htmlALSA-2025:8126ALSA-2025:8126 libsoup-devel-2.72.0-10.el9_6.2.i686.rpmlibsoup-devel-2.72.0-10.el9_6.2.x86_64.rpmlibsoup-2.72.0-10.el9_6.2.x86_64.rpmlibsoup-2.72.0-10.el9_6.2.i686.rpmlibsoup-devel-2.72.0-10.el9_6.2.i686.rpmlibsoup-devel-2.72.0-10.el9_6.2.x86_64.rpmlibsoup-2.72.0-10.el9_6.2.x86_64.rpmlibsoup-2.72.0-10.el9_6.2.i686.rpmҥ& GsecurityImportant: python-tornado security update=https://access.redhat.com/errata/RHSA-2025:8136RHSA-2025:8136RHSA-2025:8136 https://access.redhat.com/security/cve/CVE-2025-47287CVE-2025-47287CVE-2025-47287https://bugzilla.redhat.com/23667032366703https://errata.almalinux.org/9/ALSA-2025-8136.htmlALSA-2025:8136ALSA-2025:8136  python3-tornado-6.4.2-2.el9_6.2.x86_64.rpm python3-tornado-6.4.2-2.el9_6.2.x86_64.rpm; JBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateL https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142 https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142 TDpython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpmDkernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm'Drtla-5.14.0-570.18.1.el9_6.x86_64.rpm)Drv-5.14.0-570.18.1.el9_6.x86_64.rpm&Dkernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm$Dkernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm%Dperf-5.14.0-570.18.1.el9_6.x86_64.rpm"Dkernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm!Dkernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm#Dkernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm TDpython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpmDkernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm'Drtla-5.14.0-570.18.1.el9_6.x86_64.rpm)Drv-5.14.0-570.18.1.el9_6.x86_64.rpm&Dkernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm$Dkernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm%Dperf-5.14.0-570.18.1.el9_6.x86_64.rpm"Dkernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm!Dkernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm#Dkernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpmܣs $^BBBBsecurityImportant: gstreamer1-plugins-bad-free security updateYhttps://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183 https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183 "gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpm^gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm"gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpm^gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm"gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpm^gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm"gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpm^gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm )eBBsecurityImportant: firefox security updategzhttps://access.redhat.com/errata/RHSA-2025:8293RHSA-2025:8293RHSA-2025:8293 https://access.redhat.com/security/cve/CVE-2025-5263CVE-2025-5263CVE-2025-5263https://access.redhat.com/security/cve/CVE-2025-5264CVE-2025-5264CVE-2025-5264https://access.redhat.com/security/cve/CVE-2025-5266CVE-2025-5266CVE-2025-5266https://access.redhat.com/security/cve/CVE-2025-5267CVE-2025-5267CVE-2025-5267https://access.redhat.com/security/cve/CVE-2025-5268CVE-2025-5268CVE-2025-5268https://access.redhat.com/security/cve/CVE-2025-5269CVE-2025-5269CVE-2025-5269https://bugzilla.redhat.com/23687502368750https://bugzilla.redhat.com/23687512368751https://bugzilla.redhat.com/23687522368752https://bugzilla.redhat.com/23687552368755https://bugzilla.redhat.com/23687562368756https://bugzilla.redhat.com/23687572368757https://errata.almalinux.org/9/ALSA-2025-8293.htmlALSA-2025:8293ALSA-2025:8293 Ofirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm9firefox-128.11.0-1.el9_6.alma.1.x86_64.rpmOfirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm9firefox-128.11.0-1.el9_6.alma.1.x86_64.rpm~ =jBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateaWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333 https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333 'Ertla-5.14.0-570.19.1.el9_6.x86_64.rpm"Ekernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm%Eperf-5.14.0-570.19.1.el9_6.x86_64.rpm$Ekernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm!Ekernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm#Ekernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm&Ekernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm)Erv-5.14.0-570.19.1.el9_6.x86_64.rpmTEpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpmEkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm 'Ertla-5.14.0-570.19.1.el9_6.x86_64.rpm"Ekernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm%Eperf-5.14.0-570.19.1.el9_6.x86_64.rpm$Ekernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm!Ekernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm#Ekernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm&Ekernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm)Erv-5.14.0-570.19.1.el9_6.x86_64.rpmTEpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpmEkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpmÔX  ~BBBsecurityImportant: varnish security update8Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337 https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337 vvarnish-6.6.2-6.el9_6.1.i686.rpmvvarnish-6.6.2-6.el9_6.1.x86_64.rpm?varnish-docs-6.6.2-6.el9_6.1.x86_64.rpmvvarnish-6.6.2-6.el9_6.1.i686.rpmvvarnish-6.6.2-6.el9_6.1.x86_64.rpm?varnish-docs-6.6.2-6.el9_6.1.x86_64.rpm[  zkB`BBBBBBBBBBBsecurityImportant: nodejs:22 security update2https://access.redhat.com/errata/RHSA-2025:8467RHSA-2025:8467RHSA-2025:8467 https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8467.htmlALSA-2025:8467ALSA-2025:8467 5(  :nodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm":nodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmL:nodejs-docs-22.16.0-1.module_el9.6.0+170+f035de78.noarch.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpma npm-10.9.2-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpm5:nodejs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm>cv8-12.4-devel-12.4.254.21-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpme:nodejs-full-i18n-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm5(  :nodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm":nodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmL:nodejs-docs-22.16.0-1.module_el9.6.0+170+f035de78.noarch.rpm{nodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpm nodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm nodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpma npm-10.9.2-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpm5:nodejs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm>cv8-12.4-devel-12.4.254.21-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpme:nodejs-full-i18n-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm†+  HVBuBBBBBBBsecurityImportant: nodejs:20 security updateD2https://access.redhat.com/errata/RHSA-2025:8468RHSA-2025:8468RHSA-2025:8468 https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8468.htmlALSA-2025:8468ALSA-2025:8468 5({fnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm Hnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmanpm-10.8.2-1.20.19.2.1.module_el9.6.0+169+c9cb05c2.x86_64.rpmLWnodejs-docs-20.19.2-1.module_el9.6.0+169+c9cb05c2.noarch.rpm5Wnodejs-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm Hnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm"Wnodejs-devel-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpmeWnodejs-full-i18n-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm5({fnodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm Hnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmanpm-10.8.2-1.20.19.2.1.module_el9.6.0+169+c9cb05c2.x86_64.rpmLWnodejs-docs-20.19.2-1.module_el9.6.0+169+c9cb05c2.noarch.rpm5Wnodejs-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm Hnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm"Wnodejs-devel-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpmeWnodejs-full-i18n-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm†  (\BBBBBBBBBBsecurityModerate: golang security updatev https://access.redhat.com/errata/RHSA-2025:8476RHSA-2025:8476RHSA-2025:8476 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8476.htmlALSA-2025:8476ALSA-2025:8476 pWgo-toolset-1.23.9-1.el9_6.x86_64.rpmKWgolang-race-1.23.9-1.el9_6.x86_64.rpm?Wgolang-1.23.9-1.el9_6.x86_64.rpmWgolang-misc-1.23.9-1.el9_6.noarch.rpm@Wgolang-bin-1.23.9-1.el9_6.x86_64.rpmWgolang-src-1.23.9-1.el9_6.noarch.rpmWgolang-tests-1.23.9-1.el9_6.noarch.rpmWgolang-docs-1.23.9-1.el9_6.noarch.rpmpWgo-toolset-1.23.9-1.el9_6.x86_64.rpmKWgolang-race-1.23.9-1.el9_6.x86_64.rpm?Wgolang-1.23.9-1.el9_6.x86_64.rpmWgolang-misc-1.23.9-1.el9_6.noarch.rpm@Wgolang-bin-1.23.9-1.el9_6.x86_64.rpmWgolang-src-1.23.9-1.el9_6.noarch.rpmWgolang-tests-1.23.9-1.el9_6.noarch.rpmWgolang-docs-1.23.9-1.el9_6.noarch.rpm†Y  +isecurityImportant: thunderbird security updatehttps://access.redhat.com/errata/RHSA-2025:8607RHSA-2025:8607RHSA-2025:8607 https://bugzilla.redhat.com/23670162367016https://bugzilla.redhat.com/23670182367018https://bugzilla.redhat.com/23687502368750https://bugzilla.redhat.com/23687512368751https://bugzilla.redhat.com/23687522368752https://bugzilla.redhat.com/23687552368755https://bugzilla.redhat.com/23687562368756https://bugzilla.redhat.com/23687572368757https://errata.almalinux.org/9/ALSA-2025-8607.htmlALSA-2025:8607ALSA-2025:8607 https://www.redhat.com/security/data/cve/CVE-2025-4918.htmlCVE-2025-4918CVE-2025-4918https://www.redhat.com/security/data/cve/CVE-2025-4919.htmlCVE-2025-4919CVE-2025-4919https://www.redhat.com/security/data/cve/CVE-2025-5263.htmlCVE-2025-5263CVE-2025-5263https://www.redhat.com/security/data/cve/CVE-2025-5264.htmlCVE-2025-5264CVE-2025-5264https://www.redhat.com/security/data/cve/CVE-2025-5266.htmlCVE-2025-5266CVE-2025-5266https://www.redhat.com/security/data/cve/CVE-2025-5267.htmlCVE-2025-5267CVE-2025-5267https://www.redhat.com/security/data/cve/CVE-2025-5268.htmlCVE-2025-5268CVE-2025-5268https://www.redhat.com/security/data/cve/CVE-2025-5269.htmlCVE-2025-5269CVE-2025-5269https://www.redhat.com/security/data/cve/CVE-2025-5283.htmlCVE-2025-5283CVE-2025-5283:thunderbird-128.11.0-1.el9_6.alma.1.x86_64.rpm:thunderbird-128.11.0-1.el9_6.alma.1.x86_64.rpmÔO .lsecurityImportant: perl-FCGI security updatehttps://access.redhat.com/errata/RHSA-2025:8635RHSA-2025:8635RHSA-2025:8635 https://access.redhat.com/security/cve/CVE-2025-40907CVE-2025-40907CVE-2025-40907https://bugzilla.redhat.com/23668472366847https://errata.almalinux.org/9/ALSA-2025-8635.htmlALSA-2025:8635ALSA-2025:8635 Ztperl-FCGI-0.79-8.1.el9_6.x86_64.rpmZtperl-FCGI-0.79-8.1.el9_6.x86_64.rpmÔm oBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643 https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643 TFpython3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm$Fkernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpmFkernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm&Fkernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm!Fkernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm"Fkernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm#Fkernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm'Frtla-5.14.0-570.21.1.el9_6.x86_64.rpm)Frv-5.14.0-570.21.1.el9_6.x86_64.rpm%Fperf-5.14.0-570.21.1.el9_6.x86_64.rpm TFpython3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm$Fkernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpmFkernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm&Fkernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm!Fkernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm"Fkernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm#Fkernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm'Frtla-5.14.0-570.21.1.el9_6.x86_64.rpm)Frv-5.14.0-570.21.1.el9_6.x86_64.rpm%Fperf-5.14.0-570.21.1.el9_6.x86_64.rpm«h CBBBBBBBBsecurityModerate: glibc security update Nhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655 https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655 T:glibc-headers-2.34-168.el9_6.19.x86_64.rpm :glibc-devel-2.34-168.el9_6.19.i686.rpmU:glibc-locale-source-2.34-168.el9_6.19.x86_64.rpmV:glibc-utils-2.34-168.el9_6.19.x86_64.rpm :glibc-devel-2.34-168.el9_6.19.x86_64.rpmJ:glibc-doc-2.34-168.el9_6.19.noarch.rpmT:glibc-headers-2.34-168.el9_6.19.x86_64.rpm :glibc-devel-2.34-168.el9_6.19.i686.rpmU:glibc-locale-source-2.34-168.el9_6.19.x86_64.rpmV:glibc-utils-2.34-168.el9_6.19.x86_64.rpm :glibc-devel-2.34-168.el9_6.19.x86_64.rpmJ:glibc-doc-2.34-168.el9_6.19.noarch.rpmŸ  NBBsecurityModerate: grafana security updateW7https://access.redhat.com/errata/RHSA-2025:8682RHSA-2025:8682RHSA-2025:8682 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8682.htmlALSA-2025:8682ALSA-2025:8682 !zgrafana-selinux-10.2.6-14.el9_6.x86_64.rpmqzgrafana-10.2.6-14.el9_6.x86_64.rpm!zgrafana-selinux-10.2.6-14.el9_6.x86_64.rpmqzgrafana-10.2.6-14.el9_6.x86_64.rpmÔD )SBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update8https://access.redhat.com/errata/RHSA-2025:8813RHSA-2025:8813RHSA-2025:8813 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8813.htmlALSA-2025:8813ALSA-2025:8813 >aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpmBdotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpmF(dotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm<aspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpmJ(dotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm-(dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpmDdotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm >aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm+aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm,dotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpmBdotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpmHdotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpmF(dotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm<aspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpmJ(dotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm@dotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm-(dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpmDdotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm°t jBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security updateF7https://access.redhat.com/errata/RHSA-2025:8817RHSA-2025:8817RHSA-2025:8817 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8817.htmlALSA-2025:8817ALSA-2025:8817 -#dotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm*#aspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm3)dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm5)dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm)netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm#dotnet-host-9.0.6-1.el9_6.x86_64.rpm.#dotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm0#dotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm+#aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm,#aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm/#dotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm1)dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm4#dotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm2)dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpm-#dotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm*#aspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm3)dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm5)dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm)netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm#dotnet-host-9.0.6-1.el9_6.x86_64.rpm.#dotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm0#dotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm+#aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm,#aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm/#dotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm1)dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm4#dotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm2)dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpmªE GBBsecurityImportant: mod_security security update}https://access.redhat.com/errata/RHSA-2025:8837RHSA-2025:8837RHSA-2025:8837 https://access.redhat.com/security/cve/CVE-2025-47947CVE-2025-47947CVE-2025-47947https://bugzilla.redhat.com/23679032367903https://errata.almalinux.org/9/ALSA-2025-8837.htmlALSA-2025:8837ALSA-2025:8837 I0mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpmH0mod_security-2.9.6-2.el9_6.x86_64.rpmI0mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpmH0mod_security-2.9.6-2.el9_6.x86_64.rpmª LsecurityModerate: grafana-pcp security updatehttps://access.redhat.com/errata/RHSA-2025:8916RHSA-2025:8916RHSA-2025:8916 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8916.htmlALSA-2025:8916ALSA-2025:8916 ~grafana-pcp-5.1.1-11.el9_6.x86_64.rpm~grafana-pcp-5.1.1-11.el9_6.x86_64.rpmÔ "OBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080 https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080 "Gkernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm#Gkernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm$Gkernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpmTGpython3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm&Gkernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm)Grv-5.14.0-570.22.1.el9_6.x86_64.rpm%Gperf-5.14.0-570.22.1.el9_6.x86_64.rpm!Gkernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm'Grtla-5.14.0-570.22.1.el9_6.x86_64.rpmGkernel-doc-5.14.0-570.22.1.el9_6.noarch.rpm "Gkernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm#Gkernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm$Gkernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpmTGpython3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm&Gkernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm)Grv-5.14.0-570.22.1.el9_6.x86_64.rpm%Gperf-5.14.0-570.22.1.el9_6.x86_64.rpm!Gkernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm'Grtla-5.14.0-570.22.1.el9_6.x86_64.rpmGkernel-doc-5.14.0-570.22.1.el9_6.noarch.rpmÔ& %csecurityModerate: git-lfs security update|https://access.redhat.com/errata/RHSA-2025:9106RHSA-2025:9106RHSA-2025:9106 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9106.htmlALSA-2025:9106ALSA-2025:9106 FZgit-lfs-3.6.1-2.el9_6.x86_64.rpmFZgit-lfs-3.6.1-2.el9_6.x86_64.rpmÔ~ )fBsecurityImportant: libvpx security update8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118 https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118 g=libvpx-1.9.0-9.el9_6.x86_64.rpmg=libvpx-1.9.0-9.el9_6.i686.rpmg=libvpx-1.9.0-9.el9_6.x86_64.rpmg=libvpx-1.9.0-9.el9_6.i686.rpmÔ@ ,jsecurityModerate: containernetworking-plugins security update7https://access.redhat.com/errata/RHSA-2025:9143RHSA-2025:9143RHSA-2025:9143 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9143.htmlALSA-2025:9143ALSA-2025:9143 a~containernetworking-plugins-1.6.2-2.el9_6.x86_64.rpma~containernetworking-plugins-1.6.2-2.el9_6.x86_64.rpmn 6mBBBBBBBsecurityModerate: podman security updateQhttps://access.redhat.com/errata/RHSA-2025:9144RHSA-2025:9144RHSA-2025:9144 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9144.htmlALSA-2025:9144ALSA-2025:9144 %Spodman-remote-5.4.0-10.el9_6.x86_64.rpm#Spodman-5.4.0-10.el9_6.x86_64.rpm$Spodman-plugins-5.4.0-10.el9_6.x86_64.rpm&Spodman-tests-5.4.0-10.el9_6.x86_64.rpmfSpodman-docker-5.4.0-10.el9_6.noarch.rpm%Spodman-remote-5.4.0-10.el9_6.x86_64.rpm#Spodman-5.4.0-10.el9_6.x86_64.rpm$Spodman-plugins-5.4.0-10.el9_6.x86_64.rpm&Spodman-tests-5.4.0-10.el9_6.x86_64.rpmfSpodman-docker-5.4.0-10.el9_6.noarch.rpm9 ;wBBsecurityModerate: skopeo security updateYahttps://access.redhat.com/errata/RHSA-2025:9145RHSA-2025:9145RHSA-2025:9145 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9145.htmlALSA-2025:9145ALSA-2025:9145 :<skopeo-1.18.1-2.el9_6.x86_64.rpm;<skopeo-tests-1.18.1-2.el9_6.x86_64.rpm:<skopeo-1.18.1-2.el9_6.x86_64.rpm;<skopeo-tests-1.18.1-2.el9_6.x86_64.rpmĿu |BBsecurityModerate: buildah security update:https://access.redhat.com/errata/RHSA-2025:9147RHSA-2025:9147RHSA-2025:9147 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9147.htmlALSA-2025:9147ALSA-2025:9147 8Ibuildah-tests-1.39.4-2.el9_6.x86_64.rpm7Ibuildah-1.39.4-2.el9_6.x86_64.rpm8Ibuildah-tests-1.39.4-2.el9_6.x86_64.rpm7Ibuildah-1.39.4-2.el9_6.x86_64.rpmľ^ ABBsecurityModerate: gvisor-tap-vsock security updateXhttps://access.redhat.com/errata/RHSA-2025:9150RHSA-2025:9150RHSA-2025:9150 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9150.htmlALSA-2025:9150ALSA-2025:9150 9bgvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpm|bgvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpm9bgvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpm|bgvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpmźu FBBBsecurityImportant: gimp security updatel.https://access.redhat.com/errata/RHSA-2025:9162RHSA-2025:9162RHSA-2025:9162 https://access.redhat.com/security/cve/CVE-2025-48797CVE-2025-48797CVE-2025-48797https://access.redhat.com/security/cve/CVE-2025-48798CVE-2025-48798CVE-2025-48798https://access.redhat.com/security/cve/CVE-2025-5473CVE-2025-5473CVE-2025-5473https://bugzilla.redhat.com/23685572368557https://bugzilla.redhat.com/23685582368558https://bugzilla.redhat.com/23708672370867https://errata.almalinux.org/9/ALSA-2025-9162.htmlALSA-2025:9162ALSA-2025:9162 @gimp-2.99.8-4.el9_6.2.x86_64.rpmogimp-libs-2.99.8-4.el9_6.2.x86_64.rpmogimp-libs-2.99.8-4.el9_6.2.i686.rpm@gimp-2.99.8-4.el9_6.2.x86_64.rpmogimp-libs-2.99.8-4.el9_6.2.x86_64.rpmogimp-libs-2.99.8-4.el9_6.2.i686.rpmÊh $LBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security updateghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184 https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184 :|ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm|python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm|ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm|python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm|ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm|ipa-common-4.12.2-14.el9_6.1.noarch.rpm |ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm|ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm |ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm|ipa-selinux-4.12.2-14.el9_6.1.noarch.rpm|ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm|python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm;|ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpm|ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm|ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm|ipa-client-4.12.2-14.el9_6.1.x86_64.rpm |ipa-server-4.12.2-14.el9_6.1.x86_64.rpm:|ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm|python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm|ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm|python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm|ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm|ipa-common-4.12.2-14.el9_6.1.noarch.rpm |ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm|ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm |ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm|ipa-selinux-4.12.2-14.el9_6.1.noarch.rpm|ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm|python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm;|ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpm|ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm|ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm|ipa-client-4.12.2-14.el9_6.1.x86_64.rpm |ipa-server-4.12.2-14.el9_6.1.x86_64.rpmÊ_  8eBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302 "Hkernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm&Hkernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm#Hkernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpmTHpython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm)Hrv-5.14.0-570.23.1.el9_6.x86_64.rpm%Hperf-5.14.0-570.23.1.el9_6.x86_64.rpm$Hkernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpmHkernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm!Hkernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm'Hrtla-5.14.0-570.23.1.el9_6.x86_64.rpm "Hkernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm&Hkernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm#Hkernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpmTHpython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm)Hrv-5.14.0-570.23.1.el9_6.x86_64.rpm%Hperf-5.14.0-570.23.1.el9_6.x86_64.rpm$Hkernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpmHkernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm!Hkernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm'Hrtla-5.14.0-570.23.1.el9_6.x86_64.rpmÙD! yBBBBBBBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security updatez https://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303 kBxorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpmfnxorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpmjnxorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpmlnxorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpmgnxorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpmhnxorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpminxorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpmkBxorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpmfnxorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpmjnxorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpmlnxorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpmgnxorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpmhnxorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpminxorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpmÊ" HBBBBBBBBBsecurityImportant: tigervnc security updateu https://access.redhat.com/errata/RHSA-2025:9306RHSA-2025:9306RHSA-2025:9306 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9306.htmlALSA-2025:9306ALSA-2025:9306 'Ztigervnc-selinux-1.14.1-8.el9_6.noarch.rpm%Ztigervnc-icons-1.14.1-8.el9_6.noarch.rpmOZtigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpmPZtigervnc-server-module-1.14.1-8.el9_6.x86_64.rpmNZtigervnc-server-1.14.1-8.el9_6.x86_64.rpmMZtigervnc-1.14.1-8.el9_6.x86_64.rpm&Ztigervnc-license-1.14.1-8.el9_6.noarch.rpm'Ztigervnc-selinux-1.14.1-8.el9_6.noarch.rpm%Ztigervnc-icons-1.14.1-8.el9_6.noarch.rpmOZtigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpmPZtigervnc-server-module-1.14.1-8.el9_6.x86_64.rpmNZtigervnc-server-1.14.1-8.el9_6.x86_64.rpmMZtigervnc-1.14.1-8.el9_6.x86_64.rpm&Ztigervnc-license-1.14.1-8.el9_6.noarch.rpmÙ# TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update (https://access.redhat.com/errata/RHSA-2025:9327RHSA-2025:9327RHSA-2025:9327 https://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-9327.htmlALSA-2025:9327ALSA-2025:9327 !.