SOLV P0dnf1.01.2٦vjy,Ot]Xx溋Y")x86_64noarchcvebugzilla2.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7i6863finalpackager@almalinux.orgrhsaself1kernel-abi-stablelistsModeratekernel-coredebug -core modules-extramodules-extratools -libs2.9.4-6.el9_47-4.el9_7.1kernel-debug-modules-core uki-virtmodules-coreuki-virtCopyright 2025 AlmaLinux OS4.17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.1kernel-uki-virt-addonsCopyright 2024 AlmaLinux OSImportant5.14.0-70.17.1.el9_0 22.1.el9_0Copyright 2023 AlmaLinux OSpython3-libsbpftoolpython3-perf5.14.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_54.16.4-101.el9 3.el9_15.14.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_2427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 5.1.el9_7libcurl-minimal5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_170.26.1.el9_0 30.1.el9_0openssl-libs2.37.4-21.el9_71:2.06-27.el9_0.7.alma46.el9_1.3.alma70.el9_3.2.alma.194.el9_5.alma.1252-32.el9_4.alma.155.el9_7.7.alma.1libxml211.5.0-5.el9_5.alma.1python31:1.48.10-2.el9_5.alma.1 5.el9_54.16.1.3-27.el9_31:2.06-104.el9_6.alma.114.el9_7.alma.177.el9.alma.1250-12.el9_1.1 31.19.1-24.el9_120.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_6Copyright 2022 AlmaLinux OSexpatkrb5-libspkinitserver -ldaplibkadm5gnutlscurl-minimalps-libsglibc-gconv-extralibnslsmbclientwbclientpython3-sambasamba-client-libsommon-libslibswinbind-modules7.76.1-14.el9_0.5Lowopenssl1.46.5-3.el9libsshpam7.76.1-19.el9 _1.1223.el9 _2.1246.el9 _3.239.el9_4.135.el9_7.3python3-libxml2grub2-commonefi-aa64-modules x64-modulespc-modulesvim-filesystem1.29.33.1-2.el9_2.alma.13.90.0-6.el9_31:3.0.1-41.el9_02:8.2.2637-16.el9_0.233.21.0-9.el9_3.alma.1Copyright 2026 AlmaLinux OSglib2libarchivenetapisamba-dc-libsqlite-libsystemd-containerlibs18.168.6.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4:1.12.20-7.el9_12.12.5.2-1.el9311.2-1.el9_423.1-1.el9_5krb5-workstationsamba-common8.7p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.1grub2-efi-x64 -cdbootpctools -efi xtra minimalopenssh-clientskeycatservervim-minimal0.8.7-20.el97.el9_0.112:4.4.2-17.b1.el9 8.b1.el93.5.3-2.el9_0avahi-libsc-areslibnghttp2ssh-configua-libsopensc0.8-15.el920.el92.el9_66.2-10.20210508.el9glibc-all-langpackscommonlangpack-aafgrkmnprstyczbemrghboinorxsyncaehrkbmnrhsbvydaeoisbvzelnostufafilorurygadezluvhakeifnersbtuyiadgkstujakabklmnoksuwylbgijnotvzhmagifeghriqjwklniwrstynanbdsehniulnrsoocmrspaplstquzrajouwsahtcdegshnsidklmoqrstvwzltacyegheigklnopirstugknmrzveiwaeloxhyiouewzhuminimal-langpacknscdsamba-common-toolswinbind20230310-135.el9_2.alma.1814-140.el9_340603-143.1.el9_4905-143.3.el9_4grub2-ppc64le-modulesiwl100-firmware0-firmware5-firmware35-firmware2000-firmware30-firmware3160-firmware5000-firmware150-firmware6000g2a-firmware b-firmware50-firmware7260-firmwarelibertas-sd8787-firmwarenux-firmware-whencenetronome-firmwaresystemd-rpm-macros1.0.8-10.el9_5:3.0.1-43.el9_0 7.el9_17-16.el9_225.el9_3 7.el9 8.el9_46.el9_22.2-6.el9_5.15.1-4.el9_77.el9_72.2.10-12.el9_0.235.2-42.el967.el9_7.19.13-10.el9_61.el9_62.el9_64.el9_73.el9_1 2.15.el9_36.el9_4 5.12:4.9-15.el98.el93.9.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_75.2.5-8.el9_039-16.el972-2.el9NetworkManager-libnmbinutilsdbus-libsevice-mapper-multipath-libsharfbuzzlibipa_hbacksbasss_certmapidmapnss_idmapsimpleifptasn1repokey:type:idshadow-utils-subidssd-client0.10.4-11.el93.el95.el9_677.el9_73.3.17-13.el9python3-samba-dcsamba-dcerpcldb-ldap-modulestoolsusersharesystemd-oomdpamresolvedudevpython3-requestssetuptools-wheelurllib315.6-1.el9.alma3.9.10-3.el9_0device-mapper-multipathlessrsyncsudo0.23.0-2.el93.el9_34.el9_34.1-3.el9_21.0.9-9.el9_710.0-11.el97.1-5.el9_2.19.1-1.el92.el9_43.3-0.el913.el943.0-5.el9_2.1 3.1 4.35.1-19.el921.el9_52.el9_55.el9_66.el9_65.el9_06.el9_16-17.el9_6.28-6.el9_4.alma.1:2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.26.2.0-13.el92.10.4-9.el94.9-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_6 7.168.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el9:1.6.37-12.el9_7.18.2.2637-20.el9_1 1.el9 2.el9_6.1 3.el9_73.2.2-2.el934.1-6.el9_17.el9_38.el9_69.el9_75.3-4.el95.el9_66.el9_67.6-12.el9_08.el9_123.el9_3.348.3-4.el9_46.el9 _6.24.16.0-8.el9_19.el95.14.0-611.9.1.el9_74.2-4.el9_0.34-2.el9_13.el967.1-10.el9_6bluez-libszip2-libse2fsprogs-libsfile-libsreetypegmpjqlibatomicblkidrotlicapom_erreconffdiskgccryptfortranompiculdbmountndppngquadmathsmartcolsstdc++tirpcuuidncurses-libsopencryptoki-libsprocps-ngtobuf-cython3-ldbrepokey:type:strpm-build-libslibssign-libstpm2-tssxz-libs1:25.30.13.0-135.el9_2.alma.140.el9_33.1.el9_43.el9_42.24.0-2.el9_5.alma.153.0.0-10.el9_1.12.el9_4.13.el9_6.1NetworkManager-adslbluetoothconfig-serverinitscripts-updownteamuiwifiwanbinutils-goldubblewrapcockpit-bridgedocsystemwsdbus-commontoolshcp-clientommonrelayservergnupg2iputilskernel-cross-headersdebug-devel-matched vel -matchedocheaderstools-libs-develpartxlibsss_autofssudomicrocode_ctlperfython3-cryptographylibipa_hbac sss_nss_idmapsss -murmur dconfigrhel-net-naming-sysattrsshadow-utilsim-x64ssd-adcommon -pacdbusipakcmrb5 -commonldapnfs-idmappasskeyolkit-rulesroxytoolswinbind-idmaptarvim-X11commonenhanced0.4.1-7.el9_4.alma.18.el9_58.7-12.el9_1.11.2.11-32.el9_02-1.el92.el98.10-2.el9.alma9.5p2-10.el9_36.17.el9_1.15.8-4.el9_3.alma.1:2.10-5.el93.3-7.el9_2.12.2.10-12.el9_0.33.3-2.el9_05.el9_70210202-11.el9_6.138-5.1.el9_0:1.34-6.el9_19.el9_73.18.0-7.el92.3-18.el920.el9_5.15-3.el96.0.1-4.el95.el9_6:2.1.0-18.el94.35.0-6.el9_34-10.git1.el95.1.8-6.el9_12-4.el96.1-6.el990-2.el9_23.el9_34.el9_47.0.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_23.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_44.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_5bashluezsdtarzip2dbus-brokermidecodee2fsprogsxfatprogspat-develfilewupdiptraf-ngldb-toolsibarchive-develcurl-develdnf-plugin-subscription-managerogrotatenanocursessprs-softokn -freeblysinitutilopencryptoki -icsftok swtokssl-develperlpython3-cloud-whatrpmsubscription-manager-rhsmrepokey:type:flexarraypm-plugin-audit selinuxsignshim-unsigned-x64quashfs-toolsubscription-manager-plugin-ostreetpm2-toolsracerouteutil-linux -core userwpa_supplicantxzzlib1.26.5-3.el9_3.15.el9_4.16.el9_7.1:39.31.5.1-135.el9_2.alma.1 40.el9_33.1.el9_43.el9_42.10-7.el9_4.125.1-10.el9_67.el9_29.el96.1-3.el91.2.3-7.el939.31.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_441.28.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4:20240910-1.el9_550211-1.el9_68.24.2.2-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_483.5.1_1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4ncurses-baseprocps-ng-i18nython3-dnsidnapip-wheeltuned-profiles-cpu-partitioningpatch:ALSA-2022:49405099242495294260031572246028108385470901852883148239826791931784053618459340053936373:02823334567894036267529465123478911414707013212745897887502192332708264550355995722354325479504774125697088385061897145362763838658793566152131254359617798594897057445677478794:0310463456853379081196610244743849398312509304862395306928799032394641033784756638350412770167975833063950113619842364078312494575836367746992853635293492861623635646456775483997748481624466179317253137140145132343049687045416055:00593247757892510136379407585699837114041186199220834475196274633042865060296241304205011999429661700408746116398598807377558742608275819409930205183259936435541255926217537640566086532413423480362779867353193742446977903704395064776742337404903814233364355908030243012526877809786:006723831244571993936108714335047386179132042212722863066repokey:type:relidarray numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatuszz{{||ssDDYYTTSSZZVVWW11UU__22OO>>IIJvvwwJ##""XYYX11OQPSSTTRROPQ1 1ll1bbnnhhiillkkmmjjhh O w v  QQ@@! !!  [[==mm00  ~ ~~??PPOO((..--+ +))) - , ,+( * *NN. *,+ + HH+ 0   ##  # BB PPMMOOLL% %%     __  @@JJLL TTU UU3355T S S6644S AAR RR<<$$$ yy$$##!!""FFQ Q1122//PP..00P Qqqoopprr{{{ >> ddKKZZee\\$ $$AA __22RRLL9977??''$$NNvv//!!||11uu++VVMM33""aa^^zzDD& &@@==    ....{{BB))??mm))66++ddXX44PP44$$''22BBZZ33FF%%UU&&,,wwTTYYMM<<jj--99@@  IIrr  QQkk--JJ((xxff''bbCC  ]]  ;;00  ``}}KKnnAAhhyyOOcctt\\  55,,>>qq<<::GG  //' &KK**""IIHHSS88EE##::66==77CCpp>>ss88% 00**GGLL  ~~ooggee  EE!!  WWDDllJJ&&%%AA11[[HH%%##;;((ii55FF|||   CC``*** NNN gg& &&3 33 0 00NN' ''))) z zy yyzaa//__[[``. .- -/ ^^.-444 **( ((WWVVUUccCCgg  EE kk' 'bbkkiidd##jjvvqq# ttww""mm   llaarroo! !]]xxuu\\nnpp ss'!cc" IIEEFF DDBB<<AA:: ;;??@@   == ffMM??      $ $   $!!! RRGG   jjii""" &&hh   &  JJJJJJJJFJtt t t - - -----------X---------- -!-"-#-$-%-&-'-(-)-*-+-,---.-/-0-1-2-3x4x5x6x7x8xKKKKKKFKKK).*. . .X. ..%.&./.0.'.(.#.$.... .....+.,......!.".....-.....1.2.9/:/;//?/@/A/B/CIDIEIFIGIHIIIJI !"%&'()*+,-/012789:;<=>?@BEFHIJKMNOPQRTUWXYZ[\]^_`acefghijlopqrsvx{}~        PHQHRHSHTKMHNHOHUHLHVH           " $ & ( ) + , . 0 1 3 4 5 6 7 8 ; < = ? @ A B C F G H I J L N O P Q R S T U W X Y Z [ \ ] ^ ` a b f g h i j k l m n o p q r u v w x y z { | } ~                                ! " # $ % & ' ( ) * + , - . / 0 2 -<.<3 4 5 7 9 : < = > ? @ A B C D E F G H I J K L M N O P R S T U V W Y Z [ \ ] ^ _ ` a b c WXYZ[\;];^_`abcdefgDCUhijkEl;m;Bntoxp/q/rIs t uv/}0}-}.} } }}}}+},}!}"}%}&})}*}#}$}1}2}}}}}  w|x|y|zT{T|T#}u~uuuuuu$IiJiDiEiri+~,~)~*~/~0~-~.~!~"~~~ ~ ~1~2~~~~~#~$~~%~&~<<< <   !|"|#|$|||-|.|%|&||||1|2|+|,| | |/|0|)|*||| <5=5:5;5q5p5A5B5?5@5======`============ =!="=#=$=%=&='=(=)=*\+\,\-\.\/\0\1\.2_3_4_ 562728292:2;2<2=2>2?2@2AmBmCmNvDvEvFvGvHvIv3JK4LJMJNJ565 OPQRSTUVWXYZ[\]^_`aA6B6<6=6:6;6q6p6?6@6 x x+x,x#x$x!x"x)x*x-x.xxxxxx/x0x1x2x%x&xxxbZcZdZeZKZfZgZhZijklmgnopqrstuvwxyn` ` `z{{{|{}{~{uuuAzU{U|UCdefgBhi^_CUjkEDbc`aDrjEjIjJjDjyyy#y$y)y*y y y1y2y%y&yyy-y.y/y0yyy+y,y!y"y9787G 5mlpquvstnoijykrgwx   ooFoLy}x}w}#z$zzz/z0z+z,z%z&z-z.zzzz)z*z!z"z1z2zzz z z:7;7q7p7=7A7B7<7?7@7{{1{2{+{,{ { {/{0{!{"{-{.{%{&{{{){*{{#{${{{'>>!>>>>>>>>>>>>#>$>> >%>&>(>>)>>`>">>> ? ???)?*?/?0? ? ?!?"??%?&? ? ?+?,?!!-?.???1?2? ????#?$?tttt}t~ttSq8;8A8B8p8=8:8<8?8@8NwFwGwHwIwDwEwV&&&&`&&&&&"&&&&!&&&&&&&&&&&&& &&)& &&&!&'&&#&$&&&"&%&&&(&&DoEoroIoJooy4y3yWRSTZUV[\^Y_P]XOQ   #a$a%a&a'a(a)a*aA9B9:9;9?9@9<9=9q9p9+G,G-G5 rkEkDkIkJk+@,@#@$@/@0@!@"@@@%@&@)@*@ @ @ @@-@.@@@"" @ @1@2@@@@ @ @./b''''!''''''''' '!''"''''''%'&'('$'''' ''''''''''`'''#'"')'0D1D2Ddz|{|}|~|||7wA:B:p:=:<:q:;:?:@:::-A.A A A%A&A!A"AAA)A*A+A,A#A$A AA1A2AAA A A##AA/A0A A AA#b$b%b&b'b(b)b*bf[g[d[e[K[b[c[h[3G4G5G6G7G8G9G:G;GX?X@ A m\2`V] ^ZVfQ_VXVYVV{[VeQb2WqcQdQan-B.B B B#B$BBB!B"B B B%B&B)B*B BB$$BB1B2B B BBBB+B,B/B0BBaCaDaE F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a 5 ?;@;p;=;<;:;;;A;B;q;bLcLdLteAfAgAuhuiujukuluYWdRfRWreR[W] XWV|\3_W`WZWcRab3^w?Y>Y=YmnyoKpKqKzrhshthuvwxy|-H,H+Hz({(}(|(5 }^~^^%(&((('((!(((((( ("(((((((((( ((($((((((((((#("((((()(!(`(:<;<p<=<?<@<q<A<B<<<tttz ZT^YOPQRXUV]S[\W_- -- -   ))!))))"))"))!)))))))))))) )) ))#)$))))))))))))`)%)&)')())?=@=:=;=A=B=p===q=<=bMcMdM }}~}z}{}|}gBfBeB IlJlrlElDl                ! " # :n vvv    5 CDbcjkBUE`a^_hidefg w~x~y~`aeCfCgC $Q%Q&Q%4&44 4444'4(4 4 4+4,4142433)4*4!4"4 4 4 4 44444/404#4$4-4.466'5(5441525/50555 5 5%5&5 5 5!5"555-5.55 5555)5*5 5 5+5,5#5$5 5&P%P$Pp>=><>?>@>:>;>q>A>B>#c$c%c&c'c(c)c*c655+6,6 6 6 66 6 6%6&6)6*6-6.6'6(6/60666#6$6661626!6"6 6 666)L*L+L,L-L.L/L0L1L!  b bnb./# wxylm% #C$C C CC!C"CCC CCCC1C2C)C*C-C.C+C,C C CCC%C&C C C/C0C%%23' AlBlCl   45* $O%O&OrmEmDmImJmEfgjkhi`abcdeDCB^_- frjuvnoytklmswxipqg67/ |){)})z)89:;<=>2 yxwe?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~~~|~{~z~!D"D D DD#D$D-D.D&&DD/D0D%D&D D D)D*DDD+D,D D D DD1D2DDD%E&E)E*E EE E E E EE1E2E/E0EEEEE+E,E!E"E E EEE#E$E-E.E''_`89VWWXIJ9:;<wxklij&'TU9:ghEF]^Z[78uv23yz'(uvefKL  JKyz  cdqrwxYZ34%&op34:;CDop}~"#STcd`a?@ab)*MNAB 56YZRSij  IJ/0KLst;<GH]^[\67$%NO!"QRstMN%&-.\]*++,UVBCLM/0GHOP=>'(QR kl45QR-.=>mnST12mnXY)*^_@A./qrefWX12 !abDEUV()wx  IJ+,CDyz#${|PQSTstuvKLklcd YZghqr56FG <=78!" HIGHmnUV}~MN_` ,-OP>?[\abgh[\#$WXij]^}~_`?@01OPefEF{|{|ABEF   opdNcNbN9 . / : FF#F$F)F*F-F.FFF FF1F2F((FF F F F F!F"F%F&F+F,FF/F0F F F-I,I+IH]}]~]]]G]]]u>     5 )d*d%d&d'd(d#d$dGG G GGG G GGG#G$G G G))/G0G GG1G2G%G&G)G*GG-G.G+G,G!G"G#e$e'e(e)e*e%e&e H H)H*HHHH1H2H!H"H/H0H+H,HHH#H$H**HH-H.H%H&H H H HH H HWWWD [Xa\4`X^fSV}YXXXcSWsdS_X] b4eSZXE =Z>Z?Z    5 +I,I1I2I%I&I I I-I.I IIII I I I I#I$I!I"III/I0III++I)I*I JJ,,-J.J/J0J#J$JJJ!J"JJJ J J%J&J J J1J2JJJJ)J*J J J+J,Jp?=?q?;?     =              ^^}^~^^^H^G^ZTXY]VWRSOPUQ_^[\IpJpDpEprp5 ^_ FFFFppp yc !"d #$e ~~5 =[>[?[QR_PW]VSTUZO^Y[\X d dnd33'3(3-3.333 3 3#3$3%3&3)3*33322+3,3!3"3 331323 3 3 3 33/303#7$77667777-7.71727 7 7%7&7+7,7 7 7/707 7 7 77)7*7!7"777'7(7                > =    8888)8*8+8,888%8&88 8 8 8 8!8"8/80888182877 8 8'8(8-8.8#8$8%h&h'h(h)h 5 X X X X'X(X1X2X#X$X X X%X&XXXX+X,XXX!X"XXX)X*X XX/X0X9989s *V+V,Vt |w{w}w~wzw#Y$Y%Y&YYY Y YYY'Y(YYY!Y"Y+Y,Y1Y2Y Y Y Y Y)Y*Y/Y0YY YYtjsjrj'Z(Z+Z,Z!Z"Z/Z0Z%Z&Z1Z2Z#Z$ZZZZ ZZ Z ZZZ Z Z Z ZZZ)Z*Z1[2['[([[ [ [%[&[!["[[[ [ [[[/[0[#[$[ [ [ [[[[+[,[)[*[www- . / zx{x|x}x~x7v 9 9/909!9"988 9 999-9.9 99)9*9'9(999 9 9991929+9,9%9&9#9$99!\"\'\(\ \ \ \ \\\ \ \\\/\0\#\$\1\2\)\*\+\,\%\&\ \\\\\rqEqIqJqDq}y~y|y{yzy0123456789:;<=>?@A}~z{| ] ] ] ]]]/]0]]]]]]'](])]*] ] ]+],]#]$]%]&]!]"]1]2] ]]^^!^"^1^2^/^0^)^*^^^#^$^'^(^ ^^ ^ ^+^,^^ ^ ^%^&^^^ ^ ^3{4{o{1_2_'_(_+_,_____ _ _!_"_%_&_ _ _#_$___/_0_)_*_ ___ _ _`` ` `%`&`/`0` ``!`"` ` `+`,`)`*` ` ````'`(```1`2`#`$` 5$S%S&S#a$a%a&aa1a2a a aaa a a a a'a(a)a*a/a0a aa+a,aaaaa!a"a b b1b2b b b'b(b bb b bbbbb+b,bbb#b$b%b&b/b0b!b"b)b*bb?\>\=\'c(c cc!c"cc c c+c,c)c*c c c#c$c%c&ccccc c c/c0c1c2cccmn yxw/d0ddd d ddd#d$ddd'd(d dd!d"d)d*d d dd%d&d1d2d+d,d d d-:.:':(:/:0::99::):*: : :+:,:!:"::: :: : :::1:2:#:$: : :%:&:e e e e e'e(eee)e*eee+e,e#e$e%e&eee/e0e!e"e ee1e2e e eff'f(fff)f*f1f2fff f f+f,f f f f f%f&f ff!f"f/f0f#f$ffBCrrFr#g$ggg)g*gggggg g g'g(g gg/g0g+g,g1g2g g g!g"g%g&g g g|*{*}*z*hh!h"h h h hh/h0h#h$h'h(h)h*hhhhh+h,h h h1h2h h hh%h&h%i&i!i"i'i(iii1i2i)i*i i i i i ii+i,iii#i$iii i ii/i0i%j&j#j$j1j2jjj/j0jjjj j j jj)j*j j jjj'j(j!j"j j j+j,j u u'u(uuuu#u$u u u u u)u*uuu+u,u uu%u&u1u2uuu!u"u/u0uCjkDBbcde`aEfg^_hi uvyxw xxx|+{+}+z+ssFsG H T U q r Z [ V W O P a b z { x B s t C D u ^ e f E F _ ` i j e \ @ m n ? I J c d g h K L k l S Q R M N v w X Y A o p | ] y DrErIrJrrr#$ng g gzz{z|z}z~z k k k k#k$kk+k,k kk/k0k!k"k1k2k k kkkkk'k(k)k*kkk%k&kytmlpqsijrgkfnouvwx)l*lll+l,l l ll!l"l'l(l l l%l&lll#l$l1l2l l l ll/l0lll'm(mmm!m"m)m*m m m%m&m mm m mmmmmm#m$m/m0m1m2m m m+m,m 5kvlvjvivhv'g(g)g*g%g&g#g$g|,{,},z, ; ;;; ;;%;&;!;";/;0;::;;;#;$;';(;);*; ; ;;;+;,; ; ;-;.;1;2;|{}~zfgEU`aDjkdebchiB^_C1  e ene;;<<#<$<%<&<!<"< <<<</<0<)<*<1<2<<< < < < <+<,<< < <'<(<klKL78mnBC)*#$34opEF )*9:%&IJABCDyz UV!">? ef    mnRS{|EFGHabJK_` @A-.OPNO01./}~mnab:;&'56  wx`aST%&?@  UV#$yzYZij4512,-349:gh !6756}~=>UVTUQRLMMNWX/0kl;<  abefFGABwx[\+,]^ckl-.PQQR{|uvMNHI"#!"^_cdCD'(KL;<qr QRYZKLOPwx{|ghijstuv()yzdWXYZMN*+DEopWXop?@<=GHXYst=>efSTVWIJ$%OPZ[+,_`ij89[\'(GHuvqrcdqr12}~ST78]^gh[\/0  IJ23\]_`EFst]^5 B j k d e ` a ^ _ C b c h i D f g E 6 %f&f)f*f'f(f#f$f^8 7x DE; XY^]VOPU_ZTSWRQ[\yxw'P(P+P,P/P0P!P"PPP#P$PP P P%P&P P P P P1P2PPP PP)P*PPP   Fqqqnf f f'Q(Q QQ1Q2Q%Q&Q Q Q!Q"Q Q Q+Q,QQQ/Q0QQQ Q QQQ)Q*QQ#Q$QRR1R2R R R R R%R&R+R,RR/R0R#R$RRRRR!R"R RR'R(R)R*R R RSS'S(S S SSSS SS%S&S1S2S+S,SSS!S"S S S S S/S0S)S*S#S$S TT T T T TT!T"T/T0TTT1T2TTT T T+T,T)T*TTT'T(T#T$T%T&TEF+,#$>?ST78/056FG34WXuv%&st01KLijgh  DEopIJkl  /0ABop[\)*mn#$LMklyzGH !\]%&NO]^[\EFmn_`?@YZefMNXYef"#ijTUc\IJBCAB{|J^_Z[<=9:WXHI&'qr_`CDuvOPab)*}~KLEF:;WX89QRYZ  ?@ghPQ'(dabGH12yz  ()op=>ij{|OPmn wx;<st ghST  YZ+,23cd!"RSqrUV ./*+STyzOP,-[}~CD]^  -.MNVWQR_`KL uvJK45]^stwx78qrwxkl=> `aQRcd-.$%GH67@Aef{|9:!"UVI56MN3412UV'(;<}~ab UU)U*UUU'U(U+U,U U U U U!U"UU1U2U#U$U/U0U%U&U U UUUUU/V0V V V#V$VV+V,V V V)V*VVV'V(VVV%V&V V V VV!V"VVV1V2V^Y]VQRZTWSOPU[\X_3z4zozB C &R%R$R= > 6 7   E F   X Y U V ' ( i j [ \ m n   $ % ; < k l [ \ g h R S G H   H I 4 5 m n * + I J S T Q R   K L ] ^ J K 8 9 Q R  !     ! "   1 2         O P ? @     K L k l   ) * Y Z _ ` ! " P Q S T   < = # $ % &   w x   c \ # $   0 1 7 8 w x     ; < } ~ A B 9 : M N E F N O O P g h I J ' (   o p K L       d : ; ] ^ G H + , A B Y Z u v W X o p g h m n M N G H   i j u v   { | = > L M + ,   - . . / Z [ Y Z { | a b w x Q R % & c d > ?   O P s t 5 6 S T     V W ? @   s t & ' - . 9 : U V e f ` a ( )   ] ^ } ~   o p i j   y z   k l C D   e f   7 8 / 0   M N T U q r  _ ` 5 6     W X } ~ u v     _ ` { |   2 3 a b [ E F D E , -     a b F G " # q r s t \ ] ^ _ y z       U V / 0 e f c d W X I J ) * 3 4 1 2 @ A B C   C D 3 4 q r y z WW#W$W W WW1W2W WW+W,W W W%W&W W WWW)W*W/W0WWW'W(W!W"W`aQ FnGnHn=]>]?]!n"n+n,n/n0n n n)n*n%n&nnnn'n(nnn nn n n#n$nnn1n2n n ns t  o o+o,o/o0o)o*oo1o2ooo'o(o o ooo!o"o o o#o$o%o&o ooootkskrk:pX 'p(p%p&p#p$ppp)p*p!p"ppp p p p p p pp+p,p1p2p/p0ppp ppA@B@:@;@p@=@?@@@q@<@rsEsDsIsJs 5#q$qqqq/q0q!q"q q q'q(qqq)q*qqq q q q q+q,q qq%q&q1q2qIJKLMNOPQRSTUVWXYZ[\]^E_E`E r r%r&r r rr r r!r"r+r,r/r0r rr1r2r'r(rrr)r*rrr#r$rrrs%s&s s s s sssss ss+s,s#s$s!s"s)s*s's(s s s1s2s/s0sss( ) 0 1   g h ? @ q r E F  J  ! 4 5 i j ^ _ " # o p 6 7 7 8 . / = > O P B C   ) * Q R   Q R a b 5 6   u v $ % w x   3 4   ] ^ ; <   _ ` } ~     L M S T   ' (   c d y z   M N V W 9 : U V   > ? Z [ U V a b     u v W X { | - . I J e f s t = > I K L   e f   y z ] ^ 5 6   u v k l H I q r   K L     e f   * +   [ \   R S / 0   _ ` s t i j @ A K L O P 2 3   ! "     + , 9 : Y Z   Y Z o p c \ 7 8   G H w x   k l i j 8 9 m n F G   - . ` a 3 4 W X ; < I J   # $ } ~ g h ! "   C D < = G H \ ] & ' U V , - J K   D E   Y Z s t w x P Q O P } ~ a b X Y d E F g h       % &   m n / 0     _ `     ) * W X S T # $ % &   + , ' (   C D 1 2   A B { | { | [ M N q r   k l M N o p : ;   [ \ E F N O c d G H S T T U A B 1 2   y z ? @ ] ^ Q R m n %t&t!t"t#t$t t t tt/t0t t ttt)t*t't(ttttt1t2tt t t+t,tl%g%k%p%nd id5f]m,~%o,|%}%j,x,y,z,{%w]u%s%r%t,q]v]he NOPSTUABCDEFHIJKLMRWXBP"ABBBsecurityImportant: xz security update,https://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:49401 xz-libs-5.2.5-8.el9_0.i686.rpmlxz-5.2.5-8.el9_0.x86_64.rpm1xz-libs-5.2.5-8.el9_0.x86_64.rpm1 xz-libs-5.2.5-8.el9_0.i686.rpmlxz-5.2.5-8.el9_0.x86_64.rpm1xz-libs-5.2.5-8.el9_0.x86_64.rpm FBBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security update,|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099b;shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmngrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmhgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmigrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmlgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmkgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmDgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmCgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmUgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmmgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmjgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmEgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmh;shim-x64-15.6-1.el9.alma.x86_64.rpmBgrub2-common-2.06-27.el9_0.7.alma.noarch.rpmb;shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmngrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmhgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmigrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmlgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmkgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmDgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmCgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmUgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmmgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmjgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmEgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmh;shim-x64-15.6-1.el9.alma.x86_64.rpmBgrub2-common-2.06-27.el9_0.7.alma.noarch.rpmf,cBBBBBBBsecurityModerate: vim security updateThttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242zJvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm{Jvim-common-8.2.2637-16.el9_0.2.x86_64.rpm|Jvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmsJvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpmFJvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmzJvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm{Jvim-common-8.2.2637-16.el9_0.2.x86_64.rpm|Jvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmsJvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpmFJvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm_1mBBB/securityModerate: expat security updateexhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244Dtexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmt expat-2.2.10-12.el9_0.2.i686.rpmtexpat-2.2.10-12.el9_0.2.x86_64.rpmDtexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmt expat-2.2.10-12.el9_0.2.i686.rpmtexpat-2.2.10-12.el9_0.2.x86_64.rpm%rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update,] https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249-kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmY-kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm-kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmT-kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmS-kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmX-kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmZ-kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmV-kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmW-kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1-bpftool-5.14.0-70.17.1.el9_0.x86_64.rpmU-kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm_-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2-python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmY-kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm-kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmT-kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmS-kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmX-kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmZ-kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmV-kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmW-kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1-bpftool-5.14.0-70.17.1.el9_0.x86_64.rpmU-kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm_-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2-python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm#]BBBBB>securityModerate: libarchive security updaterXhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252Oxlibarchive-3.5.3-2.el9_0.x86_64.rpm>xbsdtar-3.5.3-2.el9_0.x86_64.rpmOx libarchive-3.5.3-2.el9_0.i686.rpmIxlibarchive-devel-3.5.3-2.el9_0.x86_64.rpmOxlibarchive-3.5.3-2.el9_0.x86_64.rpm>xbsdtar-3.5.3-2.el9_0.x86_64.rpmOx libarchive-3.5.3-2.el9_0.i686.rpmIxlibarchive-devel-3.5.3-2.el9_0.x86_64.rpmt-dBBBBBBBsecurityModerate: vim security updateJRhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942{Kvim-common-8.2.2637-16.el9_0.3.x86_64.rpm|Kvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmsKvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpmFKvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpmzKvim-X11-8.2.2637-16.el9_0.3.x86_64.rpm{Kvim-common-8.2.2637-16.el9_0.3.x86_64.rpm|Kvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmsKvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpmFKvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpmzKvim-X11-8.2.2637-16.el9_0.3.x86_64.rpmUnBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateqhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003.kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmX.kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpmY.kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm_.perf-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpmU.kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmS.kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmZ.kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpmW.kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm1.bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpmV.kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm2.python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpmT.kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmX.kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpmY.kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm_.perf-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpmU.kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmS.kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmZ.kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpmW.kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm1.bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpmV.kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm2.python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpmT.kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm.kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmо}#YBBBBBBBBBsecurityModerate: curl security update https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157w/ libcurl-minimal-7.76.1-14.el9_0.5.i686.rpmv/ libcurl-7.76.1-14.el9_0.5.i686.rpmv/libcurl-7.76.1-14.el9_0.5.x86_64.rpmw/libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpmJ/libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm#/curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm"/curl-7.76.1-14.el9_0.5.x86_64.rpmw/ libcurl-minimal-7.76.1-14.el9_0.5.i686.rpmv/ libcurl-7.76.1-14.el9_0.5.i686.rpmv/libcurl-7.76.1-14.el9_0.5.x86_64.rpmw/libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpmJ/libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm#/curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm"/curl-7.76.1-14.el9_0.5.x86_64.rpm,dBBBBBBB8securityModerate: openssl security and bug fix update&/ https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224Iopenssl-libs-3.0.1-41.el9_0.x86_64.rpmYIopenssl-perl-3.0.1-41.el9_0.x86_64.rpmI openssl-libs-3.0.1-41.el9_0.i686.rpmXIopenssl-devel-3.0.1-41.el9_0.x86_64.rpm1Iopenssl-3.0.1-41.el9_0.x86_64.rpmIopenssl-libs-3.0.1-41.el9_0.x86_64.rpmYIopenssl-perl-3.0.1-41.el9_0.x86_64.rpmI openssl-libs-3.0.1-41.el9_0.i686.rpmXIopenssl-devel-3.0.1-41.el9_0.x86_64.rpm1Iopenssl-3.0.1-41.el9_0.x86_64.rpm-csecurityModerate: gnupg2 security updateU(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602Q gnupg2-2.3.3-2.el9_0.x86_64.rpmQ gnupg2-2.3.3-2.el9_0.x86_64.rpm''esecurityModerate: dbus-broker security update}chttps://access.redhat.com/errata/RHSA-2022:6608RHSA-2022:6608RHSA-2022:6608https://access.redhat.com/security/cve/CVE-2022-31212CVE-2022-31212CVE-2022-31212https://access.redhat.com/security/cve/CVE-2022-31213CVE-2022-31213CVE-2022-31213https://bugzilla.redhat.com/20947182094718https://bugzilla.redhat.com/20947222094722https://errata.almalinux.org/9/ALSA-2022-6608.htmlALSA-2022:6608ALSA-2022:6608@dbus-broker-28-5.1.el9_0.x86_64.rpm@dbus-broker-28-5.1.el9_0.x86_64.rpm .hBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,`=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610 }kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2}python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm}kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1}bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm }kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2}python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm}kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1}bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm}kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm+!/AsecurityImportant: expat security update,Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838 expat-2.2.10-12.el9_0.3.x86_64.rpm expat-2.2.10-12.el9_0.3.x86_64.rpm"0CBsecurityModerate: gnutls and nettle security, bug fix, and enhancement updater2https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854!| gnutls-3.7.6-12.el9_0.i686.rpm!|gnutls-3.7.6-12.el9_0.x86_64.rpm!| gnutls-3.7.6-12.el9_0.i686.rpm!|gnutls-3.7.6-12.el9_0.x86_64.rpm~# FBsecurityImportant: libksba security update,$Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090Tlibksba-1.5.1-5.el9_0.x86_64.rpmT libksba-1.5.1-5.el9_0.i686.rpmTlibksba-1.5.1-5.el9_0.x86_64.rpmT libksba-1.5.1-5.el9_0.i686.rpm^$JBBBBBsecurityImportant: device-mapper-multipath security update,}chttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185u device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm[ukpartx-0.8.7-7.el9_0.1.x86_64.rpmudevice-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm=udevice-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpmu device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm[ukpartx-0.8.7-7.el9_0.1.x86_64.rpmudevice-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm=udevice-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpmd%1RBBBsecurityImportant: openssl security update,`https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:72881iopenssl-3.0.1-43.el9_0.x86_64.rpmiopenssl-libs-3.0.1-43.el9_0.x86_64.rpmi openssl-libs-3.0.1-43.el9_0.i686.rpm1iopenssl-3.0.1-43.el9_0.x86_64.rpmiopenssl-libs-3.0.1-43.el9_0.x86_64.rpmi openssl-libs-3.0.1-43.el9_0.i686.rpmh&2WsecurityModerate: zlib security updatesOhttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314mzlib-1.2.11-32.el9_0.x86_64.rpmmzlib-1.2.11-32.el9_0.x86_64.rpmS'3YBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,Bhttps://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 ~kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2~python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1~bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm~kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm ~kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2~python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1~bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-5.14.0-70.30.1.el9_0.x86_64.rpm~kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm~kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpmj(4rBBsecurityModerate: python3.9 security updateEnhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:73230<python3-libs-3.9.10-3.el9_0.x86_64.rpm <python3-3.9.10-3.el9_0.x86_64.rpm0<python3-libs-3.9.10-3.el9_0.x86_64.rpm <python3-3.9.10-3.el9_0.x86_64.rpm)5vBsecurityModerate: lua security update3https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329~ lua-libs-5.4.2-4.el9_0.3.i686.rpm~lua-libs-5.4.2-4.el9_0.3.x86_64.rpm~ lua-libs-5.4.2-4.el9_0.3.i686.rpm~lua-libs-5.4.2-4.el9_0.3.x86_64.rpmt*6yBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateE?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 |kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-5.14.0-162.6.1.el9_1.x86_64.rpm1|bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2|python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm|kernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm |kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-5.14.0-162.6.1.el9_1.x86_64.rpm1|bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2|python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm|kernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm|kernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm۰Q+7RsecurityModerate: rsync security and bug fix updateHzhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291?rsync-3.2.3-18.el9.x86_64.rpm?rsync-3.2.3-18.el9.x86_64.rpmۨ3,8TBBBBBBBBsecurityLow: curl security update0B8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299w5libcurl-minimal-7.76.1-19.el9.x86_64.rpmv5libcurl-7.76.1-19.el9.x86_64.rpmv5 libcurl-7.76.1-19.el9.i686.rpmw5 libcurl-minimal-7.76.1-19.el9.i686.rpm"5curl-7.76.1-19.el9.x86_64.rpm#5curl-minimal-7.76.1-19.el9.x86_64.rpmw5libcurl-minimal-7.76.1-19.el9.x86_64.rpmv5libcurl-7.76.1-19.el9.x86_64.rpmv5 libcurl-7.76.1-19.el9.i686.rpmw5 libcurl-minimal-7.76.1-19.el9.i686.rpm"5curl-7.76.1-19.el9.x86_64.rpm#5curl-minimal-7.76.1-19.el9.x86_64.rpmދ-9^BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement updatezmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317P=samba-winbind-4.16.4-101.el9.x86_64.rpmO=samba-common-tools-4.16.4-101.el9.x86_64.rpm(=libsmbclient-4.16.4-101.el9.x86_64.rpm`=samba-common-4.16.4-101.el9.noarch.rpm.=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm-=samba-libs-4.16.4-101.el9.x86_64.rpm+= samba-client-libs-4.16.4-101.el9.i686.rpm)=libwbclient-4.16.4-101.el9.x86_64.rpm)= libwbclient-4.16.4-101.el9.i686.rpm-= samba-libs-4.16.4-101.el9.i686.rpm,= samba-common-libs-4.16.4-101.el9.i686.rpm+=samba-client-libs-4.16.4-101.el9.x86_64.rpm(= libsmbclient-4.16.4-101.el9.i686.rpm*= python3-samba-4.16.4-101.el9.i686.rpmN=samba-4.16.4-101.el9.x86_64.rpm.= samba-winbind-modules-4.16.4-101.el9.i686.rpm*=python3-samba-4.16.4-101.el9.x86_64.rpm,=samba-common-libs-4.16.4-101.el9.x86_64.rpmP=samba-winbind-4.16.4-101.el9.x86_64.rpmO=samba-common-tools-4.16.4-101.el9.x86_64.rpm(=libsmbclient-4.16.4-101.el9.x86_64.rpm`=samba-common-4.16.4-101.el9.noarch.rpm.=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm-=samba-libs-4.16.4-101.el9.x86_64.rpm+= samba-client-libs-4.16.4-101.el9.i686.rpm)=libwbclient-4.16.4-101.el9.x86_64.rpm)= libwbclient-4.16.4-101.el9.i686.rpm-= samba-libs-4.16.4-101.el9.i686.rpm,= samba-common-libs-4.16.4-101.el9.i686.rpm+=samba-client-libs-4.16.4-101.el9.x86_64.rpm(= libsmbclient-4.16.4-101.el9.i686.rpm*= python3-samba-4.16.4-101.el9.i686.rpmN=samba-4.16.4-101.el9.x86_64.rpm.= samba-winbind-modules-4.16.4-101.el9.i686.rpm*=python3-samba-4.16.4-101.el9.x86_64.rpm,=samba-common-libs-4.16.4-101.el9.x86_64.rpmދN.zBBBBBBsecurityModerate: libldb security, bug fix, and enhancement updategLhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318+\ python3-ldb-2.5.2-1.el9.i686.rpm\ libldb-2.5.2-1.el9.i686.rpmH\ldb-tools-2.5.2-1.el9.x86_64.rpm\libldb-2.5.2-1.el9.x86_64.rpm+\python3-ldb-2.5.2-1.el9.x86_64.rpm+\ python3-ldb-2.5.2-1.el9.i686.rpm\ libldb-2.5.2-1.el9.i686.rpmH\ldb-tools-2.5.2-1.el9.x86_64.rpm\libldb-2.5.2-1.el9.x86_64.rpm+\python3-ldb-2.5.2-1.el9.x86_64.rpmތ/:CBsecurityModerate: freetype security update3Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340_ freetype-2.10.4-9.el9.i686.rpm_freetype-2.10.4-9.el9.x86_64.rpm_ freetype-2.10.4-9.el9.i686.rpm_freetype-2.10.4-9.el9.x86_64.rpmތ*0;FBBBsecurityModerate: python3.9 security, bug fix, and enhancement update5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353 python3-3.9.14-1.el9.x86_64.rpm0 python3-libs-3.9.14-1.el9.i686.rpm0python3-libs-3.9.14-1.el9.x86_64.rpm python3-3.9.14-1.el9.x86_64.rpm0 python3-libs-3.9.14-1.el9.i686.rpm0python3-libs-3.9.14-1.el9.x86_64.rpmތ_1kBBBsecurityImportant: python3.9 security update,XQhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:84930 python3-libs-3.9.14-1.el9_1.1.i686.rpm python3-3.9.14-1.el9_1.1.x86_64.rpm0python3-libs-3.9.14-1.el9_1.1.x86_64.rpm0 python3-libs-3.9.14-1.el9_1.1.i686.rpm python3-3.9.14-1.el9_1.1.x86_64.rpm0python3-libs-3.9.14-1.el9_1.1.x86_64.rpm|8?pBBBBBBBBBBBBBBBsecurityImportant: krb5 security update,)ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637  krb5-pkinit-1.19.1-24.el9_1.i686.rpm krb5-server-ldap-1.19.1-24.el9_1.i686.rpmkrb5-libs-1.19.1-24.el9_1.x86_64.rpmkrb5-server-1.19.1-24.el9_1.x86_64.rpmkrb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm libkadm5-1.19.1-24.el9_1.x86_64.rpm krb5-libs-1.19.1-24.el9_1.i686.rpm_krb5-workstation-1.19.1-24.el9_1.x86_64.rpm krb5-server-1.19.1-24.el9_1.i686.rpm  libkadm5-1.19.1-24.el9_1.i686.rpmkrb5-pkinit-1.19.1-24.el9_1.x86_64.rpm  krb5-pkinit-1.19.1-24.el9_1.i686.rpm krb5-server-ldap-1.19.1-24.el9_1.i686.rpmkrb5-libs-1.19.1-24.el9_1.x86_64.rpmkrb5-server-1.19.1-24.el9_1.x86_64.rpmkrb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm libkadm5-1.19.1-24.el9_1.x86_64.rpm krb5-libs-1.19.1-24.el9_1.i686.rpm_krb5-workstation-1.19.1-24.el9_1.x86_64.rpm krb5-server-1.19.1-24.el9_1.i686.rpm  libkadm5-1.19.1-24.el9_1.i686.rpmkrb5-pkinit-1.19.1-24.el9_1.x86_64.rpm9AsecurityImportant: sudo security update/,https://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282@sudo-1.9.5p2-7.el9_1.1.x86_64.rpm@sudo-1.9.5p2-7.el9_1.1.x86_64.rpmO:CBBBBBBBBsecurityModerate: curl security update/&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333"6curl-7.76.1-19.el9_1.1.x86_64.rpmw6libcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmv6libcurl-7.76.1-19.el9_1.1.x86_64.rpmv6 libcurl-7.76.1-19.el9_1.1.i686.rpmw6 libcurl-minimal-7.76.1-19.el9_1.1.i686.rpm#6curl-minimal-7.76.1-19.el9_1.1.x86_64.rpm"6curl-7.76.1-19.el9_1.1.x86_64.rpmw6libcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmv6libcurl-7.76.1-19.el9_1.1.x86_64.rpmv6 libcurl-7.76.1-19.el9_1.1.i686.rpmw6 libcurl-minimal-7.76.1-19.el9_1.1.i686.rpm#6curl-minimal-7.76.1-19.el9_1.1.x86_64.rpm;MBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,D;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 xkernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2xpython3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1xbpftool-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpmxkernel-core-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm xkernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2xpython3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1xbpftool-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpmxkernel-core-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpmxkernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpmf<fBBBBBBsecurityModerate: dbus security update/^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335JZdbus-1.12.20-7.el9_1.x86_64.rpmZdbus-libs-1.12.20-7.el9_1.x86_64.rpmKZdbus-common-1.12.20-7.el9_1.noarch.rpmLZdbus-tools-1.12.20-7.el9_1.x86_64.rpmZ dbus-libs-1.12.20-7.el9_1.i686.rpmJZdbus-1.12.20-7.el9_1.x86_64.rpmZdbus-libs-1.12.20-7.el9_1.x86_64.rpmKZdbus-common-1.12.20-7.el9_1.noarch.rpmLZdbus-tools-1.12.20-7.el9_1.x86_64.rpmZ dbus-libs-1.12.20-7.el9_1.i686.rpm}=nBBBBBBBBBBBBBBBBsecurityModerate: systemd security update/]Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336 Tsystemd-container-250-12.el9_1.1.x86_64.rpmU systemd-libs-250-12.el9_1.1.i686.rpmUsystemd-libs-250-12.el9_1.1.x86_64.rpmgsystemd-rpm-macros-250-12.el9_1.1.noarch.rpm3systemd-oomd-250-12.el9_1.1.x86_64.rpm5systemd-resolved-250-12.el9_1.1.x86_64.rpmT systemd-container-250-12.el9_1.1.i686.rpmS systemd-250-12.el9_1.1.i686.rpm6systemd-udev-250-12.el9_1.1.x86_64.rpm4systemd-pam-250-12.el9_1.1.x86_64.rpmSsystemd-250-12.el9_1.1.x86_64.rpm Tsystemd-container-250-12.el9_1.1.x86_64.rpmU systemd-libs-250-12.el9_1.1.i686.rpmUsystemd-libs-250-12.el9_1.1.x86_64.rpmgsystemd-rpm-macros-250-12.el9_1.1.noarch.rpm3systemd-oomd-250-12.el9_1.1.x86_64.rpm5systemd-resolved-250-12.el9_1.1.x86_64.rpmT systemd-container-250-12.el9_1.1.i686.rpmS systemd-250-12.el9_1.1.i686.rpm6systemd-udev-250-12.el9_1.1.x86_64.rpm4systemd-pam-250-12.el9_1.1.x86_64.rpmSsystemd-250-12.el9_1.1.x86_64.rpm>@BsecurityModerate: expat security update/.}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337` expat-2.4.9-1.el9_1.1.i686.rpm`expat-2.4.9-1.el9_1.1.x86_64.rpm` expat-2.4.9-1.el9_1.1.i686.rpm`expat-2.4.9-1.el9_1.1.x86_64.rpm?CBBBsecurityModerate: libxml2 security update/+Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338{ libxml2-2.9.13-3.el9_1.i686.rpm{libxml2-2.9.13-3.el9_1.x86_64.rpmA{python3-libxml2-2.9.13-3.el9_1.x86_64.rpm{ libxml2-2.9.13-3.el9_1.i686.rpm{libxml2-2.9.13-3.el9_1.x86_64.rpmA{python3-libxml2-2.9.13-3.el9_1.x86_64.rpm@HBsecurityModerate: sqlite security update/q<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339Ru sqlite-libs-3.34.1-6.el9_1.i686.rpmRusqlite-libs-3.34.1-6.el9_1.x86_64.rpmRu sqlite-libs-3.34.1-6.el9_1.i686.rpmRusqlite-libs-3.34.1-6.el9_1.x86_64.rpm~A KsecurityModerate: bash security update/-}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340<bash-5.1.8-6.el9_1.x86_64.rpm<bash-5.1.8-6.el9_1.x86_64.rpmBNBsecurityModerate: libtasn1 security update/*uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343$libtasn1-4.16.0-8.el9_1.x86_64.rpm$ libtasn1-4.16.0-8.el9_1.i686.rpm$libtasn1-4.16.0-8.el9_1.x86_64.rpm$ libtasn1-4.16.0-8.el9_1.i686.rpmOCQBsecurityImportant: libksba security update/,Jhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626Ulibksba-1.5.1-6.el9_1.x86_64.rpmU libksba-1.5.1-6.el9_1.i686.rpmUlibksba-1.5.1-6.el9_1.x86_64.rpmU libksba-1.5.1-6.el9_1.i686.rpmsD(UBBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update/iChttps://access.redhat.com/errata/RHSA-2023:0752RHSA-2023:0752RHSA-2023:0752https://access.redhat.com/security/cve/CVE-2022-2601CVE-2022-2601CVE-2022-2601https://access.redhat.com/security/cve/CVE-2022-3775CVE-2022-3775CVE-2022-3775https://bugzilla.redhat.com/21129752112975https://bugzilla.redhat.com/21388802138880https://errata.almalinux.org/9/ALSA-2023-0752.htmlALSA-2023:0752ALSA-2023:0752 lgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpmkgrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpmBgrub2-common-2.06-46.el9_1.3.alma.noarch.rpmmgrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpmngrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpmCgrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpmUgrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpmjgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpmEgrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpmDgrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpmigrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpmhgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm lgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpmkgrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpmBgrub2-common-2.06-46.el9_1.3.alma.noarch.rpmmgrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpmngrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpmCgrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpmUgrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpmjgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpmEgrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpmDgrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpmigrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpmhgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm#E iBBBsecurityModerate: openssl security and bug fix update/,"https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946j openssl-libs-3.0.1-47.el9_1.i686.rpm1jopenssl-3.0.1-47.el9_1.x86_64.rpmjopenssl-libs-3.0.1-47.el9_1.x86_64.rpmj openssl-libs-3.0.1-47.el9_1.i686.rpm1jopenssl-3.0.1-47.el9_1.x86_64.rpmjopenssl-libs-3.0.1-47.el9_1.x86_64.rpmrF nBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,N~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 ykernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpmykernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1ybpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2ypython3-perf-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-core-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm ykernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpmykernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1ybpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2ypython3-perf-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-core-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmykernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpmG GsecurityModerate: python-setuptools security update/L^https://access.redhat.com/errata/RHSA-2023:0952RHSA-2023:0952RHSA-2023:0952https://access.redhat.com/security/cve/CVE-2022-40897CVE-2022-40897CVE-2022-40897https://bugzilla.redhat.com/21585592158559https://errata.almalinux.org/9/ALSA-2023-0952.htmlALSA-2023:0952ALSA-2023:095297python3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm87python3-setuptools-53.0.0-10.el9_1.1.noarch.rpm97python3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm87python3-setuptools-53.0.0-10.el9_1.1.noarch.rpmlH JBBBsecurityModerate: python3.9 security update/*9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953 python3-3.9.14-1.el9_1.2.x86_64.rpm0 python3-libs-3.9.14-1.el9_1.2.i686.rpm0python3-libs-3.9.14-1.el9_1.2.x86_64.rpm python3-3.9.14-1.el9_1.2.x86_64.rpm0 python3-libs-3.9.14-1.el9_1.2.i686.rpm0python3-libs-3.9.14-1.el9_1.2.x86_64.rpmII OBBBBBBBBBBBBBBBBsecurityModerate: systemd security update/c]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954 Usystemd-libs-250-12.el9_1.3.x86_64.rpm5systemd-resolved-250-12.el9_1.3.x86_64.rpm6systemd-udev-250-12.el9_1.3.x86_64.rpmS systemd-250-12.el9_1.3.i686.rpm3systemd-oomd-250-12.el9_1.3.x86_64.rpmTsystemd-container-250-12.el9_1.3.x86_64.rpmSsystemd-250-12.el9_1.3.x86_64.rpmU systemd-libs-250-12.el9_1.3.i686.rpmT systemd-container-250-12.el9_1.3.i686.rpmgsystemd-rpm-macros-250-12.el9_1.3.noarch.rpm4systemd-pam-250-12.el9_1.3.x86_64.rpm Usystemd-libs-250-12.el9_1.3.x86_64.rpm5systemd-resolved-250-12.el9_1.3.x86_64.rpm6systemd-udev-250-12.el9_1.3.x86_64.rpmS systemd-250-12.el9_1.3.i686.rpm3systemd-oomd-250-12.el9_1.3.x86_64.rpmTsystemd-container-250-12.el9_1.3.x86_64.rpmSsystemd-250-12.el9_1.3.x86_64.rpmU systemd-libs-250-12.el9_1.3.i686.rpmT systemd-container-250-12.el9_1.3.i686.rpmgsystemd-rpm-macros-250-12.el9_1.3.noarch.rpm4systemd-pam-250-12.el9_1.3.x86_64.rpm|J aBsecurityModerate: lua security update/@8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957~lua-libs-5.4.4-2.el9_1.x86_64.rpm~ lua-libs-5.4.4-2.el9_1.i686.rpm~lua-libs-5.4.4-2.el9_1.x86_64.rpm~ lua-libs-5.4.4-2.el9_1.i686.rpmbKdBsecurityModerate: vim security update/xehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958sovim-minimal-8.2.2637-20.el9_1.x86_64.rpmFovim-filesystem-8.2.2637-20.el9_1.noarch.rpmsovim-minimal-8.2.2637-20.el9_1.x86_64.rpmFovim-filesystem-8.2.2637-20.el9_1.noarch.rpmAL)gsecurityModerate: tar security update/]https://access.redhat.com/errata/RHSA-2023:0959RHSA-2023:0959RHSA-2023:0959https://access.redhat.com/security/cve/CVE-2022-48303CVE-2022-48303CVE-2022-48303https://bugzilla.redhat.com/21497222149722https://errata.almalinux.org/9/ALSA-2023-0959.htmlALSA-2023:0959ALSA-2023:0959ytar-1.34-6.el9_1.x86_64.rpmytar-1.34-6.el9_1.x86_64.rpmrMjBsecurityModerate: gnutls security and bug fix update/shttps://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141!}gnutls-3.7.6-18.el9_1.x86_64.rpm!} gnutls-3.7.6-18.el9_1.i686.rpm!}gnutls-3.7.6-18.el9_1.x86_64.rpm!} gnutls-3.7.6-18.el9_1.i686.rpmNmBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update/,Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 zkernel-5.14.0-162.22.2.el9_1.x86_64.rpm1zbpftool-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2zpython3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmzkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm zkernel-5.14.0-162.22.2.el9_1.x86_64.rpm1zbpftool-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2zpython3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmzkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmzkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmCOFBBBBBBBBsecurityModerate: curl security update/k9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701v7libcurl-7.76.1-19.el9_1.2.x86_64.rpmv7 libcurl-7.76.1-19.el9_1.2.i686.rpmw7 libcurl-minimal-7.76.1-19.el9_1.2.i686.rpm"7curl-7.76.1-19.el9_1.2.x86_64.rpmw7libcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm#7curl-minimal-7.76.1-19.el9_1.2.x86_64.rpmv7libcurl-7.76.1-19.el9_1.2.x86_64.rpmv7 libcurl-7.76.1-19.el9_1.2.i686.rpmw7 libcurl-minimal-7.76.1-19.el9_1.2.i686.rpm"7curl-7.76.1-19.el9_1.2.x86_64.rpmw7libcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm#7curl-minimal-7.76.1-19.el9_1.2.x86_64.rpm PPBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,$4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 1{bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2{python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm{kernel-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm 1{bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2{python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm{kernel-5.14.0-162.23.1.el9_1.x86_64.rpm{kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm QiBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: samba security update/,Xhttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127.> samba-winbind-modules-4.16.4-103.el9_1.i686.rpm+>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm)>libwbclient-4.16.4-103.el9_1.x86_64.rpmO>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm.>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm-> samba-libs-4.16.4-103.el9_1.i686.rpm(>libsmbclient-4.16.4-103.el9_1.x86_64.rpm+> samba-client-libs-4.16.4-103.el9_1.i686.rpm*> python3-samba-4.16.4-103.el9_1.i686.rpm,> samba-common-libs-4.16.4-103.el9_1.i686.rpmN>samba-4.16.4-103.el9_1.x86_64.rpm*>python3-samba-4.16.4-103.el9_1.x86_64.rpm->samba-libs-4.16.4-103.el9_1.x86_64.rpm,>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm)> libwbclient-4.16.4-103.el9_1.i686.rpm`>samba-common-4.16.4-103.el9_1.noarch.rpm(> libsmbclient-4.16.4-103.el9_1.i686.rpmP>samba-winbind-4.16.4-103.el9_1.x86_64.rpm.> samba-winbind-modules-4.16.4-103.el9_1.i686.rpm+>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm)>libwbclient-4.16.4-103.el9_1.x86_64.rpmO>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm.>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm-> samba-libs-4.16.4-103.el9_1.i686.rpm(>libsmbclient-4.16.4-103.el9_1.x86_64.rpm+> samba-client-libs-4.16.4-103.el9_1.i686.rpm*> python3-samba-4.16.4-103.el9_1.i686.rpm,> samba-common-libs-4.16.4-103.el9_1.i686.rpmN>samba-4.16.4-103.el9_1.x86_64.rpm*>python3-samba-4.16.4-103.el9_1.x86_64.rpm->samba-libs-4.16.4-103.el9_1.x86_64.rpm,>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm)> libwbclient-4.16.4-103.el9_1.i686.rpm`>samba-common-4.16.4-103.el9_1.noarch.rpm(> libsmbclient-4.16.4-103.el9_1.i686.rpmP>samba-winbind-4.16.4-103.el9_1.x86_64.rpmӿ/REBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update/,lSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm$?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm#?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1!bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm$?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm#?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1!bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm[S-fBBBBBsecurityModerate: device-mapper-multipath security and bug fix update/?]