+libblockdev-fs-2.28-14.el9_6.x86_64.rpm7+libblockdev-part-2.28-14.el9_6.i686.rpm/+libblockdev-kbd-2.28-14.el9_6.i686.rpmb+libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm0+libblockdev-loop-2.28-14.el9_6.i686.rpm0+libblockdev-loop-2.28-14.el9_6.x86_64.rpm++libblockdev-2.28-14.el9_6.i686.rpm6+libblockdev-nvme-2.28-14.el9_6.i686.rpm8+libblockdev-swap-2.28-14.el9_6.i686.rpm6+libblockdev-nvme-2.28-14.el9_6.x86_64.rpmv+python3-blockdev-2.28-14.el9_6.x86_64.rpm9+libblockdev-utils-2.28-14.el9_6.i686.rpm8+libblockdev-swap-2.28-14.el9_6.x86_64.rpm9+libblockdev-utils-2.28-14.el9_6.x86_64.rpm-+libblockdev-dm-2.28-14.el9_6.i686.rpm4+libblockdev-mpath-2.28-14.el9_6.x86_64.rpm.+libblockdev-fs-2.28-14.el9_6.i686.rpm,+libblockdev-crypto-2.28-14.el9_6.i686.rpm4+libblockdev-mpath-2.28-14.el9_6.i686.rpm1+libblockdev-lvm-2.28-14.el9_6.i686.rpm1+libblockdev-lvm-2.28-14.el9_6.x86_64.rpm/+libblockdev-kbd-2.28-14.el9_6.x86_64.rpm-+libblockdev-dm-2.28-14.el9_6.x86_64.rpm7+libblockdev-part-2.28-14.el9_6.x86_64.rpm++libblockdev-2.28-14.el9_6.x86_64.rpm,+libblockdev-crypto-2.28-14.el9_6.x86_64.rpm5+libblockdev-nvdimm-2.28-14.el9_6.i686.rpm2+libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpmc+libblockdev-tools-2.28-14.el9_6.x86_64.rpm5+libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm3+libblockdev-mdraid-2.28-14.el9_6.i686.rpm3+libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm2+libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm!.+libblockdev-fs-2.28-14.el9_6.x86_64.rpm7+libblockdev-part-2.28-14.el9_6.i686.rpm/+libblockdev-kbd-2.28-14.el9_6.i686.rpmb+libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm0+libblockdev-loop-2.28-14.el9_6.i686.rpm0+libblockdev-loop-2.28-14.el9_6.x86_64.rpm++libblockdev-2.28-14.el9_6.i686.rpm6+libblockdev-nvme-2.28-14.el9_6.i686.rpm8+libblockdev-swap-2.28-14.el9_6.i686.rpm6+libblockdev-nvme-2.28-14.el9_6.x86_64.rpmv+python3-blockdev-2.28-14.el9_6.x86_64.rpm9+libblockdev-utils-2.28-14.el9_6.i686.rpm8+libblockdev-swap-2.28-14.el9_6.x86_64.rpm9+libblockdev-utils-2.28-14.el9_6.x86_64.rpm-+libblockdev-dm-2.28-14.el9_6.i686.rpm4+libblockdev-mpath-2.28-14.el9_6.x86_64.rpm.+libblockdev-fs-2.28-14.el9_6.i686.rpm,+libblockdev-crypto-2.28-14.el9_6.i686.rpm4+libblockdev-mpath-2.28-14.el9_6.i686.rpm1+libblockdev-lvm-2.28-14.el9_6.i686.rpm1+libblockdev-lvm-2.28-14.el9_6.x86_64.rpm/+libblockdev-kbd-2.28-14.el9_6.x86_64.rpm-+libblockdev-dm-2.28-14.el9_6.x86_64.rpm7+libblockdev-part-2.28-14.el9_6.x86_64.rpm++libblockdev-2.28-14.el9_6.x86_64.rpm,+libblockdev-crypto-2.28-14.el9_6.x86_64.rpm5+libblockdev-nvdimm-2.28-14.el9_6.i686.rpm2+libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpmc+libblockdev-tools-2.28-14.el9_6.x86_64.rpm5+libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm3+libblockdev-mdraid-2.28-14.el9_6.i686.rpm3+libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm2+libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpmÙE$ HsecurityImportant: mod_auth_openidc security update2 https://access.redhat.com/errata/RHSA-2025:9396RHSA-2025:9396RHSA-2025:9396 https://access.redhat.com/security/cve/CVE-2025-3891CVE-2025-3891CVE-2025-3891https://bugzilla.redhat.com/23616332361633https://errata.almalinux.org/9/ALSA-2025-9396.htmlALSA-2025:9396ALSA-2025:9396 T+mod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpmT+mod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpmØb% KBsecurityModerate: krb5 security update?https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430 https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430 >1krb5-devel-1.21.1-8.el9_6.x86_64.rpm>1krb5-devel-1.21.1-8.el9_6.i686.rpm>1krb5-devel-1.21.1-8.el9_6.x86_64.rpm>1krb5-devel-1.21.1-8.el9_6.i686.rpmÊK& OBBBsecurityModerate: libarchive security updateWRhttps://access.redhat.com/errata/RHSA-2025:9431RHSA-2025:9431RHSA-2025:9431 https://access.redhat.com/security/cve/CVE-2025-25724CVE-2025-25724CVE-2025-25724https://bugzilla.redhat.com/23492212349221https://errata.almalinux.org/9/ALSA-2025-9431.htmlALSA-2025:9431ALSA-2025:9431 j libarchive-devel-3.5.3-5.el9_6.x86_64.rpmM bsdtar-3.5.3-5.el9_6.x86_64.rpmj libarchive-devel-3.5.3-5.el9_6.i686.rpmj libarchive-devel-3.5.3-5.el9_6.x86_64.rpmM bsdtar-3.5.3-5.el9_6.x86_64.rpmj libarchive-devel-3.5.3-5.el9_6.i686.rpmÊA' UsecurityModerate: iputils security update)https://access.redhat.com/errata/RHSA-2025:9432RHSA-2025:9432RHSA-2025:9432 https://access.redhat.com/security/cve/CVE-2025-47268CVE-2025-47268CVE-2025-47268https://bugzilla.redhat.com/23640902364090https://errata.almalinux.org/9/ALSA-2025-9432.htmlALSA-2025:9432ALSA-2025:9432 S:iputils-ninfod-20210202-11.el9_6.1.x86_64.rpmS:iputils-ninfod-20210202-11.el9_6.1.x86_64.rpmÊH( XsecurityModerate: mod_proxy_cluster security update;https://access.redhat.com/errata/RHSA-2025:9434RHSA-2025:9434RHSA-2025:9434 https://access.redhat.com/security/cve/CVE-2024-10306CVE-2024-10306CVE-2024-10306https://bugzilla.redhat.com/23213022321302https://errata.almalinux.org/9/ALSA-2025-9434.htmlALSA-2025:9434ALSA-2025:9434 n<mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpmn<mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpmÊd) $[BBBBBBBsecurityModerate: emacs security updateW`https://access.redhat.com/errata/RHSA-2025:9448RHSA-2025:9448RHSA-2025:9448 https://access.redhat.com/security/cve/CVE-2024-53920CVE-2024-53920CVE-2024-53920https://bugzilla.redhat.com/23291612329161https://errata.almalinux.org/9/ALSA-2025-9448.htmlALSA-2025:9448ALSA-2025:9448 @emacs-lucid-27.2-14.el9_6.2.x86_64.rpm@emacs-filesystem-27.2-14.el9_6.2.noarch.rpm@emacs-common-27.2-14.el9_6.2.x86_64.rpm@emacs-nox-27.2-14.el9_6.2.x86_64.rpm@emacs-27.2-14.el9_6.2.x86_64.rpm@emacs-lucid-27.2-14.el9_6.2.x86_64.rpm@emacs-filesystem-27.2-14.el9_6.2.noarch.rpm@emacs-common-27.2-14.el9_6.2.x86_64.rpm@emacs-nox-27.2-14.el9_6.2.x86_64.rpm@emacs-27.2-14.el9_6.2.x86_64.rpmÊ* >eBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5-qtbase security update7.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462 https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462 qxqt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpmpxqt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpmkxqt5-qtbase-5.15.9-11.el9_6.x86_64.rpmrxqt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpmlxqt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpmrxqt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpmkxqt5-qtbase-5.15.9-11.el9_6.i686.rpmoxqt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpmlxqt5-qtbase-devel-5.15.9-11.el9_6.i686.rpmnxqt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpmpxqt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpmmxqt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpmnxqt5-qtbase-gui-5.15.9-11.el9_6.i686.rpmqxqt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpmmxqt5-qtbase-examples-5.15.9-11.el9_6.i686.rpmoxqt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpmTxqt5-qtbase-common-5.15.9-11.el9_6.noarch.rpmqxqt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpmpxqt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpmkxqt5-qtbase-5.15.9-11.el9_6.x86_64.rpmrxqt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpmlxqt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpmrxqt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpmkxqt5-qtbase-5.15.9-11.el9_6.i686.rpmoxqt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpmlxqt5-qtbase-devel-5.15.9-11.el9_6.i686.rpmnxqt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpmpxqt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpmmxqt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpmnxqt5-qtbase-gui-5.15.9-11.el9_6.i686.rpmqxqt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpmmxqt5-qtbase-examples-5.15.9-11.el9_6.i686.rpmoxqt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpmTxqt5-qtbase-common-5.15.9-11.el9_6.noarch.rpmÊ+ BBBsecurityImportant: pam security updatee0https://access.redhat.com/errata/RHSA-2025:9526RHSA-2025:9526RHSA-2025:9526 https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://bugzilla.redhat.com/23725122372512https://errata.almalinux.org/9/ALSA-2025-9526.htmlALSA-2025:9526ALSA-2025:9526 4fpam-devel-1.5.1-25.el9_6.x86_64.rpmMfpam-docs-1.5.1-25.el9_6.x86_64.rpm4fpam-devel-1.5.1-25.el9_6.i686.rpm4fpam-devel-1.5.1-25.el9_6.x86_64.rpmMfpam-docs-1.5.1-25.el9_6.x86_64.rpm4fpam-devel-1.5.1-25.el9_6.i686.rpm', EBBBBsecurityModerate: osbuild-composer security updateWhttps://access.redhat.com/errata/RHSA-2025:9634RHSA-2025:9634RHSA-2025:9634 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9634.htmlALSA-2025:9634ALSA-2025:9634 1osbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpm3osbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpm2osbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpm1osbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpm3osbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpm2osbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpmÊ2- LsecurityModerate: weldr-client security updatelyhttps://access.redhat.com/errata/RHSA-2025:9635RHSA-2025:9635RHSA-2025:9635 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9635.htmlALSA-2025:9635ALSA-2025:9635 ]weldr-client-35.12-4.el9_6.x86_64.rpm]weldr-client-35.12-4.el9_6.x86_64.rpmÊJ. OBBBBBBBBsecurityModerate: glibc security updatee2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877 V;glibc-utils-2.34-168.el9_6.20.x86_64.rpmJ;glibc-doc-2.34-168.el9_6.20.noarch.rpm ;glibc-devel-2.34-168.el9_6.20.x86_64.rpm ;glibc-devel-2.34-168.el9_6.20.i686.rpmT;glibc-headers-2.34-168.el9_6.20.x86_64.rpmU;glibc-locale-source-2.34-168.el9_6.20.x86_64.rpmV;glibc-utils-2.34-168.el9_6.20.x86_64.rpmJ;glibc-doc-2.34-168.el9_6.20.noarch.rpm ;glibc-devel-2.34-168.el9_6.20.x86_64.rpm ;glibc-devel-2.34-168.el9_6.20.i686.rpmT;glibc-headers-2.34-168.el9_6.20.x86_64.rpmU;glibc-locale-source-2.34-168.el9_6.20.x86_64.rpmÊl/ -ZBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 &Ikernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm#Ikernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpmIkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm$Ikernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm!Ikernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm)Irv-5.14.0-570.24.1.el9_6.x86_64.rpm"Ikernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpmTIpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm%Iperf-5.14.0-570.24.1.el9_6.x86_64.rpm'Irtla-5.14.0-570.24.1.el9_6.x86_64.rpm &Ikernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm#Ikernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpmIkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm$Ikernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm!Ikernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm)Irv-5.14.0-570.24.1.el9_6.x86_64.rpm"Ikernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpmTIpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm%Iperf-5.14.0-570.24.1.el9_6.x86_64.rpm'Irtla-5.14.0-570.24.1.el9_6.x86_64.rpmÓ 0 0nsecurityImportant: sudo security update shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978 https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978 Hsudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpmHsudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpmÐz1 ;qBBBBBBBBsecurityModerate: open-vm-tools security updatexhttps://access.redhat.com/security/cve/CVE-2025-22247CVE-2025-22247CVE-2025-22247https://bugzilla.redhat.com/23642612364261https://errata.almalinux.org/9/ALSA-2025-A002.htmlALSA-2025:A002ALSA-2025:A002 ,open-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpm-open-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpm.open-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpm/open-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpmaopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpm,open-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpm-open-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpm.open-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpm/open-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpmaopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpmԨ^2 /|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update Ihttps://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-A005.htmlALSA-2025:A005ALSA-2025:A005 !.*libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpm/*libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpm-*libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpm1*libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpm5*libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpm6*libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpm,*libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpm+*libblockdev-2.28-13.el9_6.alma.1.x86_64.rpm2*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpm-*libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpm5*libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpmv*python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpm7*libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpm/*libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpm3*libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpm0*libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpm9*libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpm2*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpm8*libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpm.*libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpm0*libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpm+*libblockdev-2.28-13.el9_6.alma.1.i686.rpmb*libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpm1*libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpm4*libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpm6*libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpm4*libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpm,*libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpmc*libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpm8*libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpm7*libblockdev-part-2.28-13.el9_6.alma.1.i686.rpm3*libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpm9*libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm!.*libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpm/*libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpm-*libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpm1*libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpm5*libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpm6*libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpm,*libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpm+*libblockdev-2.28-13.el9_6.alma.1.x86_64.rpm2*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpm-*libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpm5*libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpmv*python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpm7*libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpm/*libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpm3*libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpm0*libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpm9*libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpm2*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpm8*libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpm.*libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpm0*libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpm+*libblockdev-2.28-13.el9_6.alma.1.i686.rpmb*libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpm1*libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpm4*libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpm6*libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpm4*libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpm,*libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpmc*libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpm8*libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpm7*libblockdev-part-2.28-13.el9_6.alma.1.i686.rpm3*libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpm9*libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm&3 9pBBBBBBBsecurityModerate: gcc-toolset-14-binutils security update\Tehttps://access.redhat.com/errata/RHSA-2026:0052RHSA-2026:0052RHSA-2026:0052 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-0052.htmlALSA-2026:0052ALSA-2026:0052 aEgcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpmcEgcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpmbEgcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm+Egcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm+Egcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpmaEgcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpmcEgcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpmbEgcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm+Egcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm+Egcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm4 zBBBBBBBBBBBBsecurityModerate: poppler security update\9xhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126 https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126 i~poppler-glib-21.01.0-23.el9_7.x86_64.rpmg~poppler-21.01.0-23.el9_7.i686.rpmg~poppler-21.01.0-23.el9_7.x86_64.rpmi~poppler-glib-21.01.0-23.el9_7.i686.rpmj~poppler-qt5-21.01.0-23.el9_7.i686.rpmh~poppler-cpp-21.01.0-23.el9_7.x86_64.rpmj~poppler-qt5-21.01.0-23.el9_7.x86_64.rpm:~poppler-utils-21.01.0-23.el9_7.x86_64.rpmh~poppler-cpp-21.01.0-23.el9_7.i686.rpm i~poppler-glib-21.01.0-23.el9_7.x86_64.rpmg~poppler-21.01.0-23.el9_7.i686.rpmg~poppler-21.01.0-23.el9_7.x86_64.rpmi~poppler-glib-21.01.0-23.el9_7.i686.rpmj~poppler-qt5-21.01.0-23.el9_7.i686.rpmh~poppler-cpp-21.01.0-23.el9_7.x86_64.rpmj~poppler-qt5-21.01.0-23.el9_7.x86_64.rpm:~poppler-utils-21.01.0-23.el9_7.x86_64.rpmh~poppler-cpp-21.01.0-23.el9_7.i686.rpmp5 IBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb security update\18https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137 https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137 '3mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm)3mariadb-server-10.5.29-3.el9_7.x86_64.rpm&3mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm"3mariadb-backup-10.5.29-3.el9_7.x86_64.rpm(3mariadb-pam-10.5.29-3.el9_7.x86_64.rpm+3mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm*3mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm%3mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm$3mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm.3mariadb-10.5.29-3.el9_7.x86_64.rpm#3mariadb-common-10.5.29-3.el9_7.x86_64.rpm '3mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm)3mariadb-server-10.5.29-3.el9_7.x86_64.rpm&3mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm"3mariadb-backup-10.5.29-3.el9_7.x86_64.rpm(3mariadb-pam-10.5.29-3.el9_7.x86_64.rpm+3mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm*3mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm%3mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm$3mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm.3mariadb-10.5.29-3.el9_7.x86_64.rpm#3mariadb-common-10.5.29-3.el9_7.x86_64.rpm6 #`BsecurityImportant: libpng security update\ihttps://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238 Odlibpng-devel-1.6.37-12.el9_7.1.i686.rpmOdlibpng-devel-1.6.37-12.el9_7.1.x86_64.rpmOdlibpng-devel-1.6.37-12.el9_7.1.i686.rpmOdlibpng-devel-1.6.37-12.el9_7.1.x86_64.rpmU7 [BIBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb:10.11 security update\{https://access.redhat.com/errata/RHSA-2026:0247RHSA-2026:0247RHSA-2026:0247 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2023-52971CVE-2023-52971CVE-2023-52971https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509172350917https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0247.htmlALSA-2026:0247ALSA-2026:0247 .K,('mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm#mariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm&mariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm"mariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm+mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm)mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm7galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm(mariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm.mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm%mariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm$mariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm*mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm.K,('mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm#mariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm&mariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm"mariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm+mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm)mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm7galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm(mariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm.mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm%mariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm$mariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm*mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm˓78 ABBBBBBBBBBBBsecurityModerate: cups security update\https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312 https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312 J#cups-client-2.3.3op2-34.el9_7.2.x86_64.rpmK#cups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpm#cups-devel-2.3.3op2-34.el9_7.2.x86_64.rpm9#cups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpmI#cups-2.3.3op2-34.el9_7.2.x86_64.rpm#cups-devel-2.3.3op2-34.el9_7.2.i686.rpmL#cups-lpd-2.3.3op2-34.el9_7.2.x86_64.rpmM#cups-printerapp-2.3.3op2-34.el9_7.2.x86_64.rpmJ#cups-client-2.3.3op2-34.el9_7.2.x86_64.rpmK#cups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpm#cups-devel-2.3.3op2-34.el9_7.2.x86_64.rpm9#cups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpmI#cups-2.3.3op2-34.el9_7.2.x86_64.rpm#cups-devel-2.3.3op2-34.el9_7.2.i686.rpmL#cups-lpd-2.3.3op2-34.el9_7.2.x86_64.rpmM#cups-printerapp-2.3.3op2-34.el9_7.2.x86_64.rpm˩u9 PBBBBsecurityImportant: libsoup security update\$https://access.redhat.com/errata/RHSA-2026:0422RHSA-2026:0422RHSA-2026:0422 https://access.redhat.com/security/cve/CVE-2025-14523CVE-2025-14523CVE-2025-14523https://bugzilla.redhat.com/24213492421349https://errata.almalinux.org/9/ALSA-2026-0422.htmlALSA-2026:0422ALSA-2026:0422 libsoup-devel-2.72.0-12.el9_7.3.i686.rpmlibsoup-2.72.0-12.el9_7.3.i686.rpmlibsoup-2.72.0-12.el9_7.3.x86_64.rpmlibsoup-devel-2.72.0-12.el9_7.3.x86_64.rpmlibsoup-devel-2.72.0-12.el9_7.3.i686.rpmlibsoup-2.72.0-12.el9_7.3.i686.rpmlibsoup-2.72.0-12.el9_7.3.x86_64.rpmlibsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm˩l: WBBsecurityImportant: buildah security update\'6https://access.redhat.com/errata/RHSA-2026:0437RHSA-2026:0437RHSA-2026:0437 https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0437.htmlALSA-2026:0437ALSA-2026:0437 7Kbuildah-1.41.8-1.el9_7.x86_64.rpm8Kbuildah-tests-1.41.8-1.el9_7.x86_64.rpm7Kbuildah-1.41.8-1.el9_7.x86_64.rpm8Kbuildah-tests-1.41.8-1.el9_7.x86_64.rpm˩v; /\BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update\]0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445 T`python3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm`kernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm"`kernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm#`kernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm'`rtla-5.14.0-611.20.1.el9_7.x86_64.rpm!`kernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)`rv-5.14.0-611.20.1.el9_7.x86_64.rpm%`perf-5.14.0-611.20.1.el9_7.x86_64.rpm&`kernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm$`kernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm T`python3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm`kernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm"`kernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm#`kernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm'`rtla-5.14.0-611.20.1.el9_7.x86_64.rpm!`kernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)`rv-5.14.0-611.20.1.el9_7.x86_64.rpm%`perf-5.14.0-611.20.1.el9_7.x86_64.rpm&`kernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm$`kernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm˩S< 6pBBBBsecurityModerate: libpq security update\ (https://access.redhat.com/errata/RHSA-2026:0458RHSA-2026:0458RHSA-2026:0458 https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0458.htmlALSA-2026:0458ALSA-2026:0458 f!libpq-devel-13.23-1.el9_7.x86_64.rpme!libpq-13.23-1.el9_7.i686.rpme!libpq-13.23-1.el9_7.x86_64.rpmf!libpq-devel-13.23-1.el9_7.i686.rpmf!libpq-devel-13.23-1.el9_7.x86_64.rpme!libpq-13.23-1.el9_7.i686.rpme!libpq-13.23-1.el9_7.x86_64.rpmf!libpq-devel-13.23-1.el9_7.i686.rpm˩= wBBBBBBBsecurityImportant: podman security update\5 https://access.redhat.com/errata/RHSA-2026:0470RHSA-2026:0470RHSA-2026:0470 https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0470.htmlALSA-2026:0470ALSA-2026:0470 &Vpodman-tests-5.6.0-11.el9_7.x86_64.rpm%Vpodman-remote-5.6.0-11.el9_7.x86_64.rpm#Vpodman-5.6.0-11.el9_7.x86_64.rpm$Vpodman-plugins-5.6.0-11.el9_7.x86_64.rpmfVpodman-docker-5.6.0-11.el9_7.noarch.rpm&Vpodman-tests-5.6.0-11.el9_7.x86_64.rpm%Vpodman-remote-5.6.0-11.el9_7.x86_64.rpm#Vpodman-5.6.0-11.el9_7.x86_64.rpm$Vpodman-plugins-5.6.0-11.el9_7.x86_64.rpmfVpodman-docker-5.6.0-11.el9_7.noarch.rpm˩F> ABBBBBBBBBBBBBBsecurityModerate: postgresql security update\U[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491 `!postgresql-13.23-1.el9_7.x86_64.rpm)!postgresql-plpython3-13.23-1.el9_7.x86_64.rpm*!postgresql-pltcl-13.23-1.el9_7.x86_64.rpm+!postgresql-private-libs-13.23-1.el9_7.x86_64.rpm'!postgresql-contrib-13.23-1.el9_7.x86_64.rpm-!postgresql-upgrade-13.23-1.el9_7.x86_64.rpm(!postgresql-plperl-13.23-1.el9_7.x86_64.rpm,!postgresql-server-13.23-1.el9_7.x86_64.rpm`!postgresql-13.23-1.el9_7.x86_64.rpm)!postgresql-plpython3-13.23-1.el9_7.x86_64.rpm*!postgresql-pltcl-13.23-1.el9_7.x86_64.rpm+!postgresql-private-libs-13.23-1.el9_7.x86_64.rpm'!postgresql-contrib-13.23-1.el9_7.x86_64.rpm-!postgresql-upgrade-13.23-1.el9_7.x86_64.rpm(!postgresql-plperl-13.23-1.el9_7.x86_64.rpm,!postgresql-server-13.23-1.el9_7.x86_64.rpm˩V? /pBBBnBrBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security update\0[https://access.redhat.com/errata/RHSA-2026:0492RHSA-2026:0492RHSA-2026:0492 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0492.htmlALSA-2026:0492ALSA-2026:0492 ` +(npostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm`npostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmnpostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm*npostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmknpostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpm(npostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm,npostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm)npostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm'npostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm-npostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm+npostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm` +(npostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm`npostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm opgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmnpostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm*npostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmknpostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpm(npostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm ppostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm,npostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm)npostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm'npostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm-npostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm+npostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm˸@ tBBBfBBBRBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:16 security update\ [https://access.redhat.com/errata/RHSA-2026:0493RHSA-2026:0493RHSA-2026:0493 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0493.htmlALSA-2026:0493ALSA-2026:0493 ` .(} postgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm postgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm9~pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpmtpostgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm,tpostgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm-tpostgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm| postgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmtpostgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm~ postgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm(tpostgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm+tpostgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmktpostgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpm*tpostgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm)tpostgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm'tpostgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm{ postgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm`tpostgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm` .(} postgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm postgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm9~pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpmtpostgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm,tpostgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm-tpostgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm| postgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmtpostgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm~ postgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm(tpostgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm+tpostgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmktpostgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpm*tpostgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm)tpostgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm'tpostgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm{ postgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm`tpostgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm˷2A XsecurityModerate: vsftpd security update\f@https://access.redhat.com/errata/RHSA-2026:0605RHSA-2026:0605RHSA-2026:0605 https://access.redhat.com/security/cve/CVE-2025-14242CVE-2025-14242CVE-2025-14242https://bugzilla.redhat.com/24198262419826https://errata.almalinux.org/9/ALSA-2026-0605.htmlALSA-2026:0605ALSA-2026:0605 ALvsftpd-3.0.5-6.el9_7.2.x86_64.rpmALvsftpd-3.0.5-6.el9_7.2.x86_64.rpm˩gB [BBsecurityImportant: firefox security update\&yhttps://access.redhat.com/errata/RHSA-2026:0694RHSA-2026:0694RHSA-2026:0694 https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0694.htmlALSA-2026:0694ALSA-2026:0694 O firefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm9 firefox-140.7.0-1.el9_7.alma.1.x86_64.rpmO firefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm9 firefox-140.7.0-1.el9_7.alma.1.x86_64.rpm˩^C 1`BBBBBBBBBBBBBBBsecurityImportant: net-snmp security update\9https://access.redhat.com/errata/RHSA-2026:0696RHSA-2026:0696RHSA-2026:0696 https://access.redhat.com/security/cve/CVE-2025-68615CVE-2025-68615CVE-2025-68615https://bugzilla.redhat.com/24246182424618https://errata.almalinux.org/9/ALSA-2026-0696.htmlALSA-2026:0696ALSA-2026:0696 spython3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpmlsnet-snmp-libs-5.9.1-17.el9_7.1.i686.rpmjsnet-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpmjsnet-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpmsnet-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpmlsnet-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpmksnet-snmp-devel-5.9.1-17.el9_7.1.i686.rpmksnet-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm snet-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpmsnet-snmp-5.9.1-17.el9_7.1.x86_64.rpm spython3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpmlsnet-snmp-libs-5.9.1-17.el9_7.1.i686.rpmjsnet-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpmjsnet-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpmsnet-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpmlsnet-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpmksnet-snmp-devel-5.9.1-17.el9_7.1.i686.rpmksnet-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm snet-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpmsnet-snmp-5.9.1-17.el9_7.1.x86_64.rpmD 4rsecurityImportant: gnupg2 security update\Xbhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719 https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719 J(gnupg2-smime-2.3.3-5.el9_7.x86_64.rpmJ(gnupg2-smime-2.3.3-5.el9_7.x86_64.rpm˧iE 9uBBsecurityImportant: gpsd-minimal security update\:%https://access.redhat.com/errata/RHSA-2026:0771RHSA-2026:0771RHSA-2026:0771 https://access.redhat.com/security/cve/CVE-2025-67268CVE-2025-67268CVE-2025-67268https://access.redhat.com/security/cve/CVE-2025-67269CVE-2025-67269CVE-2025-67269https://bugzilla.redhat.com/24268102426810https://bugzilla.redhat.com/24268352426835https://errata.almalinux.org/9/ALSA-2026-0771.htmlALSA-2026:0771ALSA-2026:0771 w*gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpmx*gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpmw*gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpmx*gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm˽]F zBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update\_+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793 "akernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpmakernel-doc-5.14.0-611.24.1.el9_7.noarch.rpmTapython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm&akernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm%aperf-5.14.0-611.24.1.el9_7.x86_64.rpm!akernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm$akernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm#akernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm'artla-5.14.0-611.24.1.el9_7.x86_64.rpm)arv-5.14.0-611.24.1.el9_7.x86_64.rpm "akernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpmakernel-doc-5.14.0-611.24.1.el9_7.noarch.rpmTapython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm&akernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm%aperf-5.14.0-611.24.1.el9_7.x86_64.rpm!akernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm$akernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm#akernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm'artla-5.14.0-611.24.1.el9_7.x86_64.rpm)arv-5.14.0-611.24.1.el9_7.x86_64.rpmG NBBBsecurityImportant: gimp security update\ n https://access.redhat.com/errata/RHSA-2026:0914RHSA-2026:0914RHSA-2026:0914 https://access.redhat.com/security/cve/CVE-2025-14422CVE-2025-14422CVE-2025-14422https://access.redhat.com/security/cve/CVE-2025-14423CVE-2025-14423CVE-2025-14423https://access.redhat.com/security/cve/CVE-2025-14424CVE-2025-14424CVE-2025-14424https://access.redhat.com/security/cve/CVE-2025-14425CVE-2025-14425CVE-2025-14425https://bugzilla.redhat.com/24247662424766https://bugzilla.redhat.com/24247672424767https://bugzilla.redhat.com/24247742424774https://bugzilla.redhat.com/24247822424782https://errata.almalinux.org/9/ALSA-2026-0914.htmlALSA-2026:0914ALSA-2026:0914 ogimp-libs-3.0.4-1.el9_7.2.i686.rpmogimp-libs-3.0.4-1.el9_7.2.x86_64.rpm@gimp-3.0.4-1.el9_7.2.x86_64.rpmogimp-libs-3.0.4-1.el9_7.2.i686.rpmogimp-libs-3.0.4-1.el9_7.2.x86_64.rpm@gimp-3.0.4-1.el9_7.2.x86_64.rpm&H TBBBBBBBBBBsecurityImportant: golang security update\xhttps://access.redhat.com/errata/RHSA-2026:0923RHSA-2026:0923RHSA-2026:0923 https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-0923.htmlALSA-2026:0923ALSA-2026:0923 [golang-docs-1.25.5-2.el9_7.noarch.rpm?[golang-1.25.5-2.el9_7.x86_64.rpm[golang-misc-1.25.5-2.el9_7.noarch.rpm[golang-tests-1.25.5-2.el9_7.noarch.rpmp[go-toolset-1.25.5-2.el9_7.x86_64.rpmK[golang-race-1.25.5-2.el9_7.x86_64.rpm[golang-src-1.25.5-2.el9_7.noarch.rpm@[golang-bin-1.25.5-2.el9_7.x86_64.rpm[golang-docs-1.25.5-2.el9_7.noarch.rpm?[golang-1.25.5-2.el9_7.x86_64.rpm[golang-misc-1.25.5-2.el9_7.noarch.rpm[golang-tests-1.25.5-2.el9_7.noarch.rpmp[go-toolset-1.25.5-2.el9_7.x86_64.rpmK[golang-race-1.25.5-2.el9_7.x86_64.rpm[golang-src-1.25.5-2.el9_7.noarch.rpm@[golang-bin-1.25.5-2.el9_7.x86_64.rpmrI #asecurityImportant: thunderbird security update\ Hhttps://access.redhat.com/errata/RHSA-2026:0924RHSA-2026:0924RHSA-2026:0924 https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0924.htmlALSA-2026:0924ALSA-2026:0924 : thunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm: thunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm J 6dBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update\Tdhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927  java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm  java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm0K wBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update\8)https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928 ~java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm ~java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpmjava-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpmL JBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update\awhttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932 5:java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm7:java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm8:java-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm4:java-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm<:java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpm6:java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm;:java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpm5:java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm7:java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm8:java-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm4:java-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm<:java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpm6:java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm;:java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpmM +WBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update\Xfhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933 />java-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm.>java-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpm&>java-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpm*>java-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpm+>java-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpm)>java-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpm'>java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpm,>java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpm->java-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpm(>java-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm />java-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm.>java-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpm&>java-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpm*>java-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpm+>java-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpm)>java-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpm'>java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpm,>java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpm->java-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpm(>java-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpmN 2lBBBBsecurityModerate: glib2 security update\>https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936 Qglib2-tests-2.68.4-18.el9_7.1.x86_64.rpm8glib2-doc-2.68.4-18.el9_7.1.noarch.rpm]glib2-devel-2.68.4-18.el9_7.1.x86_64.rpm]glib2-devel-2.68.4-18.el9_7.1.i686.rpmQglib2-tests-2.68.4-18.el9_7.1.x86_64.rpm8glib2-doc-2.68.4-18.el9_7.1.noarch.rpm]glib2-devel-2.68.4-18.el9_7.1.x86_64.rpm]glib2-devel-2.68.4-18.el9_7.1.i686.rpmiO 43securityImportant: python3.12-urllib3 security update\[7https://access.redhat.com/errata/RHSA-2026:1088RHSA-2026:1088RHSA-2026:1088 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1088.htmlALSA-2026:1088ALSA-2026:1088 }python3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm}python3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpmP 65securityImportant: python3.11-urllib3 security update\7https://access.redhat.com/errata/RHSA-2026:1089RHSA-2026:1089RHSA-2026:1089 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1089.htmlALSA-2026:1089ALSA-2026:1089 S{python3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpmS{python3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm Q wBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update\Ihttps://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143 "bkernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm$bkernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm)brv-5.14.0-611.26.1.el9_7.x86_64.rpm%bperf-5.14.0-611.26.1.el9_7.x86_64.rpmbkernel-doc-5.14.0-611.26.1.el9_7.noarch.rpmTbpython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm#bkernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm'brtla-5.14.0-611.26.1.el9_7.x86_64.rpm!bkernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm&bkernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm "bkernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm$bkernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm)brv-5.14.0-611.26.1.el9_7.x86_64.rpm%bperf-5.14.0-611.26.1.el9_7.x86_64.rpmbkernel-doc-5.14.0-611.26.1.el9_7.noarch.rpmTbpython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm#bkernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm'brtla-5.14.0-611.26.1.el9_7.x86_64.rpm!bkernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm&bkernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm8R KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update\fqhttps://access.redhat.com/errata/RHSA-2026:1239RHSA-2026:1239RHSA-2026:1239 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1239.htmlALSA-2026:1239ALSA-2026:1239 71fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpm[fence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpmHfence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpmFfence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpmRfence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm0fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpmDfence-agents-apc-4.10.0-98.el9_7.4.noarch.rpmUfence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpmWfence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpmzfence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpmKfence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpmgfence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpmPfence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpm~fence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpmha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpmCfence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm^fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpmifence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpmZfence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpmLfence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpmbfence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm_fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpmwfence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpmJfence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpmYfence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpm\fence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpmxfence-agents-all-4.10.0-98.el9_7.4.x86_64.rpmSfence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpmOfence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpmyfence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpmIfence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpmcfence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpmMfence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm`fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpm}fence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpmhfence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm/fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpmNfence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpmjfence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpmefence-virtd-4.10.0-98.el9_7.4.x86_64.rpmGfence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpmTfence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm]fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpmEfence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpmbfence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpmVfence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpm|fence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpmffence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpmdfence-virt-4.10.0-98.el9_7.4.x86_64.rpmCfence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpmXfence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpm{fence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpmQfence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm.fence-agents-common-4.10.0-98.el9_7.4.noarch.rpmafence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm71fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpm[fence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpmHfence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpmFfence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpmRfence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm0fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpmDfence-agents-apc-4.10.0-98.el9_7.4.noarch.rpmUfence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpmWfence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpmzfence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpmKfence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpmgfence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpmPfence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpm~fence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpmha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpmCfence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm^fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpmifence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpmZfence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpmLfence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpmbfence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm_fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpmwfence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpmJfence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpmYfence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpm\fence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpmxfence-agents-all-4.10.0-98.el9_7.4.x86_64.rpmSfence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpmOfence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpmyfence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpmIfence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpmcfence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpmMfence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm`fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpm}fence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpmhfence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm/fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpmNfence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpmjfence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpmefence-virtd-4.10.0-98.el9_7.4.x86_64.rpmGfence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpmTfence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm]fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpmEfence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpmbfence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpmVfence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpm|fence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpmffence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpmdfence-virt-4.10.0-98.el9_7.4.x86_64.rpmCfence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpmXfence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpm{fence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpmQfence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm.fence-agents-common-4.10.0-98.el9_7.4.noarch.rpmafence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm̂sS