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459[tkpartx-0.8.7-20.el9.x86_64.rpm=tdevice-mapper-multipath-0.8.7-20.el9.x86_64.rpmt device-mapper-multipath-libs-0.8.7-20.el9.i686.rpmtdevice-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm[tkpartx-0.8.7-20.el9.x86_64.rpm=tdevice-mapper-multipath-0.8.7-20.el9.x86_64.rpmt device-mapper-multipath-libs-0.8.7-20.el9.i686.rpmtdevice-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpmTnBBBBBBBBsecurityLow: curl security update/0"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478v8 libcurl-7.76.1-23.el9.i686.rpm"8curl-7.76.1-23.el9.x86_64.rpmw8 libcurl-minimal-7.76.1-23.el9.i686.rpmv8libcurl-7.76.1-23.el9.x86_64.rpmw8libcurl-minimal-7.76.1-23.el9.x86_64.rpm#8curl-minimal-7.76.1-23.el9.x86_64.rpmv8 libcurl-7.76.1-23.el9.i686.rpm"8curl-7.76.1-23.el9.x86_64.rpmw8 libcurl-minimal-7.76.1-23.el9.i686.rpmv8libcurl-7.76.1-23.el9.x86_64.rpmw8libcurl-minimal-7.76.1-23.el9.x86_64.rpm#8curl-minimal-7.76.1-23.el9.x86_64.rpmcUxsecurityModerate: fwupd security and bug fix update/>M https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487Ffwupd-1.8.10-2.el9.alma.x86_64.rpmFfwupd-1.8.10-2.el9.alma.x86_64.rpm}VzBBBBBsecurityModerate: dhcp security and enhancement update/ Ahttps://access.redhat.com/errata/RHSA-2023:2502RHSA-2023:2502RHSA-2023:2502https://access.redhat.com/security/cve/CVE-2022-2928CVE-2022-2928CVE-2022-2928https://access.redhat.com/security/cve/CVE-2022-2929CVE-2022-2929CVE-2022-2929https://bugzilla.redhat.com/21320012132001https://bugzilla.redhat.com/21320022132002https://errata.almalinux.org/9/ALSA-2023-2502.htmlALSA-2023:2502ALSA-2023:2502Nwdhcp-common-4.4.2-18.b1.el9.noarch.rpmMwdhcp-client-4.4.2-18.b1.el9.x86_64.rpmOwdhcp-relay-4.4.2-18.b1.el9.x86_64.rpmPwdhcp-server-4.4.2-18.b1.el9.x86_64.rpmNwdhcp-common-4.4.2-18.b1.el9.noarch.rpmMwdhcp-client-4.4.2-18.b1.el9.x86_64.rpmOwdhcp-relay-4.4.2-18.b1.el9.x86_64.rpmPwdhcp-server-4.4.2-18.b1.el9.x86_64.rpm WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update/0Lhttps://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519Q& samba-dc-libs-4.17.5-102.el9.i686.rpm1&samba-tools-4.17.5-102.el9.x86_64.rpm`&samba-common-4.17.5-102.el9.noarch.rpm2&samba-usershares-4.17.5-102.el9.x86_64.rpm)&libwbclient-4.17.5-102.el9.x86_64.rpm(& libsmbclient-4.17.5-102.el9.i686.rpmO&samba-common-tools-4.17.5-102.el9.x86_64.rpm+&samba-client-libs-4.17.5-102.el9.x86_64.rpm-& samba-libs-4.17.5-102.el9.i686.rpm/&samba-dcerpc-4.17.5-102.el9.x86_64.rpm.&samba-winbind-modules-4.17.5-102.el9.x86_64.rpmP&libnetapi-4.17.5-102.el9.x86_64.rpm.&python3-samba-dc-4.17.5-102.el9.x86_64.rpm0&samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm(&libsmbclient-4.17.5-102.el9.x86_64.rpm,&samba-common-libs-4.17.5-102.el9.x86_64.rpm)& libwbclient-4.17.5-102.el9.i686.rpm+& samba-client-libs-4.17.5-102.el9.i686.rpmP& libnetapi-4.17.5-102.el9.i686.rpm.& samba-winbind-modules-4.17.5-102.el9.i686.rpm-&samba-libs-4.17.5-102.el9.x86_64.rpm*& python3-samba-4.17.5-102.el9.i686.rpmP&samba-winbind-4.17.5-102.el9.x86_64.rpmQ&samba-dc-libs-4.17.5-102.el9.x86_64.rpmN&samba-4.17.5-102.el9.x86_64.rpm*&python3-samba-4.17.5-102.el9.x86_64.rpm,& samba-common-libs-4.17.5-102.el9.i686.rpmQ& samba-dc-libs-4.17.5-102.el9.i686.rpm1&samba-tools-4.17.5-102.el9.x86_64.rpm`&samba-common-4.17.5-102.el9.noarch.rpm2&samba-usershares-4.17.5-102.el9.x86_64.rpm)&libwbclient-4.17.5-102.el9.x86_64.rpm(& libsmbclient-4.17.5-102.el9.i686.rpmO&samba-common-tools-4.17.5-102.el9.x86_64.rpm+&samba-client-libs-4.17.5-102.el9.x86_64.rpm-& samba-libs-4.17.5-102.el9.i686.rpm/&samba-dcerpc-4.17.5-102.el9.x86_64.rpm.&samba-winbind-modules-4.17.5-102.el9.x86_64.rpmP&libnetapi-4.17.5-102.el9.x86_64.rpm.&python3-samba-dc-4.17.5-102.el9.x86_64.rpm0&samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm(&libsmbclient-4.17.5-102.el9.x86_64.rpm,&samba-common-libs-4.17.5-102.el9.x86_64.rpm)& libwbclient-4.17.5-102.el9.i686.rpm+& samba-client-libs-4.17.5-102.el9.i686.rpmP& libnetapi-4.17.5-102.el9.i686.rpm.& samba-winbind-modules-4.17.5-102.el9.i686.rpm-&samba-libs-4.17.5-102.el9.x86_64.rpm*& python3-samba-4.17.5-102.el9.i686.rpmP&samba-winbind-4.17.5-102.el9.x86_64.rpmQ&samba-dc-libs-4.17.5-102.el9.x86_64.rpmN&samba-4.17.5-102.el9.x86_64.rpm*&python3-samba-4.17.5-102.el9.x86_64.rpm,& samba-common-libs-4.17.5-102.el9.i686.rpmlXnBBBsecurityLow: openssl security and bug fix update/0Pphttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523oopenssl-libs-3.0.7-6.el9_2.x86_64.rpmo openssl-libs-3.0.7-6.el9_2.i686.rpm1oopenssl-3.0.7-6.el9_2.x86_64.rpmoopenssl-libs-3.0.7-6.el9_2.x86_64.rpmo openssl-libs-3.0.7-6.el9_2.i686.rpm1oopenssl-3.0.7-6.el9_2.x86_64.rpmBYsBsecurityLow: libarchive security update/0@Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532Oy libarchive-3.5.3-4.el9.i686.rpmOylibarchive-3.5.3-4.el9.x86_64.rpmOy libarchive-3.5.3-4.el9.i686.rpmOylibarchive-3.5.3-4.el9.x86_64.rpmZvBBBBBBBBBBBBBBBsecurityModerate: krb5 security, bug fix, and enhancement update/Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570 krb5-server-ldap-1.20.1-8.el9.x86_64.rpmkrb5-libs-1.20.1-8.el9.x86_64.rpm krb5-libs-1.20.1-8.el9.i686.rpmkrb5-server-1.20.1-8.el9.x86_64.rpm_krb5-workstation-1.20.1-8.el9.x86_64.rpm  libkadm5-1.20.1-8.el9.i686.rpmkrb5-pkinit-1.20.1-8.el9.x86_64.rpm krb5-server-1.20.1-8.el9.i686.rpm libkadm5-1.20.1-8.el9.x86_64.rpm krb5-pkinit-1.20.1-8.el9.i686.rpm krb5-server-ldap-1.20.1-8.el9.i686.rpm krb5-server-ldap-1.20.1-8.el9.x86_64.rpmkrb5-libs-1.20.1-8.el9.x86_64.rpm krb5-libs-1.20.1-8.el9.i686.rpmkrb5-server-1.20.1-8.el9.x86_64.rpm_krb5-workstation-1.20.1-8.el9.x86_64.rpm  libkadm5-1.20.1-8.el9.i686.rpmkrb5-pkinit-1.20.1-8.el9.x86_64.rpm krb5-server-1.20.1-8.el9.i686.rpm libkadm5-1.20.1-8.el9.x86_64.rpm krb5-pkinit-1.20.1-8.el9.i686.rpm krb5-server-ldap-1.20.1-8.el9.i686.rpm-[GBsecurityLow: lua security update/0pRhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582~lua-libs-5.4.4-3.el9.x86_64.rpm~ lua-libs-5.4.4-3.el9.i686.rpm~lua-libs-5.4.4-3.el9.x86_64.rpm~ lua-libs-5.4.4-3.el9.i686.rpmn\JBBBBBBsecurityModerate: openssh security update/Bhttps://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645qaopenssh-keycat-8.7p1-29.el9_2.x86_64.rpmoaopenssh-8.7p1-29.el9_2.x86_64.rpmpaopenssh-clients-8.7p1-29.el9_2.x86_64.rpmraopenssh-server-8.7p1-29.el9_2.x86_64.rpmqaopenssh-keycat-8.7p1-29.el9_2.x86_64.rpmoaopenssh-8.7p1-29.el9_2.x86_64.rpmpaopenssh-clients-8.7p1-29.el9_2.x86_64.rpmraopenssh-server-8.7p1-29.el9_2.x86_64.rpmI]RBBBBBBBBsecurityModerate: curl security update/J(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650"9curl-7.76.1-23.el9_2.1.x86_64.rpmv9libcurl-7.76.1-23.el9_2.1.x86_64.rpm#9curl-minimal-7.76.1-23.el9_2.1.x86_64.rpmw9libcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmv9 libcurl-7.76.1-23.el9_2.1.i686.rpmw9 libcurl-minimal-7.76.1-23.el9_2.1.i686.rpm"9curl-7.76.1-23.el9_2.1.x86_64.rpmv9libcurl-7.76.1-23.el9_2.1.x86_64.rpm#9curl-minimal-7.76.1-23.el9_2.1.x86_64.rpmw9libcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmv9 libcurl-7.76.1-23.el9_2.1.i686.rpmw9 libcurl-minimal-7.76.1-23.el9_2.1.i686.rpmC^\BsecurityImportant: c-ares security update/,rhttps://access.redhat.com/errata/RHSA-2023:3559RHSA-2023:3559RHSA-2023:3559https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3559.htmlALSA-2023:3559ALSA-2023:3559{Gc-ares-1.17.1-5.el9_2.1.x86_64.rpm{G c-ares-1.17.1-5.el9_2.1.i686.rpm{Gc-ares-1.17.1-5.el9_2.1.x86_64.rpm{G c-ares-1.17.1-5.el9_2.1.i686.rpm|__BBBsecurityImportant: python3.9 security update/,q+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:35950python3-libs-3.9.16-1.el9_2.1.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.1.i686.rpm python3-3.9.16-1.el9_2.1.x86_64.rpm0python3-libs-3.9.16-1.el9_2.1.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.1.i686.rpm python3-3.9.16-1.el9_2.1.x86_64.rpmu` dBBBsecurityModerate: openssl security and bug fix update/V https://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722k openssl-libs-3.0.7-16.el9_2.i686.rpmkopenssl-libs-3.0.7-16.el9_2.x86_64.rpm1kopenssl-3.0.7-16.el9_2.x86_64.rpmk openssl-libs-3.0.7-16.el9_2.i686.rpmkopenssl-libs-3.0.7-16.el9_2.x86_64.rpm1kopenssl-3.0.7-16.el9_2.x86_64.rpmza!iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,rhttps://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm#@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1"bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm$@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm#@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1"bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm$@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm_b JsecurityModerate: less security update/Chttps://access.redhat.com/errata/RHSA-2023:3725RHSA-2023:3725RHSA-2023:3725https://access.redhat.com/security/cve/CVE-2022-46663CVE-2022-46663CVE-2022-46663https://bugzilla.redhat.com/21696212169621https://errata.almalinux.org/9/ALSA-2023-3725.htmlALSA-2023:3725ALSA-2023:3725>less-590-2.el9_2.x86_64.rpm>less-590-2.el9_2.x86_64.rpm/c"MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update/Chttps://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325.'python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpmO'samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpmP' libnetapi-4.17.5-103.el9_2.alma.i686.rpmQ' samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm.'samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm/'samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm0'samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm+'samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm(' libsmbclient-4.17.5-103.el9_2.alma.i686.rpm)'libwbclient-4.17.5-103.el9_2.alma.x86_64.rpmP'libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm+' samba-client-libs-4.17.5-103.el9_2.alma.i686.rpmN'samba-4.17.5-103.el9_2.alma.x86_64.rpm*'python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm1'samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm,' samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm2'samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm-' samba-libs-4.17.5-103.el9_2.alma.i686.rpm('libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm-'samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm)' libwbclient-4.17.5-103.el9_2.alma.i686.rpmP'samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm`'samba-common-4.17.5-103.el9_2.alma.noarch.rpm.' samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm*' python3-samba-4.17.5-103.el9_2.alma.i686.rpmQ'samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm,'samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm.'python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpmO'samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpmP' libnetapi-4.17.5-103.el9_2.alma.i686.rpmQ' samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm.'samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm/'samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm0'samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm+'samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm(' libsmbclient-4.17.5-103.el9_2.alma.i686.rpm)'libwbclient-4.17.5-103.el9_2.alma.x86_64.rpmP'libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm+' samba-client-libs-4.17.5-103.el9_2.alma.i686.rpmN'samba-4.17.5-103.el9_2.alma.x86_64.rpm*'python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm1'samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm,' samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm2'samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm-' samba-libs-4.17.5-103.el9_2.alma.i686.rpm('libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm-'samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm)' libwbclient-4.17.5-103.el9_2.alma.i686.rpmP'samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm`'samba-common-4.17.5-103.el9_2.alma.noarch.rpm.' samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm*' python3-samba-4.17.5-103.el9_2.alma.i686.rpmQ'samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm,'samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm@d glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpmq glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm' libnsl-2.34-60.el9_2.7.i686.rpm& glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpmp glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpms glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm% glibc-2.34-60.el9_2.7.i686.rpm glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm~ glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpmo glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpmg glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpme glibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpmW glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpml glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm[ glibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpmi glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpmP_ glibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpmL glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm' libnsl-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpmv glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm| glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpmu glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpmM nscd-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpma glibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm^ glibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpmz glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm& glibc-gconv-extra-2.34-60.el9_2.7.i686.rpm@ glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm{ glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpmm glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpmd glibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpmX glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpmP glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpmZ glibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm% glibc-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpmw glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpmT glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpmY glibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpmj glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpmr glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpmk glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpmx glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpmf glibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpmb glibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm] glibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm` glibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm} glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpmn glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm glibc-common-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpmh glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpmy glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpmc glibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpmt glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm\ glibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpmq glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm' libnsl-2.34-60.el9_2.7.i686.rpm& glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpmp glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpms glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm% glibc-2.34-60.el9_2.7.i686.rpm glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm~ glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpmo glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpmg glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpme glibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpmW glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpml glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm[ glibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpmi glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm&r-bBBBsecurityImportant: python3.9 security update/,|https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:54620python3-libs-3.9.16-1.el9_2.2.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.2.i686.rpm python3-3.9.16-1.el9_2.2.x86_64.rpm0python3-libs-3.9.16-1.el9_2.2.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.2.i686.rpm python3-3.9.16-1.el9_2.2.x86_64.rpmEs.gBBBBBBBBsecurityImportant: curl security update/,}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763#;curl-minimal-7.76.1-23.el9_2.4.x86_64.rpmw; libcurl-minimal-7.76.1-23.el9_2.4.i686.rpmw;libcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmv;libcurl-7.76.1-23.el9_2.4.x86_64.rpm";curl-7.76.1-23.el9_2.4.x86_64.rpmv; libcurl-7.76.1-23.el9_2.4.i686.rpm#;curl-minimal-7.76.1-23.el9_2.4.x86_64.rpmw; libcurl-minimal-7.76.1-23.el9_2.4.i686.rpmw;libcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmv;libcurl-7.76.1-23.el9_2.4.x86_64.rpm";curl-7.76.1-23.el9_2.4.x86_64.rpmv; libcurl-7.76.1-23.el9_2.4.i686.rpmgt4qBsecurityImportant: nghttp2 security update/,-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838|Llibnghttp2-1.43.0-5.el9_2.1.x86_64.rpm|L libnghttp2-1.43.0-5.el9_2.1.i686.rpm|Llibnghttp2-1.43.0-5.el9_2.1.x86_64.rpm|L libnghttp2-1.43.0-5.el9_2.1.i686.rpmÙ0u8uBsecurityLow: opensc security update/0A(https://access.redhat.com/errata/RHSA-2023:6587RHSA-2023:6587RHSA-2023:6587https://access.redhat.com/security/cve/CVE-2023-2977CVE-2023-2977CVE-2023-2977https://bugzilla.redhat.com/22110882211088https://errata.almalinux.org/9/ALSA-2023-6587.htmlALSA-2023:6587ALSA-2023:6587A opensc-0.23.0-2.el9.i686.rpmAopensc-0.23.0-2.el9.x86_64.rpmA opensc-0.23.0-2.el9.i686.rpmAopensc-0.23.0-2.el9.x86_64.rpmv/yBBBsecurityModerate: binutils security update/iJhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593ubinutils-2.35.2-42.el9.x86_64.rpmu binutils-2.35.2-42.el9.i686.rpmCubinutils-gold-2.35.2-42.el9.x86_64.rpmubinutils-2.35.2-42.el9.x86_64.rpmu binutils-2.35.2-42.el9.i686.rpmCubinutils-gold-2.35.2-42.el9.x86_64.rpm<w~BBBBBBBBBBBBBBBsecurityImportant: linux-firmware security, bug fix, and enhancement update/,3 https://access.redhat.com/errata/RHSA-2023:6595RHSA-2023:6595RHSA-2023:6595https://access.redhat.com/security/cve/CVE-2022-27635CVE-2022-27635CVE-2022-27635https://access.redhat.com/security/cve/CVE-2022-36351CVE-2022-36351CVE-2022-36351https://access.redhat.com/security/cve/CVE-2022-38076CVE-2022-38076CVE-2022-38076https://access.redhat.com/security/cve/CVE-2022-40964CVE-2022-40964CVE-2022-40964https://access.redhat.com/security/cve/CVE-2022-46329CVE-2022-46329CVE-2022-46329https://access.redhat.com/security/cve/CVE-2023-20569CVE-2023-20569CVE-2023-20569https://bugzilla.redhat.com/22076252207625https://bugzilla.redhat.com/22389602238960https://bugzilla.redhat.com/22389612238961https://bugzilla.redhat.com/22389622238962https://bugzilla.redhat.com/22389632238963https://bugzilla.redhat.com/22389642238964https://errata.almalinux.org/9/ALSA-2023-6595.htmlALSA-2023:6595ALSA-2023:6595YWiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpmdRlinux-firmware-20230814-140.el9_3.noarch.rpmfRnetronome-firmware-20230814-140.el9_3.noarch.rpmWriwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpmeRlinux-firmware-whence-20230814-140.el9_3.noarch.rpm[Wiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm] iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpmXWiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpmV|iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm\3iwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm_Wiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm`Wiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpmZWiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpmcRlibertas-sd8787-firmware-20230814-140.el9_3.noarch.rpmaiwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpmb3iwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm^iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpmYWiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpmdRlinux-firmware-20230814-140.el9_3.noarch.rpmfRnetronome-firmware-20230814-140.el9_3.noarch.rpmWriwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpmeRlinux-firmware-whence-20230814-140.el9_3.noarch.rpm[Wiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm] iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpmXWiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpmV|iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm\3iwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm_Wiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm`Wiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpmZWiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpmcRlibertas-sd8787-firmware-20230814-140.el9_3.noarch.rpmaiwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpmb3iwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm^iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpmcx0PBsecurityModerate: cups security and bug fix update/?nhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596$Ycups-libs-2.3.3op2-21.el9.x86_64.rpm$Y cups-libs-2.3.3op2-21.el9.i686.rpm$Ycups-libs-2.3.3op2-21.el9.x86_64.rpm$Y cups-libs-2.3.3op2-21.el9.i686.rpmySsecurityModerate: python-cryptography security update/-fhttps://access.redhat.com/errata/RHSA-2023:6615RHSA-2023:6615RHSA-2023:6615https://access.redhat.com/security/cve/CVE-2023-23931CVE-2023-23931CVE-2023-23931https://bugzilla.redhat.com/21718172171817https://errata.almalinux.org/9/ALSA-2023-6615.htmlALSA-2023:6615ALSA-2023:6615`python3-cryptography-36.0.1-4.el9.x86_64.rpm`python3-cryptography-36.0.1-4.el9.x86_64.rpmzVBsecurityModerate: protobuf-c security update/}https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621*Kprotobuf-c-1.3.3-13.el9.x86_64.rpm*K protobuf-c-1.3.3-13.el9.i686.rpm*Kprotobuf-c-1.3.3-13.el9.x86_64.rpm*K protobuf-c-1.3.3-13.el9.i686.rpm{1ZBsecurityLow: glib2 security and bug fix update/0ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631Nhglib2-2.68.4-11.el9.x86_64.rpmNh glib2-2.68.4-11.el9.i686.rpmNhglib2-2.68.4-11.el9.x86_64.rpmNh glib2-2.68.4-11.el9.i686.rpm|"]BBBsecurityLow: shadow-utils security and bug fix update/0Yhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632gshadow-utils-4.9-8.el9.x86_64.rpm& shadow-utils-subid-4.9-8.el9.i686.rpm&shadow-utils-subid-4.9-8.el9.x86_64.rpmgshadow-utils-4.9-8.el9.x86_64.rpm& shadow-utils-subid-4.9-8.el9.i686.rpm&shadow-utils-subid-4.9-8.el9.x86_64.rpm@}2cBsecurityModerate: c-ares security, bug fix, and enhancement update/X https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635{H c-ares-1.19.1-1.el9.i686.rpm{Hc-ares-1.19.1-1.el9.x86_64.rpm{H c-ares-1.19.1-1.el9.i686.rpm{Hc-ares-1.19.1-1.el9.x86_64.rpm~3fBBsecurityModerate: libssh security update/b{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:66433( libssh-0.10.4-11.el9.i686.rpm}(libssh-config-0.10.4-11.el9.noarch.rpm3(libssh-0.10.4-11.el9.x86_64.rpm3( libssh-0.10.4-11.el9.i686.rpm}(libssh-config-0.10.4-11.el9.noarch.rpm3(libssh-0.10.4-11.el9.x86_64.rpmX4jBBBsecurityModerate: python3.9 security update/] https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:66590 python3-libs-3.9.18-1.el9_3.i686.rpm python3-3.9.18-1.el9_3.x86_64.rpm0python3-libs-3.9.18-1.el9_3.x86_64.rpm0 python3-libs-3.9.18-1.el9_3.i686.rpm python3-3.9.18-1.el9_3.x86_64.rpm0python3-libs-3.9.18-1.el9_3.x86_64.rpmB5oBsecurityLow: gmp security and enhancement update/0}Uhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661^gmp-6.2.0-13.el9.x86_64.rpm^ gmp-6.2.0-13.el9.i686.rpm^gmp-6.2.0-13.el9.x86_64.rpm^ gmp-6.2.0-13.el9.i686.rpmB6rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update/RK https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667N(samba-4.18.6-100.el9.x86_64.rpmO(samba-common-tools-4.18.6-100.el9.x86_64.rpm.( samba-winbind-modules-4.18.6-100.el9.i686.rpm+(samba-client-libs-4.18.6-100.el9.x86_64.rpm+( samba-client-libs-4.18.6-100.el9.i686.rpmP(samba-winbind-4.18.6-100.el9.x86_64.rpm,( samba-common-libs-4.18.6-100.el9.i686.rpm(( libsmbclient-4.18.6-100.el9.i686.rpmP(libnetapi-4.18.6-100.el9.x86_64.rpm((libsmbclient-4.18.6-100.el9.x86_64.rpm.(python3-samba-dc-4.18.6-100.el9.x86_64.rpm-(samba-libs-4.18.6-100.el9.x86_64.rpm0(samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm*(python3-samba-4.18.6-100.el9.x86_64.rpm)( libwbclient-4.18.6-100.el9.i686.rpm/(samba-dcerpc-4.18.6-100.el9.x86_64.rpm)(libwbclient-4.18.6-100.el9.x86_64.rpm-( samba-libs-4.18.6-100.el9.i686.rpm2(samba-usershares-4.18.6-100.el9.x86_64.rpm.(samba-winbind-modules-4.18.6-100.el9.x86_64.rpm*( python3-samba-4.18.6-100.el9.i686.rpmQ(samba-dc-libs-4.18.6-100.el9.x86_64.rpm1(samba-tools-4.18.6-100.el9.x86_64.rpmQ( samba-dc-libs-4.18.6-100.el9.i686.rpm,(samba-common-libs-4.18.6-100.el9.x86_64.rpmP( libnetapi-4.18.6-100.el9.i686.rpm`(samba-common-4.18.6-100.el9.noarch.rpmN(samba-4.18.6-100.el9.x86_64.rpmO(samba-common-tools-4.18.6-100.el9.x86_64.rpm.( samba-winbind-modules-4.18.6-100.el9.i686.rpm+(samba-client-libs-4.18.6-100.el9.x86_64.rpm+( samba-client-libs-4.18.6-100.el9.i686.rpmP(samba-winbind-4.18.6-100.el9.x86_64.rpm,( samba-common-libs-4.18.6-100.el9.i686.rpm(( libsmbclient-4.18.6-100.el9.i686.rpmP(libnetapi-4.18.6-100.el9.x86_64.rpm((libsmbclient-4.18.6-100.el9.x86_64.rpm.(python3-samba-dc-4.18.6-100.el9.x86_64.rpm-(samba-libs-4.18.6-100.el9.x86_64.rpm0(samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm*(python3-samba-4.18.6-100.el9.x86_64.rpm)( libwbclient-4.18.6-100.el9.i686.rpm/(samba-dcerpc-4.18.6-100.el9.x86_64.rpm)(libwbclient-4.18.6-100.el9.x86_64.rpm-( samba-libs-4.18.6-100.el9.i686.rpm2(samba-usershares-4.18.6-100.el9.x86_64.rpm.