UBsecurityModerate: curl security update\WAhttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350 https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350 libcurl-devel-7.76.1-35.el9_7.3.i686.rpmlibcurl-devel-7.76.1-35.el9_7.3.x86_64.rpmlibcurl-devel-7.76.1-35.el9_7.3.i686.rpmlibcurl-devel-7.76.1-35.el9_7.3.x86_64.rpmT "YBBBBBBBsecurityModerate: gcc-toolset-15-binutils security update\ehttps://access.redhat.com/errata/RHSA-2026:1359RHSA-2026:1359RHSA-2026:1359 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-1359.htmlALSA-2026:1359ALSA-2026:1359 mFgcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpmnFgcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpmlFgcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm5Fgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm5Fgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpmmFgcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpmnFgcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpmlFgcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm5Fgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm5Fgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm̂>U %csecurityModerate: image-builder security update\}*https://access.redhat.com/errata/RHSA-2026:1377RHSA-2026:1377RHSA-2026:1377 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1377.htmlALSA-2026:1377ALSA-2026:1377 \image-builder-31-2.el9_7.x86_64.rpm\image-builder-31-2.el9_7.x86_64.rpm̶V ,fBBBBsecurityModerate: osbuild-composer security update\'Bhttps://access.redhat.com/errata/RHSA-2026:1381RHSA-2026:1381RHSA-2026:1381 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1381.htmlALSA-2026:1381ALSA-2026:1381 3 osbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpm1 osbuild-composer-149-3.el9_7.alma.3.x86_64.rpm2 osbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm3 osbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpm1 osbuild-composer-149-3.el9_7.alma.3.x86_64.rpm2 osbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm̂[W 7mBBBBBBBBsecurityModerate: python3.12 security update\i,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408 Spython3.12-libs-3.12.12-4.el9_7.x86_64.rpm#Spython3.12-tkinter-3.12.12-4.el9_7.x86_64.rpmSpython3.12-libs-3.12.12-4.el9_7.i686.rpmSpython3.12-devel-3.12.12-4.el9_7.x86_64.rpm"Spython3.12-3.12.12-4.el9_7.x86_64.rpmSpython3.12-devel-3.12.12-4.el9_7.i686.rpmSpython3.12-libs-3.12.12-4.el9_7.x86_64.rpm#Spython3.12-tkinter-3.12.12-4.el9_7.x86_64.rpmSpython3.12-libs-3.12.12-4.el9_7.i686.rpmSpython3.12-devel-3.12.12-4.el9_7.x86_64.rpm"Spython3.12-3.12.12-4.el9_7.x86_64.rpmSpython3.12-devel-3.12.12-4.el9_7.i686.rpmX *MBUBBBBBBBBOBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.2 security update\Xhttps://access.redhat.com/errata/RHSA-2026:1409RHSA-2026:1409RHSA-2026:1409 https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1409.htmlALSA-2026:1409ALSA-2026:1409 )+(eGphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmcGphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmjGphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm_Gphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm^Gphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmZGphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmTGphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmaGphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm]Gphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm2*apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm[Gphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm`Gphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmhGphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmVGphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmYGphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm\Gphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmiGphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm*php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm sphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm Ophp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmGphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmUGphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmfGphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmWGphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmSGphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmXGphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm*php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgGphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmbGphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmdGphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm)+(eGphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmcGphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmjGphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm_Gphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm^Gphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmZGphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmTGphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmaGphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm]Gphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm2*apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm[Gphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm`Gphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmhGphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmVGphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmYGphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm\Gphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm Gphp-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmiGphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm*php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm sphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm Ophp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmGphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmUGphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmfGphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmWGphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmSGphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmXGphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm*php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgGphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmbGphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmdGphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm̂uY 5kBBBBBBBBsecurityModerate: python3.11 security update\m,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410 lCpython3.11-tkinter-3.11.13-5.el9_7.x86_64.rpmbCpython3.11-devel-3.11.13-5.el9_7.i686.rpmcCpython3.11-libs-3.11.13-5.el9_7.i686.rpmkCpython3.11-3.11.13-5.el9_7.x86_64.rpmbCpython3.11-devel-3.11.13-5.el9_7.x86_64.rpmcCpython3.11-libs-3.11.13-5.el9_7.x86_64.rpmlCpython3.11-tkinter-3.11.13-5.el9_7.x86_64.rpmbCpython3.11-devel-3.11.13-5.el9_7.i686.rpmcCpython3.11-libs-3.11.13-5.el9_7.i686.rpmkCpython3.11-3.11.13-5.el9_7.x86_64.rpmbCpython3.11-devel-3.11.13-5.el9_7.x86_64.rpmcCpython3.11-libs-3.11.13-5.el9_7.x86_64.rpmIZ ({BBBBBBBBBBBBpBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security update\[https://access.redhat.com/errata/RHSA-2026:1429RHSA-2026:1429RHSA-2026:1429 https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1429.htmlALSA-2026:1429ALSA-2026:1429 *,( iJphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmbJphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmfJphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmeJphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm tphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm`Jphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmYJphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmcJphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmJphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmXJphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm2+apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm[Jphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmaJphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmWJphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm+php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmdJphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm ,php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm\Jphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmjJphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmSJphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmZJphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm]Jphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmVJphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmgJphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm^Jphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmhJphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmUJphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm+php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmTJphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm_Jphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm*,( iJphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmbJphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmfJphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmeJphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm tphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm`Jphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmYJphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmcJphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmJphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmXJphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm2+apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpm[Jphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmaJphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmWJphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm+php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmdJphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm ,php-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpm\Jphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmjJphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmSJphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmZJphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm]Jphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmVJphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmgJphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm Pphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm^Jphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmhJphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmUJphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm+php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmTJphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm_Jphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm aphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm=[ .iBBBsecurityImportant: openssl security update\tLhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473 https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473  vopenssl-devel-3.5.1-7.el9_7.i686.rpmLvopenssl-perl-3.5.1-7.el9_7.x86_64.rpm vopenssl-devel-3.5.1-7.el9_7.x86_64.rpm vopenssl-devel-3.5.1-7.el9_7.i686.rpmLvopenssl-perl-3.5.1-7.el9_7.x86_64.rpm vopenssl-devel-3.5.1-7.el9_7.x86_64.rpm̂\ 5oBBBBsecurityModerate: python3.9 security update\@bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 W5python3-devel-3.9.25-3.el9_7.x86_64.rpmj5python-unversioned-command-3.9.25-3.el9_7.noarch.rpm=5python3-tkinter-3.9.25-3.el9_7.x86_64.rpmW5python3-devel-3.9.25-3.el9_7.i686.rpmW5python3-devel-3.9.25-3.el9_7.x86_64.rpmj5python-unversioned-command-3.9.25-3.el9_7.noarch.rpm=5python3-tkinter-3.9.25-3.el9_7.x86_64.rpmW5python3-devel-3.9.25-3.el9_7.i686.rpmt] 9vBsecurityModerate: iperf3 security update\"8https://access.redhat.com/errata/RHSA-2026:1595RHSA-2026:1595RHSA-2026:1595 https://access.redhat.com/security/cve/CVE-2025-54349CVE-2025-54349CVE-2025-54349https://bugzilla.redhat.com/23861512386151https://errata.almalinux.org/9/ALSA-2026-1595.htmlALSA-2026:1595ALSA-2026:1595 asiperf3-3.9-14.el9_7.1.i686.rpmasiperf3-3.9-14.el9_7.1.x86_64.rpmasiperf3-3.9-14.el9_7.1.i686.rpmasiperf3-3.9-14.el9_7.1.x86_64.rpḿ^ zBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update\ZDhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617 https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617 #ckernel-devel-5.14.0-611.27.1.el9_7.x86_64.rpmTcpython3-perf-5.14.0-611.27.1.el9_7.x86_64.rpm'crtla-5.14.0-611.27.1.el9_7.x86_64.rpmckernel-doc-5.14.0-611.27.1.el9_7.noarch.rpm"ckernel-debug-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm%cperf-5.14.0-611.27.1.el9_7.x86_64.rpm!ckernel-debug-devel-5.14.0-611.27.1.el9_7.x86_64.rpm&ckernel-headers-5.14.0-611.27.1.el9_7.x86_64.rpm)crv-5.14.0-611.27.1.el9_7.x86_64.rpm$ckernel-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm #ckernel-devel-5.14.0-611.27.1.el9_7.x86_64.rpmTcpython3-perf-5.14.0-611.27.1.el9_7.x86_64.rpm'crtla-5.14.0-611.27.1.el9_7.x86_64.rpmckernel-doc-5.14.0-611.27.1.el9_7.noarch.rpm"ckernel-debug-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm%cperf-5.14.0-611.27.1.el9_7.x86_64.rpm!ckernel-debug-devel-5.14.0-611.27.1.el9_7.x86_64.rpm&ckernel-headers-5.14.0-611.27.1.el9_7.x86_64.rpm)crv-5.14.0-611.27.1.el9_7.x86_64.rpm$ckernel-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm̖A_ NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update\https://access.redhat.com/errata/RHSA-2026:1903RHSA-2026:1903RHSA-2026:1903 https://access.redhat.com/security/cve/CVE-2026-23490CVE-2026-23490CVE-2026-23490https://bugzilla.redhat.com/24304722430472https://errata.almalinux.org/9/ALSA-2026-1903.htmlALSA-2026:1903ALSA-2026:1903 7ha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpmKfence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm1fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpmCfence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpmzfence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpmXfence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpm{fence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpmWfence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpmDfence-agents-apc-4.10.0-98.el9_7.5.noarch.rpmMfence-agents-eps-4.10.0-98.el9_7.5.noarch.rpmHfence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpmQfence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpmxfence-agents-all-4.10.0-98.el9_7.5.x86_64.rpmLfence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpmbfence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpmdfence-virt-4.10.0-98.el9_7.5.x86_64.rpmVfence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpmyfence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm]fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpm\fence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpmYfence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpmOfence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpmNfence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpmJfence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpmEfence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpmgfence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm`fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpmhfence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpmSfence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpmUfence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpmwfence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpm}fence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpmGfence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpmffence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpmRfence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpmZfence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpmcfence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpmFfence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpmafence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpmjfence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpm|fence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm^fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm.fence-agents-common-4.10.0-98.el9_7.5.noarch.rpmifence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpmCfence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpmIfence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm_fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm0fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpmbfence-agents-wti-4.10.0-98.el9_7.5.noarch.rpm[fence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpmefence-virtd-4.10.0-98.el9_7.5.x86_64.rpmPfence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpm~fence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpmTfence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm/fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm7ha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpmKfence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm1fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpmCfence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpmzfence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpmXfence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpm{fence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpmWfence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpmDfence-agents-apc-4.10.0-98.el9_7.5.noarch.rpmMfence-agents-eps-4.10.0-98.el9_7.5.noarch.rpmHfence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpmQfence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpmxfence-agents-all-4.10.0-98.el9_7.5.x86_64.rpmLfence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpmbfence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpmdfence-virt-4.10.0-98.el9_7.5.x86_64.rpmVfence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpmyfence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm]fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpm\fence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpmYfence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpmOfence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpmNfence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpmJfence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpmEfence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpmgfence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm`fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpmhfence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpmSfence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpmUfence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpmwfence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpm}fence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpmGfence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpmffence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpmRfence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpmZfence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpmcfence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpmFfence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpmafence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpmjfence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpm|fence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm^fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm.fence-agents-common-4.10.0-98.el9_7.5.noarch.rpmifence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpmCfence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpmIfence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm_fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm0fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpmbfence-agents-wti-4.10.0-98.el9_7.5.noarch.rpm[fence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpmefence-virtd-4.10.0-98.el9_7.5.x86_64.rpmPfence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpm~fence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpmTfence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm/fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm̫L` XsecurityImportant: opentelemetry-collector security update\5!https://access.redhat.com/errata/RHSA-2026:1908RHSA-2026:1908RHSA-2026:1908 https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-1908.htmlALSA-2026:1908ALSA-2026:1908 Vopentelemetry-collector-0.135.0-3.el9_7.x86_64.rpmVopentelemetry-collector-0.135.0-3.el9_7.x86_64.rpm̫/a ([BBBBBBBBBBBsecurityModerate: util-linux security update\Vhttps://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 @Elibblkid-devel-2.37.4-21.el9_7.x86_64.rpmkeylime-registrar-7.12.1-11.el9_7.4.x86_64.rpmQpython3-keylime-7.12.1-11.el9_7.4.x86_64.rpmdkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm@keylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm<keylime-7.12.1-11.el9_7.4.x86_64.rpm=keylime-base-7.12.1-11.el9_7.4.x86_64.rpm?keylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm>keylime-registrar-7.12.1-11.el9_7.4.x86_64.rpmQpython3-keylime-7.12.1-11.el9_7.4.x86_64.rpmdkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm@keylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm<keylime-7.12.1-11.el9_7.4.x86_64.rpm=keylime-base-7.12.1-11.el9_7.4.x86_64.rpm̲Hh +fBBBsecurityImportant: gimp security update\9https://access.redhat.com/errata/RHSA-2026:2707RHSA-2026:2707RHSA-2026:2707 https://access.redhat.com/security/cve/CVE-2025-15059CVE-2025-15059CVE-2025-15059https://bugzilla.redhat.com/24322962432296https://errata.almalinux.org/9/ALSA-2026-2707.htmlALSA-2026:2707ALSA-2026:2707 @gimp-3.0.4-1.el9_7.3.x86_64.rpmogimp-libs-3.0.4-1.el9_7.3.x86_64.rpmogimp-libs-3.0.4-1.el9_7.3.i686.rpm@gimp-3.0.4-1.el9_7.3.x86_64.rpmogimp-libs-3.0.4-1.el9_7.3.x86_64.rpmogimp-libs-3.0.4-1.el9_7.3.i686.rpmц&i 8lBBBBBBBBBBsecurityImportant: golang security update\? https://access.redhat.com/errata/RHSA-2026:2709RHSA-2026:2709RHSA-2026:2709 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61732CVE-2025-61732CVE-2025-61732https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24370162437016https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-2709.htmlALSA-2026:2709ALSA-2026:2709 K\golang-race-1.25.7-1.el9_7.x86_64.rpm\golang-docs-1.25.7-1.el9_7.noarch.rpm\golang-tests-1.25.7-1.el9_7.noarch.rpmp\go-toolset-1.25.7-1.el9_7.x86_64.rpm\golang-src-1.25.7-1.el9_7.noarch.rpm?\golang-1.25.7-1.el9_7.x86_64.rpm\golang-misc-1.25.7-1.el9_7.noarch.rpm@\golang-bin-1.25.7-1.el9_7.x86_64.rpmK\golang-race-1.25.7-1.el9_7.x86_64.rpm\golang-docs-1.25.7-1.el9_7.noarch.rpm\golang-tests-1.25.7-1.el9_7.noarch.rpmp\go-toolset-1.25.7-1.el9_7.x86_64.rpm\golang-src-1.25.7-1.el9_7.noarch.rpm?