(samba-winbind-modules-4.18.6-100.el9.x86_64.rpm*( python3-samba-4.18.6-100.el9.i686.rpmQ(samba-dc-libs-4.18.6-100.el9.x86_64.rpm1(samba-tools-4.18.6-100.el9.x86_64.rpmQ( samba-dc-libs-4.18.6-100.el9.i686.rpm,(samba-common-libs-4.18.6-100.el9.x86_64.rpmP( libnetapi-4.18.6-100.el9.i686.rpm`(samba-common-4.18.6-100.el9.noarch.rpm87^BBBBBBBBsecurityModerate: curl security update/q https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679v<libcurl-7.76.1-26.el9.x86_64.rpmw< libcurl-minimal-7.76.1-26.el9.i686.rpm#<curl-minimal-7.76.1-26.el9.x86_64.rpmv< libcurl-7.76.1-26.el9.i686.rpm"<curl-7.76.1-26.el9.x86_64.rpmw<libcurl-minimal-7.76.1-26.el9.x86_64.rpmv<libcurl-7.76.1-26.el9.x86_64.rpmw< libcurl-minimal-7.76.1-26.el9.i686.rpm#<curl-minimal-7.76.1-26.el9.x86_64.rpmv< libcurl-7.76.1-26.el9.i686.rpm"<curl-7.76.1-26.el9.x86_64.rpmw<libcurl-minimal-7.76.1-26.el9.x86_64.rpmY+hBsecurityLow: tpm2-tss security and enhancement update/0Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:66850t tpm2-tss-3.2.2-2.el9.i686.rpm0ttpm2-tss-3.2.2-2.el9.x86_64.rpm0t tpm2-tss-3.2.2-2.el9.i686.rpm0ttpm2-tss-3.2.2-2.el9.x86_64.rpm 8,securityModerate: python-pip security update/`(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694zpython3-pip-wheel-21.2.3-7.el9.noarch.rpmzpython3-pip-wheel-21.2.3-7.el9.noarch.rpmC9mBBBBsecurityModerate: ncurses security and bug fix update/xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698Nncurses-6.2-10.20210508.el9.x86_64.rpm' ncurses-libs-6.2-10.20210508.el9.i686.rpm'ncurses-libs-6.2-10.20210508.el9.x86_64.rpm ncurses-base-6.2-10.20210508.el9.noarch.rpmNncurses-6.2-10.20210508.el9.x86_64.rpm' ncurses-libs-6.2-10.20210508.el9.i686.rpm'ncurses-libs-6.2-10.20210508.el9.x86_64.rpm ncurses-base-6.2-10.20210508.el9.noarch.rpmb:sBBBBBBBBBBBBBBBsecurityModerate: krb5 security and bug fix update/9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699  krb5-libs-1.21.1-1.el9.i686.rpm  libkadm5-1.21.1-1.el9.i686.rpm krb5-pkinit-1.21.1-1.el9.i686.rpm krb5-server-ldap-1.21.1-1.el9.i686.rpm libkadm5-1.21.1-1.el9.x86_64.rpmkrb5-server-1.21.1-1.el9.x86_64.rpm krb5-server-1.21.1-1.el9.i686.rpmkrb5-libs-1.21.1-1.el9.x86_64.rpm_krb5-workstation-1.21.1-1.el9.x86_64.rpmkrb5-server-ldap-1.21.1-1.el9.x86_64.rpmkrb5-pkinit-1.21.1-1.el9.x86_64.rpm  krb5-libs-1.21.1-1.el9.i686.rpm  libkadm5-1.21.1-1.el9.i686.rpm krb5-pkinit-1.21.1-1.el9.i686.rpm krb5-server-ldap-1.21.1-1.el9.i686.rpm libkadm5-1.21.1-1.el9.x86_64.rpmkrb5-server-1.21.1-1.el9.x86_64.rpm krb5-server-1.21.1-1.el9.i686.rpmkrb5-libs-1.21.1-1.el9.x86_64.rpm_krb5-workstation-1.21.1-1.el9.x86_64.rpmkrb5-server-ldap-1.21.1-1.el9.x86_64.rpmkrb5-pkinit-1.21.1-1.el9.x86_64.rpmuDBBsecurityLow: procps-ng security and bug fix update/09Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705)-procps-ng-3.3.17-13.el9.x86_64.rpm-procps-ng-i18n-3.3.17-13.el9.noarch.rpm)- procps-ng-3.3.17-13.el9.i686.rpm)-procps-ng-3.3.17-13.el9.x86_64.rpm-procps-ng-i18n-3.3.17-13.el9.noarch.rpm)- procps-ng-3.3.17-13.el9.i686.rpmZ;IBBBBsecurityModerate: avahi security update/https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707z avahi-libs-0.8-15.el9.i686.rpmy avahi-0.8-15.el9.i686.rpmyavahi-0.8-15.el9.x86_64.rpmzavahi-libs-0.8-15.el9.x86_64.rpmz avahi-libs-0.8-15.el9.i686.rpmy avahi-0.8-15.el9.i686.rpmyavahi-0.8-15.el9.x86_64.rpmzavahi-libs-0.8-15.el9.x86_64.rpmh IBBBsecurityModerate: libxml2 security update/https://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747A}python3-libxml2-2.9.13-5.el9_3.x86_64.rpm} libxml2-2.9.13-5.el9_3.i686.rpm}libxml2-2.9.13-5.el9_3.x86_64.rpmA}python3-libxml2-2.9.13-5.el9_3.x86_64.rpm} libxml2-2.9.13-5.el9_3.i686.rpm}libxml2-2.9.13-5.el9_3.x86_64.rpmN  NBsecurityModerate: opensc security update/Khttps://access.redhat.com/errata/RHSA-2023:7879RHSA-2023:7879RHSA-2023:7879https://access.redhat.com/security/cve/CVE-2023-40660CVE-2023-40660CVE-2023-40660https://access.redhat.com/security/cve/CVE-2023-40661CVE-2023-40661CVE-2023-40661https://access.redhat.com/security/cve/CVE-2023-4535CVE-2023-4535CVE-2023-4535https://bugzilla.redhat.com/22409122240912https://bugzilla.redhat.com/22409132240913https://bugzilla.redhat.com/22409142240914https://errata.almalinux.org/9/ALSA-2023-7879.htmlALSA-2023:7879ALSA-2023:7879Bopensc-0.23.0-3.el9_3.x86_64.rpmB opensc-0.23.0-3.el9_3.i686.rpmBopensc-0.23.0-3.el9_3.x86_64.rpmB opensc-0.23.0-3.el9_3.i686.rpm ?RBBBsecurityModerate: openssl security update+_Nhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:03101lopenssl-3.0.7-25.el9_3.x86_64.rpml openssl-libs-3.0.7-25.el9_3.i686.rpmlopenssl-libs-3.0.7-25.el9_3.x86_64.rpm1lopenssl-3.0.7-25.el9_3.x86_64.rpml openssl-libs-3.0.7-25.el9_3.i686.rpmlopenssl-libs-3.0.7-25.el9_3.x86_64.rpm[ WBBBBBBBBBBBBBBBBBsecurityModerate: rpm security update+-whttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463 a rpm-sign-4.16.1.3-27.el9_3.x86_64.rpm/ rpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm_ rpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm[ python3-rpm-4.16.1.3-27.el9_3.x86_64.rpm` rpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm. rpm-libs-4.16.1.3-27.el9_3.i686.rpm- rpm-build-libs-4.16.1.3-27.el9_3.i686.rpm/ rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm^ rpm-4.16.1.3-27.el9_3.x86_64.rpm. rpm-libs-4.16.1.3-27.el9_3.x86_64.rpm- rpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm a rpm-sign-4.16.1.3-27.el9_3.x86_64.rpm/ rpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm_ rpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm[ python3-rpm-4.16.1.3-27.el9_3.x86_64.rpm` rpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm. rpm-libs-4.16.1.3-27.el9_3.i686.rpm- rpm-build-libs-4.16.1.3-27.el9_3.i686.rpm/ rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm^ rpm-4.16.1.3-27.el9_3.x86_64.rpm. rpm-libs-4.16.1.3-27.el9_3.x86_64.rpm- rpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm˰2 +*securityModerate: python-urllib3 security update+$https://access.redhat.com/errata/RHSA-2024:0464RHSA-2024:0464RHSA-2024:0464https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22424932242493https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-0464.htmlALSA-2024:0464ALSA-2024:0464:npython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm:npython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm˭ lBsecurityModerate: sqlite security update+;https://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465Rv sqlite-libs-3.34.1-7.el9_3.i686.rpmRvsqlite-libs-3.34.1-7.el9_3.x86_64.rpmRv sqlite-libs-3.34.1-7.el9_3.i686.rpmRvsqlite-libs-3.34.1-7.el9_3.x86_64.rpm˩6 oBBBsecurityModerate: python3.9 security update+Cchttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:04660 python3-libs-3.9.18-1.el9_3.1.x86_64.rpm python3-3.9.18-1.el9_3.1.x86_64.rpm0 python3-libs-3.9.18-1.el9_3.1.i686.rpm0 python3-libs-3.9.18-1.el9_3.1.x86_64.rpm python3-3.9.18-1.el9_3.1.x86_64.rpm0 python3-libs-3.9.18-1.el9_3.1.i686.rpmˤ tBBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update+&!https://access.redhat.com/errata/RHSA-2024:0468RHSA-2024:0468RHSA-2024:0468https://access.redhat.com/security/cve/CVE-2023-4001CVE-2023-4001CVE-2023-4001https://bugzilla.redhat.com/22249512224951https://errata.almalinux.org/9/ALSA-2024-0468.htmlALSA-2024:0468ALSA-2024:0468 Cgrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmDgrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmigrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpmjgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpmBgrub2-common-2.06-70.el9_3.2.alma.1.noarch.rpmUgrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpmEgrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpmhgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpmngrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpmkgrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm Cgrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmDgrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmigrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpmjgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpmBgrub2-common-2.06-70.el9_3.2.alma.1.noarch.rpmUgrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpmEgrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpmhgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpmngrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpmkgrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpmΌr HBsecurityModerate: gnutls security update+GGhttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533!~ gnutls-3.7.6-23.el9_3.3.i686.rpm!~gnutls-3.7.6-23.el9_3.3.x86_64.rpm!~ gnutls-3.7.6-23.el9_3.3.i686.rpm!~gnutls-3.7.6-23.el9_3.3.x86_64.rpm߲  DBBBBBBBBBBsecurityModerate: nss security update+:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790THnss-util-3.90.0-6.el9_3.x86_64.rpmRHnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmOnspr-4.35.0-6.el9_3.x86_64.rpmSHnss-sysinit-3.90.0-6.el9_3.x86_64.rpmPHnss-3.90.0-6.el9_3.x86_64.rpmQHnss-softokn-3.90.0-6.el9_3.x86_64.rpmTHnss-util-3.90.0-6.el9_3.x86_64.rpmRHnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmOnspr-4.35.0-6.el9_3.x86_64.rpmSHnss-sysinit-3.90.0-6.el9_3.x86_64.rpmPHnss-3.90.0-6.el9_3.x86_64.rpmQHnss-softokn-3.90.0-6.el9_3.x86_64.rpm4 KsecurityModerate: sudo security update+H|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811@sudo-1.9.5p2-10.el9_3.x86_64.rpm@sudo-1.9.5p2-10.el9_3.x86_64.rpm[ MBsecurityModerate: opensc security update+Dhttps://access.redhat.com/errata/RHSA-2024:0966RHSA-2024:0966RHSA-2024:0966https://access.redhat.com/security/cve/CVE-2023-5992CVE-2023-5992CVE-2023-5992https://bugzilla.redhat.com/22486852248685https://errata.almalinux.org/9/ALSA-2024-0966.htmlALSA-2024:0966ALSA-2024:0966C opensc-0.23.0-4.el9_3.i686.rpmCopensc-0.23.0-4.el9_3.x86_64.rpmC opensc-0.23.0-4.el9_3.i686.rpmCopensc-0.23.0-4.el9_3.x86_64.rpmE QBsecurityImportant: pam:1.5.1 security update+,V[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:102444Qpam-1.5.1-22.el9_5.x86_64.rpm4Q pam-1.5.1-22.el9_5.i686.rpm4Qpam-1.5.1-22.el9_5.x86_64.rpm4Q pam-1.5.1-22.el9_5.i686.rpmg TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+1https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:102744kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm!4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm*4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm$4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm13bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm#4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm!4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm*4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm$4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm13bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm#4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm wsecurityImportant: tuned security update+,Phttps://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:103846tuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm6tuned-2.24.0-2.el9_5.alma.1.noarch.rpm6tuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm6tuned-2.24.0-2.el9_5.alma.1.noarch.rpm^ yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+nAhttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939*5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm14bpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm$5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm!5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm#5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm*5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm14bpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm$5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm!5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm#5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm5 \BBBsecurityModerate: python3.9:3.9.21 security update+/https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:109830python3-libs-3.9.21-1.el9_5.x86_64.rpm python3-3.9.21-1.el9_5.x86_64.rpm0 python3-libs-3.9.21-1.el9_5.i686.rpm0python3-libs-3.9.21-1.el9_5.x86_64.rpm python3-3.9.21-1.el9_5.x86_64.rpm0 python3-libs-3.9.21-1.el9_5.i686.rpmE aBsecurityModerate: pam security update+M?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:112504P pam-1.5.1-21.el9_5.i686.rpm4Ppam-1.5.1-21.el9_5.x86_64.rpm4P pam-1.5.1-21.el9_5.i686.rpm4Ppam-1.5.1-21.el9_5.x86_64.rpm dBBBBBBBBsecurityModerate: curl security update+ @https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129w> libcurl-minimal-7.76.1-26.el9_3.3.i686.rpmw>libcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm#>curl-minimal-7.76.1-26.el9_3.3.x86_64.rpmv>libcurl-7.76.1-26.el9_3.3.x86_64.rpmv> libcurl-7.76.1-26.el9_3.3.i686.rpm">curl-7.76.1-26.el9_3.3.x86_64.rpmw> libcurl-minimal-7.76.1-26.el9_3.3.i686.rpmw>libcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm#>curl-minimal-7.76.1-26.el9_3.3.x86_64.rpmv>libcurl-7.76.1-26.el9_3.3.x86_64.rpmv> libcurl-7.76.1-26.el9_3.3.i686.rpm">curl-7.76.1-26.el9_3.3.x86_64.rpm7 nBBBBBBsecurityModerate: openssh security update+L0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130qcopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpmocopenssh-8.7p1-34.el9_3.3.x86_64.rpmpcopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpmrcopenssh-server-8.7p1-34.el9_3.3.x86_64.rpmqcopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpmocopenssh-8.7p1-34.el9_3.3.x86_64.rpmpcopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpmrcopenssh-server-8.7p1-34.el9_3.3.x86_64.rpmR  vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%|c$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:114866kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm15bpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm$6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm*6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm#6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm15bpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm$6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm*6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm#6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpmm! "YBBBBBBBsecurityModerate: opencryptoki security update+_Whttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239(L opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm(Lopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpmWLopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpmVLopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpmULopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm(L opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm(Lopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpmWLopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpmVLopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpmULopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpmE" cBsecurityModerate: expat security update+6Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530bexpat-2.5.0-1.el9_3.1.x86_64.rpmb expat-2.5.0-1.el9_3.1.i686.rpmbexpat-2.5.0-1.el9_3.1.x86_64.rpmb expat-2.5.0-1.el9_3.1.i686.rpm# (fsecurityModerate: less security update+x#https://access.redhat.com/errata/RHSA-2024:1692RHSA-2024:1692RHSA-2024:1692https://access.redhat.com/security/cve/CVE-2022-48624CVE-2022-48624CVE-2022-48624https://bugzilla.redhat.com/22650812265081https://errata.almalinux.org/9/ALSA-2024-1692.htmlALSA-2024:1692ALSA-2024:1692>less-590-3.el9_3.x86_64.rpm>less-590-3.el9_3.x86_64.rpm|$ iBsecurityModerate: gnutls security update+https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879! gnutls-3.7.6-23.el9_3.4.i686.rpm!gnutls-3.7.6-23.el9_3.4.x86_64.rpm! gnutls-3.7.6-23.el9_3.4.i686.rpm!gnutls-3.7.6-23.el9_3.4.x86_64.rpm% .lsecurityImportant: shim bug fix update+,-Mhttps://access.redhat.com/errata/RHSA-2024:1903RHSA-2024:1903RHSA-2024:1903https://access.redhat.com/security/cve/CVE-2023-40546CVE-2023-40546CVE-2023-40546https://access.redhat.com/security/cve/CVE-2023-40547CVE-2023-40547CVE-2023-40547https://access.redhat.com/security/cve/CVE-2023-40548CVE-2023-40548CVE-2023-40548https://access.redhat.com/security/cve/CVE-2023-40549CVE-2023-40549CVE-2023-40549https://access.redhat.com/security/cve/CVE-2023-40550CVE-2023-40550CVE-2023-40550https://access.redhat.com/security/cve/CVE-2023-40551CVE-2023-40551CVE-2023-40551https://bugzilla.redhat.com/22345892234589https://bugzilla.redhat.com/22417822241782https://bugzilla.redhat.com/22417962241796https://bugzilla.redhat.com/22417972241797https://bugzilla.redhat.com/22599152259915https://bugzilla.redhat.com/22599182259918https://errata.almalinux.org/9/ALSA-2024-1903.htmlALSA-2024:1903ALSA-2024:1903hshim-x64-15.8-4.el9_3.alma.1.x86_64.rpmhshim-x64-15.8-4.el9_3.alma.1.x86_64.rpmx& oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update+,z%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671Ckernel-5.14.0-427.13.1.el9_4.x86_64.rpm#Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm$Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1%bpftool-7.3.0-427.13.1.el9_4.x86_64.rpmCkernel-5.14.0-427.13.1.el9_4.x86_64.rpm#Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm$Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1%bpftool-7.3.0-427.13.1.el9_4.x86_64.rpm'' PsecurityModerate: squashfs-tools security update+https://access.redhat.com/errata/RHSA-2024:2396RHSA-2024:2396RHSA-2024:2396https://access.redhat.com/security/cve/CVE-2021-40153CVE-2021-40153CVE-2021-40153https://access.redhat.com/security/cve/CVE-2021-41072CVE-2021-41072CVE-2021-41072https://bugzilla.redhat.com/19986211998621https://bugzilla.redhat.com/20049572004957https://errata.almalinux.org/9/ALSA-2024-2396.htmlALSA-2024:2396ALSA-2024:2396csquashfs-tools-4.4-10.git1.el9.x86_64.rpmcsquashfs-tools-4.4-10.git1.el9.x86_64.rpm( SBsecurityModerate: harfbuzz security update+>{https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410lharfbuzz-2.7.4-10.el9.x86_64.rpml harfbuzz-2.7.4-10.el9.i686.rpmlharfbuzz-2.7.4-10.el9.x86_64.rpml harfbuzz-2.7.4-10.el9.i686.rpm) VBBBBsecurityModerate: avahi security update+9O https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433zavahi-libs-0.8-20.el9.x86_64.rpmyavahi-0.8-20.el9.x86_64.rpmz avahi-libs-0.8-20.el9.i686.rpmy avahi-0.8-20.el9.i686.rpmzavahi-libs-0.8-20.el9.x86_64.rpmyavahi-0.8-20.el9.x86_64.rpmz avahi-libs-0.8-20.el9.i686.rpmy avahi-0.8-20.el9.i686.rpm* \securityModerate: exfatprogs security update+https://access.redhat.com/errata/RHSA-2024:2437RHSA-2024:2437RHSA-2024:2437https://access.redhat.com/security/cve/CVE-2023-45897CVE-2023-45897CVE-2023-45897https://bugzilla.redhat.com/22469762246976https://errata.almalinux.org/9/ALSA-2024-2437.htmlALSA-2024:2437ALSA-2024:2437Cexfatprogs-1.2.2-2.el9.x86_64.rpmCexfatprogs-1.2.2-2.el9.x86_64.rpm+  _BsecurityModerate: pam security update+Ohttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:24384Opam-1.5.1-19.el9.x86_64.rpm4O pam-1.5.1-19.el9.i686.rpm4Opam-1.5.1-19.el9.x86_64.rpm4O pam-1.5.1-19.el9.i686.rpm , !bBBBsecurityLow: openssl and openssl-fips-provider security update+0_/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447m openssl-libs-3.0.7-27.el9.i686.rpmmopenssl-libs-3.0.7-27.el9.x86_64.rpm1mopenssl-3.0.7-27.el9.x86_64.rpmm openssl-libs-3.0.7-27.el9.i686.rpmmopenssl-libs-3.0.7-27.el9.x86_64.rpm1mopenssl-3.0.7-27.el9.x86_64.rpm- 9gBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update+Thttps://access.redhat.com/errata/RHSA-2024:2456RHSA-2024:2456RHSA-2024:2456https://access.redhat.com/security/cve/CVE-2023-4692CVE-2023-4692CVE-2023-4692https://access.redhat.com/security/cve/CVE-2023-4693CVE-2023-4693CVE-2023-4693https://access.redhat.com/security/cve/CVE-2024-1048CVE-2024-1048CVE-2024-1048https://bugzilla.redhat.com/22366132236613https://bugzilla.redhat.com/22383432238343https://bugzilla.redhat.com/22568272256827https://errata.almalinux.org/9/ALSA-2024-2456.htmlALSA-2024:2456ALSA-2024:2456 Egrub2-pc-modules-2.06-77.el9.alma.1.noarch.rpmkgrub2-tools-2.06-77.el9.alma.1.x86_64.rpmjgrub2-pc-2.06-77.el9.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpmhgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpmigrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpmDgrub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpmCgrub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpmBgrub2-common-2.06-77.el9.alma.1.noarch.rpmngrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm Egrub2-pc-modules-2.06-77.el9.alma.1.noarch.rpmkgrub2-tools-2.06-77.el9.alma.1.x86_64.rpmjgrub2-pc-2.06-77.el9.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpmhgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpmigrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpmDgrub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpmCgrub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpmBgrub2-common-2.06-77.el9.alma.1.noarch.rpmngrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpmF. "zBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update+bhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 frhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpmT systemd-container-252-32.el9_4.alma.1.i686.rpm6systemd-udev-252-32.el9_4.alma.1.x86_64.rpm3systemd-oomd-252-32.el9_4.alma.1.x86_64.rpmSsystemd-252-32.el9_4.alma.1.x86_64.rpmU systemd-libs-252-32.el9_4.alma.1.i686.rpmUsystemd-libs-252-32.el9_4.alma.1.x86_64.rpmS systemd-252-32.el9_4.alma.1.i686.rpm4systemd-pam-252-32.el9_4.alma.1.x86_64.rpmTsystemd-container-252-32.el9_4.alma.1.x86_64.rpm5systemd-resolved-252-32.el9_4.alma.1.x86_64.rpmgsystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm frhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpmT systemd-container-252-32.el9_4.alma.1.i686.rpm6systemd-udev-252-32.el9_4.alma.1.x86_64.rpm3systemd-oomd-252-32.el9_4.alma.1.x86_64.rpmSsystemd-252-32.el9_4.alma.1.x86_64.rpmU systemd-libs-252-32.el9_4.alma.1.i686.rpmUsystemd-libs-252-32.el9_4.alma.1.x86_64.rpmS systemd-252-32.el9_4.alma.1.i686.rpm4systemd-pam-252-32.el9_4.alma.1.x86_64.rpmTsystemd-container-252-32.el9_4.alma.1.x86_64.rpm5systemd-resolved-252-32.el9_4.alma.1.x86_64.rpmgsystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm/ MsecurityModerate: traceroute security update+chttps://access.redhat.com/errata/RHSA-2024:2483RHSA-2024:2483RHSA-2024:2483https://access.redhat.com/security/cve/CVE-2023-46316CVE-2023-46316CVE-2023-46316https://bugzilla.redhat.com/22463032246303https://errata.almalinux.org/9/ALSA-2024-2483.htmlALSA-2024:2483ALSA-2024:2483gtraceroute-2.1.0-18.el9.x86_64.rpmgtraceroute-2.1.0-18.el9.x86_64.rpm0 #PBBsecurityLow: libssh security update+0vhttps://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:25043)libssh-0.10.4-13.el9.x86_64.rpm})libssh-config-0.10.4-13.el9.noarch.rpm3) libssh-0.10.4-13.el9.i686.rpm3)libssh-0.10.4-13.el9.x86_64.rpm})libssh-config-0.10.4-13.el9.noarch.rpm3) libssh-0.10.4-13.el9.i686.rpm'1 $TBBBsecurityLow: file security update+0~Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512 file-libs-5.39-16.el9.x86_64.rpmEfile-5.39-16.el9.x86_64.rpm  file-libs-5.39-16.el9.i686.rpm file-libs-5.39-16.el9.x86_64.rpmEfile-5.39-16.el9.x86_64.rpm  file-libs-5.39-16.el9.i686.rpm2 YsecurityModerate: wpa_supplicant security update+@bhttps://access.redhat.com/errata/RHSA-2024:2517RHSA-2024:2517RHSA-2024:2517https://access.redhat.com/security/cve/CVE-2023-52160CVE-2023-52160CVE-2023-52160https://bugzilla.redhat.com/22645932264593https://errata.almalinux.org/9/ALSA-2024-2517.htmlALSA-2024:2517ALSA-2024:2517kwpa_supplicant-2.10-5.el9.x86_64.rpmkwpa_supplicant-2.10-5.el9.x86_64.rpm3 %\BsecurityModerate: gnutls security update+"https://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570!gnutls-3.8.3-4.el9_4.x86_64.rpm! gnutls-3.8.3-4.el9_4.i686.rpm!gnutls-3.8.3-4.el9_4.x86_64.rpm! gnutls-3.8.3-4.el9_4.i686.rpmA4 &_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: sssd security and bug fix update+3Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571#epython3-sssdconfig-2.9.4-6.el9_4.noarch.rpmlibipa_hbac-2.9.4-6.el9_4.x86_64.rpm' sssd-client-2.9.4-6.el9_4.i686.rpmbpython3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmksssd-common-2.9.4-6.el9_4.x86_64.rpmisssd-2.9.4-6.el9_4.x86_64.rpmdpython3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpmjsssd-ad-2.9.4-6.el9_4.x86_64.rpmvsssd-proxy-2.9.4-6.el9_4.x86_64.rpmqsssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm# libsss_simpleifp-2.9.4-6.el9_4.i686.rpmtsssd-passkey-2.9.4-6.el9_4.x86_64.rpmwsssd-tools-2.9.4-6.el9_4.x86_64.rpm"libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmmsssd-dbus-2.9.4-6.el9_4.x86_64.rpm libipa_hbac-2.9.4-6.el9_4.i686.rpm  libsss_certmap-2.9.4-6.el9_4.i686.rpmlsssd-common-pac-2.9.4-6.el9_4.x86_64.rpmapython3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpmrsssd-ldap-2.9.4-6.el9_4.x86_64.rpmosssd-kcm-2.9.4-6.el9_4.x86_64.rpm! libsss_idmap-2.9.4-6.el9_4.i686.rpm]libsss_sudo-2.9.4-6.el9_4.x86_64.rpmxsssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpmusssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm\libsss_autofs-2.9.4-6.el9_4.x86_64.rpmnsssd-ipa-2.9.4-6.el9_4.x86_64.rpmpsssd-krb5-2.9.4-6.el9_4.x86_64.rpm libsss_certmap-2.9.4-6.el9_4.x86_64.rpmssssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm'sssd-client-2.9.4-6.el9_4.x86_64.rpm!libsss_idmap-2.9.4-6.el9_4.x86_64.rpmcpython3-sss-2.9.4-6.el9_4.x86_64.rpm" libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#epython3-sssdconfig-2.9.4-6.el9_4.noarch.rpmlibipa_hbac-2.9.4-6.el9_4.x86_64.rpm' sssd-client-2.9.4-6.el9_4.i686.rpmbpython3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmksssd-common-2.9.4-6.el9_4.x86_64.rpmisssd-2.9.4-6.el9_4.x86_64.rpmdpython3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpmjsssd-ad-2.9.4-6.el9_4.x86_64.rpmvsssd-proxy-2.9.4-6.el9_4.x86_64.rpmqsssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm# libsss_simpleifp-2.9.4-6.el9_4.i686.rpmtsssd-passkey-2.9.4-6.el9_4.x86_64.rpmwsssd-tools-2.9.4-6.el9_4.x86_64.rpm"libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmmsssd-dbus-2.9.4-6.el9_4.x86_64.rpm libipa_hbac-2.9.4-6.el9_4.i686.rpm  libsss_certmap-2.9.4-6.el9_4.i686.rpmlsssd-common-pac-2.9.4-6.el9_4.x86_64.rpmapython3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpmrsssd-ldap-2.9.4-6.el9_4.x86_64.rpmosssd-kcm-2.9.4-6.el9_4.x86_64.rpm! libsss_idmap-2.9.4-6.el9_4.i686.rpm]libsss_sudo-2.9.4-6.el9_4.x86_64.rpmxsssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpmusssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm\libsss_autofs-2.9.4-6.el9_4.x86_64.rpmnsssd-ipa-2.9.4-6.el9_4.x86_64.rpmpsssd-krb5-2.9.4-6.el9_4.x86_64.rpm libsss_certmap-2.9.4-6.el9_4.x86_64.rpmssssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm'sssd-client-2.9.4-6.el9_4.x86_64.rpm!libsss_idmap-2.9.4-6.el9_4.x86_64.rpmcpython3-sss-2.9.4-6.el9_4.x86_64.rpm" libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#5 '^BBBsecurityModerate: libxml2 security update+{nhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679A~python3-libxml2-2.9.13-6.el9_4.x86_64.rpm~libxml2-2.9.13-6.el9_4.x86_64.rpm~ libxml2-2.9.13-6.el9_4.i686.rpmA~python3-libxml2-2.9.13-6.el9_4.x86_64.rpm~libxml2-2.9.13-6.el9_4.x86_64.rpm~ libxml2-2.9.13-6.el9_4.i686.rpmk6 (cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+i&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743Dkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1&bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm#Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm$Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1&bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm#Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm$Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmt7 )DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+x https://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890Ekernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm$Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm#Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1'bpftool-7.3.