\golang-1.25.7-1.el9_7.x86_64.rpm\golang-misc-1.25.7-1.el9_7.noarch.rpm@\golang-bin-1.25.7-1.el9_7.x86_64.rpmх-j yBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update\Fhttps://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722 https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722 %eperf-5.14.0-611.34.1.el9_7.x86_64.rpmTepython3-perf-5.14.0-611.34.1.el9_7.x86_64.rpm&ekernel-headers-5.14.0-611.34.1.el9_7.x86_64.rpm)erv-5.14.0-611.34.1.el9_7.x86_64.rpm$ekernel-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm"ekernel-debug-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm!ekernel-debug-devel-5.14.0-611.34.1.el9_7.x86_64.rpm#ekernel-devel-5.14.0-611.34.1.el9_7.x86_64.rpmekernel-doc-5.14.0-611.34.1.el9_7.noarch.rpm'ertla-5.14.0-611.34.1.el9_7.x86_64.rpm %eperf-5.14.0-611.34.1.el9_7.x86_64.rpmTepython3-perf-5.14.0-611.34.1.el9_7.x86_64.rpm&ekernel-headers-5.14.0-611.34.1.el9_7.x86_64.rpm)erv-5.14.0-611.34.1.el9_7.x86_64.rpm$ekernel-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm"ekernel-debug-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm!ekernel-debug-devel-5.14.0-611.34.1.el9_7.x86_64.rpm#ekernel-devel-5.14.0-611.34.1.el9_7.x86_64.rpmekernel-doc-5.14.0-611.34.1.el9_7.noarch.rpm'ertla-5.14.0-611.34.1.el9_7.x86_64.rpm6k MsecurityModerate: edk2 security update\]Ghttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776 edk2-ovmf-20241117-4.el9_7.3.noarch.rpm:edk2-aarch64-20241117-4.el9_7.3.noarch.rpmedk2-ovmf-20241117-4.el9_7.3.noarch.rpm:edk2-aarch64-20241117-4.el9_7.3.noarch.rpm׆;l PBBBBBBBBBBBBBsecurityImportant: nodejs:24 security update\$Bhttps://access.redhat.com/errata/RHSA-2026:2781RHSA-2026:2781RHSA-2026:2781 https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2781.htmlALSA-2026:2781ALSA-2026:2781 5v&( "<nodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm{Cnodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmanpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpm :nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpme<nodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm5<nodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm=ev8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpm ;nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm <nodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpmL<nodejs-docs-24.13.0-1.module_el9.7.0+209+ecf6523e.noarch.rpm5v&( "<nodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm{Cnodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmanpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpm :nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpme<nodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm5<nodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm=ev8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpm ;nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm <nodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpmL<nodejs-docs-24.13.0-1.module_el9.7.0+209+ecf6523e.noarch.rpmׇgm 0`BBBBBBBBBBBBBBsecurityImportant: nodejs:22 security update\fBhttps://access.redhat.com/errata/RHSA-2026:2782RHSA-2026:2782RHSA-2026:2782 https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2782.htmlALSA-2026:2782ALSA-2026:2782 5%(  9nodejs-packaging-2021.06-5.module_el9.7.0+208+fb06c0ab.noarch.rpm>dv8-12.4-devel-12.4.254.21-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpm5;nodejs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm 8nodejs-packaging-bundler-2021.06-5.module_el9.7.0+196+ac40ca3b.noarch.rpm{Bnodejs-nodemon-3.0.1-1.module_el9.6.0+172+f0ba00ec.noarch.rpm";nodejs-devel-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpmL;nodejs-docs-22.22.0-1.module_el9.7.0+208+fb06c0ab.noarch.rpm ;nodejs-libs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpma npm-10.9.4-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpme;nodejs-full-i18n-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm5%(  9nodejs-packaging-2021.06-5.module_el9.7.0+208+fb06c0ab.noarch.rpm>dv8-12.4-devel-12.4.254.21-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpm5;nodejs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpm 8nodejs-packaging-bundler-2021.06-5.module_el9.7.0+196+ac40ca3b.noarch.rpm{Bnodejs-nodemon-3.0.1-1.module_el9.6.0+172+f0ba00ec.noarch.rpm";nodejs-devel-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpmL;nodejs-docs-22.22.0-1.module_el9.7.0+208+fb06c0ab.noarch.rpm ;nodejs-libs-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpma npm-10.9.4-1.22.22.0.1.module_el9.7.0+208+fb06c0ab.x86_64.rpme;nodejs-full-i18n-22.22.0-1.module_el9.7.0+208+fb06c0ab.x86_64.rpmwn zBBsecurityImportant: buildah security update\uShttps://access.redhat.com/errata/RHSA-2026:3298RHSA-2026:3298RHSA-2026:3298 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3298.htmlALSA-2026:3298ALSA-2026:3298 7Lbuildah-1.41.8-2.el9_7.x86_64.rpm8Lbuildah-tests-1.41.8-2.el9_7.x86_64.rpm7Lbuildah-1.41.8-2.el9_7.x86_64.rpm8Lbuildah-tests-1.41.8-2.el9_7.x86_64.rpm̀z BBBBBBBsecurityImportant: podman security update\H, https://access.redhat.com/errata/RHSA-2026:3337RHSA-2026:3337RHSA-2026:3337 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3337.htmlALSA-2026:3337ALSA-2026:3337 #Wpodman-5.6.0-14.el9_7.x86_64.rpm$Wpodman-plugins-5.6.0-14.el9_7.x86_64.rpm&Wpodman-tests-5.6.0-14.el9_7.x86_64.rpmfWpodman-docker-5.6.0-14.el9_7.noarch.rpm%Wpodman-remote-5.6.0-14.el9_7.x86_64.rpm#Wpodman-5.6.0-14.el9_7.x86_64.rpm$Wpodman-plugins-5.6.0-14.el9_7.x86_64.rpm&Wpodman-tests-5.6.0-14.el9_7.x86_64.rpmfWpodman-docker-5.6.0-14.el9_7.noarch.rpm%Wpodman-remote-5.6.0-14.el9_7.x86_64.rpm̀1{ IBBsecurityImportant: firefox security update\t2Nhttps://access.redhat.com/errata/RHSA-2026:3339RHSA-2026:3339RHSA-2026:3339 https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://access.redhat.com/security/cve/CVE-2026-2757CVE-2026-2757CVE-2026-2757https://access.redhat.com/security/cve/CVE-2026-2758CVE-2026-2758CVE-2026-2758https://access.redhat.com/security/cve/CVE-2026-2759CVE-2026-2759CVE-2026-2759https://access.redhat.com/security/cve/CVE-2026-2760CVE-2026-2760CVE-2026-2760https://access.redhat.com/security/cve/CVE-2026-2761CVE-2026-2761CVE-2026-2761https://access.redhat.com/security/cve/CVE-2026-2762CVE-2026-2762CVE-2026-2762https://access.redhat.com/security/cve/CVE-2026-2763CVE-2026-2763CVE-2026-2763https://access.redhat.com/security/cve/CVE-2026-2764CVE-2026-2764CVE-2026-2764https://access.redhat.com/security/cve/CVE-2026-2765CVE-2026-2765CVE-2026-2765https://access.redhat.com/security/cve/CVE-2026-2766CVE-2026-2766CVE-2026-2766https://access.redhat.com/security/cve/CVE-2026-2767CVE-2026-2767CVE-2026-2767https://access.redhat.com/security/cve/CVE-2026-2768CVE-2026-2768CVE-2026-2768https://access.redhat.com/security/cve/CVE-2026-2769CVE-2026-2769CVE-2026-2769https://access.redhat.com/security/cve/CVE-2026-2770CVE-2026-2770CVE-2026-2770https://access.redhat.com/security/cve/CVE-2026-2771CVE-2026-2771CVE-2026-2771https://access.redhat.com/security/cve/CVE-2026-2772CVE-2026-2772CVE-2026-2772https://access.redhat.com/security/cve/CVE-2026-2773CVE-2026-2773CVE-2026-2773https://access.redhat.com/security/cve/CVE-2026-2774CVE-2026-2774CVE-2026-2774https://access.redhat.com/security/cve/CVE-2026-2775CVE-2026-2775CVE-2026-2775https://access.redhat.com/security/cve/CVE-2026-2776CVE-2026-2776CVE-2026-2776https://access.redhat.com/security/cve/CVE-2026-2777CVE-2026-2777CVE-2026-2777https://access.redhat.com/security/cve/CVE-2026-2778CVE-2026-2778CVE-2026-2778https://access.redhat.com/security/cve/CVE-2026-2779CVE-2026-2779CVE-2026-2779https://access.redhat.com/security/cve/CVE-2026-2780CVE-2026-2780CVE-2026-2780https://access.redhat.com/security/cve/CVE-2026-2781CVE-2026-2781CVE-2026-2781https://access.redhat.com/security/cve/CVE-2026-2782CVE-2026-2782CVE-2026-2782https://access.redhat.com/security/cve/CVE-2026-2783CVE-2026-2783CVE-2026-2783https://access.redhat.com/security/cve/CVE-2026-2784CVE-2026-2784CVE-2026-2784https://access.redhat.com/security/cve/CVE-2026-2785CVE-2026-2785CVE-2026-2785https://access.redhat.com/security/cve/CVE-2026-2786CVE-2026-2786CVE-2026-2786https://access.redhat.com/security/cve/CVE-2026-2787CVE-2026-2787CVE-2026-2787https://access.redhat.com/security/cve/CVE-2026-2788CVE-2026-2788CVE-2026-2788https://access.redhat.com/security/cve/CVE-2026-2789CVE-2026-2789CVE-2026-2789https://access.redhat.com/security/cve/CVE-2026-2790CVE-2026-2790CVE-2026-2790https://access.redhat.com/security/cve/CVE-2026-2791CVE-2026-2791CVE-2026-2791https://access.redhat.com/security/cve/CVE-2026-2792CVE-2026-2792CVE-2026-2792https://access.redhat.com/security/cve/CVE-2026-2793CVE-2026-2793CVE-2026-2793https://bugzilla.redhat.com/24402192440219https://bugzilla.redhat.com/24422842442284https://bugzilla.redhat.com/24422872442287https://bugzilla.redhat.com/24422882442288https://bugzilla.redhat.com/24422902442290https://bugzilla.redhat.com/24422912442291https://bugzilla.redhat.com/24422922442292https://bugzilla.redhat.com/24422942442294https://bugzilla.redhat.com/24422952442295https://bugzilla.redhat.com/24422972442297https://bugzilla.redhat.com/24422982442298https://bugzilla.redhat.com/24423002442300https://bugzilla.redhat.com/24423022442302https://bugzilla.redhat.com/24423042442304https://bugzilla.redhat.com/24423072442307https://bugzilla.redhat.com/24423082442308https://bugzilla.redhat.com/24423092442309https://bugzilla.redhat.com/24423122442312https://bugzilla.redhat.com/24423132442313https://bugzilla.redhat.com/24423142442314https://bugzilla.redhat.com/24423162442316https://bugzilla.redhat.com/24423182442318https://bugzilla.redhat.com/24423192442319https://bugzilla.redhat.com/24423202442320https://bugzilla.redhat.com/24423222442322https://bugzilla.redhat.com/24423242442324https://bugzilla.redhat.com/24423252442325https://bugzilla.redhat.com/24423262442326https://bugzilla.redhat.com/24423272442327https://bugzilla.redhat.com/24423282442328https://bugzilla.redhat.com/24423292442329https://bugzilla.redhat.com/24423312442331https://bugzilla.redhat.com/24423332442333https://bugzilla.redhat.com/24423342442334https://bugzilla.redhat.com/24423352442335https://bugzilla.redhat.com/24423372442337https://bugzilla.redhat.com/24423422442342https://bugzilla.redhat.com/24423432442343https://errata.almalinux.org/9/ALSA-2026-3339.htmlALSA-2026:3339ALSA-2026:3339 Ofirefox-x11-140.8.0-2.el9_7.alma.1.x86_64.rpm9firefox-140.8.0-2.el9_7.alma.1.x86_64.rpmOfirefox-x11-140.8.0-2.el9_7.alma.1.x86_64.rpm9firefox-140.8.0-2.el9_7.alma.1.x86_64.rpm̀@| NsecurityImportant: python-pyasn1 security update\&]https://access.redhat.com/errata/RHSA-2026:3359RHSA-2026:3359RHSA-2026:3359 https://access.redhat.com/security/cve/CVE-2026-23490CVE-2026-23490CVE-2026-23490https://bugzilla.redhat.com/24304722430472https://errata.almalinux.org/9/ALSA-2026-3359.htmlALSA-2026:3359ALSA-2026:3359 {|python3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpmz|python3-pyasn1-0.4.8-7.el9_7.noarch.rpm{|python3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpmz|python3-pyasn1-0.4.8-7.el9_7.noarch.rpm̀HUFor detailed information changes this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.3xw XZ Util]s anctegrat7coll& of user-space fmpressu@itiWb}doLempel-Ziv-Markovɡalgorithm (LZMA), which perossl[ datai. TW?provide highÔr?Ykeepingde%time short. SecuWy Fix(es): * gzip: arbitrary--w%e vulneraby (CVE-2022-1271) moroաboutsgissue(sincludimgt,CVSS scG cknowgments,j/r8,ftoR pagms,ViVi IMaed)updgyim verJ$Ovi editorPvim: U.Out-of-r Po{r OffsetvV0554)@Heap-lBuff6v=low octs?943?y4202hr blol+621+&-read'9'usf{freeutf_ptr2)r51SExpatG C.bN fpa?XML docu<eC: st hausv9typeM;2531=in8pyStr8():w1kernel pvaIconta3!,anyopeNsyomC: Small tableturb sizeTCP sourcx gen^ocnl:k012){rdiU_evf_ƤTsUprivescal^Y7Ya--netsub$lrooq966tomIP ESP tscode76K Bug`make SHA512_ar1.sCRYPTO_USER4-ins (BZ#20726SR-IOVgan*> 50%d3483fixrrupiauyby dm-1 982187mCTP cli$-sid eloffns [al(_-9]<404#n finasymmec8.61102)Mozillabird# ndg mZnewsg4p. TO K 91.11_: CS jbox0dL`ow-s`beD pasz/regeijava+.RI,34468)uU nsSHj8708Apnd] could a way l hdd@ ba webT p9pMsafbugs` iFi}7׫ESR{Y84nd atbuan oto.20&ɳDa0}g OS PGP gna Lwas|ceptslidc26c9 en[sty1hej 1745ilyPACulOfreqsebled2XPoiu=ReceEleeA8SquiVf-@ Jx, fs,p"FTP, GopHT' b obs: DoS xcezgM|p/ es1-467/ -jdkAJDK 1J/ RunEnon+Softwa!D lop,Ki* xhaveHen?3a r D:(S0.168).77Ct " BXa -J (JAXm82073416Ocl{r ilN(HotPtF1859 1XFpIrMedH .invokeBasicoaa? rh1991003 pE br s#n..pkcswr er.PKCSInce7@,P[L9e#GYKeyje/imz^ don'tKA_SIGNMFIPSg{107ǡ{Rct s1@e6=gevh.8.0-8,*T+(.342.b06$08/V/z95V.u-Graf n%, fe h ushboargqh G, InfluxDB &TSDBeAua ccount3keg 107$7 7 +T(174 9aratm\sL8J3875J9Prous\s&"abhe )+ AirdfacSNi%a"mumoi*5at%dedE%i0=\g!e3</W0pv,qwfBlaeU`9 wce</Nfigu105395ޢ/r'>T'ma;v_8i~uTboh-D}HeSPF=U-D..fips=f e,ڢan{r'{F1lEha} rIi7e,Ṇ1 x Ma7uless- (! ed¶3\ -" browsg:rdli, {|t2UU 3.150LDOxebuF\*ft*URLamet631MoPos#ofC0)#GFGo T!!8 s+Go  !lb.,Zn. y ngo<. 6  r e*Q:%R/p+'RO.0)I/http T.En4%V17Ugo/Y(er̛"P*sM962Mew/xmlPDe%r.SkipW81io/fsBGlob(0:Kh/!BU#rshF3Fgob K$#: NewS]leH`seP- omit X-warn $worj2148v C t-git`es9b]UXGoJI7L+8PHPHTML-embe $mS$ApacS:phpsswordexve^ ngM4& F) o RCE-4)N/O%Wr+88*o*0+_reg)+_> rxp.cK897KS/i-/EmbyteD927MaF)-%$, thBSQLHb * is((omp pMy40gal (26 11), mdb0.5._ysql-sel (5)p=: ou3M9w@ :ack_ on _co_to_in(%-KxBIGINT!O JE6l2 h fUo@5uTf\'o~0wiag -;&0,8˒exfnc/k] .o,v50 av(befui"a(t,ifi51uCONNECT SREng'4P(E(V5p2pir3;I_s::walk D73Dpoison exivoli.% X7Xcr0,_tmp_1::f1F8F(_B or:: e_r*_X9Xmy_d::uor=A80AField:: IfaH&=y)f^s2cTRfx![s/`_w_a)__^oSy_$ca8~8I4N0*V3V#ɺ2ee::-_vr_ct _/kǮ4eN%ry_are$SEL(view`d(__s8V]HAVINGNOT EXISTd|a&q+c&_elf445IS NULLޡ _;BTi& :_M7&ɤv B it Q*GR4/iL3.ccA;)in ; ORD4BYO5 ‘u˔5LWHERE$h n er ind(˩VD3:/_ȴinK"due"-:=,gD3iqueP$)o5')TPund/=bup/ds  2XkCc5VIEW= gg \9S| 5  nLfi_:d ^*n 9b(CTE 1˚ 13_,::VɹerG>|3|+ &_p'joa# ă4 P8ȏbec8jk Ĉ5- y~D2IN 8b+S+= 3csi_i>l>049[kc_1_y<s d/cls_api 0[9 ower9LPAR';t:Shaxp,.:(#s[H&22H$+:_Dyss-ng`TsOF5fi|nam>3 gfs2;=?h dvo#>(^<#oc 7,e5DAP{:f en6ofti85;Un5j7+#575-KRBmt2C*$T;3 #A:*#vXSLT-89Cro(inhe%nt's+e3e$4>2;$2Y7!Y,V,mzm$D;pP: PK11_C'PWS6 '3'j>*SSL@'ki }@_NOCHECKSo3P#S31lHIn$71mgnutlsFFDHE8032 . TZ3DES+3v4Bs uD3ll&c v,|LN5508]mUC`ECDSA k/ZTs_-w ip256k1>[XxM19/XS6UCo#X8p-onSl+FKAT8$=1RRsPon23+qs G uYOZtKwsu&]|iN5(O5[IBMHW$T] POWER10pPe/5\yG|[ 1ew]R-R*1*DH tTg*5856*EC*7*S+8+AND,9,zero-,_,HKDF5mi 147?QK4/go"~ VM6SkI .L!K 9usri%K. X!I vm-/:4dTMh]4 164 5 Z6 999QDOf-- ASP]CMVC/s-" MlS=DQ; ru. 0YwRubxa< ow+prL,Z)en(/O"?xt)ȢMsk94+r(p4=1e]28)JIu! R-= 87:)Sr=[-F6tEl9y(.>-iLM daem0-d!mk5a866Hw (E0J,8J2:26 tzerXunB,d>6C(Xg2r Z?4143567840529678$Dv3NNN$V5VInno"/j1512DDL/22*iFTS$=27NG'PluK#c5ʲPAM EZJulZ5/ZεLog#R60R!` 505;52678O30153o69R "5+T3(2gP= d!.22vedeyd$@4: E#_d ,D2logroE tjr(lVN .jG} $dBIp^ BfasIZ ;%EISZ 2?75Y nϡ(_SbS- 29t $?  G$:MtNX c INImu0-778 Hg4-og`s, 0 4Ka -O:JReWV) mXANSI'%D17lrze- B!B43502p] o 7v%.gitS.+CSW2Z20$R+/mlx5jnujDrlNX#ntr /7 8,B tC+"dB\-\ke,extOp-.G5wF'J0)un1U`M"u-: WR0xVamazo4.32xiPn9nX86/ /UV-ST/Fi[KUV5 77Gl!:#2-sync s\  0.b>mq_]2_h- _Ma[9J 0.zw11ONVMe/lderak n-donips,nic^77WAd[nvmeӪa0-7(/tcp9iVFstag3Brq()_)l(qf)O'mI QR bY&929x2 9/ppc64 I]# & "T "=aTwlscpu+" 17,/ */ HvwJ1AMX 2amx0C8, bf- H82L1G pm#H!4!avf"19Q&i40e"dWebVGTKI'l8(re+e B:qB7x%2gtk&2.36.7)+*:4( @Rfkx R:289])***(**(BfSFPo=dEB k4_" )-5 9UTF-8C YL)5.)3Y*"e$#4 __Mn__8pvix8l[gs-g4 -ZhC6ChsTCjWASMARM64T -00KGLnnS-6_#rJl)2nNjMEz8&resh G/-2022-3033) * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVER40959SData-race when0r`non-UTF-8 URLs iThreadL60LMemory safety bugs fixed?Firefox 105 andESR2.3Y2YRYte contspecifiYan HTML documthat was n#side'iframe's src. at8bute.ot block3ċAG elepemailuld [gger atworkqu]4Ca6x SDK@ndlwith Th erbird vulnerable to denial-of-serviceacke60KSecJ CZxtL forokiD__Ho__8pǡd8l[nt-1ity-base- bC6CIncohernucachbuildWASMARM64T7) Fֱe9ts abou6e s issue(s),mcluW impact,CVSS scG cknowgs,!othrelaMma, 2Rm liR&ences:.TBerk{yter\ NDo|n (BIND)mpy ofX)5Syrm (DNS)otocols. Ees `(n8d);.ollibra(rKines=app{susifacWZ~;7tool=Wifyzaipt r"ly. SFix(es): Hbind:9sQfigǢw 7wYfromYzero stale-!-time3may minaDunexpedly8'm$leakECDSASEC/E8177FsGdGExpat Cz2XseE:Cusf-freexdo funnxmlde.cZ674TSquidThigh-pXncexypweb clisupporFTP, GopHTTP dn objrs:ffovzSSPILSMB authv131gnutpv v3GNU T p LayhN(GnuTLSg,tich ryptograp algormsѡ6 SSL, RD Nettle1OBigndfit easilyalmRy xtN kit7-en=langu,C++, Pyth}2Pike,fl LSH!GPG+evekRlc  䪈followhave be2upd@ reamss:(3.7.6nn;8) 3:u d&_pkcs7_'.2509 Bug[IBM 9.1] [P10] POWER10 enh4y:u-r l (BZ#2 58( AMd KAlmaLinux385! DES-CBC g{ FIPS41531 ah uRkeys <22FmK9770).NET ed-softwar9 . Ita9bs@  C- APIsevi l?wi CLRn "wsd`add il navE. eZdfU'V3 6.0.1Run 0jdot: Nug poisonvia.ld-wBڤ+di~ :Ng.jsXPdlop} ppkn fa(scal(yJScript{gmD. 6nϡ(16.17.1{':aomnWebCgez35255)>RSmuggOduin "hea,lo[j-17- njdkOJ17Environy+SDKit?:rS MultiByr;no ` f(JGS 82860 16 eexce{ :X. ceG e(h5h26hHttpS nonlimiL twe2c9c̯2haloNTLM h 4sá,9_nsjicFiz+hJNDI numb(0ƿ4_miNI /2 (NO936ï3939h Prep6or4nquarR n\releas10, Z0.5) [a0 l:-9]329 .8.0 8 *& o11+p1V71) ur{DbrowW,+undar com7 ,/7b' s}9w.01"4 JSEginmviolkU[cross/ 292 CupJSg:&Dni w.prie>} 6d} 4Y6 e sgpwL{w fon by lciouad2istor7924)g!9x-je1e"h"clb3"P7'/¾=1 ;VariLN78zma-l^l"mp0U ddifw" *p-E&d. orif .1rgszip ra43a3!,c}%sC&cpu rJ C%ml vilee=cUn(dTKc&PTRACE_SEIZEWO_SUSPEND_)%COMP`3-)cras+!^booT14/G2 AMD^p (mt7921eiule))5,execveA,.ntD+ced666 JblscrvVGA Uput someNs.201needQ(oa+yhee,DRBGf miycfN')vx)watchdog BUG:k. - CPU#30u 34s! [swer/30:0]O785UV ,5.16"A Bad L qemu-kvm pfn:68a74600?vfio(Ems 2M H+a5>879Vhpa2)9 E!(Nlo!e hpiloq& HPE RL3 Gen", (aarch64f94&$*T, aGve,u$_% !3cl, g yb'vcdy25%.typedl. tC+eB9Cpib t = & sp}:u()PyL_FSt$doeL/wamddp tgv)ptto$S0g735pPublK-fra.@ (PKI)b esQdaA0i,4 $CC-ki-:OSxteeyt/ 2J+XXE41 lua ]ILuapowtulVG-Ndn".Vlso'("ntld \ ,- #:%  G_errCsde.c"unrora )7 < 30)ImB$ei0&[$cuszMOS aac*VM̳SOST  mi% use'sS((hoodgo: h/bi l(o .Flo`'nd R:1Tpani'en0d m iTh,i(jn218&i Chhes:Ҥj c%Ti', seRBN\,n podmanl)s`.gs)D.r)<3fv.5!#Kub4eN.org/x/-PnPEAcULUl)-u-Z3288#-gv Ycp47 tagf):m`eD.wFgvp?1QbounMa IP1(R8H 3r _sQ as i;XTdR *B/s8:~ c[>29^X-/h6l ePYwesfirs emp,l33,l//> wr A--t _45u _"in}>ws 7271>skf!mm fyou insj7]7 g - lQ/ creUyles,4J ygn(rv9fa% Npt;sic35cg-f5' a | g ndE: &tuaWdisk y: _T2 t<-&icsi"M:onS6y/UUID/&*, rscrm 0KFVhMh(KVMK@(F?u]M/rItecV5p-}9_run5  .6)4(.0)0647FBQEMUqcd-ehciMA Ecu 7G"Nfdcaad=qfU L507L5l-hda:aa ,sr"+K6KNULL er]pci_$7eYhw/acpi/hp.~ 415Ay%-v2vcGRcUCcKVM ') hyp sor EXiI3; wbo p4 :ssociN+ta.zso,O9 ۢIO drivpo~ k:H$PPb$GooglJ/.3Ce*$d? /yet R/#fl5,8"BommeisU;seri8Ł9Id:nar.mbolN%pt25=GI"(CMpulPiI!' si *e,.RX )vnD,Nr_~ed#4(8.5031 3F8'nwۡjNumOfNWF< : :08>ah Qling OCIQs^ m`>tD:sc'to:(@ Y:N6iBA8#i;V$KlW$=TvackF;!- KHlsU]*R9,(urz#vMdh< i[ FriBidi] $ KsJn%ex Hebrew, ALc)aplay^d7^:@;-,X"*Ftselfl$tPlogM-> fZ 8 9a3425V)7HJ30- _ _rtl_to_4 SVN9NSEGV>ve_ marks=1AGQt5 Qt 5.P 5&Qt:M& IPqQP0z:)2ub$n?r EO,C.f(%xPATH8mM:8N@FGTK$&@l@re*Ge <:BB,FY:gtk: U 1 o@ deM 2D9P8PQ9QC[_ YsI2 Bf:af<S=6700:cP9TSDB8rUgG!85p553Cf2tdl?3UK!zin1UrlH1-5B4(:RTM!-E>170qgo/Hr:D!exhausm.*Mf2: F OAu I@t)TokeP5F;Y n 167;pro)heus/-_D?I;vH. u!]ªYin›D42VCSRFFY 2>O3OIDOROh171Q3e"/JD3 SkipI8(LIio/^ BGlobd630:"/@BR.IÄpߌ2Unm hjFXgob XK \S]leh- o:X-Q] j21^>unbd(ac8=P1Qgg8(1.Q\287@)4\gdiI"_sTloVednS&qA.82Zp`T<$$97(?NA<79mT<2:1_ad/h*xyon394R;=Us46uni oVur: bodyO2c OrV8i orqAmLb?#`Bi21Źp_ajprXpsa`C638l94045o7 522ʮ:Edq pe@hoyy-htF&T181Outp,#o,8614<p_cmp_mA5>I" +sMa'q>f-7 f1yGoSuG$TCP! 039A dnsmasq D-DD(N)?DHCP'HvC64-)#x JUZdhcp6_no_y/9uO~ LACP `FLQA8oZD. *is!=milaOgg Vo $=)810?-lxp,@>=;822fN: x in(_fifo_ved_X_5050O>>8CM F DF (OCF) a CnRAAi1haUbinher^ny* 1):$Redis( advPdm-'eR.of#;zTI-3 si66s0Oah1sGwets, and sorte. For performance, Redis workith2 in-memory data9. You c6) R,etails about sissue(s),clu impact,CVSSsG cknowledgolrelain¢,f3R pagm l,R&es:^Addi al Changes:Ҥj o %TeasseefAlmaLinuxp Not0linkNfromΎToolbox ist fMoz9symJcllowsSumofFnnerizqTl Itjbuilttop>Podmanust arJX technoiOCIgol4: net/http:r sanz^f Trans-Enco'head(x170Uio/fckhausMGlob930630:press/gzipBR~.I1Ipath/f0ߌ2]iffh  XTag ImOFileTIFC }: DjjIH56pBNuNF pol"^2^rer.865.O|-{!cp24=.-buff:.c m 35Ą _cpy>T_q xV284ĔhT “exctS[9pPddrg bF hN[lsdirü~ 8tDiz e By Zerorop89RawDStedfÒN;W HPHTML-embedOC }ummonlS}pacHTTPo7php0.2575 hpArduee_fat(Wail j1-2Qnime arraRpg_b ry_am ,jo RCE316>O-JPEG<wrijE2000ijajpeg mfa opj2_dekyu=12=DgcoIM c U UNIX kten >mari;als smaPOP3txe-mBŢm SQL du1nt plug-z subzd): ( escalZwhSimimasnon-zdb|05 :Mut E fb"tW ?d MIMEycn[KmoU!s+lM,weA 6^m: uuT a 28da, sl,Ad+bo) )Be/gobAD .KiRewS]leH Rse!xy - omb.X-wed t.j214=V Y/AnJSON(YAJL) <nt-SAX-style)7n ANSI CKCv_ da5gen-oyajl3 Qg:xatD5T479=Udpdk d{ 1W P,e D{ op Kit/teth>qvfaa, & spaD":Ca Vh+@sthaUwo o$s m5 1eDPDK/,vy___l _fymay2b1-383 rv3ilx54Tz d/l%R #819A~ kern*3W!,1any/3off-! '+4rXU55or BatHc '?. s[ 0-3651!*g--vulb+in_so-"ms64 smb2_ioctl# d# 016*idf_"]_. _icbd)y,b[617wiotlb!kDMA_FROM_DEVIg08"*s,Hr nft_do_uin&$ ,UMi10J HWspcm_hw_PoM4S 78p4Gmŷoarupk18#c@8urywbe%`drm%,m_F*_get3,28cKYpfkey_:353 in P9k_htc_Rbei6(&%anofß67 x86_3e_]n%185} o ysufd:tpG99nf_)s%-)poten@£loCg258  FMH_sfa_4G#26,s-P_Dv23din-ean-uO8mri-sha' 乮 SBDRNc3Ni]architufZ'TST5T5ifRC&_DRPW_6po/0del3Nz#;ofUo]149AMD:+tBle@Arb26*p)= r,6en1usitJ!(*hr|6z#(3rF[5..γǤoisbe%&" 1-ifinq @65.whol!b""u)n olE z-*9g@B) m+awu*el7434@2zE3own(fu!vouat!), Fe1~}:dH IPv63 nԩ I1777=^7ba@n!sMe2Blo[SMB) [8C+(rn~0SIFS;DV- P ma; ne ;pr\ C.6-,s,(4.16.4/,7748E;2)8is?E1$274=)F   :, &font<gJ6@$c,-A$[>sW[r.9d0u glyph)f "ly$W: sfn`i\$*40>SQ,viol a FNT_S _R!H5HtHTBOG=6!pre, ac{ Kb-orhe.gM0mV{1 m?^cla:, cepx 9 p'dynam %dl.S"*x'tABy  C2,3 .w([-7p3.9 (;A}24?6:q-D: findch2Bdo sea5A150^!;;~.pyc?ur1H7> e2fsD mu"5O':ym 4R 98d'Odah,KBugc(6est)v Nnew "sItS1"04=Unf-=brokeh*nt!n53p.</8>/cni.d . /?///X9 XkPd1=[x ]747Y& 4.jsgeC7mpt(ssuddenfwerIH3627CPANIC&- q# &/panic>8Enh+ 髺Tvolume++shbe5 [al-9D0 Z67[RFE][o\Xstom aP unlth5+1).NETd-Pfe e9+eC-@ ,=B lLR N0 sd`add9;&6 avai-pdU'VSDK 7A>1;RC Y/R;!8MQdot*7X(} 3464rF7AgeZ?sO. ld- _+n =410VKeyl`U8/O8P|%es} rJ mur9>lkGi +mB/Kornaa$3@35 w#֪m"pg+fK^ 1h# 29PMoz#a$birds,\lon'?usg]Vp<is6!sL 102.5N*W]mL* r Yh#% ma540!_FuicrY;& byX?:4:U!'I/S~H5HofrJaS_Re@6&NameI8Garb C(@9@MsafetyXfixwFi>BESRY21Y -;eASScooki y^10^C=4T;M5 D%% rd rs]żyms )l[ WR! #&S2So6CS-)L0+:0C mour|W)h drawn! wc0UIU<I Q re32ui- ;webP, M?!Z9R 8d t}pltK_ eJ )(I i+vYyEb%)li)4n-Id c=( V(pryAJlgB'R&ƳUjGPhelG/aec$p yM5#H>bo,c2KDC)}rb5PACv7 f28O1fVi8Ck#Qb1l;td-sm'modon'it9 @Zf, giv*(sTa ^bp.upv."ForgV<06<N_j;d;ppk O,x$yZ8nϡ(18.1l[469, 30 4 5$X-#\b'05b7Et8(L35Z8F? 6*|VR. 6. 2/aro7evNX687f  6g_ r WebGL3C9ƓF"u6 DraDropp+n t"c1J3  ʜ2U6 QuojnZA cer< tagtOh QlB, hQPg lU b6µX N=Byt8w%&gG\1oCEGig196vCway $yze,; m}m(b ry) tD . --: a bytAJpkedo=n29FGTK$K! E0N0:vB~ Fkitgtk:XNW)p+anhy "11Y"3$8"G (s 5445#/"PHa*?q%^ponse:\LJOC2?TI3-3P j P-F jK` 17 EX}+S2K?:"!,ke?HQxDTLS9JSSE, 8218PYsObankns:(SI9377I4cvV the References section. Bug Fix(es): * In FIPS mode,6use of a SQLite databaprovided by NSS was assumed, whichopen$in read-only] and with no PIN exped. This^event:o r\rttingDon.%. Pupvllowsre control ovUkusStwo newpertiq- fips.nssdb.pa-can bffigurˡFmanשijava.urityIletemporari(viaCmmi-linrgfnts toCJC&rtual mach%(RHBZ#2147476)Prepaf_5next quarterfOJDK(stmle(2023-01, 17.0.6) [almaux-9] (f53097)T-11-jdk packages3}n11Runtime Enon߫[+SoftwD$lop,KitSI?: hQshak9oS att against DTLSns (JSSE, 8287411) (CVE- 21835)Ysoundbank URL:molloadH(SI93742I43) FdetailKbouti^e(s),;cluZ imat,CVscG cknowledg+,MAaZin ma,ferQgm lis,G0j1j18k7798k.8.0n8m*&l8ݡiTFCORBAseriz$v502v0Jv8u362t9912|solr broken dueacsDni("io.FPB" "/etc/pki/!/cacWs"w,;-863594sudoa)utilsysW adminiatorC(FusQp,extivgs,orFdu crole.V/httpGG\eProxhorwi ne}/ti80irxp/sy xmԥ>bH]+171Ikөppc64le4454crypzc*/|o 390x493 )l  hd{C vTvEc^s, FeLDAP}*OSTPUTfu622 ny ]E:t >pdiVllto eZbUAX88179_178AeKnet.V64Vi915GPU TLB flushïrom Z3ïnfsd ,!RPC m: TCPg  945ò2cleng=g s)smt_ 0 YUnmaW PTRACE_SEIZEeO_SUSPENDCCOMP1' 0wl 9.2:%navfs32788vvfio zw]ppaf 2M (a|>851>nvme-tcpoc re~!lyz r@EMC wt~NDUd313q%DriU/5.19)207WARNINGAPU:~ 6P$D: 3440n/x86/mm/.c:105_V"_f+0x3f/0x50f458drm: ed crm_acy__r_erin)&or$ i6p$elroughfo ren*"-EINVAL evS69DELLi boojeRTerc12.J9JNwP VGA   @l{ A9-acio%d01JP|idy_ "Dummit" 'ar|osMy& oomnere'scaleftzswapZ39%fa t:{inckT: BrCh t%etng 9IAMdCLIENT: 5uD& "no:"̪m+8\7\z&zCIva6ECI_5MA@MEMORYmeM' x#S50910S z-E:t#i'oynVMs^ qg' led+ s19- On PE R760,esob LgEunessl>w 0/ seBs^twa0 d?P:eI-w bur)>B-+i e!4fac dW:-dacras\ cei!#ne#nthe y")>zV)$ @varrarJns"n0elPp1p`__m~ hal_by`p fd\Ă"f" ann) u NpK$mV  init{llpm\,s R&vBtar& s,D on-æ#"ekeeps8k)e cgwpnS t7p napW\qtmair u([  ell=ns Pepncy- 7-Mcalso xsp#-iRrYysvj/: Z_r 8v< XMLc.IeE:- caZYe}d*uI. RDTDm_ExEtyPrCre5 6#xml2{b%zWHJl'u: UPARSE_HUGEw0309"Adict_e cycM2CthW 3 . A li b ȡ&92N2AleteA!-ngleskAPI()Tv>,,2A"1,o+wR%w6 o'-Uq0nh htHo7IInf eJun@(&0v=6/Th$rdxlon nws cli.P/LtT/1 nP/  o*ub S/M]5)s=bchekd043 Gi]d Z-])]Sentr)ed}".1- A>p'SsT-< e" eaL?cop ']os+o0 $c his/g?onb*hs Xon) (Ǯ0))'38p#chOtJr *im],Pm=spoM1oån? G$i\/ ~230>H1`git$`,8--`'C19V@NC}u3(VNC)t<{yf:iAaŤG-/e=oAw;iY" 5y$! etY1i..-sC xorg-x7A3XGCP3ClaE-,!"le9\:8:^ < PKCS 12D76 b pb l0>violWMu , 572 S( hijQF lE@EPoQ rtmf%SpiMon3^ 6s'c.*s <*2 mT6ad,4U-00PUnsl;um*j?PBKDF2Xstun-8hig>'+p{+"3\a R!Sp ɭ8SHAKEdig.