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm$Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm#Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1'bpftool-7.3.0-427.18.1.el9_4.x86_64.rpm"8 *eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: glibc security update+, https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339P glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpmWglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpmwglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-be-2.34-100.el9_4.2.x86_64.rpmMnscd-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpmyglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpmYglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpmiglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpmhglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpmzglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpmglibc-common-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm\glibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpmaglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpmcglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpmvglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpmdglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpmtglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm%glibc-2.34-100.el9_4.2.x86_64.rpmnglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpmrglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm'libnsl-2.34-100.el9_4.2.x86_64.rpm{glibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm~glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpmfglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpmgglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm[glibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpmsglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm`glibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpmXglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-br-2.34-100.el9_4.2.x86_64.rpmglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm]glibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpmqglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpmoglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm}glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm^glibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpmLglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm% glibc-2.34-100.el9_4.2.i686.rpmglibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm' libnsl-2.34-100.el9_4.2.i686.rpm&glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm|glibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpmlglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpmmglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-as-2.34-100.el9_4.2.x86_64.rpmuglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm& glibc-gconv-extra-2.34-100.el9_4.2.i686.rpmeglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpmpglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpmjglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpmkglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpmZglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpmbglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm_glibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpmxglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpmP glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpmWglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpmwglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-be-2.34-100.el9_4.2.x86_64.rpmMnscd-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpmyglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpmYglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpmiglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpmhglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpmzglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpmglibc-common-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm\glibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpmaglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpmcglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpmvglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpmdglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpmtglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm%glibc-2.34-100.el9_4.2.x86_64.rpmnglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpmrglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm'libnsl-2.34-100.el9_4.2.x86_64.rpm{glibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm~glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpmfglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpmgglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm[glibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpmsglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm`glibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpmXglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-br-2.34-100.el9_4.2.x86_64.rpmglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm]glibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpmqglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpmoglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm}glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm^glibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpmLglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm% glibc-2.34-100.el9_4.2.i686.rpmglibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm' libnsl-2.34-100.el9_4.2.i686.rpm&glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm|glibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpmlglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpmmglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-as-2.34-100.el9_4.2.x86_64.rpmuglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm& glibc-gconv-extra-2.34-100.el9_4.2.i686.rpmeglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpmpglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpmjglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpmkglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpmZglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpmbglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm_glibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpmxglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm"9 BBsecurityModerate: nghttp2 security update+mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501|N libnghttp2-1.43.0-5.el9_4.3.i686.rpm|Nlibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm|N libnghttp2-1.43.0-5.el9_4.3.i686.rpm|Nlibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm<: FsecurityImportant: less security update+,zhttps://access.redhat.com/errata/RHSA-2024:3513RHSA-2024:3513RHSA-2024:3513https://access.redhat.com/security/cve/CVE-2024-32487CVE-2024-32487CVE-2024-32487https://bugzilla.redhat.com/22749802274980https://errata.almalinux.org/9/ALSA-2024-3513.htmlALSA-2024:3513ALSA-2024:3513> less-590-4.el9_4.x86_64.rpm> less-590-4.el9_4.x86_64.rpmU; +IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+~bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619Fkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1(bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm"Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm$Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm#Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1(bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm"Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm$Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm#Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmO< ,jBsecurityLow: c-ares security update+0`https://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842{I c-ares-1.19.1-2.el9_4.i686.rpm{Ic-ares-1.19.1-2.el9_4.x86_64.rpm{I c-ares-1.19.1-2.el9_4.i686.rpm{Ic-ares-1.19.1-2.el9_4.x86_64.rpmW= -mBBBBBBsecurityModerate: cockpit security update+bEhttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843H]cockpit-system-311.2-1.el9_4.noarch.rpmI]cockpit-ws-311.2-1.el9_4.x86_64.rpmE]cockpit-311.2-1.el9_4.x86_64.rpmG]cockpit-doc-311.2-1.el9_4.noarch.rpmF]cockpit-bridge-311.2-1.el9_4.x86_64.rpmH]cockpit-system-311.2-1.el9_4.noarch.rpmI]cockpit-ws-311.2-1.el9_4.x86_64.rpmE]cockpit-311.2-1.el9_4.x86_64.rpmG]cockpit-doc-311.2-1.el9_4.noarch.rpmF]cockpit-bridge-311.2-1.el9_4.x86_64.rpmc> 65securityModerate: python-idna security update+'https://access.redhat.com/errata/RHSA-2024:3846RHSA-2024:3846RHSA-2024:3846https://access.redhat.com/security/cve/CVE-2024-3651CVE-2024-3651CVE-2024-3651https://bugzilla.redhat.com/22747792274779https://errata.almalinux.org/9/ALSA-2024-3846.htmlALSA-2024:3846ALSA-2024:3846upython3-idna-2.10-7.el9_4.1.noarch.rpmupython3-idna-2.10-7.el9_4.1.noarch.rpmO? .wBBBsecurityImportant: python3.9 security update+,+https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:40780 python3-libs-3.9.18-3.el9_4.1.x86_64.rpm python3-3.9.18-3.el9_4.1.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.1.i686.rpm0 python3-libs-3.9.18-3.el9_4.1.x86_64.rpm python3-3.9.18-3.el9_4.1.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.1.i686.rpm@ /|BBBBBBsecurityImportant: openssh security update+,@shttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312rdopenssh-server-8.7p1-38.el9_4.1.x86_64.rpmodopenssh-8.7p1-38.el9_4.1.x86_64.rpmpdopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpmqdopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpmrdopenssh-server-8.7p1-38.el9_4.1.x86_64.rpmodopenssh-8.7p1-38.el9_4.1.x86_64.rpmpdopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpmqdopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpmA 0DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+3https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349"Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm#Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm$Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1)bpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm"Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm#Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm$Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1)bpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm{B 1eBBBBBBsecurityModerate: openssh security update+Ahttps://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457qeopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpmpeopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpmreopenssh-server-8.7p1-38.el9_4.4.x86_64.rpmoeopenssh-8.7p1-38.el9_4.4.x86_64.rpmqeopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpmpeopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpmreopenssh-server-8.7p1-38.el9_4.4.x86_64.rpmoeopenssh-8.7p1-38.el9_4.4.x86_64.rpmߴC 2mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,G$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583Hkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1*bpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm#Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm$Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1*bpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm#Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm$Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm&D NBsecurityImportant: libndp security update+,a[https://access.redhat.com/errata/RHSA-2024:4636RHSA-2024:4636RHSA-2024:4636https://access.redhat.com/security/cve/CVE-2024-5564CVE-2024-5564CVE-2024-5564https://bugzilla.redhat.com/22841222284122https://errata.almalinux.org/9/ALSA-2024-4636.htmlALSA-2024:4636ALSA-2024:4636W libndp-1.8-6.el9_4.alma.1.i686.rpmWlibndp-1.8-6.el9_4.alma.1.x86_64.rpmW libndp-1.8-6.el9_4.alma.1.i686.rpmWlibndp-1.8-6.el9_4.alma.1.x86_64.rpmE #RBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update+<#https://access.redhat.com/errata/RHSA-2024:4774RHSA-2024:4774RHSA-2024:4774https://access.redhat.com/security/cve/CVE-2023-31346CVE-2023-31346CVE-2023-31346https://bugzilla.redhat.com/22504582250458https://errata.almalinux.org/9/ALSA-2024-4774.htmlALSA-2024:4774ALSA-2024:4774[Xiwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpmaiwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm\4iwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm`Xiwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm^iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpmfSnetronome-firmware-20240603-143.1.el9_4.noarch.rpmV}iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpmYXiwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpmXXiwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpmcSlibertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpmWsiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpmdSlinux-firmware-20240603-143.1.el9_4.noarch.rpm_Xiwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm] iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpmb4iwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpmeSlinux-firmware-whence-20240603-143.1.el9_4.noarch.rpmZXiwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm[Xiwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpmaiwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm\4iwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm`Xiwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm^iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpmfSnetronome-firmware-20240603-143.1.el9_4.noarch.rpmV}iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpmYXiwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpmXXiwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpmcSlibertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpmWsiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpmdSlinux-firmware-20240603-143.1.el9_4.noarch.rpm_Xiwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm] iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpmb4iwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpmeSlinux-firmware-whence-20240603-143.1.el9_4.noarch.rpmZXiwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpmaF 3dBsecurityModerate: cups security update+_ https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776$Z cups-libs-2.3.3op2-27.el9_4.i686.rpm$Zcups-libs-2.3.3op2-27.el9_4.x86_64.rpm$Z cups-libs-2.3.3op2-27.el9_4.i686.rpm$Zcups-libs-2.3.3op2-27.el9_4.x86_64.rpmZG 4gBBBsecurityLow: python3 security update+0i,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 python3-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.i686.rpm python3-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.i686.rpm^H 5lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928Ikernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm$Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm#Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1+bpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm$Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm#Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1+bpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmQI 6MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,F4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363!Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1,bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm#Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm$Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm!Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1,bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm#Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm$Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm|J 7nBBBBBBBBsecurityModerate: curl security update+z(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529w? libcurl-minimal-7.76.1-29.el9_4.1.i686.rpmv? libcurl-7.76.1-29.el9_4.1.i686.rpmw?libcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm#?curl-minimal-7.76.1-29.el9_4.1.x86_64.rpm"?curl-7.76.1-29.el9_4.1.x86_64.rpmv?libcurl-7.76.1-29.el9_4.1.x86_64.rpmw? libcurl-minimal-7.76.1-29.el9_4.1.i686.rpmv? libcurl-7.76.1-29.el9_4.1.i686.rpmw?libcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm#?curl-minimal-7.76.1-29.el9_4.1.x86_64.rpm"?curl-7.76.1-29.el9_4.1.x86_64.rpmv?libcurl-7.76.1-29.el9_4.1.x86_64.rpm/K :xsecurityImportant: python-setuptools security update+,"xhttps://access.redhat.com/errata/RHSA-2024:5534RHSA-2024:5534RHSA-2024:5534https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5534.htmlALSA-2024:5534ALSA-2024:553488python3-setuptools-53.0.0-12.el9_4.1.noarch.rpm98python3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm88python3-setuptools-53.0.0-12.el9_4.1.noarch.rpm98python3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpmlL 8{BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928Kkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm!Kkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm$Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm#Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1-bpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm!Kkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm$Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm#Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1-bpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm*M securityModerate: python-urllib3 security update+2+https://access.redhat.com/errata/RHSA-2024:6162RHSA-2024:6162RHSA-2024:6162https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-6162.htmlALSA-2024:6162ALSA-2024:6162:opython3-urllib3-1.26.5-5.el9_4.1.noarch.rpm:opython3-urllib3-1.26.5-5.el9_4.1.noarch.rpmܝ7N 9^BBBsecurityModerate: python3.9 security update+]hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:61630 python3-libs-3.9.18-3.el9_4.5.i686.rpm python3-3.9.18-3.el9_4.5.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.5.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.5.i686.rpm python3-3.9.18-3.el9_4.5.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.5.x86_64.rpmO :cBBBBBBBBBBBBBBBsecurityModerate: krb5 security update+Ehttps://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166  krb5-libs-1.21.1-2.el9_4.i686.rpm_krb5-workstation-1.21.1-2.el9_4.x86_64.rpmkrb5-server-1.21.1-2.el9_4.x86_64.rpm  libkadm5-1.21.1-2.el9_4.i686.rpm krb5-server-1.21.1-2.el9_4.i686.rpmkrb5-libs-1.21.1-2.el9_4.x86_64.rpmkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm krb5-pkinit-1.21.1-2.el9_4.i686.rpm libkadm5-1.21.1-2.el9_4.x86_64.rpmkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm krb5-server-ldap-1.21.1-2.el9_4.i686.rpm  krb5-libs-1.21.1-2.el9_4.i686.rpm_krb5-workstation-1.21.1-2.el9_4.x86_64.rpmkrb5-server-1.21.1-2.el9_4.x86_64.rpm  libkadm5-1.21.1-2.el9_4.i686.rpm krb5-server-1.21.1-2.el9_4.i686.rpmkrb5-libs-1.21.1-2.el9_4.x86_64.rpmkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm krb5-pkinit-1.21.1-2.el9_4.i686.rpm libkadm5-1.21.1-2.el9_4.x86_64.rpmkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm krb5-server-ldap-1.21.1-2.el9_4.i686.rpm P ;tsecurityImportant: bubblewrap and flatpak security update+,KJhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356D}bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpmD}bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm`Q ZBsecurityModerate: expat security update+;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754c expat-2.5.0-2.el9_4.1.i686.rpmcexpat-2.5.0-2.el9_4.1.x86_64.rpmc expat-2.5.0-2.el9_4.1.i686.rpmcexpat-2.5.0-2.el9_4.1.x86_64.rpm1T ?]BBBsecurityModerate: openssl security update+IPhttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783n openssl-libs-3.0.7-28.el9_4.i686.rpm1nopenssl-3.0.7-28.el9_4.x86_64.rpmnopenssl-libs-3.0.7-28.el9_4.x86_64.rpmn openssl-libs-3.0.7-28.el9_4.i686.rpm1nopenssl-3.0.7-28.el9_4.x86_64.rpmnopenssl-libs-3.0.7-28.el9_4.x86_64.rpmQU bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997Mkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm$Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm#Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1/bpftool-7.3.0-427.37.1.el9_4.x86_64.rpm"Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpmMkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm$Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm#Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1/bpftool-7.3.0-427.37.1.el9_4.x86_64.rpm"Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm V CBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update+.*https://access.redhat.com/errata/RHSA-2024:7484RHSA-2024:7484RHSA-2024:7484https://access.redhat.com/security/cve/CVE-2023-20584CVE-2023-20584CVE-2023-20584https://access.redhat.com/security/cve/CVE-2023-31356CVE-2023-31356CVE-2023-31356https://bugzilla.redhat.com/23045832304583https://bugzilla.redhat.com/23045932304593https://errata.almalinux.org/9/ALSA-2024-7484.htmlALSA-2024:7484ALSA-2024:7484_Yiwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpmZYiwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpmXYiwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpmb5iwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpmWtiwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm\5iwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm] iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpmeTlinux-firmware-whence-20240905-143.3.el9_4.noarch.rpm^iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm[Yiwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpmaiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpmcTlibertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm`Yiwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpmfTnetronome-firmware-20240905-143.3.el9_4.noarch.rpmdTlinux-firmware-20240905-143.3.el9_4.noarch.rpmV~iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpmYYiwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm_Yiwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpmZYiwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpmXYiwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpmb5iwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpmWtiwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm\5iwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm] iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpmeTlinux-firmware-whence-20240905-143.3.el9_4.noarch.rpm^iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm[Yiwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpmaiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpmcTlibertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm`Yiwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpmfTnetronome-firmware-20240905-143.3.el9_4.noarch.rpmdTlinux-firmware-20240905-143.3.el9_4.noarch.rpmV~iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpmYYiwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpmyW UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+X<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162$Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm#Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm10bpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm"Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm$Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm#Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm10bpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm"Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm X vBBBsecurityModerate: python3.9 security update+\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 python3-3.9.18-3.el9_4.6.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.6.i686.rpm0 python3-libs-3.9.18-3.el9_4.6.x86_64.rpm python3-3.9.18-3.el9_4.6.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.6.i686.rpm0 python3-libs-3.9.18-3.el9_4.6.x86_64.rpmY {BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+p>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617Okernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm#Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm$Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm!Okernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm11bpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm#Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm$Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm!Okernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm11bpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmEZ \BBBBBBBBBBBBBBBBBsecurityLow: NetworkManager security update+0.jhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 > NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpmB NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm< NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm= NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpmA NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm NetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm: NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm; NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm? NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm@ NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm > NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpmB NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm< NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm= NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpmA NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm NetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm: NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm; NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm? NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm@ NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm%[ oBBBBBBsecurityLow: cockpit security update+02https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325F^cockpit-bridge-323.1-1.el9_5.x86_64.rpmI^cockpit-ws-323.1-1.el9_5.x86_64.rpmE^cockpit-323.1-1.el9_5.x86_64.rpmH^cockpit-system-323.1-1.el9_5.noarch.rpmG^cockpit-doc-323.1-1.el9_5.noarch.rpmF^cockpit-bridge-323.1-1.el9_5.x86_64.rpmI^cockpit-ws-323.1-1.el9_5.x86_64.rpmE^cockpit-323.1-1.el9_5.x86_64.rpmH^cockpit-system-323.1-1.el9_5.noarch.rpmG^cockpit-doc-323.1-1.el9_5.noarch.rpmK\ wBBBBBBBBBBBBBBBsecurityModerate: krb5 security update+J https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331  krb5-libs-1.21.1-3.el9.i686.rpm libkadm5-1.21.1-3.el9.x86_64.rpm krb5-server-1.21.1-3.el9.i686.rpmkrb5-server-ldap-1.21.1-3.el9.x86_64.rpmkrb5-libs-1.21.1-3.el9.x86_64.rpm krb5-pkinit-1.21.1-3.el9.i686.rpmkrb5-server-1.21.1-3.el9.x86_64.rpm krb5-server-ldap-1.21.1-3.el9.i686.rpmkrb5-pkinit-1.21.1-3.el9.x86_64.rpm  libkadm5-1.21.1-3.el9.i686.rpm_krb5-workstation-1.21.1-3.el9.x86_64.rpm  krb5-libs-1.21.1-3.el9.i686.rpm libkadm5-1.21.1-3.el9.x86_64.rpm krb5-server-1.21.1-3.el9.i686.rpmkrb5-server-ldap-1.21.1-3.el9.x86_64.rpmkrb5-libs-1.21.1-3.el9.x86_64.rpm krb5-pkinit-1.21.1-3.el9.i686.rpmkrb5-server-1.21.1-3.el9.x86_64.rpm krb5-server-ldap-1.21.1-3.el9.i686.rpmkrb5-pkinit-1.21.1-3.el9.x86_64.rpm  libkadm5-1.21.1-3.el9.i686.rpm_krb5-workstation-1.21.1-3.el9.x86_64.rpmh] HBBBsecurityLow: openssl security update+0UL https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:93331popenssl-3.2.2-6.el9_5.x86_64.rpmpopenssl-libs-3.2.2-6.el9_5.x86_64.rpmp openssl-libs-3.2.2-6.el9_5.i686.rpm1popenssl-3.2.2-6.el9_5.x86_64.rpmpopenssl-libs-3.2.2-6.el9_5.x86_64.rpmp openssl-libs-3.2.2-6.el9_5.i686.rpme^ MBBBsecurityModerate: python3.9 security update+!khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:93710 python3-libs-3.9.19-8.el9.i686.rpm0python3-libs-3.9.19-8.el9.x86_64.rpm python3-3.9.19-8.el9.x86_64.rpm0 python3-libs-3.9.19-8.el9.i686.rpm0python3-libs-3.9.19-8.el9.x86_64.rpm python3-3.9.19-8.el9.x86_64.rpm4_ securityModerate: microcode_ctl security update+ dhttps://access.redhat.com/errata/RHSA-2024:9401RHSA-2024:9401RHSA-2024:9401https://access.redhat.com/security/cve/CVE-2023-22655CVE-2023-22655CVE-2023-22655https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-38575CVE-2023-38575CVE-2023-38575https://access.redhat.com/security/cve/CVE-2023-39368CVE-2023-39368CVE-2023-39368https://access.redhat.com/security/cve/CVE-2023-43490CVE-2023-43490CVE-2023-43490https://access.redhat.com/security/cve/CVE-2023-45733CVE-2023-45733CVE-2023-45733https://access.redhat.com/security/cve/CVE-2023-46103CVE-2023-46103CVE-2023-46103https://bugzilla.redhat.com/22706982270698https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22707012270701https://bugzilla.redhat.com/22707032270703https://bugzilla.redhat.com/22707042270704https://bugzilla.redhat.com/22922962292296https://bugzilla.redhat.com/22923002292300https://errata.almalinux.org/9/ALSA-2024-9401.htmlALSA-2024:9401ALSA-2024:9401^microcode_ctl-20240910-1.el9_5.noarch.rpm^microcode_ctl-20240910-1.el9_5.noarch.rpm3`  TBsecurityModerate: libgcrypt security update+p https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:9404Flibgcrypt-1.10.0-11.el9.x86_64.rpmF libgcrypt-1.10.0-11.el9.i686.rpmFlibgcrypt-1.10.0-11.el9.x86_64.rpmF libgcrypt-1.10.0-11.el9.i686.rpmHa  WBsecurityLow: vim security update+0zthttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:9405Fpvim-filesystem-8.2.2637-21.el9.noarch.rpmspvim-minimal-8.2.2637-21.el9.x86_64.rpmFpvim-filesystem-8.2.2637-21.el9.noarch.rpmspvim-minimal-8.2.2637-21.el9.x86_64.rpmab  ZBBBsecurityModerate: bluez security update+n+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413 bluez-libs-5.72-2.el9.x86_64.rpm=bluez-5.72-2.el9.x86_64.rpm  bluez-libs-5.72-2.el9.i686.rpm bluez-libs-5.72-2.el9.x86_64.rpm=bluez-5.72-2.el9.x86_64.rpm  bluez-libs-5.72-2.el9.i686.rpmtc  securityModerate: python-dns security update+qhttps://access.redhat.com/errata/RHSA-2024:9423RHSA-2024:9423RHSA-2024:9423https://access.redhat.com/security/cve/CVE-2023-29483CVE-2023-29483CVE-2023-29483https://bugzilla.redhat.com/22745202274520https://errata.almalinux.org/9/ALSA-2024-9423.htmlALSA-2024:9423ALSA-2024:9423ypython3-dns-2.6.1-3.el9.noarch.rpmypython3-dns-2.6.1-3.el9.noarch.rpm0d #asecurityLow: tpm2-tools security update+0 'https://access.redhat.com/errata/RHSA-2024:9424RHSA-2024:9424RHSA-2024:9424https://access.redhat.com/security/cve/CVE-2024-29038CVE-2024-29038CVE-2024-29038https://access.redhat.com/security/cve/CVE-2024-29039CVE-2024-29039CVE-2024-29039https://bugzilla.redhat.com/22780712278071https://bugzilla.redhat.com/22780752278075https://errata.almalinux.org/9/ALSA-2024-9424.htmlALSA-2024:9424ALSA-2024:9424ftpm2-tools-5.2-4.el9.x86_64.rpmftpm2-tools-5.2-4.el9.x86_64.rpm5e &dsecurityLow: nano security update+01Ahttps://access.redhat.com/errata/RHSA-2024:9430RHSA-2024:9430RHSA-2024:9430https://access.redhat.com/security/cve/CVE-2024-5742CVE-2024-5742CVE-2024-5742https://bugzilla.redhat.com/22785742278574https://errata.almalinux.org/9/ALSA-2024-9430.htmlALSA-2024:9430ALSA-2024:9430Mnano-5.6.1-6.el9.x86_64.rpmMnano-5.6.1-6.el9.x86_64.rpm5f  gsecurityImportant: bubblewrap and flatpak security update+,rRhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449D~bubblewrap-0.4.1-8.el9_5.x86_64.rpmD~bubblewrap-0.4.1-8.el9_5.x86_64.rpm6g  iBBBsecurityModerate: python3.9 security update+D\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:94680 python3-libs-3.9.19-8.el9_5.1.i686.rpm python3-3.9.19-8.el9_5.1.x86_64.rpm0python3-libs-3.9.19-8.el9_5.1.x86_64.rpm0 python3-libs-3.9.19-8.el9_5.1.i686.rpm python3-3.9.19-8.el9_5.1.x86_64.rpm0python3-libs-3.9.19-8.el9_5.1.x86_64.rpmh nBsecurityLow: cups security update+0 )https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470$[ cups-libs-2.3.3op2-31.el9_5.i686.rpm$[cups-libs-2.3.3op2-31.el9_5.x86_64.rpm$[ cups-libs-2.3.3op2-31.el9_5.i686.rpm$[cups-libs-2.3.3op2-31.el9_5.x86_64.rpmSi qBBBBBBBBBBBBBBBsecurityImportant: krb5 security update+,IShttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474  krb5-server-ldap-1.21.1-4.el9_5.i686.rpmkrb5-pkinit-1.21.1-4.el9_5.x86_64.rpmkrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm krb5-server-1.21.1-4.el9_5.i686.rpmkrb5-libs-1.21.1-4.el9_5.x86_64.rpmkrb5-server-1.21.1-4.el9_5.x86_64.rpm krb5-libs-1.21.1-4.el9_5.i686.rpm krb5-pkinit-1.21.1-4.el9_5.i686.rpm  libkadm5-1.21.1-4.el9_5.i686.rpm_krb5-workstation-1.21.1-4.el9_5.x86_64.rpm libkadm5-1.21.1-4.el9_5.x86_64.rpm  krb5-server-ldap-1.21.1-4.el9_5.i686.rpmkrb5-pkinit-1.21.1-4.el9_5.x86_64.rpmkrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm krb5-server-1.21.1-4.el9_5.i686.rpmkrb5-libs-1.21.1-4.el9_5.x86_64.rpmkrb5-server-1.21.1-4.el9_5.x86_64.rpm krb5-libs-1.21.1-4.el9_5.i686.rpm krb5-pkinit-1.21.1-4.el9_5.i686.rpm  libkadm5-1.21.1-4.el9_5.i686.rpm_krb5-workstation-1.21.1-4.el9_5.x86_64.rpm libkadm5-1.21.1-4.el9_5.x86_64.rpmQj BBsecurityModerate: expat security update+Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541dexpat-2.5.0-3.el9_5.1.x86_64.rpmd expat-2.5.0-3.el9_5.1.i686.rpmdexpat-2.5.0-3.el9_5.1.x86_64.rpmd expat-2.5.0-3.el9_5.1.i686.rpmUk EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+c'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:96053kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm*3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm12bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm$3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm#3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm*3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm12bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm$3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm#3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpmFl hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%, https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:00597kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm16bpftool-7.4.0-503.21.1.el9_5.x86_64.rpm"7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm#7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm$7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm*7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm16bpftool-7.4.0-503.21.1.el9_5.x86_64.rpm"7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm#7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm$7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm*7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm>m KsecurityImportant: rsync security update%,8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324?rsync-3.2.3-20.el9_5.1.x86_64.rpm?rsync-3.2.3-20.el9_5.1.x86_64.rpmdn MBBBBBBBBBBBBBBBBBsecurityModerate: Security and bug fixes for NetworkManager%LLhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 B NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpmA NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm? NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm; NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm< NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm@ NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm> NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm= NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm: NetworkManager-1.48.10-5.el9_5.x86_64.rpm B NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpmA NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm? NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm; NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm< NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm@ NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm> NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm= NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm: NetworkManager-1.48.10-5.el9_5.x86_64.rpm(o `BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%Ehttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578!8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm$8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm"8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm17bpftool-7.4.0-503.22.1.el9_5.x86_64.rpm#8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm*8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm!8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm$8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm"8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm17bpftool-7.4.0-503.22.1.el9_5.x86_64.rpm#8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm*8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpmՕ/p CBBBsecurityModerate: bzip2 security update%]https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925?hbzip2-1.0.8-10.el9_5.x86_64.rpm h bzip2-libs-1.0.8-10.el9_5.i686.rpm hbzip2-libs-1.0.8-10.el9_5.x86_64.rpm?hbzip2-1.0.8-10.el9_5.x86_64.rpm h bzip2-libs-1.0.8-10.el9_5.i686.rpm hbzip2-libs-1.0.8-10.el9_5.x86_64.rpmq HBBBsecurityImportant: python3.9 security update%,ng https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 python3-3.9.21-2.el9_6.1.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.1.i686.rpm0python3-libs-3.9.21-2.el9_6.1.x86_64.rpm python3-3.9.21-2.el9_6.1.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.1.i686.rpm0python3-libs-3.9.21-2.el9_6.1.x86_64.rpmÓlr MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,U] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379Xkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm$Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm*Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm#Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm"Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm$Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm*Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm#Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm"Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmÿs .lsecurityModerate: python-setuptools security update%2Jhttps://access.redhat.com/errata/RHSA-2025:10407RHSA-2025:10407RHSA-2025:10407https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-10407.htmlALSA-2025:10407ALSA-2025:1040799python3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm89python3-setuptools-53.0.0-13.el9_6.1.noarch.rpm99python3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm89python3-setuptools-53.0.0-13.el9_6.1.noarch.rpmó`t 2oBsecurityModerate: jq security update%| https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585Vjq-1.6-17.el9_6.2.x86_64.rpmV jq-1.6-17.el9_6.2.i686.rpmVjq-1.6-17.el9_6.2.x86_64.rpmV jq-1.6-17.el9_6.2.i686.rpmþCu sBBBsecurityImportant: libxml2 security update%,Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699wlibxml2-2.9.13-10.el9_6.x86_64.rpmAwpython3-libxml2-2.9.13-10.el9_6.x86_64.rpmw libxml2-2.9.13-10.el9_6.i686.rpmwlibxml2-2.9.13-10.el9_6.x86_64.rpmAwpython3-libxml2-2.9.13-10.el9_6.x86_64.rpmw libxml2-2.9.13-10.el9_6.i686.rpmþ#v xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%Rhttps://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837Ykernel-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm"Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm$Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm*Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm#Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpm!Ykernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm"Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm$Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm*Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm#Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpm!Ykernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmpw WBsecurityModerate: glib2 security update%fhttps://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140Nj glib2-2.68.4-16.el9_6.2.i686.rpmNjglib2-2.68.4-16.el9_6.2.x86_64.rpmNj glib2-2.68.4-16.el9_6.2.i686.rpmNjglib2-2.68.4-16.el9_6.2.x86_64.rpm޽.x ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,jVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411*Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm"Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm!Zkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm$Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm#Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpm*Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm"Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm!Zkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm$Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm#Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpmĂVy yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%@https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861[kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm*[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm[kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm$[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-5.14.0-570.30.1.el9_6.x86_64.rpm#[kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm![kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm"[kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm*[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm[kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm$[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-5.14.0-570.30.1.el9_6.x86_64.rpm#[kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm![kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm"[kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpmį+z XBsecurityImportant: sqlite security update%,N https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992Rwsqlite-libs-3.34.1-8.el9_6.x86_64.rpmRw sqlite-libs-3.34.1-8.el9_6.i686.rpmRwsqlite-libs-3.34.1-8.el9_6.x86_64.rpmRw sqlite-libs-3.34.1-8.el9_6.i686.rpmĢ{ [BsecurityModerate: icu security update%Whttps://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083 libicu-67.1-10.el9_6.i686.rpm libicu-67.1-10.el9_6.x86_64.rpm libicu-67.1-10.el9_6.i686.rpm libicu-67.1-10.el9_6.x86_64.rpmħG|  ^BBBsecurityImportant: libxml2 security update%,i!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447x libxml2-2.9.13-11.el9_6.i686.rpmxlibxml2-2.9.13-11.el9_6.x86_64.rpmAxpython3-libxml2-2.9.13-11.el9_6.x86_64.rpmx libxml2-2.9.13-11.el9_6.i686.rpmxlibxml2-2.9.13-11.el9_6.x86_64.rpmAxpython3-libxml2-2.9.13-11.el9_6.x86_64.rpmijy} !#securityModerate: python-requests security update% Rhttps://access.redhat.com/errata/RHSA-2025:12519RHSA-2025:12519RHSA-2025:12519https://access.redhat.com/security/cve/CVE-2024-47081CVE-2024-47081CVE-2024-47081https://bugzilla.redhat.com/23712722371272https://errata.almalinux.org/9/ALSA-2025-12519.htmlALSA-2025:12519ALSA-2025:125197vpython3-requests-2.25.1-10.el9_6.noarch.rpm7vpython3-requests-2.25.1-10.el9_6.noarch.rpmf~ "dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,\https://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262$9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm18bpftool-7.4.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm!9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm*9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm"9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm#9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm$9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm18bpftool-7.4.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm!9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm*9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm"9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm#9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm #GBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,yohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746\kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm*\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm$\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm"\kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm#\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm!\kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm\kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm*\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm$\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm"\kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm#\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm!\kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm\kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpmҚ $fBBBsecurityImportant: openssl security update%,hqhttps://access.redhat.com/errata/RHSA-2025:1330RHSA-2025:1330RHSA-2025:1330https://access.redhat.com/security/cve/CVE-2024-12797CVE-2024-12797CVE-2024-12797https://bugzilla.redhat.com/23427572342757https://errata.almalinux.org/9/ALSA-2025-1330.htmlALSA-2025:1330ALSA-2025:1330q openssl-libs-3.2.2-6.el9_5.1.i686.rpm1qopenssl-3.2.2-6.el9_5.1.x86_64.rpmqopenssl-libs-3.2.2-6.el9_5.1.x86_64.rpmq openssl-libs-3.2.2-6.el9_5.1.i686.rpm1qopenssl-3.2.2-6.el9_5.1.x86_64.rpmqopenssl-libs-3.2.2-6.el9_5.1.x86_64.rpm\ %kBBBsecurityModerate: libxml2 security update%Yhttps://access.redhat.com/errata/RHSA-2025:13428RHSA-2025:13428RHSA-2025:13428https://access.redhat.com/security/cve/CVE-2025-32414CVE-2025-32414CVE-2025-32414https://access.redhat.com/security/cve/CVE-2025-32415CVE-2025-32415CVE-2025-32415https://bugzilla.redhat.com/23581212358121https://bugzilla.redhat.com/23607682360768https://errata.almalinux.org/9/ALSA-2025-13428.htmlALSA-2025:13428ALSA-2025:13428Aypython3-libxml2-2.9.13-12.el9_6.x86_64.rpmylibxml2-2.9.13-12.el9_6.x86_64.rpmy libxml2-2.9.13-12.el9_6.i686.rpmAypython3-libxml2-2.9.13-12.el9_6.x86_64.rpmylibxml2-2.9.13-12.el9_6.x86_64.rpmy libxml2-2.9.13-12.el9_6.i686.rpmԼ> &pBBBBBBBBBBBBBBBBsecurityModerate: gcc security update%nKhttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346  libgomp-11.5.0-5.el9_5.alma.1.i686.rpm$ libstdc++-11.5.0-5.el9_5.alma.1.i686.rpmlibgomp-11.5.0-5.el9_5.alma.1.x86_64.rpmlibgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm libgcc-11.5.0-5.el9_5.alma.1.i686.rpm libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm libatomic-11.5.0-5.el9_5.alma.1.i686.rpmlibgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm$libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpmlibatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm!libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm! libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm  libgomp-11.5.0-5.el9_5.alma.1.i686.rpm$ libstdc++-11.5.0-5.el9_5.alma.1.i686.rpmlibgomp-11.5.0-5.el9_5.alma.1.x86_64.rpmlibgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm libgcc-11.5.0-5.el9_5.alma.1.i686.rpm libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm libatomic-11.5.0-5.el9_5.alma.1.i686.rpmlibgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm$libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpmlibatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm!libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm! libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm 'BBBBsecurityImportant: libxml2 security update%,9~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350Apython3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm libxml2-2.9.13-6.el9_5.1.i686.rpmlibxml2-2.9.13-6.el9_5.1.x86_64.rpmApython3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm libxml2-2.9.13-6.el9_5.1.i686.rpmlibxml2-2.9.13-6.el9_5.1.x86_64.rpm  (GBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%7Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm#]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm*]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm$]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm#]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm*]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm$]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm )fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962"^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm*^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm#^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm$^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm"^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm*^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm#^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm$^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpmŠ  *EBsecurityImportant: libarchive security update%,}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130O{libarchive-3.5.3-6.el9_6.x86_64.rpmO{ libarchive-3.5.3-6.el9_6.i686.rpmO{libarchive-3.5.3-6.el9_6.x86_64.rpmO{ libarchive-3.5.3-6.el9_6.i686.rpmŗl +HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%, !https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm*_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm$_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm#_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm*_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm$_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm#_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpmŻv ,gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,.https://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm#`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm$`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm*`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm#`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm$`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm*`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm'  -FBBBsecurityModerate: python3.9 security update%E;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019 python3-3.9.21-2.el9_6.2.