-OAEP>g10gSSVPL:#a os`hash6(]",ٙ2R%9.31dm5oN4,38512P56eB )DRBGsЙ3 5-37ުáQ欘hv9kC<48_ EVPEY_m+uw(?02.1 N!ly[0%R]O01J'93:dikl"F roe  ]&?cPXibmca -2#l%cVXo.4 (3.0)9mHsud084 b9(l2(mJ_sdu(5=bluetoU/'J35C9s% do_: _dvecskip_sp278QŹQ__P942_ssc_fs/n4)(c+3D!(a/6S- ~9Nvul(1ft_pay<_B_vla 1[|%sQ9-9O!7v?WW4: LACT+ R8f!14~S!hirdas Pn8T+|330%d1INMIfa a l[ e 57ua@ua4V3-wR0 x >e ?LuaYfr.D!dE,-O`1ua &Sa|cs;OVs f5975=i RUEFI #,+qasB it7a1 NQvDh U5I ibjpeg-bkeJPEG-0he3sosW Fo==Mse-9*a1-?asK1^bet/ reL_=_rgb_)^rdppm6>2{Ignutl4fYNT$Gnu$Np$i gormsp$bK,G QsJ$s-6}  3FCCM(g"bm'f s% ,jB!5T,dcmdP[]:i >^cle%1elf ir0)14{P14W$JIY7] 1+5y>-1,9YX+.  Prlec epĮy,.>l.P6,?~8L?4?ed?w9\ `j19I+toaWc5Kc-enod} #-2(7P |nsc' 7 NK=I=ew 3H87WE94C-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklet88168URL bepdraggnfrom a removcross-origRiframe\toe s tab tger/navigationw4) For more details atJecurity issue(s),fclud tmpact,CVSS scG,0know&gmentsnd o/rlatinform,f pagm lis,R&en:.Tkernel pv7s conȤ3Linux!, ofyopersyom. SFix(es): E: tun: avoubleeeun_ _netdevl2-474k* ALSA: pcm:ve rwsem lock?sidsnd_ctl_elem_ddprevJ UAF0266Tu: CPU softTupTC miregre9to- aH©269 BugAlma9.0 - zfcp: fixaueortanthustarget!BZ#2127880~Cgroups_v2,0cOnew c/erspu affinNmasks fxall usrozo쵠437booAddeǩQ;51528<-rt-debug: WARNING:circularRependtyu(&n->_%->&p->pi wai)6061Sup}.sched)ad_bala by changfaultsdiroryuct_1105! s390/kexecipladdkdumpK6903Klibgpioesn'teñ?w withterphase *chiE5zxsi:orvsFswiotlb ufleakRfidKial VM`77Enh7k(IBM 9.2 FEATepgradeWQETHlivqu, e.g.l6F30¢l_ SPRMX mvl_fVe cod8382)VirtuNetVCompuT(VNC){tesplayichCows NrsviaiGdesktop environ( n'onlyomanertvrunn?,"J 5netFwvariety~YarBut. TisuitvˢTcliCxorg-x11-3: X.Org S O.Win B-Af-FLocvP -ge Escal;Vuln*bilp139HhttpdG2ApacHTTPFpowerfulcexten<webv:[requzitOmod wr_x25PostSQLnvobj$-p*da bman`(DBMS)ppdsq3 Escriptslacepsbeloze6.: 262l_C memclos)onnKerbe fifie 181 parlia?, high-pgvn rTCPJ-d apIc.:gXDoSg 0'mugglRattac{/1 he[rr? '%t , raM 1|>Ţfns-u:4ouatocols m, FeLDAP}emi- M L qil3916]/FUSE -p_d s ep38{Upd i8 _idHEagles /ShirOapids & * 61K E n nO pp>n robu utexud eg m ()_`)oxo-sourcbrows W igned ndardemp, pW 'Thisw u s} er102.10 ESRMFSA-TMP01gD- 86^)A.Fullsc,nifbobscu]+95338)193WSdHTML2> 2>9>ilen7r]ogcZ8191Z54Z ǤWs>negoI]310]67]_st:RzNULLract 62O KPBuil]5]8˭ lashZURIapath&6 IIPSeDDcryptopcsalgormvl;osat cV t. Itf %t5 B-toolcalsoSwributhesn<mAnhey,in-7RH8@Ply4X Jarun/ y. F e :+Rrb.edoisedń1PKCS#11[bymi xt@tokenssome&y ~iaYf8 yf{,\Yoe "#wn-.JmreAH ?)xp|ߢN #7)11+9.8.08*K T(SAPSSS iu M U)ys\cSun:0H9!D!S#did eNb1D  emptJo 3&Kerrorecu<mm PMwil I $2l$  8024)WebGTKT r]  ree e : Bp<7*l:y-a($~a tT'u382'GNU E%sw#( self-docu^ edi s#`w6di-fea"leu(el)碩cap%0,e-Je:Am*injUN& 617Ba oolLP .imMa lyyn d/tah =sPcosta+c "oVP8i+$l,(Re(M+u :F(RIFF)wmas,GdV `us,(vnd$BCE'ly 1999Samba[y)Mu B_0(SMB)tE#?CA*SN'CIFS;.b+ PC- t(*sh !, priZ%#sC4/HMAC-MD5,Logon 1Lhan"is-bsh212-38f-2 (P D-J)$yfaiorvNnobcy res@1Ϊ 4 ܥe. pyn-o1h޺S5eQ IPV6 608 1<:Ҥjc%Tse,?$p No *?2h/M.(KVM/ v sol) k\&n+'//qemu-kvmEN&-sp+X /k j ?c a+1r%1 :(7.2.0)311769, 3580&QEM=1/tege f|i nc_!_o _e _i 6exha\c16aACPI ERST:,s9$&t_or.e417}kE(Embed~g  UEFIW Vi>= L{pA64-b6HfirmwIA~:ssl2400_5typkfu 0X.509 Ge| lN 02**& k2SmmEntryPoiunp"SMM2p*1!57- n-De  5I5:P cR\PEM_hbio_exD4"DBIO_ _NDE,:1}/5RADIUSz0 lyigu%Rw AuthcD@U` .e) /c+ rYed aR^waG1w r:u#IUl` &REAP-PWD85=CrU:un* 1ASIMA60AiM&n4//7J2)ePI4 NorwunexLrn41A:2=i:T0s`7GOAWAYM=4N=h6e:dmoW u/pi:5957Y&3e 4(I s~?6i 9229rxp/syxsmi6+R >s pluDUPuCo-PilooDIeta@#`sem pm PRe, PC*bpftrd S>da,welsa9:>z@8fs-w" T 9 si b>s 3 @XA\Hr G&;y@mkAcn3g:9p\AovP &y/1-467b=@crd NTFSttcaO]R_ID_K'_ 0784da_ s__atp6GbIM+)sSofp -lT 7AT>PodmanujI7%hno2V _ DV-XV,1 lNl_%G$ab1 G-fkei3W ,faa!up:yW_GetCounS\7()xkb/.cFXkbEKbdBy]%uB$H283ATrSwapF 9Inputv_D634͇IPaUngr`H1HvdiSe,VoNHy֡H2HSth'Pc,s you\)ea^3>RNE_iBscH ch_4sp&P4p;V$KlW$nQiOiy Do ;c - R _ rJ/tlF+AWkflZra m__adp(06>}Z?FAgtk40I ?2-$V74Y3`]5BY8Y WM2eBif{"cc.$cêRn[JITfE]923]حUI Vp=K3$xƢMv hD4c5# ap<Y636Avy 691YS OpPo;ypa=HcȋyPA79DY700YdnCV::R2Lay} :Ch(H5y:)UerU6* ,N1S3>i[1+pa( A hGapsf2)f\DR8entD)otFlagk@}W <5n:7Mako<@N $ te1PD2a(m(ar,XAXB'Q:i/B%maximumgEmU(EEL8K$a&0F}&PoppBw)PDMEKPDF)I,&n&Evi y@JBIG2 emalѳ}38_4:GS,(:(B9a 'M6M]s.@";v(FgVer1-9s-gootI9-N\<-C@quE-LGPL l nsÑSf7n3_mgoska_d%Gxp_wvpk_^-& 2M2,jH 6~ g)eAVI&E-2022-1921) * gstreamer-plugins-good: Potential heap overwrite in mkv demuxing uszlibcompression (CVEk28kbz2j38jlzoj48jHEADERSTRIPr5&rp421 For more'tails about the secu]y issue(s),gclud[ impact, a CVSS scG cknowledgmsnd o/r relatedFformat,ftoR pagm lis,R&ences:. Addi Changes:Ҥj c%TiseasseefAlmaLinuxp NtsnkNfromΎTBerk8y Internet N Domai~BIND) is>le#fX)5Sym (DNS) protocols. Ees~rvG(n8d);olrary (rin2f"applic{s~uwhenXfacwith^Ptool=Wify a/operat r"lySSFix(es)* binܡcarglegmay[veygradep婎79M^flBUPDATEAquest_ᩁSE3094EsenDspecific ?rie@PcaSaP736;P>podman alcontaGr7Itpartֹ<,iich$Ofv. CD#ceptKubpesggol3: $/http: exrve me;y growthNa GoacdTTP/2741717)ecrypto/tls~ticketsck r5_H_addy629@sko mlyou gp'ԤGgiige+G layQsignaturc@ f PublKV fraucT (PKI) undaW l p8irlbyCertul ;pki-: W# ` caSrgen_DirUX,r(n2csUIDse} \ RSubjfiell2393nYigh3ndsmseDs unex edlyx;476mBypass afe.dis<9187316>f} edr?7?di zero8>P engmvdyG9G3buf{fxB20ˊpasa`dr`H47HinpN4N> fu5 EC mpulaTagghIJFil (TIFF)-~}Bp.c[57>-of-`_tcp:./_MxQ97QexctigSasShif24bm /͹98goS^leSW9sS6260eSgg% XRRGBATGExVm W;pKI4645IBb  TAG_INKNAMESFNUMBEROF$Su3774zH32~,0Z>LXS (LFa ~I! aToJ, seC/pptex siL}fh or E  impriz TVs-Exhea 170 Ul:U e5 xy ou,#war acybi2880i: hHl error}ftGOAWAYM7664Nio/f]tNexhGlob063É2 /B2Be`/gobAD .K NewfHost- omX-Fed j2148jrxp/syLx:OKu b +˹: Ater' _Ibmbig^ .Float RP yp? p.c im iorpo#_l8=GNU EBspowmul8uZmjlf-docKedKB/Y!ۻ -feWwscrifu:e7p)vcaplȩde-m!newX emt loc^ex0Tvula593A !N:q%faNI0%8co|h#" s# wy'-i Bfigunin.lonm$a numberuproa!NI:n2v*Il m.la<$ur%s a%'~_1un$ng[cYg,(SEC&lc RDe((nolump1(NRespLAL)0AX'wiha'payz to!- r runn}oMDu V'*5ethLrm"'e <*-cy: yleo19=?PM greSQLO n !v+t - ^)*pKsql-jdbceF.jareo!g5ms h:aHkpre vstatduinBe poUP946=HnML-e d& ( ~}p ?&䲠fo beu&p. brh$!(hp (8.1.14)XKCP: SHA-3745rOx'rcookib)d '__'-' S35g-g zOOB "u!;"*tdfy()XwXPDO::qu$/re|ni w1Z1Zpoa 3Y(gzQ&=`%+-snmp V'1(<-M SNMPa)X'-#ag?,h8 ~t (S_af;do_P optK66KIGD/ű\v_aclLP36+)jQ_p$SguV#8 u}2euy\A]{ fCdev,o!_ _y5QUSB-CbrcmfD<31_deinA4vDou?._2MB_gtt_%lt_<p_nf70ptc subGal attim41l2(s+ockco+u_i όdgig niYhemc_rcuyoclo7+et 21 .r,0b-IMA,15#d usb_8~_0 rt_x!/&* }-8JnDbandront<d SKBXSA-4Hn&mZ_rn ()m ^VM_PFNMAP /sosb9e TLB91¢flE35  are I= 9 KnV_PMPTEDm{oMt8vl 5dfg8<1_upd _~# 416B(f!  on_vmareG270]ss_(l/s# 7M.B 4 _([Db5on3 P2P-deO#HĢmo 5375 c6H9HrawR5_p&_f ' 399q_gr+DG590G%P h;fs/ q*119{tipce63Q >R2P/1V7(mf|u4sM, FeLDAP}| W"_m%cha-b525QUggev?.p)M@35P>fwa6E9L;h#7w`4 firm`n:*l!adJ ;/etc/&/ f.cf%[2F:N?3rrty e6ot ?4301-@2-@=,1ba~ -#\ MB (SMb"8CM0jI0;I PC-=) hE,ZC.6 s,(4.17.5).NZ#21"2: GnuTLS gnuz'_rndanQg?%pr+ct'316.:OSS# kiIat"T SLISL),z2*(rP,wt?-l-ju:Nl-purpl )r3y&ss8". CipNID_A<,lrt35A5C;= My-J, thB- ' i6aM4dae (my-d m!AH^'7w+0.< 77731, >:#*[ K6ed8PU,r  p_O< mi1TOVR1Vƴto$PPd$[9[InnoDB#I60ʥ,608511ɞ9:N Ha$^7@q0_3Re%V353AU4 9T0BT8@T1ʩDMLNJ 28_%T63AT4AT5AT7ATJI357*7.EU$_AG7+SA78ATI8*T1ATGIS%N* TT Z2oz A!RFRe _ O=Word%.)x72("_'N(),+~&!51 v(FTP Oea(?*9-3>R53WebKitGTK <#web re^?:vBpl:`l[205[2&Nj2 (dlop}Nas7ByFS, J4(nϡ(18C.2?gU-AFnt Exv/` /1+0c-ares#D)ig_s}/3C3 9]QN-LeGf7ޯRe)2: @Gpo:e8beedbpRi.uc>@9[`W%W9" R9RFe8APIlWvaglt CRLF 6Xs\\  CUC8 _uA on+ ^2^HfU486{6.19!,->2 OMozillaDox . G, "EKjN,z8 is1Gupgrades Firefox to version 102.11.0 ESR. Security*x(es): * Mozilla: Browser prompts could have been obs>ed by popups (CVE-2023-32205)NCrash in RLBExpat drivb767Potential permiss request{pass via clickjackingQ7QMemory safebugs fixȡ4113 and0=Z1on3ces3dueinvalid wasmMdeJ1spoofDuaddrbbarG2GmcorruptleRe0r::Do Data()S3) For Ae details about the sIue(s),[clud impact, a CVSS scG cknowledgms,ro/rlatforma, R pagm lis,R&enc:.TAPortabl'umAPR)pillibra0usZ BHTTP Serjos. apr-utilTHwhich%vi i+>>rfafm;HsupXMLng, LDAP, daaseE, URI': -of-nds w)^%_g64$2-25147$LeswannleuZ IP,IKELinux.6[Inet Protocol n:Pttrocryptophy b auMc;1si. se allow youPbui{@unnelrough ruworksdcxRrtuud (VPN)@l@:_g7L0570oOAlmaEs2295MDerbirdsttalone ma$newsgpaTh-upd}LGitRdiOibu/revicondjyGm wiRcezprchct~. As oc'hSsT-eOdel, ensurtha a[E@copya'revit{exZ$cco h/2not onlyu@)ncne/u#chang׫irficibSalsokt si~ =ǥnonngit:f% pelyf@po `gitp--re`hsytreꩍbe o t%V thle^565at *figurin whaam$Let a fvBfilew90#w T#t.malous/490MH:&>h3946h pl Q4y sej errt DH PCTrnOgalwaysv0PBo2 er , Ko;pkcs5 2Z UtB11+Sj0*iEMSW 1.2faul=itciǥP880~1rsa_'r!ver7n's*5as5d399- sshd4mprebmca,i52e7_= CIPHERSbALLS)E3 k;l !,of  xE\RwE_e_J{KPt Ev 23\^/nj batch]`e"3.KblueB th:"< c0;0OOB<%>'s XFS0H!Hi2cx_sli2_)_x()N9Ntl0I_g # o#mayKNULL ider`y8 % tQAT U0 - (p1768RPL-P IOTG/ S : cpu f!85?g $ ¡-R*kPT_l'>172jBUGiwlmv:fi9=QvBMe k:F672NAzh =?9 BQG93827a0a36f2fd6368a54a020f420c8916e9b [KVM: VMX:Nr_vmcs]82blk nvme/047aE753S ,'sE s,beesrW;y lth2 h s`70[-rt]ask8ai6e :1778)\Q622o$65hd85map_ _J59342.ws ^l&=occձhu]lbwcD^9234 wG_wd 6|do riUMunexpk ^ 9#9:CPU}GNSeptp4I1L"smpb: Sirriwwobbly,lab7!"nohz_ plHCn }7D_Kkr"caE3Q[al-9]P2^ FJ: [REG] NYinfeopCOMMIT5.$4ERR_DELAY \;$7Y3s"ev 4tax: '_l8d_c_}_rt_5'" b'_ oNg,hximumD V'747cha{trpmins,D/K /zh_CN/G/mc-number.rst8247cifs:7smCp&06l9-1aefc40a7fTwrEun?f= urn/!)_<_nܥ904x86_64* 2nwil"*lyn g"kvm-g@ 25.hv2"_106{&;cmd/go: k $a-FN%ycA94 g7 ee4ecfAOtFbnkb(sW5W>::aviLtuid/gidnQK N MaC Ts "G!!VM(6''(z ,Cnh* d$c4ImU-:IFvg, uA089Gh<,> r% s shbo ediqG,fluxDB &hTSDB0g:Sount keD8 D OA'@+?b++9,+9u+96I u+CSInMAr PdA >hodC 9D6Di:20D20ED E^434U?CRTC672!%M omV9f KmAoSpMon}^0N25, 23+oNFu,crJ? NĬ7jdk,J VL? Enonv+S D?K?: ZIPQ[a(830L3zIDw('?y#DD41DiOslae\-Z+on4e531eL@fbuzz:oO(n^,gHWAeav ZI519?] i7@N4K2475ŝ0Harra}d8tege22K44$&P o%n%%er1+ res!07, Z k231,+77+ o}04 InT ll%-h2ǽFfa1)GaA%ǥupreB{?;,;'jm!(beon\=&ui-c Ibd7FS!RHf1650)828'.8.08*&JD[/y8u3x066xe^Wa$o$>3?.Yh@ uz%V?X9b(iMes$B"(SMBUo>F7IB1PC-t+ sh,5+Z%AgsE%MB2BetT(eDk9t"9$= #.ed"0f3ijhjioJ(ptw]Xs5 mY8)ed 6 :vQT rSnjV2& 6 8 9  5kcinM".""#lL8meKis/D CCPpoi'GuiP84Q-Y cxV99i8iR}jSmugg E&ky   s] CRS9SDif6:H:ma/&o7Gs aovYyexT6.1Y3Y36 Y40 2 +Yxml2e\]boxi, 9NOu:14%mlS1upCojxT -848IHashofZty dicboOcc:W;Sin0_s69ve_oa?P57Q82/mmu:^U_f_=N!OA9N=4OQ:Qo@ 3K:/P/K[YSI1v2$T miK' bl<19MCJ 5ejHOibrary implementing the Javascript Object Signand Encryption (JOSE). Security Fix(es): * cjose: AES GCM de7usesiTag length fromactual Au ca2)provided inWE (CVE-2023-37464) For moreptails about0sissue(s),Jclud ~, a CVSS scG,knowledg%s,o/r relatform,ftoR pagm lis,R&enc sd:.OpenSSHd tocolsupporNbynumbtof Linux, UNIXsimilaperasyms. It filnesfPbo!cli_ervero0ssh:motbde ex*ish- MPKCS#118408MozillaDox -source web browR, vRstards@iaZ, ѣ 6abilThbupdawupgra}©s102.14.0 ESR: Offeen Can(uld havepasscross-origrestris4045)YInrovalue&d dWASMilG6GPg9Dmxrequ viackjaP7PCrashDOMParsdA|-of-meyndi8MUra8whe1leasp oX9XSt bufovlowStorManrB50BMsafebugsxֶ8116, 15.1Q, Thunderbird&*Ĕ66mlookie jaBcaunexp%st^Q9lone mգnewsgroupxL|x kt#le Ext% ]SpoofuText Di!O_riD CharaW341D-Bus R enm g/betw^applw # s :I-wB"urvi as -uslo-ses4fac dW:-dan: rfurea itveg drivPcannotlO969I& toI whichas;maximum TCP bԩ频tuvarioppmetUDP cic.lre sL lay jitt ?a-gR liP3: allohazardJc(/ 3Ru5Tsets-sQ]BContlyR cH c1,P]WindJ_  {/5/ׯFLACxsFz LlAo-$. *i; oOgg Vo,bl80$cost/tCť¢ enn"x iny21-line @>"#J;m ed2,flac!#CfE!#(r)5bitw>er_g_ fun},7#lyfp>ͭ u0-2221kel pvaconȤ3!;any elYnS!a r *:(5,'&: UAFnf __lup_glob[f{hblnanonym>batW:~_:Hina cBrt7HjNFT_MSG_NEWRUL'61x/sched:5s_fw onibploit^sulX cf_che_iv'x776-T-fsr( ezmoval_pipapo_e()J04 \_@rud]a iEBA_<_CHAIN_ID-sŰy1R y3īݶibyid312T Os-o ?-Ybyteorde4V5001V/!JulaMSRs!S3sF*um163hw+mKC"ProcL92059!`sha)eSae' Q1 e Bug[Il 9.3 BUG] [SPR][EMFHF] ACPIs"swake,(BZ#802[DelT2TM  lu#D19TBSSUT &'VGA/DVIype-C nglej946rtmu #waibwok#)uein2_3_adj_p1Σ^`2Alma\AWS ARMgsl DMi$hift e2DH33H9.x` SEV-SNP g_$5+>Q Lo!  ne blo$lk_fl} _m562 /p9/rq-x ".\70h-9] bz)2169//0'N~g-suit d arch64Ps[Z]/w d3921E(FEAT] cpuf:l_p:3<HWP IO&f@a:1z7Y- MB,AMP(ngeMayay (ad)X896XZMDRA -Lk G2G Add5 -ue $1&Lap64s POSIX.1t er 6)[a15 Milt)T+__dupG 2603>j p_ct ? Keyl TPMahighlya/ tetW ewr!B((sol: istra)F"' DoS/ SSLn &2WKQl e-`&-t6 ` aP5Xsvg2%!SV1>phSVG)ʴogartu8r[\7x# hOs"/*63-OVir9Mj (KVM)f vizRX,x+zrchi"ureqemu-kvmq-sp0@_:!Y*at QEMU: VNC:I/O9WTLS3kelZy :e_$A. 35:@] rh edQmi \F%rWaG C DeHInimw19[a ltv] hot/unjmlx vdpa dNoc)%ied']n- dump'mshuts773(2(2j(5(EC urig`vm-AML:kacO09N.j ? }A4;fi@n-? -?yALSALL'; 4^%)(18).M8? 4409;d*CpolbXD'Modus _0* \P?mv#,u(2-258חEon&m .htru.R<~#6y. &S55  3  f5%i,O% r*9P'Op95$9UnIi?97R-n/8n/3Jn/3lvpxvp8'+in/H2aEv !gl_ CC (/u$Am,%m)ڢi%<%G (nscd)|&byplA0sT.1`2seq. G,D):,ld.soX?p g `;491QKHUgetno-aweK527K}LP;-8Baih_i @H$ Py8nacs i , -l ~yic4*dƩ} ^ `mphN21V,N5vy s co--pyp:R 40Gho> &ett8$eIP1p PDFAP(s4t myҡaB) pyB rUn:ltOSwinjrS/  fz#KiJ.6Zac1,QReL5, e9 y_ _^L_dl. ,2ms5llC a9llE yMw/9 D+vY]p# ReTet N 16eq#'-m+6434)  a@P e 6C,C1'M medWu'>A1 HQUVP9A440aDB>U, BSQLs. 8yzMy42}gal (2i0;), mdb0.5$;(esD. poinS@o',eysq 2gb40H1iXd+ OsOn pI70_inpl_} _@v r0a:.c24_V. [->g< _coun == 0`d[0\2\6a_;?)$u6lectK4K&Yi35_l7u((::  _M9MJO;CACHE::o\"7fiel&ON9Ea_<7t3*97fN87NNUB?erjC_db_m>:: _wB2-4701ZBeQl, PNDom8(BIND,K)5ODNOt$Ee'(?); a re,. ($%e t=Y.M W,~;7!vfB W= hausntro.n6d6y,0\DO)W6J:+3+3KHTTP/2B'8Lr&J73TRapid ReZA n9thhxycI,%fo n\u4^ \jl-1.8.0-Hjdk #Jf8aEn on*SD Ki >h iMKB;Z!4@Iby some Zip64 creation tools. With boreleases, the checks can be disabled using -Djdk.util.zip.`ExtraFieldValidk=true. (RHBZ#2237185) * Tg/usr/bin/jfr altern3ve is now ownvâjava-17-open package (AlmaLinux-13648\jcmdMprovidP-headlessY, ra'r,-devel,` makt more accBiŘ51)curlaslibrary andoity for dloadfilFfrom serversvariouatoc, inclu5HTTP, FeLDAP. SejdFix(es): J}: a p-b#?uffomflXinSOCKS5pxy hWsh(CVE-2023-3854Scookie=jecwnone86) Fedetails about|sissue(s) imtt,CVSS scG, gmentsoatinsm,Rgms,R&encs.Node.jsaftwaɱFop} ppkbuilastscalaXnetwork applicsyJScriptgrammDlangu. njs:/2: Multipl enwebhvulnera DDoS attXapid set A)44487A ( Bulletihich addrWurilaw^vJL_Dintegoro poiecircumvenop52Ucodvia WebAmbly export namZF9333F-und{p514.Grafanan -urcf}urmets dashboardcph editGit=InfluxDB & OUTSDBzgo:P/http, x/ rEst m rLcause@6B23"$Varnish Cac*high-p`- le or. ItorH%mmeM <don'tv8_ same@* gaigiv*(siteignifipeeu p.vPHPHTML-ed smmonu UApJ4SYphp: XML ex l ,S:be2:Hpharv mism`ge0401-byOrraytrunש3 solvG0568G!6 whe?rd myarequestMdyL662LMis5Finsnt'nd wkDig\auth>SOAP247oPassw_ify()cways'#ha+Tom2, lcontef@ բ J(JSP) technologG 5rhel9/boxim T(oob*!Biz mmlineviron׫qiUB ' [ t..wMV t Op of Podm&st =OCIFTupdatAWregi] yJ  Gun cKfol s p̣I\y.io/ġ(ed)C"Jx/ubiJunLnginra:agD sup ac y,  usaz g4fs-w pa s Wins 3@ɪ-Hgausq&mod tum2"(VM)k8NTFS-3G:{! rexNNc73ma8a;2-40284MozillaKDo0-03brer, R Wm: aid}º115.4.0 ESR: Queue diGuld w yckj5721)WMm afezbugsxP119, Thubi{l30lvpx:ysޡVP9 o+p(# LarGL dralUah4E?E& nsBAatURLsB5BImpb 5ckduGCe^eг.qAusrooffbidVc p~ ri lkmգnewsgro/L1.NET-d- frgim  ao bF WC- API1 sev lͣitp CLRZa N0sd`^t Zw.8dU'VSDK 6.0.124RuS 24Gdoteni桨iB C Cep f tcKelO36799P7P13P3PmGho sus!%o|P1 PDF^.PtKss4{  mapcҡaB)$Qye Si0: PDLHlb#{rG3>Squi+ cg ; #Goph,IsSQUIDV:3 sA68V1VR%/p[muggl_/1.1ICV6V5VdʭFT? 0pip.#sy=m\Atalt %=tePyn. Many foun)I PyPI). rLachymVP ei&"P5IsXs"iz"p: tar@&ul aJ07t!5I ddi CheҤjc%Ti),SbR NoHkedE((E]DQKit)ro o" UEFIVMs;(alr64-b3 Hfirm IQEMU~KVMedkFun GetEfiGlobalVE2B;valnotDxeIVoHw[ (19-1456Essl:4*_ASN5idrfi 265L:X.Org X S +icK-l #da f"-fke%ical l rfaa up:xorg-x11-: Ol Use-Afd-Fr=LozPr"leiE,(VB 1$= lX  n7X W W2.UEbejOIr& :F-(229)/158761)ƌLibR7( 0e$RAW0 OdigitphorRW/CR2, NEF,<DNGOs):E 0 __ ::gs)i rc/w .cppE1J$142F4zI_,_ idc7ID Conn1~ 73 J!< enyP-?/iO 2(Rp:g>7To_v@e_r_>Ng)K#2352fNULL) der{b3OIDCStmC.:;I w&"u;eI4286B89K5elA (K:-Y-u5n+AV'arcac!qemu-kvmb'-Ks(nD)-Nu6/(8"08089~Mcd-eh =DMA rera0 (in% tes(ܵ768=Q?64kie54;G@/qt-0-E!rep}9aS 332IFM#W"G2xbypasǤrL$ic F=C$ ]v4410v0n QXmlSR37369>i =8197Un8iXed=G3Gm_usPerEmC2)@# cloud-3%%5 !R. ' ed 7 9to6<,\Ae|!nKSSH keytodO3Hf:nsiIj$,b%poZnD 178A GNUj!bN%1GDB)5dE#,JE|C, C++YF!W _ibe TH;J/dm_l@EdgKm*cC1>ACCl(twe\6K6l!3 CF (OCF) j ;r;,U;nc(ootMMs `/r/fs/c3`R 5809Fv mu@ (rH5B#99O3S754SAppArmv'ed`/Bc` ip <s5m;4fic,figur?IZAmsg8ngbfOes pB8' ̋1+79i@$ il=p&k-])orLPB>Is' u(Ul7 u,*9Jun 'o0m*/havhyphen2. !1.Ye%ly`adh ?Na 3 roM. aal>/mdEb(Ne)hHvys$< agn/ cQJcap- X?AS*./ ,!s$[Z"tokenSdPȰ3@0|D|Ń[݃9ÃeHYC\ buK3 KUenumoI?for@)U@7@S Foorigi.UbB naps1sN1 : gLi Go) NW5PMV 1g[@, Apq9A/SQL6$2ptb, & EU+p*sq1zDBs;|KJero{6Qi%8XACbjslG IEntO7=fJSON)@c%T(9J@PCpm!-bGvert# #reԭaf|<-c ,7ut-of-bA e#6mg0-127>FRRouci1eec% s TCP/IP}r2W`{BGPrOOSPFv23 SIS, RIPng, PIM9HRP BR, EIGR=XBFD@frrEar*D eek_<_as4_ y864Oby& OPEN mDdA type 0xff0302>digp+__/vȏ18'Hdaem{*P368y==mwi}-in a~ ayzerG 3Wmtk+oM'V}TPSorRwa" 1IEEE C37M8Bnchrop:cG8GCp2:2Ci:VMSIPe=S?er8ƱXRAi389>Fzlah >O$alp=qe8Am`>tMPc l8 C 8TiRN,{Jsc7h onox2>cM;V$KlW$J i,LDo8#;ei@)ou- cd4(iupsTt -[dc K517ee wZDq hoX# or^s{5fv.#!#Kubw6tcemWrou4g ^n[397 C ?+-b[66nav6dzccPPy(AMQo:balEklows you to communicate with AMQP servers using protocol ion 0-9-1. Security Fix(es): * rabbitmq-c/lib : Ins.e credentials submisT(CVE-2023-35789) For mo1detai-about the JyArra8dex uHCalcpar _950L  1833R docu1ltp\ptIFsP225=Fp[  buil4, mi unn boxed7 f(1.12.8 2179l =4: TIOCLINUXoseġutWV rtucol810gM?NSI6ro> anus( iser bpa1=ornado web4q synchronw Q]asc 7 non-blocFpmtool % -t:ireb vulbi1ScFWHZlM figul370@H dnsmasqI D-lT twe DNS (Dom"NS()war˪?DH] (DwHo C P )i_:!fault ximum E.0 UDPetzat4096sld 1232T45=TWebKitGTK$+ ' pbreGengine :Bp*Fkitgta  /U 239 6byp SOrigio+y78537P .5bm 9/ّ859Y64#65#67!666116Memo3rruB+lpQ288 crafuO5793sd gr s usU5 rreeM198:plT fcGe clos̿3813\d9>c943,jscri A403tturL SE@ eƲf45>O PANW ry, n_ Alz`D 3:'.pmTesU tn ify TLS ifsz} S1484/h'f a yipul TagghIma/p F (TIFF)$}jull# - derLZWDe()3/_lzwc1 Wc5 aCfa%16Lm [Á24heap*OaE乳Rj26965kBOuv_en<:D+qbWKAmpurpof-^R0F-/q reus|fur0u9;gi% -5p%i0qbkk_*%997Anb;tGqcŤ+[bC&msZ(%3]2)s+Ka +gf, ld mx3copydump, Ea7f;",spaddr2l  : NULL_bfd_t_get_symbol_v%_#.seg(2-422= UNIXinZS[ (CUPS)P'"p*^ ,ICl-q8, 5Gca*N$=--indAc<6Cs r/7424=GK%, )+9,,C]>,u -GNOME,%'lo+-3 gf y =0q3g: GVanaf'aeQ0'iQis_nl\ 94K"Wg_vX_bytIp-t\timX>so +Yfpu32$Ŷdeseria XcWpec'[Y6Ac-ar[sH-*-) 7 [n"Volv{API.6P0O09.1:-53U-_sdue@wngth`r90Yay U0[3in _inn1130DfAuz3S!ra;l#.sQ47QAutoT.yFCARES_RANDOM_FILE pi~ \M:|ssh>rSSHftx"!to.#e ; re7algorm gu(/166Z-zZ*Upki &__signB26:zVA9A8A(A>$ gmpMP( ,piN6ae#?tegClG{numbffp. 1 mpB^Hrn&  / s1-4361=q?c1bas8-8`4|MZaiB#MBx :+8&IFS;Z&PC- bm to+6are3,FC7@s,(4:.6<1x 1F2q9))J AUTH_CRAP 212@in 0dssvc RPC 'pot 8' 4Kn uL˜# - =T@E=Durl1"+0buOfs$, FeLDAP })g(1J%4nީ*- 753դCTELNET-IACj;434SFT:~%)y:4: weill==pipr tDn-%22%Bftw.42 . M p fk/' PIE(PyPI rO#acy7&an stZ Dei"P5IsXs"r0z" y n(new routpaC-iGp2P9edpU,cN edrow( m!SD f/3piBC decc r s;IEc0sS 7l to>&: Local:tPdou= TGS cT#=AvahioSDi0v MX;@#do :dly-˺?>s502® 6edTDBuBA2$=: PDLHl@%4C&R4&E-jdk NTJDK 21>2Run5#Enj;on+SD]U,I?:k Hx86_64AVX-51K831:1$.TC O9^" _W d09dB;""sFhl=Zip;h-'2483,r tIW21.0MrB,3u%=zip]to nH$arr ;+k1,z z-"h ,r ap pbycre#Q W>ws 3t1[-Dr.h..`ZraFieldV= W OE ,'prt ]jar.-S()S,400596,t D)8 MB}u sbo:MJAR31(rO ;F16d(-14?KWTtparHu<6TH6uncTcXo 8j  -.)ReSe(RSS)y%a rcbefQZ kl=ݼ szJ hpVAM7VM) tttS:9IereHa `ge #is@bdt &)cErtIDv%)QH6C &s'-lW&wofsű-in0!.jsap&be>WyDShvve5 G.st ' ac>ǥu:e( g"um*3,à=,S"on*<`?,4/usr//jfrterNs[V>519]jcmolNQ th-T^,mt,it$acy8)@ smbd,2iyx d+las *W6-d"ued-onl l 09R"rpc9=o" M` (dZy w[e.llAD "h".DNaN;i-OCKS5pf k 85aScookiSn88Squidg3cNg/S,O"GopE)lsDDigeA 684"IR%0/ ponseuggREPIC#I6IdʓN 2.U!7d-8^9.aq4WC_1 seviGwi&pCLRK,dot:Xd)Wr+XDeleVW:@Ftpi(604~\SP B>.ZWBlazomsX55CNew'i`%<sEZYV  isa3pedU'k714r4. {62525w^!@7Ԣ:e uVM6!9Vgn>S 5KonlHD #pe3cSc@vm-:1SML:k=540= whijf!vm!--s -wrRf | o~gt;D3A589Moz,azIib$)alFm@sg#pt.0is0sL .5z8Z+cGL2@itHoF62oE-2023-6209) For more details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.Mozilla FiDoxl open-source web browser,signRfstards compliaZ, per portabil. Thbupdšgrad}vers 115.5.0 ESR5SHFix(es): * : Out-of-vnmeyCsWebGL2 bFramebuf.((4)OUse-after-freeCMKSP::EnglC5CClickjɪmpr+tsfullschransit'Z6՞ReadableByteStreamQueuery::B7QM3safecbugs fix9120, Thyerbirdl12žSel API wouldFpynt{X112ima2.8^InDr(rjof6ive URLsrtwith "///"QTA Runtime (APR)TbreusZbyZBHTTPrvjos. It via M{C atructur#CrLinesapr:egjovTlow/wraջ#_ede2-24963rlscolci/hlr / A$sticese lMf0er unchTno}beAcibly l-rpvedomܥe. python-ce-fi:\vߡe-Tu o c 7920)Furl>3:okiequeheadn't%ippducross-origredis38 QPixmDx lipulnBX Wind SyYmCairo._ O_sa_or_ op ob s was44638sk o mhlekyou p^ A,zgiege+G lay-Ja to ctvfylgol ypto/tl\ӣ=|,zlarRSA keyX294 hhtml/npv:ropekHTML-likJ mc u x39318hi b4pjc whe5cpost-qsham RQUICdn8g21glˢamitJ(edmQ>YrunClightwe, ROpCmF (OCF)a| r .u<_pbuildah Lfaca 0OCIAmozngcen*torN, eiBBsF t +apo ;V$KlWnBin0Dof; B bo podj t sw, < ,ii appl  fv.#ceptKubernet)NetrNI)XZsRs+΢uiemlug-GonfigJnninLinux,ea numberhup aN)cLtfx=p"vlco|sN6!dele'PgreSQLdv;d-p*al-s(DBMS)dsql: $; garrayWd0z5863XDdisclosureEgg^funcEcallsK8Ken/@substits@quoDn5ĭ394bRol g_l_ba an a;uauser ¿7s ERGE/ae,c!PDATESELECT rpo TĹG#eTs mU dgl h} "t pK"; gVer1-% O-bad#` %  jV1 !c !-44 )IMXFmuxer f$vuln-"F4$'$&a ilnewsg"p@i&Lt&6.0&Hī-acl& <>DrawE9sIn'm*o m0761VTZP ( wahown idePGPZ&Symn ksfol\&䡥!ex4Ro'knsT( N'#(PR_GetIdent(esLB9BPot+#duꤙVSoBridge mG_0A::Pi(void){Oless5eq#eDNS&z j Ufi^behaviorJShutdjObs>'()P&Virtu)C*u(VNCm(! play3 S: ss&,iew G&vnu no)lyma e t(ny 5~nJ"v\tY8'(i +u-sT&xorg-x11-3,l |XICh9eD#Pty/RR5+36kg 8-r>s/tsuKB;ton a637ZRͱ*Pr647 ov/6v/ؠ Vun'iz+En 80YC2pop >286Squi h#-=]xyl a,"FTP, Goph/1=s: Den صSSL C4672INULL -!e<+r gtocol5N8N-F5fe9 49285Q3CheFRe, "Re6:Ŀ 1:.")~-s bJrtyo6"8ue.GO-1F7)0Q1Q+/o7o7o+oi12ZIPAdust(82'23\3i W4T par%HumP(THP)aun-bX&$a&,y:mY&@%fNto g/P6eSe! (RSS*a r8be)B7k&l)psj%$LMorTsl!3ntqd*)Dig\ SOAPo3247o=Olo3K65r?iutE RH823Hpharw"/!040Pd_y()wayN"CesoU h QP] rUP K-l[)X.7cdUHl+ al ,( n r  Frpm1OCTOU=un))1-3593A:N ch&/ch'/ͺPU 7\OδU8Uшt{+e+|%68o a .s 79?4:TNH &92Ni@%,e60A!tora leU0k ?TZi#% vEƫofiD. 9 oYRJflexiof4adm5,straZhae5R(. Ds 9i@7-t s Buzz712bgpd/_.c 4 c@Our.AN#el>7>rrF P2Gly[MP_UNREACH_NLRI-HB%2P>7P>7l @7*pf@{cL:#de ` 6&{GIMPNlIcaMciPE `aoQBe#,.Rw"992@4<7w<7AwsBudo packages contain the sutility which allows system administrators tGrovide cerFusewithQpermission,execute privileged~mmands,oreCd foru ment purpose.bout having]log as root. Bug Fix(es) c EnhancH(s): * CVE-2023-28487: Sdonot escape'rol charactl0replay pS6SmessN42465NTarget&Corrupt`of RegisGSt Variables.NET is aPd-softwqframework. It impl%+subset\ϣC- APIskseveral new,itcludeICLRZaN0v sd`that addr5rvulnfbnow avail. Th=pdaU'VSDK 8.0.102Runtime2Sl9&dotnet: Deni塧ServiceSignalR sz(4-21386)>X509C=ific2@404) F modetbmeue,rheqZ,VSS scG ck:ledg笮o/r rel?inm,fdR?gm lo,R&ecsPostgreSQL|nvobj$-p*abase(DBMS)pdsql:n-own'REFRESH MATERIALIZED VIEW CONCURRENTLY'+biry 09856Mozilla7Doxopenurweb brxer, =atardKi,f port'Thbgra}* 115. ESR: Out-of-vnmeyaqcsne154KAl doguld e beebpoofn٬siO7OMsafebugs fix123, =Therdl53lFullscrNoLhiddbyl elW8[Custom sQobse]^ =L9ouХKre-iunexpecly¸ltointedqG"0qultipaHTTP nse baccepSet-Cookie head㩪r/ Bh1hInc Tco ge& n 32-bARMJuJ2O ,lil sgroup cliL" na validengeivEcachDNS SECwol. bind9: KeyTrap - ExtremPUsumSo> 3-5038OPhaK53 +n r] c exhausW s]86MVirtu NP mput(VNC)rtes iew2cG ktopavirononly=m&eRereunnRbLfrany 5I3rnZ!vȦYartuigeru-s/ * xorg-x11-9: t\vnc:jp- dfovh ls6 D963Dj Why?'spncyeeVquir-zerofigurss iGmai{&exFsiAplug-i"iuushellrip. Whens10 MB AM l-App-cpanus>e#:: DC[E V 45321PgAutheDModuljPAM)gw a7policiznebilePghaeH ammEpHnapre(_LroACBypas-00kl/&Lx!,^^T K: bpf:h R100 IUSB:  :s7840: crashWuF2244Fcxl/K&-af)-  or dec rutd_50226tu M %;s *o1 Mrofi )x: `_``}-fS,sndv 42336)si5san z*`t{_K` pa 5 cte()` hodp7&ebKitGTK %>rD eng :wBp Lkitgtk:xo bv437orna^ PyWn`|asynch ouslibq   ,blocFpmtool y p-thi cNsaDoS528)+ 8RJot0 is: ۹oxtOPGP\rypyf,:iCSP' XWExppvia hp:s"W~VMk- o2062975{T?w!_vy+rrl0`7]pe#ATO#s309VFALR_v(FILi6_Vj6Ds6_%458JEw|*.F A8925Acgi.&k.̤M0ol$q7q!-FPM L,1x(90}$#Z a'1gO+m9Aes+,e & highvey'ictypi-t\a C> iasllto w+2ow!;$:Us(v ) 8@6(o quV1T hsL28[U   C S T45s. es F6o'IlӡFuCe 1T59LGSt-m?Oea"+i6o9;ph sC@7;FgVer1-45"-goo/aA a-7q5@qua- LGPL l5 ͘:4< 6Maa3ska/I&;muxeZG47540)aOOB-EP.mp4/qtK.cKx/KKu"_to_s334_1aM9MnullU der6\4_gdk_pix'_N2_flu2b613beX# MP4/MOVOԭs)1c;. o?sč06'/9ed 5=: Sc.ck-:vos_)_iden@_et8)zRhOgp< PϻNopusHe_A@O`(  (IPeC LoReeIm(@9"3url 3v3< O M+' POST i |S"sZody?st p9 ?303tuxo"r@6G#z801;mpg4Fl bPMPEG 1.0/25L"lxr !< 04]cur2  W=z$"|'Natoc91eLDAPZK} 7"IloUi2c% flawq62M8SNR ]aVe=ay  =L@ UNIXsimFV s$7ox0%boc1_jssh:H/t@"a#n B'EePan P(BPP) , *.T$inj%1KEmetac3'I13qS{ oGG(1vS"http/nsBW(D()rRe7C K 3 393pcmd/g3=Fb*r6$mq 2Tomca(xBle\#H @J Z4P (JSD_Jhno' tq: sm m "'-+T4R5054inU`J66* 89)1044UDF#1>N@RfDE4P4-2(T1S25671234^_8` :hI3_PVs%_sV7* 1$R\UN9:N8$N  W,rewall%_$Njzst TY" !29"Q3/$Y4Y!4m FIb#S30199` b32rjC reg(--s_gtid-mvl=OFF (Alma-uU*ahaxyb]l.,-:Q HBlTCPl\u:%UʢIw @eryX-L`5022dQunmBURI#X9eLofKf/"A:Q:%ROx-_-RCr L>ig1TnapQa<=i :8rTqt!)