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.2.i686.rpm0python3-libs-3.9.21-2.el9_6.2.x86_64.rpm python3-3.9.21-2.el9_6.2.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.2.i686.rpm0python3-libs-3.9.21-2.el9_6.2.x86_64.rpm   .KBsecurityImportant: pam security update%,phttps://access.redhat.com/errata/RHSA-2025:15099RHSA-2025:15099RHSA-2025:15099https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://access.redhat.com/security/cve/CVE-2025-8941CVE-2025-8941CVE-2025-8941https://bugzilla.redhat.com/23725122372512https://bugzilla.redhat.com/23882202388220https://errata.almalinux.org/9/ALSA-2025-15099.htmlALSA-2025:15099ALSA-2025:150994Spam-1.5.1-26.el9_6.x86_64.rpm4S pam-1.5.1-26.el9_6.i686.rpm4Spam-1.5.1-26.el9_6.x86_64.rpm4S pam-1.5.1-26.el9_6.i686.rpm  /NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,pWhttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429akernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm$akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm#akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm*akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm$akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm#akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm*akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmƟ+  0mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,G https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661#bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm$bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm*bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpm!bkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm#bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm$bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm*bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpm!bkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpmƤU  1LBsecurityImportant: cups security update%,a https://access.redhat.com/errata/RHSA-2025:15700RHSA-2025:15700RHSA-2025:15700https://access.redhat.com/security/cve/CVE-2025-58060CVE-2025-58060CVE-2025-58060https://access.redhat.com/security/cve/CVE-2025-58364CVE-2025-58364CVE-2025-58364https://bugzilla.redhat.com/23925952392595https://bugzilla.redhat.com/23930782393078https://errata.almalinux.org/9/ALSA-2025-15700.htmlALSA-2025:15700ALSA-2025:15700$\cups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm$\ cups-libs-2.3.3op2-33.el9_6.1.i686.rpm$\cups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm$\ cups-libs-2.3.3op2-33.el9_6.1.i686.rpmS 2OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%nhttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740*ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm$ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm#ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm"ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm*ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm$ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm#ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm"ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmԃP 0nsecurityModerate: python-cryptography security update%nLhttps://access.redhat.com/errata/RHSA-2025:15874RHSA-2025:15874RHSA-2025:15874https://access.redhat.com/security/cve/CVE-2023-49083CVE-2023-49083CVE-2023-49083https://bugzilla.redhat.com/22553312255331https://errata.almalinux.org/9/ALSA-2025-15874.htmlALSA-2025:15874ALSA-2025:15874`python3-cryptography-36.0.1-5.el9_6.x86_64.rpm`python3-cryptography-36.0.1-5.el9_6.x86_64.rpmƯ# 3qBsecurityModerate: gnutls security, bug fix, and enhancement update%: https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116!gnutls-3.8.3-6.el9_6.2.x86_64.rpm! gnutls-3.8.3-6.el9_6.2.i686.rpm!gnutls-3.8.3-6.el9_6.2.x86_64.rpm! gnutls-3.8.3-6.el9_6.2.i686.rpm  4tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%K https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398dkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm#dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm*dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm$dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm#dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm*dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm$dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmr 5SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%Rhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:16592:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm*:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm19bpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm#:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm$:kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm2:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm*:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm19bpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm#:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm$:kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpmJ 6vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%ci https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880ekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm#ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm$ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm*ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm!ekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm#ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm$ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm*ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm!ekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmM 7UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%LFhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377fkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm*fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm$fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm#fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmfkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm*fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm$fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm#fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmǝU 8tsecurityModerate: iputils security update%ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558Riputils-20210202-11.el9_6.3.x86_64.rpmRiputils-20210202-11.el9_6.3.x86_64.rpmDz^ 9vBsecurityModerate: vim security update%yzhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742srvim-minimal-8.2.2637-22.el9_6.1.x86_64.rpmFrvim-filesystem-8.2.2637-22.el9_6.1.noarch.rpmsrvim-minimal-8.2.2637-22.el9_6.1.x86_64.rpmFrvim-filesystem-8.2.2637-22.el9_6.1.noarch.rpmǹ  :yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%sd https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760gkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm*gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm#gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm$gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm*gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm#gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm$gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm¿7 ;XBBsecurityModerate: libssh security update%W https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:182753*libssh-0.10.4-15.el9_6.x86_64.rpm}*libssh-config-0.10.4-15.el9_6.noarch.rpm3* libssh-0.10.4-15.el9_6.i686.rpm3*libssh-0.10.4-15.el9_6.x86_64.rpm}*libssh-config-0.10.4-15.el9_6.noarch.rpm3* libssh-0.10.4-15.el9_6.i686.rpm  <\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%bhttps://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281hkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm#hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm*hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm$hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm#hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm*hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm$hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpm  ={BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%whttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409ikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm*ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm#ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm$ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm*ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm#ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm$ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmȷ  >ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%{9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930jkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm"jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm$jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm*jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm#jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm"jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm$jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm*jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm#jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmѴE ?yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%4Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396ukernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm*ukernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm"ukernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-5.14.0-611.5.1.el9_7.x86_64.rpm#ukernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm$ukernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm!ukernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-core-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm*ukernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm"ukernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-5.14.0-611.5.1.el9_7.x86_64.rpm#ukernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm$ukernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm!ukernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpmukernel-core-5.14.0-611.5.1.el9_7.x86_64.rpmF *XBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update% Mhttps://access.redhat.com/errata/RHSA-2025:20532RHSA-2025:20532RHSA-2025:20532https://access.redhat.com/security/cve/CVE-2024-45777CVE-2024-45777CVE-2024-45777https://bugzilla.redhat.com/23463432346343https://errata.almalinux.org/9/ALSA-2025-20532.htmlALSA-2025:20532ALSA-2025:20532 Cgrub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpmjgrub2-pc-2.06-114.el9_7.alma.1.x86_64.rpmDgrub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpmBgrub2-common-2.06-114.el9_7.alma.1.noarch.rpmigrub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpmhgrub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpmEgrub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpmkgrub2-tools-2.06-114.el9_7.alma.1.x86_64.rpmngrub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm Cgrub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpmjgrub2-pc-2.06-114.el9_7.alma.1.x86_64.rpmDgrub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpmBgrub2-common-2.06-114.el9_7.alma.1.noarch.rpmigrub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpmhgrub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpmEgrub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpmkgrub2-tools-2.06-114.el9_7.alma.1.x86_64.rpmngrub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpmR 0kBBBsecurityLow: shadow-utils security update%0Yhttps://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559gshadow-utils-4.9-15.el9.x86_64.rpm&shadow-utils-subid-4.9-15.el9.x86_64.rpm& shadow-utils-subid-4.9-15.el9.i686.rpmgshadow-utils-4.9-15.el9.x86_64.rpm&shadow-utils-subid-4.9-15.el9.x86_64.rpm& shadow-utils-subid-4.9-15.el9.i686.rpm qBsecurityImportant: sqlite security update%,` https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936Rxsqlite-libs-3.34.1-9.el9_7.x86_64.rpmRx sqlite-libs-3.34.1-9.el9_7.i686.rpmRxsqlite-libs-3.34.1-9.el9_7.x86_64.rpmRx sqlite-libs-3.34.1-9.el9_7.i686.rpm  tBBsecurityModerate: libssh security update%i https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:209433+libssh-0.10.4-15.el9_7.x86_64.rpm}+libssh-config-0.10.4-15.el9_7.noarch.rpm3+ libssh-0.10.4-15.el9_7.i686.rpm3+libssh-0.10.4-15.el9_7.x86_64.rpm}+libssh-config-0.10.4-15.el9_7.noarch.rpm3+ libssh-0.10.4-15.el9_7.i686.rpmC! xBsecurityModerate: vim security update%tzhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945ssvim-minimal-8.2.2637-23.el9_7.x86_64.rpmFsvim-filesystem-8.2.2637-23.el9_7.noarch.rpmssvim-minimal-8.2.2637-23.el9_7.x86_64.rpmFsvim-filesystem-8.2.2637-23.el9_7.noarch.rpmT" {BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: sssd security update%,n/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954#i sssd-2.9.7-4.el9_7.1.x86_64.rpmt sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpmn sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpmm sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpmw sssd-tools-2.9.7-4.el9_7.1.x86_64.rpmv sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpma python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpmc python3-sss-2.9.7-4.el9_7.1.x86_64.rpm' sssd-client-2.9.7-4.el9_7.1.x86_64.rpmp sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpmb python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpmo sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpmk sssd-common-2.9.7-4.el9_7.1.x86_64.rpml sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm] libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpme python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm libipa_hbac-2.9.7-4.el9_7.1.i686.rpmu sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpmd python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpmr sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm! libsss_idmap-2.9.7-4.el9_7.1.i686.rpm# libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpmx sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm# libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpmq sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpmj sssd-ad-2.9.7-4.el9_7.1.x86_64.rpms sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm" libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm' sssd-client-2.9.7-4.el9_7.1.i686.rpm\ libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm" libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm libsss_certmap-2.9.7-4.el9_7.1.i686.rpm! libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm#i sssd-2.9.7-4.el9_7.1.x86_64.rpmt sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpmn sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpmm sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpmw sssd-tools-2.9.7-4.el9_7.1.x86_64.rpmv sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpma python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpmc python3-sss-2.9.7-4.el9_7.1.x86_64.rpm' sssd-client-2.9.7-4.el9_7.1.x86_64.rpmp sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpmb python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpmo sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpmk sssd-common-2.9.7-4.el9_7.1.x86_64.rpml sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm] libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpme python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm libipa_hbac-2.9.7-4.el9_7.1.i686.rpmu sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpmd python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpmr sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm! libsss_idmap-2.9.7-4.el9_7.1.i686.rpm# libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpmx sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm# libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpmq sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpmj sssd-ad-2.9.7-4.el9_7.1.x86_64.rpms sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm" libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm' sssd-client-2.9.7-4.el9_7.1.i686.rpm\ libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm" libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm libsss_certmap-2.9.7-4.el9_7.1.i686.rpm! libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpmɵ# zBBBsecurityModerate: openssl security update%Zhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255ropenssl-libs-3.5.1-4.el9_7.x86_64.rpm1ropenssl-3.5.1-4.el9_7.x86_64.rpmr openssl-libs-3.5.1-4.el9_7.i686.rpmropenssl-libs-3.5.1-4.el9_7.x86_64.rpm1ropenssl-3.5.1-4.el9_7.x86_64.rpmr openssl-libs-3.5.1-4.el9_7.i686.rpmɵs$ BsecurityModerate: kernel security update%whttps://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpmkernel-5.14.0-611.9.1.el9_7.x86_64.rpmkernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpmkernel-5.14.0-611.9.1.el9_7.x86_64.rpmɵ=% BBsecurityImportant: expat security update%,v&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175g expat-2.5.0-5.el9_7.1.i686.rpmgexpat-2.5.0-5.el9_7.1.x86_64.rpmg expat-2.5.0-5.el9_7.1.i686.rpmgexpat-2.5.0-5.el9_7.1.x86_64.rpm& EBBBsecurityModerate: libxml2 security update%,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376z libxml2-2.9.13-14.el9_7.i686.rpmzlibxml2-2.9.13-14.el9_7.x86_64.rpmAzpython3-libxml2-2.9.13-14.el9_7.x86_64.rpmz libxml2-2.9.13-14.el9_7.i686.rpmzlibxml2-2.9.13-14.el9_7.x86_64.rpmAzpython3-libxml2-2.9.13-14.el9_7.x86_64.rpm' JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%H;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405#kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm$kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm!kkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm*kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm#kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm$kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm!kkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm*kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpmۅm(  iBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update%)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660 Ssystemd-252-55.el9_7.7.alma.1.x86_64.rpmUsystemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm5systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpmS systemd-252-55.el9_7.7.alma.1.i686.rpmTsystemd-container-252-55.el9_7.7.alma.1.x86_64.rpmT systemd-container-252-55.el9_7.7.alma.1.i686.rpmgsystemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpmU systemd-libs-252-55.el9_7.7.alma.1.i686.rpmfrhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm3systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm6systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm4systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm Ssystemd-252-55.el9_7.7.alma.1.x86_64.rpmUsystemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm5systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpmS systemd-252-55.el9_7.7.alma.1.i686.rpmTsystemd-container-252-55.el9_7.7.alma.1.x86_64.rpmT systemd-container-252-55.el9_7.7.alma.1.i686.rpmgsystemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpmU systemd-libs-252-55.el9_7.7.alma.1.i686.rpmfrhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm3systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm6systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm4systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpmƗC)  |BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%,Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865lkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm#lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm*lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm$lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm#lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm*lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm$lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmʊ *  [BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241*mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm#mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm$mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm"mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm*mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm#mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm$mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm"mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm"+  zBBBsecurityModerate: python3.9 security update%Lx https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342 python3-3.9.25-2.el9_7.x86_64.rpm0 python3-libs-3.9.25-2.el9_7.i686.rpm0python3-libs-3.9.25-2.el9_7.x86_64.rpm python3-3.9.25-2.el9_7.x86_64.rpm0 python3-libs-3.9.25-2.el9_7.i686.rpm0python3-libs-3.9.25-2.el9_7.x86_64.rpmʥp,  BBBsecurityModerate: binutils security update%Dhttps://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343Cvbinutils-gold-2.35.2-67.el9_7.1.x86_64.rpmv binutils-2.35.2-67.el9_7.1.i686.rpmvbinutils-2.35.2-67.el9_7.1.x86_64.rpmCvbinutils-gold-2.35.2-67.el9_7.1.x86_64.rpmv binutils-2.35.2-67.el9_7.1.i686.rpmvbinutils-2.35.2-67.el9_7.1.x86_64.rpmʥj- DBBBBBBsecurityModerate: openssh security update%_whttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480pgopenssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpmrgopenssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpmogopenssh-8.7p1-47.el9_7.alma.1.x86_64.rpmqgopenssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpmpgopenssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpmrgopenssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpmogopenssh-8.7p1-47.el9_7.alma.1.x86_64.rpmqgopenssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpmʡ. LBBsecurityModerate: libssh security update%V&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:234833,libssh-0.10.4-17.el9_7.x86_64.rpm},libssh-config-0.10.4-17.el9_7.noarch.rpm3, libssh-0.10.4-17.el9_7.i686.rpm3,libssh-0.10.4-17.el9_7.x86_64.rpm},libssh-config-0.10.4-17.el9_7.noarch.rpm3, libssh-0.10.4-17.el9_7.i686.rpmʡ / PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,|9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm1:bpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm*;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm#;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm$;kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm1:bpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm*;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm#;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm$;kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpmR0 sBBBsecurityImportant: libxml2 security update%,5Phttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679libxml2-2.9.13-6.el9_5.2.x86_64.rpmApython3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm libxml2-2.9.13-6.el9_5.2.i686.rpmlibxml2-2.9.13-6.el9_5.2.x86_64.rpmApython3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm libxml2-2.9.13-6.el9_5.2.i686.rpmʏW1  xBBBBBBBBBBBBBBBBBsecurityImportant: grub2 security update%,7https://access.redhat.com/errata/RHSA-2025:2867RHSA-2025:2867RHSA-2025:2867https://access.redhat.com/security/cve/CVE-2025-0624CVE-2025-0624CVE-2025-0624https://bugzilla.redhat.com/23461122346112https://errata.almalinux.org/9/ALSA-2025-2867.htmlALSA-2025:2867ALSA-2025:2867 kgrub2-tools-2.06-94.el9_5.alma.1.x86_64.rpmEgrub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpmUgrub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpmhgrub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpmDgrub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpmjgrub2-pc-2.06-94.el9_5.