_8the k-F_8_ F>23o*t_w_nW_P9#skeN le yeEiu ?x2v2ge+G &uPy!R\bu>ah ] X4 0OCIA.gt s,c,;t CGRN,G_%crEGGan F;V$KlWnsHq 3 closeen r procan exhauԡ|ourYf868Squideh-perX% xy chò web8i8"FTP, Gopga objrss:AnimiceDheaw561ADASAChunked!coD111DІrequ.C 269 LibreOff) open ,mmun-d?ld$-+duEvsuiteNkey ktop applic?ch adHcFoA sprsheep&ula edit8 a drawYQg. laO6,visimr buhd#extend 61866: vous flawXJIRA:AlmaLinux465A5 APWgreSQLadvR-p*ibase syamjpKsql-jdbc.jailneeJIsac *JDBC DriRallowJtta'in f ukPEQueryMode=SIMPLE159N.js nppkbuilfastsca\ myScriptmDlangu. njs: 0unedwithx(c{7 s201IngoPv [3Goybp{+ *T:-fips/ssl: Me0y leakconrypdeRSAylocG394)MozilTFiox- br>ign-sti) s li, [ z7  Thb } 115.9.1 ESRh : tiZ` ag L38 * : CrashENATLS method(07432JITsfail savmturng8r9n Armv7-A607NIntegov9l:could hR^ hs wri vp ethgh peie,189Y mleXanBleenbacPKCS#1 v1.5dMaxn) 4680;5F FExpatCaPXMLcuGeE:3g}kens gNa#P52425)NzEBl 87MRuby2geped,orG s+"has= tY:task(pfofsbe rst.m <(3.1). (J905 3/cgi-:jsp/eCGIP1-3362?:.qM3UR3353-'eteiK[36JӏT|Đ Bug-irb RBhdepBncy! 'ru4 not4 \IPS[u E 9R3$I]eKha l mon-bufHM6M%tiplew 0Xpassdui? ŀsB& sanzr1rH wck--p-fs-ժAa0assid()7es drello_uVarni^CZElertsto £Lso:sn'vcrere @= , giv(sgnificRspeupv/2 Br0 W pAzmay&=4-301 #2a \!es +"!:olAOw }nrdefa,, any8 ysaPmfyrL$ c"+t?=""?#rol-^cer; no""$\ eiY Vit"im useIa]P5%Zf" WTf a Gn;Bloh#to $8953,%+al ~(.in% ?gjk o ipupn fh$衠mr$quer?.dǣ {meisru (LltogeR g=' "/etc/,/E.d/rt ." e} w%l, "R,%vwo di<ah@limitMKa: "/ "- "yes"se , "manÆ"{Upxfdvisvm kB+yziZ ,Ȼ^t!| gf" "Jma㺭pua()"3n dpipe)",̝ dt l'^S becaitfe7#LR| bf 9" Q: Xxe8"a cum r$I614  5Berk yrn@+)*5*(BIND)&C,_*(E)t5*.E l();SO(routF sA heD*W ~;7tool=zais l** *\:+ o:+NSpec_ sy s0 l tooKa65C`E~ bo64_-s-eb|sser 7uA 679vD%5RFC 19184ae zo7r>“nxd ”T~51VPOm@| yexUЪO44"$jc-1./-jdk ?J0'0Environ*SDKit>: gEce7c(83198510MlC1$genO8322122XXP.200.|7 cII85IC24fP" )_t_s1ray"75[9;j111+h["\lookFO57{N'477+U22+ͣG _h2 AphttpdulN;A02 (h2+h2c)c4 wngB22L2.4% (5ONTINUATION;{u734 A&0nutlsGNU Trv!Layh6(Gnu)g, n&%phalgorymsTn6SSL,C*D Mindhanl+%883NJD/M ,*a1@a110.0b1 GetB$,be^wr*38N#0m* -mizeEX#JWI/drgJ%++tgarbc@$`P3Nmp"Rd+i "i)cu+ ,-o\Typ{%åVPV껷AlDB5 sX,-m2I6},,,5,10{,10d!]^0->=9l30?y7x7/, x/ 2:Yeul52~>sw3 QIP}ah  a3+(OCI*e!G. Amt#cs4$@)3N, "fG,aorAL]Cpo;V$KlWnsr!t"at>; B : full{'pe 9f3fGi F!SP(LF fB-B76os,E@' G.O'in$ }'" oh,VU#421644.;` I7&w[N] OS fac VMcrST !i%|OosI% hood--Y,aco %GPG9osi^e 30( Ad nChes:ҤjIc%Trese,Sd }/R Nxs HRLoGTK6!lreGeng7#:B/ Fkitgtk 'NI9 tc!6K=04=?Y24>YMYaJT ,,:U!w145vU!r Irb{lou&a-to-,=cS+983 9gM aRecoMPvXGSX35F^si9928 M.pmaX+I6 ZGZX+/cAZly| f pifing[6inPu"0;Q+-agIa +[(43&1n power 7$~s4DwT@ no 8&b[cx80 eJ,pvܥe url3364@stM$Z3S*[4AGtS 80jpysd-:>2OAEP BPyC9Jxk52kj4a29&riM4nXaNmxml9x219}xKl]VMk2KVMT*f"5'>o s7cu@cq;8/qemu-kvm,f3 mp0mk/Rt QEMU: e1000Rp_5_et_to_ge(34UVNC=4"5pLinf7_,7() 32l;Yi+IDE rpXKMBR6*8ũNULL der_-pHB_a66Qam53c974Sdi#0$H @o46= Raw?:RAWob2Odigithoto[merah RW/CR2, NEF,<DNGOs: ao-|in .T2@ _exd1729@` X)w53 "D5:Ds(2b_XkbRSyms?z(Ks:/_bx.outSubT6T#X=M? $,X=X.Org}pm&:|pm|y|ߡF*%NoNPMcuL&#pL=;IL:M (Id centr edJb:B(d tra /c0 eE (s7(&i ipa3.Bs[M ?61!CP/V>r2&A_s BGPNOSPFv2>ISI'RIP?PIMq HRP BR, EIGRPzBFDZfrrect7ngheLi gp_Dy_llgE do93T W$ngU_pX_QSS7 NLRIs[:p= 1358Kai cA  Gnlri_a_()d/!.cd90FhaTjleda| 3-' D3N UPDATE,E3Eaa Jf ORFa*6> py|n- 5!;P#!1-W"pZ!f;:P G}@!.i` YisDF6+rossqMQs 804=2b+ O#z=Ns-7DS&.") AlPdsSt~/PodABu,X hn g.D"!.W/pIY-lik in%31*h Wb9b!/P?))()[Re-C:> p2=\k/iPAXJMA- 1lULl4Cnha6E V-fkey$aI-`M Fsm/up:Ixorg-x@;# }"OiInD Pty/RRODu53gRs/tsuKB ton a 637ZRͱPr6478sHN1/Fa/^hpXI@P? b8~AbtK ilRmas dq]229qSEP&abe\GLXa @@@ =~hSXISV#YHier3y]UO$VDd%WIU0,y 8= Xwe[X Xo'W2/>C uQU*Z x7 L F (OCF) 7 g q 3 c io/fVcGlob2 63:!?/gzipB$I1IW/ߌ2Ì$/;TYSD"$Yaf[E(N3)/=Vsnd`9 բ1d s,/AIF AU,'WAVsrc/ 4.6au.cb#286=&S.Zs,1pa/podl@P=&fv.}ci= Ku3net\\YHdetails about the security issue(s), including impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. Addi al Changes: For j c%TiseasseefAlmaLinuxp Not0linkNfromΎTPros Manƪ Interface (PMI) provid8p+m+funLs fMPIdla. C ExascalQxRan extendversf7stard specifiCly 8ign1support st@ upe~sizesS*Fix(es)* pmix: rcon powtt'_\obwnhiparbitrary fs (-2023-41915)mq*Network Block DeviNBD) is%_tocolacJ.hYdisks9 -lik!) overNn. 1libnbdgusp1liwwr1uzS:licious4\may crashz[5871)?C&hisbehavKhenPreturn|unexpUpb!`2>FreeRDP@fre!2RemSsktop(<),ddhcensexardpcannMsJch a icrosoft WindmWinexJVirtualBoxy:PrqoffselculŴ*o DOSz39350)GNull Poir\C@9FXL1Linvld ǑOOf BouWeS2SmigS-of-Ssagdi_multi_opaque_/l6lgfcocbwvulabilqCrejSu018mOQsRinUear_decompre_ba_aN567N`gKiveY`k dueiVOsv9vbuff2rncrushhMsrwith fdput`8`U3*O/nsc_rl tI41-U12fezgfxbse)Xre}l_LumaToYUV444F8th'Pcenabto\ RN, eiBsccu:Pa< t ;V$KlW$n.u!va Do; B - /http/i:niS (DoS)Res5nsTHTTP st2Ansible rp sedel-drfigu , -n2 deployD&taskԩ<}sSSH8doe fjiw .aem)b % a 1ip(XTagt]l (TIFF)}2X a(G2[0A'9faf4Fax3En ,/_f.c1618Qi cp7407458Braw2'D117D-HcpS pToTi1 /ɠ622=Mut , l|"MIME e-m.. Ksx !s(s,.mboMas q#A82sPOP36IMAPm.i80=1Pythons{pr_, vjob-'nc#, peG,asse,hy #& type"iy# t6y#)C-.vc4wT& (}:orep/_!r.pyf/uH. (h/j)%tupl27?+jpeg-!b $JPEGWysoFo42+c(tjMk1sa*a $asKb betQ,K ?9-] in 1moA}1jdcoefctJ1-293>9TCu(VNCE0#+o-9iewGdz7enF&on.o(er}ni ny 5n$"wetY."i K[/7T p:xorg-x11-3: UD1buDaroU5F@,F3>wgk$MgO1maid 5]nsutl73> ekgooV k@quE LGPL A=P <~FLACF #gA* -yNs C& Auq's6yCA'ID s*$G5mier bv# .-GloPKCS7 c#X e#9083Gnjinja2hJ2 p p gS r<(p8.1,DjqspiJ(noXML dx :l\Cd? an$alk nd*ed :q _9 $ n H? $69219=MinGW (M9ma GNUC< pe\ )#C! ! tX1HD`!NbtiO#H-gdb/bfd/oni!fd_2l6[@157=8gluyH=zQ""2G#i#y1NIsDc#,t>Ih2+h2c)oMl=KgOL2.4 Peh#=: X(r/2l_K0u 36p#*Fre Rl$rb ĪE=()0Disclos 10?J1/: Sto Cross sBSc!M671Akl#3W!D1@. K *K:(M7[G-0e"_new G604|GC'w3ff-SKBs+ix_ _r_Oic()UAF~7h7 r!WroupUas(ofYa)ev'!1Vu3Zw XFu L9sDtnRU24rdma,mpF1r} ;577YK;douNhci+n_dSnu gbW846(RCI:obal)Fc)2886Sbe pUARTSETPROTOIGu$_tty_ioct*3fĪP45y89912IP_CMD_ADDSWAPU /k&fXI_~%th T.586Csmb:' :H+OOB "2%)Gmm/s1Vina_c->u s 3a _pe&c@_yŬ528F?A'Vbridge: /in - "_hae_&_-shƯ78]/:VOETH_P_1588 d PaPs a0Scdskb coo g61SCIFS .DeIVWZCq.EAVw%de Xen\ed_+`&|&569a HsEZ`oseK 3Lcklogg K:G4֔txB u ՚ lxsw:L<?m_acl_tcaF cO Ki2c801<1^_ 6Y`*Ba9}/wbar$@c toUma oC_/]60 ref=QUEUE/DROP++Sa?WMddd/a3?I~ -a3WIM B+[o aRK,BR,+fP topprYLnfinW Pa:aq 2rF _dns_Xet_ndao63 GOpe_labelCCdbu_t_h 5_ns/C1އr B2B@Ϗ>]mg&cxML(PAMk aR/to a7pol@1/[2mp'p'2 H Hcp _un S anIi23$ :NsSSLuE~Nۡ se :),TW M (LGt96a fu,trd-L'p7 )fcK@-SIV )r'a0OfouOekHyoci*enV1 9<;K* OqH7`GaeX^_JX9.42ore* mbeG9s& 6/POLY1305 Mj-sI&KXaPEPC[ 9Ip+P QPdJG N <<72A.`0-Sr6 ~, LSysV7LSB $ ssM Br^0K;l], V RD-Busiv.@Xs, oQ)(.t[#ofTkeepsDfe47.fcn]r,snapshotcWre? PsH , !4L=un U E elH2a?X yO@hIo:Y d-ir-c^Yysv2/-@lvbUnt renszonVfa=- SEC=y700=4sP*?CXu8bQ >.+er-:qxyC_/ J~kfe^*k/o8:q Etho@A @ 6009lMia+tdigQ691Ac?!aisZdenMm-borw[t^BT^RIBdift-Bϣ FYLHbV<2,RR>hbv$5oma<\:G- in%strCs\!85*q>podman  ss,e[ai"DMP(j'wi~;=a3atiS0corrly.bind: PreparNSEC3 clst r&c exh!t CPUurd@3-50868)\KeyTrapExtre[8cump~sv atorN387NSific rs query s`ya|aut-of-memorywdiua6516`E) iNS64_-b&asserR* duLuv5679vQĢ5RFC 19184vre zo7r>“nxd-redi”d~51VParlarOmyexcЪloaO440^-dyndb-sp:~tt ABhe0 FKetjbȳsi (s)F ct,CVSSG cknowg,rela: ,fGoR`gmg python-jwcrypEP s Web>WKS| SEnnhJWE)TokeT) JOSE Obj VdH)ndardsE:2ious Cu:FdeniSice} 8102) s API agrac^5 izcapa ie* sIng,Vr te_~edQKX:4f-by- error'+vL5esBySts()1441)Knegng_new0ngIunndoZ 94T%p :n9515 (sGogrammnguM{  r fips/nssl: Mkq edeRSAys3Sb&t/":' dRest.heMultip: FC5290T/cookiejarw wLnsih,Ȥ8s HTTP u89u/x509: VpanicFczf Va  ubl kegor 3m:ʻC,displvQ r Vhtml/p:s4n9 M medbr < estbn5, x/ 2:liminumbf CONTINUATIvfrs SP mod_h2 ApeEdulsA2m (h2+h2c)ttb=ng]L2 3:73 Lib| wIP,IKEU.iSPg:=g hyO auth};y 8seOw{unnelbghsBouchpriv٥ (VPN)9l@7is# .ShaH 0 np 8shN357MPMHnc9o-PiloHPCPXi V , 4acquiarv)anysfv -l measur>Cli-weCbuң^tŲ1makeet icuTwell-ceG plex  cp:posq zse} exUPvia p}xyL3019:L _LGrafZ L, ferirzdObo_ e orOG,fluxDB & OUTSDB J( kvuln +' bypas=10 6-pluginQ KP} gnutlsU T NU L(GnuTLSf,b ic s3~SSL, RD (M0vazde-0ne*p883xNpazJin[/^M xSc DaemSSSD))ad',cF bo meism9soSccI ")M!P,gA[MY sAM) PWow;hwJ-  lfZtousssq Ra}PHGPOE. un/sl3-375s*t|234nPscTotTll & dz16)Is7209)V N C u(VNC Ku us&view2cGksen5 on #onoa"whetvr i butny 5I }v tybY  igerl TcliHxorg-x11-3: HeV"r/5R cXI#SccgEv 108M)`GDe`1`U-aftfreNRenAddGlyphƫV fxml2d+ op box_}XMLu:@w?R~;506GLFiS(LF@le?$ao sasoRF Qtex0&  }s\f^o6" JmBN$ t sa3!,). I( *K:vin5 )- n u 62! e743 hw: amI% rai#VC*!Uat iAMD-SN08,L2 ffdhe*9tih inrduc0a2e5b909w._ed=1 l pairwg cy tsl 009mm/mglru:*uV Q(B[EMR] [TBOOT OS] SUT > ldX gonS3|te9(2 Tbo'OS O |$ -16v BUSYɄ673 m"te - NMIsi E30678E0:6f:00.0>##e<A+timC110N.js oftw}(fas9 s- T&JavaScrip>+nj1$92(fe o re" URL' *"5z Sm %ACnLObfu@2Pb813c-areOa__ _l 25..NETd-ԫ7? bTWC-$#s'n o eICLR N0 d`4)#rZ6nr@ig upd6U'VSDK 8.0.105Run5 dot:& u)ou 004?+ Y600Y25P 8*?Z1Zas@NI' _?c0KT, o@enx 1has1 p{',$_ol> %k"yfo f|have |Na rstmeB(3.1).y!,47V3:fG(uRSIOo 2(BRCE6.rL_o" RGE1Eɖ_Reg4e5*VԮ3 $Id M<(Id0b g80Ӧ:wT/ZH^oq/a ud rs5. m)lBgru"&=xy2 -|o d/%2Qt)+t8`Cz@X;obah0?0I/)C ute-].{)f-2nt5M a coll/";k>,p7(r$s 54t f w orohFty re:O pve1ܥejinjaSQ+ 5L;hXG4064yDrpm-oolJgemPML^FlOST; ot-L4"4;s b O ~Bͺh-.M!-:t_o &w:Pld-/</md [O.z]1852*Us;PM`ir#o8>O?fv.uon|KunetG$OSOB.¬MRÑ7GSA5YT<A =3cslirpCK2 tep@GooD&gViso]* .y-7ZmparC2Yvc-tap-vp9b$figu-%X,o ^ sosTX947)22 2-657y"8H,-n"IJ68.ExEPp_ !UC!e i,y|MfM SaboH.+were toi/s%0R) awYk1k/O/I! scrCafsG3G /CF F>6> I/7I/2iI/20) uFNp#s\ )bKA*eQJz:r[ ln&l~324{H{Gho]Ls- rXKP1NM2u u.Pfs4Stnoetm ϡ+)Medq2|hLPVP !TrW-Dri h1^62.1t6;M2QPo,K#BI9_v1auolAH/ES deQ$2G"65dlK "b87!f&,ns, Ls,y8 _9:imtWiU/Cw,5_~R+% "<l oE'nf.Tempo x2Ip)b/G zi8.{"-bombO ];GzyU crevi[ rQeY+GYY$sH 4' ' Ssk uX2encQa }/!'siaX!pSj8his/ais Z`_+(Ǯn|/us(s{iw!iɻF][e3ǥ!o!rgRtc s20 ,,W,oc545*qal.b465,6h'kW20*sym c&1HF+ct, a CVSS score cknowledgmentsnd other related information,fEE page(s) lis)R#ences sec7.TPublic Key Infrastructure (PKI) Co contains fundaalgckjs~quirjby AlmaLinux Certific Sym. Security Fix(es): * dogtag ca: token aunt;Vpass vulnerabil@(-2023-4727) For mdels aboutsuissu,cluding im5o$golaVprovide3Gogramm(u$mpilerZS: archive/zip:rz hlPof caZIP fSsb4-24789)Onet/MUnexpLehavifrom Is method6IPv4-mapp( 6 addressh90Kernel-bas'Virtu-ManUKVM)full vizsolu2Hon+varietes. :qemu-kvm<user-s/on_runn5 ms5at6 Zs: QEMU: 'imgG' leads@hostQSad/write446; _OpenSSHn tocolle1uppor,ynumbtի, UNIXsimilaptsEItթ7necSaryb!cli_erv8o0ssh: PossibmotkUex3due2a r^ndiiignTc638kt&3!,ny.  *K{mlx5e:"Dsprd bugj timesta(hnapi_poxextH52626)kBluetoA: AvoidQt-aftZfreemhci_error_eY6801Ycrypto: qi- 0olveEd AER oyU974Uxen-ntdd miakb_mark_fcycleK7393Kgfgadoufs__cte_groupW[smb:]UAF3mb2onnh_()35870̨r ly pkwintO96O: hns3: no/llow ll_nic_%_%pdl1 40 Bci->n wi_pumb_JIRA:T -2894BUG: unaefe faulccf16bf752f593ff8 [aTlT9.4.z]k35672k[HPE & ]quemergAMDi^ansllibrpatchpix6220x9]/ 4\/_de.c:51!\68icDPLL-ݡ71)CNB95schedpd TCtm v6.y764.) : SR: beb XS69TRFE] BOtmpfsswapuopU825#IsoDs,uws 5Og^ ^8as W .ۈ595ީ]G oc VFbetTx MDD ev"Z9083MC REGRESSION] bos: br z10+ ckets495ybnx2x*ch PCI qe,JurF k432x buildah i lfac>t0OF~im. Amoth'cews you CiworkRN, eiBscr anoa .rpo;V$KlWn"-a D{r) ;!  S-fips/& 3Me9ysk& ndVRSAylo# 1394 podmanv,f sortZengeCheckEli"ParraydevqT (83212114P[UTF8[zeB1"4B31BExivemb0lengTan in loopW98W8W (RCE)t-Lt05480[P200}?savde2106e4eOut-of-bosŪ'|2DO454W O1L11M+N7N7N+nN2727+u%Z(TIPC mkemb`(504$88(e7&isi4on&_d_dc'NQ/ge_sr%by_O''vÁX'c)hclgevf&nd_mbx_msgV9vC(m=lNdelerתbuf,Y2-4862(: j1939:a1$MadlyPngY#_6s_rw `)3mm/vmsfug(akeup_k%d["(aD"zone67$s)Us?%bi,eBrPTP WQ x@qtrocɹժpulMmD a_mapÐ85B f_tG#:P+ce"Sa*7avm*I* &rx3cLW435#w,iE2~o#2&tc<2sfcu'_Q__zerocp_twsk_uniq7).98S)d'_hmm.c:*src_pf ? 4\854Ir8169IlRracTxR&a`M r g-ivcm!an8841^,ytwT)Pif 3h%be2isd!-|2,o40x2:..ofUy-{)sGpaO95blk-cL-dK(iot66 Q #% V%ki d1 %4t54G9!;)xmlR#3QtqtP:Delayun7 le W!po 9936Y lmxws`e,\\ httpd;ApacHTSL$#8*fG; |/ ~v9em . @pnYdv2738m )DS !tity en uD4Dn8+er.A?7?PSSRFwP37E`bN o E](E dSV~:L! &UEFIW :Vi'Ma 64-bHfirm^#I#:Q:F2: gerq .Hob2ouldJHOB OR/W226edk25'ctTCP=iAi'{N=!5452zA  W PseudoR; Ge D8Lw-eOe8 -ty-e -ad/vsuq"ky)ktop,,ch0dHosp2ep #%&uve8nddrawM?. ,s6iK#but5hO!*llt(:9%cu.%pr!tlle *1t-7ȩ cMa ph,0Cuvm7i-p_Z~77f^5asynchEoI/Ob;Dom< Lookup '0t9at.@80 @o @5n numerh$3 D:rhmRzP 3U @80@@74p alsi0)fg]n-terack;edn'f0X=NetC IOEL<4418& 3NI^f.NFco st7+ecnF\r; lug-ForB1in)+%l~Su))a. :c2s ,selflp%ofl[0je|sN47:p{%"C 6alightwe,:)l+$.<F (OCF) 3Nr-.#Py) n  3, vo<.23e QI]8 os,P s, 68i vBhvel6  typeæi6 3sm83 C, well.H;wi op}h JIdIpriv rq+4032cmm~!/in0UPSd p* +@k/c@?=dMstLrC chm:0777 WqSaPd-0xyr g ; Es,"FTP,z_irq;T#N` (i9R90RsC#?shut]nĚ8"scsi;"f2")fc_lR_ptp_ u88hN%1%_K@(~ Nrx_kp],`bM5`pRel/hba%ef\%$_h%_þ4!24]MovPIV'Lq6AE6Icn uph5*#amd-xgbPOa0)I&7#eP:a beyDrTlifeR#Œ#0./ FRADIUS3 {lDRi)AYDInhrhe)v :5PCrYBa r1uOorg p /ko6 #sa?OyIwW Z3sal or +ZloiOv47389$ LDAPA "v3=t%vLjA.P(@^<-lut,-%dmw-ds: l8e MS},!-se&[ds6$Bel_: #,N *(BIND!n)5JGEGJ(na);lp(| TMo,, W~;7(vL>zais l@bk: 'sTp_(sr"RvX"RRseist s@namc1 *ivSIG(0(exhau!PU% 9%úAss\a( O othK&!8 l B/G rlS D 4L!_3,&lMPRU ily S¢1rib!E, e o[_ /Xpnc 9l%4E, Eje;"K,ckkg[pa/ei 3i"wnpV}2_1in\3d5sE}:k+4/+.1+(jm+Fucr A diaobscue$U75 ]OuVK3z7$5ǂe!sw#'ee$4<c/!91ŭk,/x86*TL40M602Ÿrlg'1=;7t7G606W525pvlt;=!7gi$tls4Op!cxl/<ođ839őbo %9]nr -BL:Vr J cT`H (N ycZgl(' ,a'e*r0/2d55-.2392M;rF(vTvac<(N[Nf.@mz4nz"TomcaFnle5@-Qo P(JSPf5echno+.tq:;Ha? E C\E C03{S- a CVSS score, acknowledgmentsnd other related information,fto "HE page(s) lis,R&ences sec:.Node.js issoftware develop} ppk  building fastscalable network applicsyJavaScripNrogrammDlangu. Security Fix(es): * njs: Bypassbimportstri via data URL (-2024-20)Ifs.lstat bR permissDm$l=18=fchown/-E36137) F?mo]tailpboutsBu,9cluj act,g'Tkernpv7s conȤ3Linux!, ofyo$syom.  *K: nft_s _set_rbtre4kip enterval elefrom gc6581)Wetfil9Xlimit:"jfiguthaauselgEoverflowd668dvfio/pci: Lock extINTx ma© opsE810Ǫ: ice:$ potiENULLUrȡ._bridge3link()e55ex86/xen: Adomull_chec?smp.^90^_raEmutex afX}gcq_ͫrtithe25e%-ra__nexpr_type_get700cobjb19bSc{Kerb|?uthentB|GcmeyourEfenatn-cos~8ds/n\ed E sȲTktoe@Ghelpru-U *y#keyJce(KDC krbGmo t[*733Orc 0t ool =if +sizO"#e arrayc B ""~o NmblyNresJ furvy SIMDuchitvs2C ubtVPg}##\ -d fM#vulU ORCU0OK%Ck BNI NI),$sR  .c!wrivplug-in$|%cumbfGa. :cs)on=p!nvlrv>$oN4d go!9/x509: VCfynichertQhun n publalghm5 478A:N/LlirptVPNKit!tenIp Gos oasA$gV+u*. ypodT-mane\ual kom0"C, gvc--vsb4'DNS #}wi+N<unC8ghtwe,mOpcF (OCF) 9u me0&ah laκ4 WOCImagAmEth,cenh' $C:!N} iB4scd rM1no axr!;V$KlWns !(atk9; B bo, /wge71GNU W=  .x = HTTP,SFTPDtoc 1s isVG)l#per&h8428ss, %po} w/fv."g p(Kub9"teVj-yhttp#rFV  ogS#Urilla/sch-#exhaI+kas|tlKdes]%29sko mhl.uh- ,k+ lay0 uUrto(ev[2GhosuEsr. PDF dCPnss4ձIof,itmapXaaB)bep%dZprSd:X ~_y]shtSAFER6{295Y'gg3alS;+ u-.9Zto" if0urrd/cti\7tNstBubwrJ(/usr/bin/b)2<-rQl6s s etuid bVryAW)<)#2spfpak#6#šCs s&box es= (--)472GLib3 ֢0 bY/uCI ]:`-GNOME"Hop r,nrg] < un  2lB 43 E pow6ul,s$o F&.-y'eworade -Zn (el})2ap]e0e-!e:g-N:- (2-abbr.Do0 uunsafe E9331Dco IMAP f;[}UNIXA4[ma :n mindsa;aPOP3teinŢim&*dr3Yo$de d):{_prXeh{gr=a E12318 cz`N =\% f$Da59  TM3G?(fs3ROpng 2Va!sRs94%"2fsd!2RELEASE_L<3OWN 665m;6aE,A6->-fq@in'8lkS30S/bc7di2-by-6Twb_dirx3@J:gb7>Blueth9U= F7B-'Bkbes/?: Uepy~8_"_no#:3-%d94dKVMFlus[su kvm->{9o(UAFsvm_|d8ģ ong;:4a 3m 6s>6Ac-;Sr{[=i ufFP>of s_i,CjAsplhiopt_aS80$C-of-bos a inB;ê8z7mq7ap-.H[ru in&_';V=9Ausb-s) a&<*ud C:\aQi"izM6AEPCI/MSI si_p (97x9R !e WARN(9x9{@=_aH19082Jp |gror>JƕReve<4;2Is100>\@$NBFg icJ3;:LdouO payload7# Moz!r0=x oa- web2ws6 4a2 m66, 43}: 115.15/128.2 ES m: T8) f upAfto2a &(; U83Ief%%weee &( E9r.)s ranā2Ádid J>ig: fu5Le3eG l6c5)-orc-JrOOM'si4iWASM*invA(C5CSeEr55-an%s( popup*883 `M @ ?130, Th b-l7C  Async G15tLA[3mER76>i}: ZlMGxgroup/LtLPL`CDenx$ OTR cK9]2f-ag!#  2Qt"wer"$cl3G?syZGeLa9on;i{/r_ ,eܥep/pA0 d8 A_jOx 1in\#634Expaj C9yXML8eH:/gay#LlOPFV02O454HNO MWra:;1;i; 1-0BWD (NBD'K.hw?S!n N)HY1enblFA1"8DS:*i (#<7 -SS E lkii>oL3%"SL)vm#/m(TLS)Z 7a Ml-@-0v B%g{Ox ssjX.%1 D61BRub onD\9O9,uD|6t14"ȢT tarexmlwS56RE39X4rc-CanF+ng6y5 7NsuchG7Q, >]]>11941T433)Po -Pil0(PCP1'U,oW#Pe+"8ܤ)a Xd7-;pmjTurs 2-2= Z9 Ts i.rFula`;->rWx ;7TmI*m9+>eC1cprroo%g77Pcd;!|ugh mp/c#.]N6>+ 3GT>il $.Dlm)N100-?e inDtI'Y g{^-EW,CaS!

e=>kM,h saOshbo"';7 ,e r9M篬 T)EG,fluxDB &{:TSDBHg&uio!in_jlx&b C_mirr ['tr)> 8wK%yskb67dAR@%9a/]fH%:\@1&is r5or-m1%e%[` 2v4pfKyKha&vp#; X0XfcOE'fN1 %l7vma (l isie <$2f &J&%!D]le|Ϋ ]&, @\%P"_vc1o#__^+iCXd"`c!o &V"0_3el%K"gpio 6\w&wE _chaed_^yY899afd:$i(Co ak86fG%-FaabHe$E, Jccppc_WJai$P5"Cfs2H9go8]+PN`nlaA*#)G@sTof H gafI<=ydadqW=oszf/um fe%ACPICA$$I\(6'BARYNK.$_`bAc3E$1ht7Vri?_@70 _%J22f,dnrjaReEPERMbnp i xs_tcp_f_etj@%GL+FSh* (LFz[!aos, +os, eg c; VO7GzG1UfO OSTq i%@se8/7 oo4Be(sq>orIal>aDipn?4upR*s;l6clouUA5"tos^cpit- 2LA -snmpC /R *USNMP(SNMPnX|^< Ant,hmes or 0STŒ7ْGNEXTnsV|u9  AGENTnsLogń8݄9zBcc(-frs&qenI#_Aa c _I Cc?*<{i9S(CUP~ SZ 3i-9w 5st/b /Bd^ UDPADDR_ANY:631ZF SM,^0+/.b`cfGeterA` APIX#/" aHoIPP647l~pp- [E 8onUlxc@PPD} 4(_jk;( Ap73M#$=OW+C 1 &TomcF(leH*DBugRe5iI6 1.2{#?z(JIRA:Alma-58zfN^'Dv|/O!16tb989CS3<'formance, and portability. Secur Fix(es): * firefox: 115.16/128.3 ESR ()thunderbird: Memory safeNbugs(xed in\1 131, O`m, T\7(CVE-2024-9401='2ЊCross-orig{access to PDF contents0rough multipart responsesg393gJSON h4hompromisNX pcan bypa site isolation]. For e details aboutje sissue(s),cluding impact CVSS scG,knowledgm쬸o/r塆, ܡ#R pagm lis,R&ences:.Tgڡpv7svide3Gogramm(u$/mpilerS-fips:D`FIPS zerobufL55LMozillacissttalone mգnewsgp cliISpecially crafWebTransGquestsuld leadden4 ofrvice9.PodctpuploadviaLckjþ71Externtocol hPKbe enumerYpopup8mrup{dJIT400#Zmay oc whenFonjcern objr6,.NET 5d-softwaf!ework. ItleubsetUWC- APIssev3liteICLRZa N0viϢd`that addraZvulnfG ; avaJble. updU'VSDK 6.0.135RuSme35dotnetyem.IO.Po- Mle DoSwsuseSedLQ4348ZDSAoText.Js@5@asusce'ble9hash flooPe4{. 8100 k :sHTTP/3 amcaa raYdisN rdtd xr3822S Flg# R penurweb broww, JignRf:rd_ Xiper'Use-r-freAni 'lin.1KChemsp)9680:hOIPMIim{-tooܡ l2ep™MIlligeP&M mrf().ia}N s0 healthnito!ipmi: mcheck o@auth?z)ypeoLANssBssi29349podmanswain\Xs s  lib<rary,ich$oappA8 fv. 2#Kub%etes/:*aallJyP" func%deepne?lit vpanic/YexhO\415enc3/gobȐDer.a;sŕQuctureɗ՞b,build/cintȥ+"// +1"  tag \wiĥexp `$P: Brah:{i-o: Crypto-Po]y DiMo </kLwJNetqCNI)%|sif.wriWplug-BfiguEnninLLinuxg8a bsupt edaNIrnsselfj=p!nvIl vlloco' sNivle'. msko  s you inlf?zgyige+G lay sl attobeate ify} lese b j a0OCIAm{th'cenito  dRN, eiBsc ʡ7 ja r8o;V$KlWn]iODocko;) bo > j-1.-Ujdk|#J J1Environ*SADlop+Kit if : Heap-B#OvlIoSaDumpSc$n2RGB F3-4816"!: Array8dexAtegzf(8328544F21210Arop? P@maxHerSizeP286P08PUnboDd T-of-w err833144S17SIױ:Wr reGY263111+77+}21 reenel}h 35!,..  *K: Ll,suu_n(R) Atom)2874 XtBnft__offO-: dsre+   7-iR8$t "u/mlx5 lo|Zchdev$dh2ncyA526:kBeng : idxd:W oopsrmmod8le-CPUS +35989[hwM: (w83792d)[NULL*der<+ u-e[r1-473e!rmptcp:%snd_nx8li,+թ-n68!sd_,q:T.O"OOBCT!_tune()\978\Add aquire,0umaph2[855KVMh#WARNvN+ wiffs&x-htUsked]9#]ioif_napi_dh)B5*/Bxfrm6: ip6_B_iա8real+__s'Z4095gfs2: rT%_logu $Q207QY_ct:kep# zo_ht_keyW27$cnon-35 _udp_2_bZ8: y3K GTK%3#l$:d  :wB Fkitgtk: 2 U"0%R%CuE%4077FZPomaiousw4)vc!n;&edI0ra07|O s r[wW*~Gg vei'h0Th73$d ! 2fVis,1+bar '2of86AR c2beh 23271\bN%tdJ(2ߣ`be cerprin{user_38й5'ex 5 7-a418 Py;%nj"pr, acw  :$d9 ulclassex+ ,y hig5lF dynamr%di!& N tw&y^&c C ,w&tdr &/p}DoR9vecktrale  hG 6S UY ,2`* ,-,a=~mK.$d mp&0is,\9.,),xten.&yh1 va'R H--s)yW3 I$!$" ": rT!J3zmajo i=1W-%ssh< ed+o=&Krem )&ǝ #0ken ߩptkeneeoÿseaU!uyh *doc*. Py1^S'_-!j 6#-" pix2B$  "ws Bm"s9675s94?Zhwu:BNatBrN5h HmInj (BHI2CIaddCnq< rxFcopyA6640| reR,e;q682'af_uni4.gKClI74ga۪m3()T92mac8547 ec ,res-_(5@b6Gscsi:ߤunBcfs host<+{&Wpty  vm1p blie <tap :) d G4mu4tX9r(9iűerycRo36244Mu=2s-bamu XSSC78 _h2 A httpd1EB#2ntM(h2+h2ctngB2ڤL2.4 \Oer ><::Bbullq t~$~A2363\g1C 1046̇o1T9-DisposXbegn«rN/x-mOP-re_rN}1}Per>o}&kR,9dM<$eAW#WDA7,V9VSQ2@QdQ4DSQ4<7ҍClip"pax3ttJp#a sY5YDOM p!ID3PX N6Ө:o*JH3HOBj"8promptbe|y FURLc2Ӭ;dla Rk0L#Df EXR` ~-.'-' | 7qual"is dms aief viGQ?V%l9faJITaggg2FIFI(TIFF)\ 3: !,,.c7006E64(EZ6)pOFt'UEFI-#VirtuMach58 a 64-b8HpmrUIQEMU. rssl\o_i.509g6119OK @@I6InpV|inG#O RUN --I9, /pEACRI-O:~mk I4/$BB ( )ďlmysqOLY1305 MAC1clasW Her&PowerPC61UE):sp$+in RSA blisR237Ra j7s072CedkTempoW"A%Ch s ֤ny'Xi# ,W 6Alma!R> Not0Hed14<*:AN 4H@8=!NSBi, 2/p[:]()i'-fe9=inMEk91BxXw " e?)X8s W2 xorg-xEPY,/Wsinh3XIGetSe$edEvx 3105-bPaG#kb1bOR7GlyphƮ3F2[*//:c g.Zdo%/\tee y 6|.UZ=F go-r_$ygurl*AAs3&{)La61v)pGNOME Sh7p<Cf >]F5k$(s)8zN#qP likEN,une gBs:)vag0cap of SFrno''hN8ntr% nova=n` ! nome-sn.=i$l !6-A})9Oar/ve/zipKgFr tZIPQ9/netOUAAqIs3h IPv4-m( 6Bj90X.Org >is an open-source implementatiof the X Window System. It provides basic low-level func@ality!atll-fledged graphical user interfacere Uign&upon. SecurJFix(es): * xorg-x11-Fver: Heap buffVoread/data leakagel ProcXIGetSelectedEvs (CVE-2024-31080).bPassiveGrabDevi`b1bUse-af-freORenderAddGlyphƮ3) For moCtailOboutsCissue(s),Wcluding act, a CVSS scG cknowm#,1d o/r relatinform1,toR pm lis,R&ense+i8 Changes֤n c'Xress9jAlmaLinuxt Not0linkNfromΒ Kernel-b6d VirtuMachinKVM)$7s6 v#izsolu numerous hardwpIs. TD:rhImodule conns paw>hE-spac)m5urun m.pV alsoVAPIs5nag/a withPodmzst 8X technologiesOCI gol;: net/[http:]()mime/multipa2text&to&euy exhausRequest.ParseMCF3-4529e[html/Op^: ]orturMShalJSON|thodsy br < escap*24785p:=lW`DNSSsscanűviniSloO8OGDeni̩duemr@ 100-űRe hlinMEk91e n ariearItmureqemu-kvmwr7_na  QEMU: SR-IOV:vd NumVFs ds fl 6327)YDMA ntrancPdoub vulabi+ 446YMSM!ISynchK*7 NBD0"D=Socket Closur 7409B`WebKitGTKG%port\ a web r Leng~: B* Lkitsiaiciv s4^addr apoof92843)Zh t QrbicodeoU950Up es ðbc]Bmium-brb ANGLE4558CW yn-jinja2 J7wopPH.1a Djo NpirnoXML dxt sup~ xpr|ons;s H ` :cepfkeys"attrieuW L064BLLDPLd [ c .5 pLk-Lay4s) s EbCDPgo{tlHvekr me ism;eliwnotifNأSadj= G work4 ldp/ vsch:]s 1 rigge] l 0-278 ]d: -of-ndwhde%ONMPe1-43612JCCPDU P+ cdp.c_1910BLPop9r( PDocu F (PDF) ,by aEȿDvim p?df: cWk`so-dUraIx623C _auth_nidcO ID  !ec  Ap e HTTP >envJ!AeUnyPy/iOAu2.0$p : Sz`OIDCSmTypliokie`mpula 2481CJos-'u Javascript ObjGS0]2Encryp/[jb jdep/[clev~aQ.toge>nNB Disk}(E). Q: r817a .o olCPU sumpP3-50967Fu>+s) -X kthcA } tk3 pv 3 oA:/ L> CWD65CIp mJtmaximum TCP0ndwidthuneV U islreL, diyAt,c-gR  iV3: ` (7250,ESNET-SECADV000p Mlmarv0 ioi:6306BBPF mpi CqB(BCCe"(f effx k t onD\!d BerkyFee e) bc8 unlv:#}scaoh mihl=hN23D1 в% high %;F tfenhan &` iltre@4.x)LLVM Uckeo#ile ,5-bytekeTע!p ,owe&ex.%i`dynamB&$(kbe{ J%u%{poinL  nwk9C@pec orLrsDTI&'T pfC>C%G 12n<,,d_premF;]hysٺy #es,OI(:hcoCird-p0i  $" ":rAr&J ajooe tsӪF-%'u$shoulҢNe o=aloKrem)s|ǝ'SrtkTestneeÿse? t.H h **.\ya _ge Dna#$"j"=fi T0:vzipf^ mbs 4-04LfinreIPv46 rQB4032BcI"5ZIP !f8088Ivko-or Rcl-exysy& .&y'.dt /any Cn .ww/+\QTR!!a|!-MySQL&Py#iO'e C- xcWx(dbf`Ch,GPI}!%J -pymysql(]uua+inputi360FXjay{-imapd  m IMAP'OP3, NNTPDSIE )%beJ#I1EbyxnLITERALa Nl1Y1?40D"6unC n 7ghtwe,+3x v jF (OC.2ruUm #91D6t'r)MaTs .Ag(MTA)' pj(likDSM"AUTH (SASLTLS :?smuggl0CD6 H#utJ json s 3EBzD'3oci->--h[[ z'lk$ )]U7cw' 7zKubt j* jwB$o >k= W1Ke;JWKy!%a6S$JWETvT) JOSE  x%)y% JWC,Via3ecg- ^*f W323"81F: 7[p)?pow ul,7Ou5 |:a'pel"387F73R3S3)].alg5*hXP{3M3A323C ViNVi' d|3nUd d#,>vi eo vimHLK1-39mDbluez R!3fo A f B9tooci ,n7h ,p6d2,q 2(pcmc\. ?! oHD@c  t/. $K23e#K586c=ZdioXAVR9NVNArrI mowCl0EhV2734phonB1rtLY596tOBEXDoE cN`4`aLavrcp se_me_d2z2ze3{89{m_mJ_s4n0nsy2(44431^0`t2C(Bub wraS /usr/bin/b%<%N7n!  ssWirn9U3T fpakMk"Is N!pZ sdatasourJ-scalable timrirom pm Redilive PCP metricbpftraceKript>das wellseveralshboards. SpFix(es): * ou/gob: golang: CallDeer. onmessF which connseply neYstructurcanuse anic duest exht (-2024-34156C?i open , fea rDﯴgraph tMGit=InfluxDB & OUTSDBdompfy:[-basbmuta6XvulnbilH478750Kerberos1twork au0nticsyGm,vroveof ylEby eliminatn-e prac_e4senpass8ds ovС/JunrypѢ. It Mow li)(=sƳeaHwithahelpa X.thiparty,"#key dis:buc]L(KDC) freEdius:gery at59ExpatOC/braMRsXML|cu 6>eN: DoiaC_ResCPUE50602F.NETEmged-softwaframele+subsetТXC- API#newiWLRZaN2_sfbthaddr]<> av. upd9U'VSDK 9.0.100Run ?dotB: TypeQfubŗlead/AVeC7Nrbf7Ԧ:(4solV6Kbo26a2 cloud8e#p vi| E #|dmstwv@e1d j021S vsso>XtCpo70acl:.v!5It:p 8eUEK,mrel ,b<hadb(WWAN)APPPoE,=T !*!a> yt8!vmf~RKton#6tj eoaxJIRA:-730diUۢW&rou.?is@2e#ipv4.'e-%ڂ1i$y2\iP3rusgn3661z" HCPop81=puM'ZtH3؊647 dj-17-j @3J 177EC+S# A:^hparrn ,21\ BB߹yF--5ig$K5suhtoUw9b. W is} )/twV9ƖHE}soyearsҢIr9(867, 712).J 21 +R%/dcDon'tp#p (A:3&sk_7&u$8k($@Y 015 $arm64/sve^i(4xCPU 'S7t BWi40RfEc-byIb1er'!te x~08Py| n M s, ,Q$n2q mDuq s s, BexM vA%m ve:Ge; t9N l. @7m C .wow @ jf28VG LarF S< (LFS) 0s9!suZ%s dioMm,@%s,IeGGr =G"} R%a h git-lfhFS.H5d_ en s/ '.\MKHadvd ,F-!u "oft!F CHH si3I w,n hE*s, %so. \N#& F-9. Youwp1 DeiBbyW+2ΡZ{I?8a,;qp'G( log :' LuaMGs~dJexT4698#Y(d-of-4 OcACL17?`hUB*lcjsnimsg y2-24834poL6ydKx 14 Q3,145QxMŢRCEͬ(31449\DuEp^rt6.X/75F 2<3",MTF-8-_53_am__cA+2C+Ma8-_Qi/-, R pQLFpa(My4 8mysql9:r QApr \/210=&unde(kaOJ8ae/iwMdaemmdbd) Xs"42- /SqSgInnoZ \O\3-2WepaWy sYrob0f0aloadlL բ(~/8)ePrelMor-wid'hIPPDiVS(IPV% -}&/>CE)Ō.SKf!7ckeadapli Wak^p'?T lthq?*sÝ'runsCP=(VRRPv2)X eveo&:Zt =S5Lia5rrp`3 _d>& 11Tpodman |) ss,0s 0 poy': a`fv.r!ndKuVnet  ildah:Wb--jobs=2'K_3G9"l%S11218?F%3ja(OCIC. AmBt ¦c$ytoBeaRN,scr2orQ O;V$KlWnB0s; B" Szip2 ʡ'$",Sf (9o ('m,<7 ,haCk~ +:U-",e 'n2;-O'il19&90.9IPCI9%i'%롿Ita64CqIFF5Set:A:Incor7h9KYedd$I.cZb98 ExIshipy5o)rI UUIDf)"cpWaO* /te^mrsf/=0A443PBiOQodvcmk(j1 )227}kEdx!e_5[]fAa6twri(t8r h, S Ų&)K@em&tC1>iH0AmWnso'D,h+k SpE1nCr&6a)$b ///K,ks598Fs8t-9b9h'bi-i6R#e t0s3b2\0thd-ZT#XB/a$)Gs P/)seip4nd" .:p9"c3/t[5466"cU/ 56c';:eRCUtigmp6_:O07[Oovl.UAF9_ry_(3_^ mdI/+_%d8\`dTatmi6 [ecɬ200/udCFNsl-1$b$s L7in*_f_X2-j46Xvmx3N(e6>in'_pB_xd377j'xTLS k6034[R'D[D'[crUWY(`[Q= zme-n-=nrCky>C umjK(MRGPDUK0aBV J5J5J7J710= ̌~Cud-mcghltL c4jK20K& aPo#Jpenof 1_; '0biD2so LA]MAmG+ErqvlaNf HdXSLT@0 SCee[ngtKRasS>p/K$dĖ ]eŖduurren?azCYvCAcfer to the CVE page(s) listed inRe&ences section. Tgolang5ck8s provide4Gogrammi#(u$ compiler. Security Fix(es): * net/[http:]() Sensitive headers not clearon cross-origirâLD (-2025-4673) For more details aboutsissu,Kclud΢ imt, a:SS scG cknowledgmentsn/rlaVformaH,+libxml2rardevelopZolboxle of various XML stards {: Heap use aftfree (UAFĩsDenialgservic DoS)9794)WTyp0nfusL6L2: IntegOverflowZBuildQName() LbSt Buff1ok6021Kkernelzɤ4Linux!,anyopersypm =K: x86/micode/AMD:* ;-of-CnSs with CPU-less NUMA d2199cloud-initga+tscripts f5ȡS. C{specH9run dTiz"etrieveKll SSHy %le`usOYf :ermlaw4-6174java-1.8.0-Jnjdk[OJDK 8 J1 Runtime Environ*Softwa#D!Kit @: BetGlyph draw;r30749).Enhi TLStݱhupport6546Ime+J3s4614˚450106'BugO>erfvigurthe5QIPv4 wav6 (ei$due -D..-B`=tr"be續fiHrIintza*%@s)method ^IAddr.getLocalHost() wouldurfully quh+naTeIh. ThihavionHe ndLS+ risBtiHfrom'U> .-OeasewiĴKM(Alma-102904, 567891012717+HTTPi hlt5005t/6ZD Hdefault phic#displayyWaylB"seca! fure*tradi!bX11thatawt.Rob @{akcf nXptO,duca bk[. W/ +updӤRPM n $ommec 2PipeWi,ichscanĐNf6666970 21 +83845 xchoomigrtaskj one;$anY 1 garballor,AllocRegobjr\ssoc 9atsamʪob| re r.thr S icC, bOhê l)rbit'chT-to-T Qacrash9 )­ (dcmid-O olvis by ways s Lp/oughan }903 81JGLib]sFapplicbbJkGUiq-tuC4t]-GNOME ploop,n 2 g^utildfunդstoatauc g:u_n_msg(^4-52533)?(Und@or&/g.c g__x_uni9r43ATomcat/ieA#P+ (JSP) technologi twVgp0379 - RCETOCTOUޡu66337)k: malS//2 PRIORITY_UPDATE> 1650)dma: uvco:m d%pof8002)Fsunrpc: e SVC_GARBAG.5svc aupesas'o38089[idie[vir  cen^edchite. Aspo.'vSsTG -s%m(l : j ea workAcopy_'revi Gn exact$c9h/al Ȣr{n)*G ce/us~ ` ir a alsoxkeswpoMbleoåN LHdoe saEze URL2 yxc ene tc?03p^NewlineinHElp exfilt 9g033 z ex83846fig. es353k4*c `31(4ƚGUI hL Z has " 5f-3ntsa wr^)owanAlus}s1eiabcy tarϪpveGe s%p"!s:V Trae)Vulnbu  +*I x72 MozAa,E:" -sourceb breign{o a:"+i,1 Z Rf:u] bird: L n#ctxc 8028)`Memsafebugs<in. pmdiCyZ958Dz:9Wun+^acc]mii_nw_YZ6Z/mdiobu:e- 6457/Bya1SQL C>y wM(base .ub&92NR"ed%A!torn leleAPIB*v Mmsık agaU'oJflexinadms3<].D sql2TBi696RedP vadvyd /-,iftf,tod-GjZceI!j,hsǥs. \m-e"Youwistm-bymh2λ,y o#lxo9X ; \ `r:94X715 7Un#A44C;67CHy og OBWu|7+=C(ssUY (ICUQ!r/-fu7n6 hicu:W!SRBRoot::UTag !522 B]#B]#(TBB)'++'4)1&tG?5v tUneNlor tiXmi- k @ jque Un HT592>DOMipu$!(0-11rtpmlTTFPzu Mo'ePM)a$ +tu:|R 4913Vt}C5 Jafo-akfJ9A  ellL ic(7LAwi |.fasr ?.jr./ ~ %  E&5299"jAslAAF.JatxArrupuAPt742*Py npre4, C-R&pD2es mexceU hi- dynamdin=%)IeXs3 t(t?R>Podm36 X-PO:OCI 1n a-CKkJIP?EEs9HH#?I>d?NVIDIAXTI23[@lZGTK%tof $%DGr?Z,:wBpl7/ a7! W p3i>on598+*dfa65G:glKA nload?s ekmay@i ,MV0QP!&j@rduɢh\.Er(P1 Sh8hT 5N4(B/anNSaf Bq2^q6-q"lsn7/r276r? ]6/sB8r6Focmd/go:EVCS{E_36ic bpf, te&3 '_skb_pkt_c'8:mm_R\'orE%94-2895Q@Atlb:F0Mb4@V^p,Fbef80RY nALA_fvs GUP-0 racP B&dp gs3!se3qpullb u+g_S12ŤA rtw88['>'G:Cg6C9Dc5 B4toY((N fljU YTi2c/S@rc( PH3Et^WB/':Cso]5~T&xmTR er]al4Do%\Xb S^D5HVT[TektrHx 4I/^iy a2 1 nwl-aul! s"^b^sLl k!ics.*2-6YX7.VhGseverayefT{75Ks$EJpioISO 9660 CD-ReOLouYaKMbsdt_`,=obi?Asg&v-񤄦poVskHm)VrRR^2>_90_Yek-()&.}&K |t|`Ć`in?8up` 89/S`rcokFe/or#G|:RbR09182lS esjrLcbtAu>L/V6GMPq79qme}poyCas2D0gUn edb?Ea1aUU7U13lB+40.2*/Oerbird ESR 140.2, Firefox2 and Thund&(CVE-2025-9185) For more details about the security issue(s), including impact, a CVSS scG cknowledgments,o/r relatedFformation, toR pagm lis,R&ences:. Tkernel pw8s conɤ4Linux!, ofyopersypm. SFix(es): *K: udp: me>ycounFleak.j22058)=net_sched: etsHdouble adclass with1em ahild qdiscc37914cice: fXesAchdearesetenarioP8417 N.jssoftwavelop~ pql fbu\fascalawork applicszJavaScripNrogrammanguQ Rici: U UsInsuffly Rom ValuZ150njJW6Threa#xposuvia Diagnostics Chan>S3083SGOAWAY HTTP/2 fߺgausOsicheapP5JAdvadGtrus D Environ(AIDE)utilthat ctedatabasfiloyyǡn u=3enâ:teg;4dGs a:crpneutralizabbyp54389Mozilla. tualon֣newsgroupS bf :|[:Anial-of-serv du4^Graph: WebReFmpw 2lSbocaprinvd poRrtAo/V!o MPq79qme-origTpoyFCas2D0gUniniti=QEnea1aMSsafetygs[ Wu 15.27,28.14,^+ * PgreSQLn obj%-q+al(mana(DBMS) pjsq: vex0eG i; tM @ *~8715)WD\9N4KImod_h2 Ah ttpdulleB 2 toco<h2+h2c) op libngB2 L2.4 er .:dxy_I: u from4 sf f X49630yth pre4, a'v enRy, w he3excepy y high#veynamic  typdl. support& faթm7LlCjraJ-ell.vu@w̤; |cp ^ ow par ar 194:gWhfscXaten UAF_dequeB)782K40LMMIO wres-!Ea1_cr_hw\8200\RDMA/iwcm-af-fre,h  cm_isb11b/Always notif^xbe)emps`3*`tipc˾_nosoJ46vsockK ns_* TOCTOU:xfrm:Ő?ha g lW_md=ri=by  uTLS 1.3 sesum 48z/3HijZ5aPupv`A49812luggAuth.  MD (PAM)`amB a7< need2rZp hleH l- -paL rTrama602itmldޢ 55&CK6ed #amas)OpenTet x0[:]()= (d> edcr$ ТLD4673podman 6s% erIta f < y /+)fv. # KubTt  k6+b mmm host)9566My!B lti-, t_.A#!<I scsM t (my!d  op:Ti ,-ECDSAgnatM+8utY 13176 :dA spec vulnb+(CPUwr 0722NO7 m8 r#N688NS"do##U99UUDF%1;<Re %P3PC=*i#[$XP#/747DN8ĚDML%H{0-InnoDB%47;yN(40S%62G709Ks$L0]ĝ70<<3G'Tt56K7038KDD&0tPl:1Sxet eCs:539!JulDž 97N%N787H-9:210NΗ!K8/X7- En=/C%1%ėg U +1; .N=Poo'$=(;+9+S:102^R7  =P302xjK I.!-sour-4brow)!SA$Krd'mD, pp. )N KgK;hK1052s2rp&b=9 EP l KKCh, fifbehavior8XL8Ԉ [LLay\9\KK3K3K3WK3v >t;I=wNQRU76dSPer3^SVGP(gnutl(H9GNUH6n>Vi(Gnu8h(1GW22algor*LpDGs*ch2SSL,k8D : Vi/d2)temp:q)Q3299NNSCT+:onJJN SANT_I8I3T_$_fig_)os@iphl*u)-63 BugQoEnh(3dBZ#235962+`F1)\E2le 1312PKdwc3: gadg^ e?3=nuntU;e>5@> E:v?10jdo_Ie_Y>(ܩYto ;unmoed/l>u ]84;390/cSCCB pr*c>96+Mmmig<8DiU%pWFB724 BINDU e l @6 Doml`nj #DNS\W(4<)q. de3$(n3d)olv$6pAIPfr,es;@&r  (rout7#AA9);_L=vlAfyaisp`l b&B:9uF?F cexhaus}7611|]-- Ss??V%ple9d vyD7 o s2 eg8_seEPnXXCe5538rb5 nmAtokA43737cQ0ASN.1rs72fQ"OG@{D123ADJin#M1%͜4tC$% Sma%7W3ͣ1$ N0!&>GGCS%ZAFT%H#HealMoEo%C1w!H -52HLPRKA[ti#:pę) 0=5, N#Hs$O4Bk UnaeHedXNNRif35+P4'"h,)#͢<NP!+3;49#FPA6pel-a>Mmore details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. AlmaLinux IdlMan?z (IdM)cralizPauO,ci:m:(oriz' solu b Qdial/cloud-basdDerprise viron . SXFix(es): * FreeIPA:m: PrivilegAscalfrom host1domaadm? (F-2025-7493) FTkernel pw8s conta4!, ofyopersypm K:/keys: fix slab-<-of-Dnds_task_fmI4-50301)YKVM: x86/hy2-v: Skip non-caicUddressdPV TLB flush3835_wifi: ath12k: DecrTID RX pefragtup err%hlj]9761ElibpqD provs3PTgreSQLi*,rary, which allows;gramsnf Eserver ip0sqSicԉ7910MozillaEox brer,J ignSJst i,@ ?  thu] bird`: Me]y safet9ug 117 =Ous` s)ad/wrinutrigg'd by GLWurew09wCross-Tk]du2 IPC m, 0iUse-jr-fMnaTrFGraphI::GetInce 8_An OBJECLaK%buterode! haviorY0 Fs a -K2҉ ඿ESR 140.4,D)144&Đ5ҐSoR OLscould mfi`Ns )(=SSHtocol!canu'{.Z< appl : osftp_8)-nfsdon'gnU^re:desvc__regr2/kmZ :|m_scpEn# _9yno-sirobe d208sunrpcysi l71K?ƣWK6,fivarfi+n #_d_ S981 cfg80211me:p lthW__#__ult`49cs`lpfcbuf/crdercdjXeive]c i,@ loni:$ sgro!2 jn-1.-o jdkI)hJ= J1fEL(*SDVlop+ S@ccPF-or5300Cf e?t6u BugySiA8.8teT)9.2hasX a leilkeea maj EZ. Wi^his, samO|wsoofo%&l@8.2,46f3 On{ somean 's FIPS#e(ll4enV_a eP>.!verpbuuk-Dd..fips=f8777, 8982717+־889 +6St01617tfufun4$anA$lkTagImai'Fil (TIFF)A le:b4 A F #AW -Wwe[9900GNU E)spowucC"om)L,0lf-docuk'$ItסZB -f "langu(ep)袪te-" el he Injvi "" URI Schemo )R)2-')ue stHt; mto a')-strucm 3sh sTs"ed. \D(in-m9. Youwpst6eiB um(2ΡZk%o9y#;O moog rOu@s"B)bpoMRCE46R_A6e-exLUAsi;e#b8b;#DoS<"lX9X!rUͺV*KgZipv6WrOMACpaRd lays9:view2cG|ktop*>onl4re&unn?, but>u 5I>neR!vat YarteA5isu -^sT xorg6@l3XPtHNo ycre6222XwXkbcv71R30RVRSetatMap&HGafas5nchm^imasn0ws~ !-/)2nsa^;6Bsim(!@Dt*)e osy]axZۥgwww.g*ct1r> my6HighA }(iy72149madbDB,CZ.DCEmpOBGte82969M]I_di__lK7 /*(CPU Apr p 0722NInno"K6CC :lWtwe,2i;;CuOCtpc$r _ :4>;3'm Ced !'mZou:UEѭ)` m$ fig^/dev/- olekw 2565m=dmar6'r4gadge A fs A{88d7 -lB"z} /i>E AMD"974-3635j4Ud Fvmg@ddmIBPB=tig 4cFBIND (Berk]y NDH;DNS>I4S<)t*Zd32(n3d)E2 lv$sI IPG; &rS(ro e>ifac);_a@=v{8fya(O#l r/bi CacIpoP;$u+KRRsg)Gw{PRNG;80;R exhaJ AiaO|KEYH8671:u< 5454hA_*[f=Mn 241aCop#aLWI! t#3i%^)9+V\G:r6U cK: tp=CAN7 , in0_rcv2C8a^so[ qimd-p p shadWC,WBg4668-Squsanckmb @ QF7Fv,beS en ey/o2 Andd()&D]767Ťtd*"6MMIO"@72 rxj/>aĢOket HI-I/OJG46io_uc:T0we{esdul OO06Mm_pcOddF_cl0__ ()Np0/e,d2-2x-U9ck'd 64n_)_650195~V>challsM29o/rwsSNOWAIT O_DIR]-!A [#aC1eC4@ir%/vKdc_queuX G11QVMX: Bu0 l PT_J( K/] )){)iCONFIG_BROKENj3xePXJRt] .Dw#ve (6Advis4 %s21sRDMA/rxe"sqp% m*reqG2&buafErq itV/s 74rG(v4#/ o8 rcu_Ü16N!lim== 0U PL| inZcKBo 6?*pc/xi)9 efJicp_opaO4:Nd 3 u9paprK<<{ s'0'd:_353v |MYJ!@N60 l/d<œ26a1s%>raJ__m u\î4/x"Omap >BOe>=D imG c0sUEFIL Foot T2GW 8'ar$ >rdl#8J h)\=LlU=In&:^ap-^an6oG-thYl4NFS^QL# 4_shutdown_ bFSen: gna A !pm72p_:_r6Y44QB="totrtKNULLup  79@?brcms#T ranctl{Ahy_iqc}! ms_nd80rRûbc@de__boH_#Ǽq=mlx5Pk ODP#Ɵdrm/xe/PTP_Ek495Shid"Q_*d*nd jrtw8 1cg+l_hw_s-* 4&le/ 7X`mt76925gl n_ch:! ``b'x FhOPPix]:Yid$ fu9uıa+tin&_[_aDto_vi #$_/ ;m%zeCo]  E:greDd?vrf:Al3ml_l3_oWf te beuEAM_OPTION_TYPE_STRI]] Wh'<  erRZF3ūvxlO _vni  1offgEloadc}-ip6_1mss6ASoCOF[ thda-daiDAI+ge+8®?LG @T'?b, ýX let.[.h&{+s.c18-17 Cpodman V4m`s 3ims@p%,lpuodMU/i/ fv.4c@p/Kubyt r8/sqnsER|C4m!9kub+;+N9Wb.1-8i\FB strings, hashelistseand sorted. For performance, Redis workith2 in-memory data9. You col ghtwe, _ 5 z OphCꡃOC c$rume ):4pK'masked 'muse(mra:31133)`ma iou^/dev/cRolekwm525- m=da, marbit gadge dVcfsc {88VirtuNetJjmpu/(VNCh spl} > Uview2cGktop notWl\m\eRicn?, bMany 5Rrne#!^da tYartesiVsu- Ixorg: xl3:af}XPtHNoy! c6222 XwXk a vO R30RV ^RSetatMapHN/pNGE ofYGNOMEtaOeCookie Expi DYHa"4[OBR]RަRL_1102X0 XT 8W2X.OrgoH -9j X Wind(ic >-lll a full-fݡgraphicF aQupxQt 3D<(near-l !m on^& ~12DVre%&nC++ Quick) ^2:k AsImx#A! Q3DLoa|.cpp~ sMheap[277:Berkeley AD*(BINDdh)wK (DNo p E/ (n8d); ) (rou so! whe'Xi~;8=vdfy{ape  ly hbiCisoattµu RR"077{G w PRNG;8K(  y(~y, }s-!eIP?dreHsy ;Roexhaus<O|KEY 86mPyn#e4, ac,\"-nRz mmguqm,a,fcep,Vy # dy #typedl. s¼m<c7Ciasllto"w  p-kdcp# naSSRFHRm?\rollO SRVG5908WRunboL d TCP eamKU9/ SSLkim#=ock_LayL:bTranso (TL ak enggezl-purpoBcryptphyy 8! "T&!& RFC 3211 KEK[wa9 Mozilla"EoxB&brer, stm) f: MmgbypassDOM:4uon } 30N KAo/V oI4IIn 2XJavaS: Webf mblЮ6dS^gin;~yWo rsU9RTC: 20QRQG И2poof$F757 $C&MLω3"xx [1o:3L  SertSl Slgn-On?SA٢2Zr# whNlife-cyclCfed"  i!K#Q +: TyuX&YEn'ouve-#4715`ha& `oi,k-nlotbalT ): vHAPmjso%podman ]'s Himnis ,'f*<1p u fv.X c$ptKub {% Go P?L pgo:eve/tarw  5s\GNU pOf%U2ke e(S( S(R((.o-oseJke'o;xr{i%; push6;$ "!q*:,L,'ce;y(dmA Ies#nkz. >evtutq4 `)XDey ,{)7z),t+ to-i$ sla re,fablr synchrz2bo-o,spliF o th. Of"ea=oPub/Sub,)1),,yHmEl,s5ǭ!beh y5ƥ'\#m[si *kl@ 4/!,c7 K: m2slubvo8w.-kswapL_tr_pr6*3~3 IMP (2,ML,p" m!seV,.R^ao89gt s,cen' s tCCs ^ RN,! sc oU 'l sta>po8 ;V$KlWngia ck+N;<o& ~e}.s XMLcu ]eK:E w^@##2tM D!XsC sm Ts ³937F>Vxml2d op0 &S"h {slۢiw4at&Dyn+Fu**"/.W971*nf>B$_-_ld()il@in+4_#id_-rm-387^ dwfg80": x/Acmp_oCL986Le1000eD;,#._eepJ98ʗmt76N'Fec u%C91CtcA Cl- _sk(sk)->!_ršdis955TBtolGMT: #si5UAFs??i"u/vt-DisKAty9Cifohlk 0058Xce_adap: }GxaYK|  F]18fp ':?mpVvk+V7LSB ?i2=;+HoH'lC - )(usO&RD-Bus ;vo$r_uD,ifde4#okDfkxsen +/ cgro']+tusnapshoWreqPst, ,r);  boItEal+yrol0zH22,-i:cHYysv 5-:8=  cl( EIa SUIM2EK ' FK\n/F m?858%KitGTK %9)LM?'r(3L :wBp L):?7/ WPE0)b8l!W=1350zgtk:s1??fOon)1V 3-43000hA s Gex tZys&b339Ph4>/hD}rYr7_r_X30T431_2CrSaf q4^40_r3i 48_2eb1-9IUag--j1394_Ly Ur6628f,cI : j1939:c NETDEV_UNREGISTER~,x8!-et/mlx5< OJJ7.4T2.saf0Gbu-=ɦESR 140.6,W biQ)146&! a0 1/a.U043?OJIT m_&P S2. ,X\1Se}22:nvasG1x 2\YImonUN8;ND3!2Requ(FY3Ҩv2p5  ?y9`p876 GrnaY, r 3metr9d boZm 4JK|>un8ed<(CPU Ot _05HInnoE#K447K627K58VPKOxmgr%N0NCs^$?9;2wim hapa,>p F a(y4>gc! Xnt fq' UoMuV  BUnianPo W13497lQTPM f 9ly  5boote iwn!] /mur o : KRegij#wsot4odu8$e r560hUl'_df_mn:&: 9 "LCAP_SYS_ADMINr1` n7&8Hm7&f4&Fdt"du!$#"*egor&66Ptlwai;~;a;DkJif*_Ap_msg_yDd3&%ObLPHPOG-=dl [J &+[ LphC$pg!Ion`2Jckps73RNULLDerSOAP-q6L-GRspcP8of6491fJHD<)R N2ChaOut426*!PcqP: zipEf Cexvi(EOCWLocor*fa@)_f82F,kN+l"5h6i: t6 ge+G `=s 9_ vW#B_ t# b\r?t  (:>Y+bng8va a mil.gbEmbl)f^gFJ P/lUH1rnmAmbY7)copyѡ -ly 3,Ŧk< files), ranlib (for generating an index the contents ofarchive@eadelfAdisplayAdetacdGmVo6bout binarysize>lis}psec2uobj )CBtr7sEptablefromvpcard4symboland addr2linver esstoR/*). Security Fix(o: *utils: GNU B Linker heap-bas7ojflow (CVE-2025-11083) FmoreesX7xissue(incluݢ impact CVSS scG cknowgmo/rlatferR pagm},R&enc'. Pythonfterpre4, a'v-orienRprogrammlanguq, whichemodu, cla, excepy Ry high level dynamic data typedl. supporfaթmany7m callCUraJs well.vou`ows;s 7p: Invalid ueOpenSSL APIyuse BufE-(en NPNwu`W4-5642)ecfHTMLParsIquadcmplex6069CKzip(EYf Cral DirorLEOCD) Locatow*fset not check5-8291ulQʦi;s.path.expv()th r-rolp75wTbppy:sVvidecu-ities ipula(code~ߥItKar, gf, lnmcopydumpn5CH toleObynumbff.ux, UNIXsimilapU necWQbo!cl _er o6ssh:?: CKaiercl/Hex\via ProxyComm 1984)rNulon// URI(oҩ u0yu >6be{.  applic curn ha20 poly1305@ba5987Mozilla.Eox$-sourceb browq, ignS2st[ sia[, pG Raby f: Use-aftfrexWebT&sKChil193'@AboIPC StTmD coulOrigg8^d$B鲐f0fUnqeccGC durRegExp0ilHK4KCkjregrPHKlbforhrW5Wthu rbird: Mem safebu7 ix"136, T5ESR 128.8'Č8ŌJITru YWASM i32 `n 64-bit CPU3P15.21%7ŠIncor XSLT sow o 5-of-Ends 2dQ%00$ faklpsgTa jar:Lngjh u6FKitGTK%Alreᢹengo :wBH Lkitgtk: d rQ mD4352 PPfmaJ l/redҭGa 5r01^r3`r5_r6CrSaf q41C bona Alma ; TeW th gi`b.T/\r- : EDeniTS i2 unvr\Ԣ;o z6815kThi' mx5domainoivirtuXhos^Sifi% ACME utomcg5te wiC bfigure d.oirĜnatIewal %'_mdpacHTTPMe_ (unidVH5575GLarge0FSa (LFS)X/l!bsu`a  ;os, qrpD0 N8s9ior7n#rtUR-lfFSw*ar .Ml2662.[ ;elm֣QsgroupW 40." F 46 4 43 ] RTC: S]alO2R mis.iSJavaSc:t  X8Sbe?p n ect dixmyGWansGLx PrivgezNetmN8;N9megin*icy,pasReqt ҨDOMkokΰp5 6y4~httpd{3pow+ulff R|?CGIonJr6508QUdir+AlFO[Ifd6200dDIPs _to #cmd=...g58098[Vj work CFu0(VNC)%}!oariew2cGYktop%onj oma!nejre vrunK ,Jt!. 5IL ne!l de Y!turTiu -  X.Org: Xwayl4ro oT2659xoFxFSyncIQTgH6FHPReEvK0K' Mze YRediW Y599YO PCctePaBarrCX8X ikbCT!OfKeyM7MHKWCSymsGXەVModMaskTII kl a4H!,q+# K:PI:lo NULLder-"{3-5260 Mvsock/io d` cocWvsk->tviO#0264iHID:: zero-wU#MI302I: bcm:# UAF_@_sh92Am; 9inc_p_bulk_noprofš3113XALSA:Cb-ZpoeExtigyMO de#sm8.NET6Aftwafr5 !b%C-%seveP%n CLRZaaN2-i4 fbthat(]vul'* n 2 . upd9U'VSDK 9.0.104Ru"me3.dot( E V×n-InMmr.hAs8&+24070jBugEnh:(TBZ#23497"814^$xml2 d,opO tool'b)XML`# ? {E AE FE l617 7St.) $Snq/fE[`9~+% I d p2Qz%$Dslp* dVVoa $1,Ģz&¢K s%ll,5r)8 )%tyl"eet me%is9 -s.c:85v*ipV- ,"]. s,ac0nE4curpy*%us : s MP43dO"O"7347dGrQ&na!. !., furmQ%S!dx&boj! edk#t=luxDB &%SDB go%-jwt/: -go8^%veT-hi4r par-0"9jinja J bkt gh%trXseT7as751'ExpaZ C\ B deNI,Res;ISE?C.DjhFh817k3 E0B2Spoof8non-BMP3iT57_9)Y3e8/ -orS0_ 7_ K 9=K 9Ì30GI(5;ImaM g: "6RCE3-4t2PSD222psp g333c?-by-C-AU0s7 lc?gBin%1ok// 592W(TomcR 2letf#e!AI+ )Z+%Pa#(JSP) t,no7#Ctw: -TOCTOU2Q+"7 GP"Q/o<,Ilosc <O LPUTE 48"kXH84-rAis[ex@ra*?rossU/n4467TϳH5455[:Loa* i Zs.5tC208һ?M:rD<M:qXq3042L` oF ,L, en\i:gob:f3l(Dezr.6mesbs6>7yMwux-W9anw&sexh34:A S8jl5FlirpuVPNK8tpGo$s JJbn/7gViJiM. ypod -/o:s.0arClKvc-tJ+'iQa:cDNSueJ }w1Q |.4-/x/crypto/bG=t-BA`28zNj -1. &-jdk pa+4JK& A&E1*Sr'Dw$ @.etTLS'nJ 15H7i. 6O:t&e/@fha6798717+21 +d[319of=s ~Ssfin5clB152&(GetInheriHNsLP)554 ^|*=HQra= (UI) Mis_<h |o5.BXIDI/tmp :< 28'BQLD#?had v<ede<Fүghc i# (/POSIX $4p),Amath%m)ۢincdaeK(nscd<plBKsWi8q{nZ@fun` cNFl "/:2a Cg's Tr=03=PHPJ_-e-d Ls ly&OjC xphphm?' `iysqln`89bS`byAver`cc.quotX8c-d'Y112vIZCaxyXxtFghtE* CRL=j 2[sh4hHV*fewrZer%'es]C |Zl*1217 FK* ?omitNh"V7rRVsWf iC[?\lfW ml lonIM- rGIrBeN@)J)tDcaOJ ,1γ{86\5N(JUs;E8 n +iFe EY-XP-408V? bH ":"`OinTsw0Z5 8 10 10Îݎȍon3 F5RubNtn'a', has4&&! ɢ BntI @%reoS=RE99"6rk-EVBhav 'XVwB5sp, >]]>4 Ê#46 633K~Pm&e6( :Ui#WTP@7220:MFC((.n @ I%foh"m?f#jI, me.2 +Ō 389m?(vLDAPD 3ZYv3) t % L} we jAAP[^)R-k} %dminist/ -dsB: niKq$"9$gA٪Q^cust)POS fa>1XVM 13OSTPi%BGuKosR_hood.M>[sqMx l;,]o\Glo.* toude#+) w2eoliSckpc[$RU:eE$ HVM,0lf- 8;ZY= m-4(elTE6e-i e:u]mLiH3'ro88539\!000:e_ure braDnQbA 0+FHj Us0֤nNc'XiVOD[eW]es-e\XqsM*{T-N-mid[.i6Y fyHd))isK,>6465A"Z(R ntsg g*a519?Eetailed information changes this release, seee AlmaLinuxR Not/linkMfrom&Referencsec]. Trsync utility enabl#2user o copy and *hronize fi'locally or across a network. S.withofast becausonJsenddifqoverfstead of:ing whol. ilsod amirror:tool. Secur-Fix(es): *K: Patrav$al vulnerabanr(CVE-2024-12087)A--safe-p"bypasVЫzpeN8NRace CoIHlSymbolic LqK74 Fmoryboutmsissue(s),acluo impact,LCVSS scG,knowgments,Fo/rat,foRgms,Ad)C7֤\_Kerbeqau0nticsym,ich canJrwyourEbliminEn-e prac_eW8dA unryptө. It ows cliereeaڻahelpaudrdrty,"#keystribuc]L(KDC) krb5:fIen cululog bk s5-24528AugnutIp ahid[GNU Transport Lay(GnuTLSbraryhleM ographalgortmhtocolu6SSL, RD Q: IuIneffic DER Deco Gtasn1 LNmo!DoSr243AwA3"atrs AbsttaxROnASN.1,(specifieX.680 ITU-TcommP:)sct}s manB}nH&uishWEn/Ru(Cypl90) e"=d_funs :Pf13CImDNS f A/A nncwa'quest nfigd ol.z$ %`src/b/mod.rs` js/avark-dnMTCP Que} FlaweA(|Deny,Sy841BPyxn m pre, D vjobj2- ^xmmZlatod,> y exce vhigh vel dynamY+ ypel. sup6t aթwyN lCiewell.vous ndow̤; _p: cURL 1 e quabrM doma 093A s!buil.c`omd OS `if:s, VMN .OSTr i%. useOsSd5ho  BesJ qM>.itcpload*dirlyloudgisp=b<o-|cpit- o-fips/openssl: Meyck er Qt RSA/y4394)d//cond :y: C7EPEa "// +1"K tagdeep"neexp s[U/anTu{staexhaus34158  FIPS zedo;9355EqP BGoogle'sC .3*Fed? yet:tRa flex,8"ommeism iz|ā : mafc2-1941Erpm-oҢNorbioge;PMתLmly boyile^saaabdAthn-IW-:t_p |6 /srollG - :sct_n_ affA89Bk BX.Org-s]c+cfBX WJ > bas " - afull-fo4 U asignedW>kxorg-x11-: tig heap-ba! "privrg s_ 632A 4: Xw - se---r5 soM 652 : xF; InitTrig()H601HPlaydEvK0Kuninite oYKRe Y599YOuf-YwףCreuPaBarrCrX8XBTXkboTzOfKeyM7MH?KWCL sG6%ەVModMaskTI5BX frunn;XW26"r ,r1_ +7aO*$, G= s3toperatgo'^42 4&g4_9 - :3f:5N%d 5lk=.D3v2rjnSSA i1i,M_Gnel_m[0^ %LRCӼ83Ci4rF StoragLF4r%l!:r'aX%h*seG s!!K *!t:h0!or1 &J5/4pU&@7cx&kposhake#pQUICn,L3-3932Kil o88tL oS2S8:+l:=1.'i0nloop2238O/ip n|'e5eh or)Isc!+"IPv4:pp( 6 add'esj9b[http:]()0)'r 100-e MEkzp'Of r r 6KHF<+Yi 2000' gjpehIzin%/$olor.>5682 I/%2/j2kHBc>R|nt?Oe "2KitGTKۢ%@! Yweb reKe: Bp. Lkitgtk:1. malek1crdvO #2a!C  5sh 419 rAis [exZ>Ggi1A67TϳT T V551VLo}iZscri83tDFһ=r9CrSafq16ZqK 4ahS+aTolD &ac|6OCI_6. A gngs,cJFG\:$itRNiBscur.n a{5r;V$KlWB6uLiDoh9r ;<".60 go-joo JOSEQ4"Vw'lu?71" 389C7' 8Fn LDAP t7 3v3) l'l!t ^^d wLD twejAc5^)Rs2LeLiej%dminis=-d]nuc ]z d wsk oi ins{Ne{gz ge+G lH` /aFtodcifyN xGi7x:P HTTPpJ,laTcu: psJ5a}m<<< n<&ruOngx__mp4_ 2-417H#M:=sMH2HHQL24-734Gr^ na, fe r7rd boar e\ Gt=InfluxDB & TSDBjwt/: OJ vyc du! he&"+ 204i&@a!PeHvirol`L"en"4/a2=<' qS :u 'SsT10Iel, en: Q pQa'/os4yxexact$@le!his/n2no,lwCC6>o=En))Ǯnehavemisp/us; irG$ bu0Rsk sQ>ȥnoRD gi' baANp0'/ݢztinAJ5 Jxsl$PtdQdXMLGg' uak HTML,ez&¢Ke,9 lyA) - >OCXSLT yheetL@ 9\&(GetInheriHNsLP)5549 GIMP@S^SI MEpUUP)z ?i K.RDY"V736VsWf inv7dKnlf4f/ml swrN-""sR r8euR)9 )t:caHJ c1UV861Viun<n__shutR"s61123 _h_ id}_w ID2^x \GXhI OJ!&n: P \/iO U 2.0B :- OIDCPrlRM# PF lL-u314.hk%ssyrP1S1PDFcu.P s4Jt|o"tmO"} saC)G p5d/prR >g:ng1%<=gdevn#_Sr_kB+DhJrX`l6kel p4:!a! n! zK0o_u3/sqpm.:u(BTd->th3-ctx4T3Msoq6 &void oIL[.numb;58007Ztpm:!dkvb()WeAAb/acpi&8;Hrtpcf85063:lxqV]).'PCF$ NVMEMZ69Znvme-tcpU`,_,_du@ Usi_ibfLF_UBSAN shifXK/ar*Dih._xrW ow_;,f93?pUNk.js >@ dop~$l-k*GNhppl szJavam ( M c-ar&&2F_ w 86x8CJemoE $NDEC VTTektmx 4014^yV'3nwl :Y e OSC 50pu  HMozillaEoGPTbr $O? "-((J .f:bk;&KҦUBh8QUnjn a tX s4nΨ'ison"j "K^I !*(`(sw3w өTbugs $138,'5ESR 128.10(ÎM3ݎȍonfLn$vdm-Z uoftMferru-'!inceI] 'haP g7sjC. \Qs-9. Y%$wpst{ 'byOm /2ΡZkG ry oi'7/9o;$ { Fr:i$EOJ6uni7e owth" Pabby,odX 67YpiEpGNOMEktopto5;&9qiex 8ra/ml fo aXFZ*Hk 4yf# 59j$ LO#-"hN:t(zugh bYAmysqln92ingle98HO.quo-B-HN 3ZC*o}k*̣xts&CRLF(j}2 sh2زJSQL$ NI>72_N1C, a CVSS score cknowledgmentsnd other related information,fto "HE page(s) lis,R&ences sec:. Mozilla Thunderbir/sstualone mailnewsgroup cli. Security Fix(es): *sR: UsInterface (UI) MisrepresJ of attach URL (-2025-3523)XI  DisclosureI/tmp dirory ingQ2830QLeak?hash=Window credials viaaf\ү2) For modetH[bouts:issu,clud impactiTlibspx9s providew HTTP vl2ratfGNOME *ateg?ov(lvappend_param_quof205ŧEHeap buffIsniff_un>n()E2EsFfeed_or_htmlKkip_insig!icant_spj3jOqndsadh_h ersse_requestQ906QDenTiceOwhenOlargml|ranwith R Ņ7ƅouble fremessEget_co-disposi{thkgh "7-7-7.c""s" GHTaovalueĚ11ŚNULL poi derwݧM"filename" eUi),GtP nofCM-DMV1.dma;seVAuthoriz7haCfostbee@rbyA4642ZMempGqual_ƫ`0GAvahiYnler6DNS S~yMultM#spec]P&i bjs918)PGmizQlarmMG-rZ``6784 k$DwtBJOOB9ad(@I_mOH t__"#StoBJexiYpÚ91 Uu ԉLvo'i48Pyn4, a've,7Iergm  uq,c,moduldcl*exce s,y hi1ll dyR i_g !$4m cC. ,2well.vCv$̤;  nado: T4Z1m-DF;728gB s 80,WaM&gmax l# 4St7me #R( mapba{5 D$;gVer1-p)-bad a ll1-  &: H265dec PS-BJOR΢0ic38 )Cb kjaDcould ve led $#aapayArd"'yPo, #`eV?Copy#cf*?g b4b%safebugş8]ZŠ FCGI Pq6{ p*-fcgis:&0.44 0.82,Z =.6.\2 (aka L06'!gsfiCwnhiH/__udp_.192"v:ce =lyde A0Axskv:xp_ _a:as _u7 [997Xg} veng.gH2&H/4I9"( h12umin"_rx_h_Vcap_n@b94%gc 1"(/POSIX wp),Amath%m)ۢin]7cdae/(nsc23@\ 6Wiunn;+ /:Luid(dl{(!sLD_LIBRARY_PATHV80/x) 1717P/039971766ModS)  r*de%+en)"^6  #cHPo  < B 1` Co-Pilop< se -pm =>PCPbpftrIc3>da,,$7 getbnx2esizmb-xdp-4cas"11 BA 0OL2CAP s->7)i2 -F_cmd]9]$ $3cfg 11: cwiphy_3$efrcS7ŲUUAF?i>md!Z&fv.*)nptKubt 8skopleN8j  /iH#ge+G Fend.4.'vfy<J%ah;:^P{%OCI Pm1thiNcSb P@~NRN,\NXsc! 0r u nA/O<r ;V$KlWn?ck%|;0il0? 6A jl7lirpuVPNK{ FQiGo3bs 9PgVis+4Ka~Q`v-tap-AX1tzSQT_960@wVi69GIMP (GNUNM.pul PP%s(!X/,.R0al\l1:upon xorg-x11-k -Xwayl7::?g ncH.BH.X (ExteWAnimzCur T.7'"Big st6(tUn?DS DI ByVI {80)ud9 (R R)y8VirtSW u4PVNCvX('XCB` GdR? )oMrep#Lunn cny 5ne5vt7Y )i!5`#Y-7 7s=tbl0 a^GOb%oQrQire(i 0^s 'kbr1RO,LVM, Btrf?LUKSbMD RAIDG"PE\_act$kro%<Y:u@c60M>'__ idc -ID& 4uT Ap/?S ban!@9nRe2PPci4V*nKKs^pioISO Y0 CD-ROMLis#noVybsdtard1\?%:pO-񤄦poo # lR:K1/PiVFQip"`([#JiS'?Q |o=k Timeuuino 7P>xy_sLe.ESas aclrN %dž:əlMCTt4-1030Epowul!`bFng&-i*l {AJ8&(el)袪- e-]C e: jC BXLrro k,(q3{=Q Gy_kG3qt5DG q, xml B3Q* n:6:*CnAs FvK V54eEdg MX (PALto 7up po^eZ.nLW&Hv L eH {\1m:g |I b0w s%;=OS 6%fa  Vg / 'i%) sS)Bhoo+BlqMFuI , > ~o6*co#ble< !e<'r-cli and cockpit-composer ents. Security Fix(es): * net/[http:]() Request smuggling due to acceptance of invaliwhunked dataQI (CVE-2025-22871) For more details about the sissue(s),Lclud impact, a CVSS scG,knowledgm, o/r relatinformation,f̢R pagm lis,R&es:. Comm^e utilJcontrol osbuild5xTbc pv7s providet{ard C $rari (/POSIX&readp$Ah%m)ۢinam0rvicache}emon (nscd) usby multiplegrams osym. Withseq,$Linux*fnnot fun ~rly /: V*ogfr overw0e bugtW257021kernel2a4a!s]anyoperӮ oK: Squashfs: fix hɢsan95ckmxattr_idunt3-52933sudoIwhich allowsadmineorscerFus wiQm (,ex!tivilegcorefgu  pur.hav^o loAas root : LPE via hoopz3246{Open Virtual M(2Tooˡע;o"sourclo~!VMw,6. Vy, Ew ar 28podmansx is pWo_"inu~fv.D ##Kubut 1wbnv'd|-q+] N4 (DBMS CREATE STATISTICS do#3" ma+pm7)vsftpd SVe emT"mProtoc(FTP) EH xTn :ji$ N,!me)p424&Mozilla FiEox6%&web br 0 igne'+0H ,%U fpo ng7DownloPax>&32MUse-af-freMJavaScc[ GCL6-0885KthbirSM safe+s pOESR 140.7,&';)147.&91ŏS1b<#pe d, <ndiT:.sWebGL78SIPH2 Eng N4NI.!lossVGQO3OM+gNbypas5DOM: -JCI#&sDragD^^C kja,bg  *ew6/h-9j]8,I08I-snmvb%+6p1E+s%Si(M SNMP\&ena,hry3:qet QS c1u byU r USB '-fa maBt#-ta, /c se/veB0xil 4-r ETCP 29 6×E1 Almab6/limi.e [% ;:@#_1euAVCOM? 672"YA ~*SNMEA2000wxxcdrm/xe#k;ma-f4G ru3870m#:!t v_done//_off, lengthir3['q97vmwgf V $s h .aga SVGA_CMD_MAX_DATASIZEc/ cusbhwc3:R &r (twePurrF+_$v(s\/h"828ol6:epWuq /7e_W__osd_ma\1I (7I MR4P6 seng.R!l2<4 chan6cn%s,! csub-pSlW9&an:)akS:c/sI, (4-levelo i~ :H@'CEPNM Q0 @144(\JP2\~+f5fXCF ~$AFZ4ZsJ&ͱLB=j"V4G)04 ;rMp$/%^4tejC4]@J.--=d eiYN,nQAvElJ0c@ p;" $g__;_iPYA0XPypTn pre4, acMO,0orEed.bsQ(,|M xi6,y hDdy~: 6typxinqP!1">#m tdC,=well.(wiQwAurlRUnedrAexh&{o64zGa St%nPQ7Cly[Il|H]nE]qD"mbcg&x;foK:~AreE%s®6446g%YW mer $&zoA&381r$ntpollE349E&F%vm_bi$ioctl8uyOg_F73ьJ6uXJWqYu@\FA8\ cO"%2_8_H 4OĬO)BIGtoMGMT;.|<7É94ĉ.:&l$cf H 0 RX K@830: hc] :%Ai\)teFa&)-a0a Xs /Mpo]y;$sIo[T]ledGnr^[no -Ac[re#Hed(d1e. 1C cur l*lL]or d$]tn@suchMicrosoft WsAchinxJVirtualBox  op nt . 53IȎ nQ- r-vulobyv8vj3jps nUs %GFX Q updfs%18v9-suhz hz2,<:vsch;nek<g a3778xc½rqWp/gv2mVW81WRDMA/"KASAN: s-UR ib_regr_"j bl k8022ãyrxeԼa~4~MrujSquashfso$ bkze cuA p415pvs3/vmcCk ns r{ izitf03+ATM CLIP !inrs59f < inGm io_u /net387v<USB976pus st_rcu k_up_capsF7Fipv6GRCU>p6_xmit83=Blue_tNISOpo UAF so_ _9N41ه0hƉ5zUi_mdiN+ yey2.Å271Ѕ ALSAari:! gÈ6hci_syncrcmdqueue_onW3tphn HTTP@ "~ GNOME ha: S"eU Con ErrOLS-B <inNTLM Auth^c6-073WMultipa Pym r 6-Keyl!TPM3Ply lbT attTr$tB$sol : K%sau^rdAst:v. ! Xiq $CP"GIMP (GNU ImaManip P})n!isiedin 5R@4Uo1> s;ɡ34  -8D1 XB:VQme7g3*aȪSgQ 2550|g_p  _ ycle+_RF3+KDou[+[exFAT _382R3n -0285/:glob)6<8?p? %1)o )-ds: q</ 4905Q+C>oll,: 1-F(OCF)  c$+ hW]ahO,fK9 OCIQLqC ] g¦cX#stto:G` RNiB;(>t: 'az, qG$;V$KlWnial ck{O ;iEo RpodA>eJss,.E2PomyDH<fv.ac4ptKubVt6MozillagEox -0webDws dE# p : vpI5 244!f+O"Enga 03LO785OusafKbug!xT3ESR 115.33,40.8,. bird)148&&–93ŖUnfeoDOM:l&`:8W OAu:/VoJ4JSb.=>+d>n4t$NkExteKl S$À6L"]NSS;S: J.$66SS,defDBO9O dL \N8: ">misKil$!k83uzMP\MFg]{M;۪r:8^59_;;%.κ62+WebRePv>VMcGS_S71QPo yi{JARWS<7xsK7Wm' *'8p8pt!RTXx5 x2NP5back"*7(AkPmKXy,p 5 2&f,c+V( GCK5CQ9 BinSIDL);."V\