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpmigrub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpmBgrub2-common-2.06-94.el9_5.alma.1.noarch.rpmngrub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpmCgrub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm kgrub2-tools-2.06-94.el9_5.alma.1.x86_64.rpmEgrub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpmUgrub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpmhgrub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpmDgrub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpmjgrub2-pc-2.06-94.el9_5.alma.1.x86_64.rpmlgrub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpmigrub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpmmgrub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpmBgrub2-common-2.06-94.el9_5.alma.1.noarch.rpmngrub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpmCgrub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpmK2 LBsecurityModerate: expat security update%glibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpmmglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpmxglibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpmuglibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpmzglibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpmkglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm% glibc-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpmvglibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpmXglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm]glibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpmaglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpmfglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm& glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpmMnscd-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpmcglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpmeglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpmbglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpm[glibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpmwglibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpmZglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm'libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm}glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpmsglibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm' libnsl-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpm\glibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpm{glibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpmjglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpmrglibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpmoglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpmgglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpmlglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpmqglibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm~glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpmiglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm`glibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm^glibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpmhglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpm|glibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpmnglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm_glibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpmYglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpmP*glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpmdglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpmyglibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-2.34-125.el9_5.8.alma.1.x86_64.rpmtglibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpmmglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpmxglibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpmuglibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpmzglibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpmkglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm% glibc-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpmvglibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpmXglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm]glibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpmaglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpmfglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm& glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpmMnscd-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpmcglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpmeglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpmbglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpm[glibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpmwglibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpmZglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm'libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm}glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpmsglibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm' libnsl-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpm\glibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpm{glibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpmjglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpmrglibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpmoglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpmgglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpmlglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpmqglibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm~glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpmiglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm`glibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm^glibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpmhglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpm|glibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpmnglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm_glibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpmYglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpmr5 MBBBsecurityModerate: python3.9 security update%r[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:69770 python3-libs-3.9.21-2.el9.i686.rpm python3-3.9.21-2.el9.x86_64.rpm0python3-libs-3.9.21-2.el9.x86_64.rpm0 python3-libs-3.9.21-2.el9.i686.rpm python3-3.9.21-2.el9.x86_64.rpm0python3-libs-3.9.21-2.el9.x86_64.rpmÔp6 $RBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update%M https://access.redhat.com/errata/RHSA-2025:6990RHSA-2025:6990RHSA-2025:6990https://access.redhat.com/security/cve/CVE-2024-45774CVE-2024-45774CVE-2024-45774https://access.redhat.com/security/cve/CVE-2024-45775CVE-2024-45775CVE-2024-45775https://access.redhat.com/security/cve/CVE-2024-45776CVE-2024-45776CVE-2024-45776https://access.redhat.com/security/cve/CVE-2024-45781CVE-2024-45781CVE-2024-45781https://access.redhat.com/security/cve/CVE-2024-45783CVE-2024-45783CVE-2024-45783https://access.redhat.com/security/cve/CVE-2025-0622CVE-2025-0622CVE-2025-0622https://access.redhat.com/security/cve/CVE-2025-0677CVE-2025-0677CVE-2025-0677https://access.redhat.com/security/cve/CVE-2025-0690CVE-2025-0690CVE-2025-0690https://bugzilla.redhat.com/23374612337461https://bugzilla.redhat.com/23374812337481https://bugzilla.redhat.com/23391822339182https://bugzilla.redhat.com/23458572345857https://bugzilla.redhat.com/23458632345863https://bugzilla.redhat.com/23458652345865https://bugzilla.redhat.com/23461162346116https://bugzilla.redhat.com/23461232346123https://errata.almalinux.org/9/ALSA-2025-6990.htmlALSA-2025:6990ALSA-2025:6990 B grub2-common-2.06-104.el9_6.alma.1.noarch.rpmj grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpml grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpmh grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpmn grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpmC grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpmi grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpmm grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpmD grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpmk grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpmE grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm B grub2-common-2.06-104.el9_6.alma.1.noarch.rpmj grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpml grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpmh grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpmn grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpmC grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpmi grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpmm grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpmD grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpmk grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpmE grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpmÔ|7 eBBBBBBsecurityModerate: openssh security update%mhttps://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993ofopenssh-8.7p1-45.el9.x86_64.rpmrfopenssh-server-8.7p1-45.el9.x86_64.rpmpfopenssh-clients-8.7p1-45.el9.x86_64.rpmqfopenssh-keycat-8.7p1-45.el9.x86_64.rpmofopenssh-8.7p1-45.el9.x86_64.rpmrfopenssh-server-8.7p1-45.el9.x86_64.rpmpfopenssh-clients-8.7p1-45.el9.x86_64.rpmqfopenssh-keycat-8.7p1-45.el9.x86_64.rpm‡|8 .-securityModerate: microcode_ctl security update%mLhttps://access.redhat.com/errata/RHSA-2025:7043RHSA-2025:7043RHSA-2025:7043https://access.redhat.com/security/cve/CVE-2024-28047CVE-2024-28047CVE-2024-28047https://access.redhat.com/security/cve/CVE-2024-31157CVE-2024-31157CVE-2024-31157https://access.redhat.com/security/cve/CVE-2024-39279CVE-2024-39279CVE-2024-39279https://bugzilla.redhat.com/23453632345363https://bugzilla.redhat.com/23453812345381https://bugzilla.redhat.com/23454212345421https://errata.almalinux.org/9/ALSA-2025-7043.htmlALSA-2025:7043ALSA-2025:7043^microcode_ctl-20250211-1.el9_6.noarch.rpm^microcode_ctl-20250211-1.el9_6.noarch.rpmÔ9 /securityModerate: python-requests security update%9`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:70497xpython3-requests-2.25.1-9.el9.noarch.rpm7xpython3-requests-2.25.1-9.el9.noarch.rpmÔ": psecurityModerate: rsync security update%`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050?rsync-3.2.5-3.el9.x86_64.rpm?rsync-3.2.5-3.el9.x86_64.rpmÔ+; 4rsecurityModerate: iptraf-ng security update%yHhttps://access.redhat.com/errata/RHSA-2025:7064RHSA-2025:7064RHSA-2025:7064https://access.redhat.com/security/cve/CVE-2024-52949CVE-2024-52949CVE-2024-52949https://bugzilla.redhat.com/23327022332702https://errata.almalinux.org/9/ALSA-2025-7064.htmlALSA-2025:7064ALSA-2025:7064Giptraf-ng-1.2.2-1.el9.x86_64.rpmGiptraf-ng-1.2.2-1.el9.x86_64.rpmÔE< uBBBBBBBBBBBBBBBsecurityModerate: krb5 security update%A{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067  libkadm5-1.21.1-6.el9.x86_64.rpm  libkadm5-1.21.1-6.el9.i686.rpm krb5-server-1.21.1-6.el9.i686.rpm krb5-pkinit-1.21.1-6.el9.i686.rpmkrb5-server-1.21.1-6.el9.x86_64.rpmkrb5-pkinit-1.21.1-6.el9.x86_64.rpm krb5-libs-1.21.1-6.el9.i686.rpmkrb5-libs-1.21.1-6.el9.x86_64.rpmkrb5-server-ldap-1.21.1-6.el9.x86_64.rpm krb5-server-ldap-1.21.1-6.el9.i686.rpm_krb5-workstation-1.21.1-6.el9.x86_64.rpm  libkadm5-1.21.1-6.el9.x86_64.rpm  libkadm5-1.21.1-6.el9.i686.rpm krb5-server-1.21.1-6.el9.i686.rpm krb5-pkinit-1.21.1-6.el9.i686.rpmkrb5-server-1.21.1-6.el9.x86_64.rpmkrb5-pkinit-1.21.1-6.el9.x86_64.rpm krb5-libs-1.21.1-6.el9.i686.rpmkrb5-libs-1.21.1-6.el9.x86_64.rpmkrb5-server-ldap-1.21.1-6.el9.x86_64.rpm krb5-server-ldap-1.21.1-6.el9.i686.rpm_krb5-workstation-1.21.1-6.el9.x86_64.rpmÔl= FBsecurityModerate: gnutls security update% IBsecurityModerate: libtasn1 security update%44https://access.redhat.com/errata/RHSA-2025:7077RHSA-2025:7077RHSA-2025:7077https://access.redhat.com/security/cve/CVE-2024-12133CVE-2024-12133CVE-2024-12133https://bugzilla.redhat.com/23446112344611https://errata.almalinux.org/9/ALSA-2025-7077.htmlALSA-2025:7077ALSA-2025:7077$libtasn1-4.16.0-9.el9.x86_64.rpm$ libtasn1-4.16.0-9.el9.i686.rpm$libtasn1-4.16.0-9.el9.x86_64.rpm$ libtasn1-4.16.0-9.el9.i686.rpmÔ? LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,h@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423*Pkernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpmPkernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm#Pkernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm$Pkernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm"Pkernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm!Pkernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpm*Pkernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpmPkernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm#Pkernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm$Pkernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm"Pkernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm!Pkernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpmPkernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpmɐ1@ kBBBBsecurityModerate: avahi security update%(*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437z avahi-libs-0.8-22.el9_6.i686.rpmyavahi-0.8-22.el9_6.x86_64.rpmzavahi-libs-0.8-22.el9_6.x86_64.rpmy avahi-0.8-22.el9_6.i686.rpmz avahi-libs-0.8-22.el9_6.i686.rpmyavahi-0.8-22.el9_6.x86_64.rpmzavahi-libs-0.8-22.el9_6.x86_64.rpmy avahi-0.8-22.el9_6.i686.rpmuA  qBsecurityLow: vim security update%0Rphttps://access.redhat.com/errata/RHSA-2025:7440RHSA-2025:7440RHSA-2025:7440https://access.redhat.com/security/cve/CVE-2023-4752CVE-2023-4752CVE-2023-4752https://bugzilla.redhat.com/22373112237311https://errata.almalinux.org/9/ALSA-2025-7440.htmlALSA-2025:7440ALSA-2025:7440Fqvim-filesystem-8.2.2637-22.el9_6.noarch.rpmsqvim-minimal-8.2.2637-22.el9_6.x86_64.rpmFqvim-filesystem-8.2.2637-22.el9_6.noarch.rpmsqvim-minimal-8.2.2637-22.el9_6.x86_64.rpm^B !tBsecurityModerate: expat security update%Blhttps://access.redhat.com/errata/RHSA-2025:7444RHSA-2025:7444RHSA-2025:7444https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-7444.htmlALSA-2025:7444ALSA-2025:7444f expat-2.5.0-5.el9_6.i686.rpmfexpat-2.5.0-5.el9_6.x86_64.rpmf expat-2.5.0-5.el9_6.i686.rpmfexpat-2.5.0-5.el9_6.x86_64.rpmUC "wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,.9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903*Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpm!Qkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm$Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm"Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm#Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpmQkernel-5.14.0-570.17.1.el9_6.x86_64.rpm*Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpm!Qkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm$Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm"Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm#Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpmQkernel-5.14.0-570.17.1.el9_6.x86_64.rpmeD #VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%g https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142Rkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm$Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpmRkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm"Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm!Rkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm*Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm#Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm$Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpmRkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm"Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm!Rkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm*Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm#Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpmܣ}E $uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%tWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333"Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm*Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm#Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpm!Skernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm$Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-5.14.0-570.19.1.el9_6.x86_64.rpm"Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm*Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm#Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpm!Skernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm$Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-5.14.0-570.19.1.el9_6.x86_64.rpmÔ]F %TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,Khttps://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643!Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm#Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpmTkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm"Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm$Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm*Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm!Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm#Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpmTkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm"Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm$Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm*Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm«nG &sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update%SNhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655P glibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm}glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpmhglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-it-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpmsglibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpmnglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpmpglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpmZglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpm[glibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-as-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm^glibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpmYglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpmzglibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm_glibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpmuglibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpmNglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpm{glibc-langpack-my-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm' libnsl-2.34-168.el9_6.19.i686.rpmglibc-langpack-af-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpmtglibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpmkglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm% glibc-2.34-168.el9_6.19.i686.rpm5glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpmiglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpmlglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpmwglibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpm\glibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-is-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpmdglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpmWglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm& glibc-gconv-extra-2.34-168.el9_6.19.i686.rpmCglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpmcglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpmjglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm`glibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm&glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpmvglibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-or-2.34-168.el9_6.19.x86_64.rpmfglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpmoglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpmbglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.19.x86_64.rpmglibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpmxglibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-om-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-be-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpm|glibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpmLglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-az-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpmgglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpmqglibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpmeglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm'libnsl-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpmXglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpmrglibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpmMnscd-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm~glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpmyglibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpmmglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm%glibc-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpmUglibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpmglibc-common-2.34-168.el9_6.19.x86_64.rpm]glibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpmaglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpmP glibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm}glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpmhglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-it-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpmsglibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpmnglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpmpglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpmZglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpm[glibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-as-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm^glibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpmYglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpmzglibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm_glibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpmuglibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpmNglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpm{glibc-langpack-my-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm' libnsl-2.34-168.el9_6.19.i686.rpmglibc-langpack-af-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpmtglibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpmkglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm% glibc-2.34-168.el9_6.19.i686.rpm5glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpmiglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpmlglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpmwglibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpm\glibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-is-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpmdglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpmWglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm& glibc-gconv-extra-2.34-168.el9_6.19.i686.rpmCglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpmcglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpmjglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm`glibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm&glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpmvglibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-or-2.34-168.el9_6.19.x86_64.rpmfglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpmoglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpmbglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.19.x86_64.rpmglibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpmxglibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-om-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-be-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpm|glibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpmLglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-az-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpmgglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpmqglibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpmeglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm'libnsl-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpmXglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpmrglibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpmMnscd-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm~glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpmyglibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpmmglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm%glibc-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpmUglibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpmglibc-common-2.34-168.el9_6.19.x86_64.rpm]glibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpmaglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpmŸOH 'PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,!ihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080!Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm*Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm$Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm#Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpm!Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm*Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm$Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm#Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpmÔ1I (oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%  https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302Vkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm$Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm*Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm#Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm$Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm*Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm#Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmÙGJ )NBBBBBBBBBBBBBBBsecurityModerate: krb5 security update%$https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430   libkadm5-1.21.1-8.el9_6.i686.rpm krb5-server-1.21.1-8.el9_6.i686.rpm krb5-server-ldap-1.21.1-8.el9_6.i686.rpm krb5-libs-1.21.1-8.el9_6.i686.rpmkrb5-server-ldap-1.21.1-8.el9_6.x86_64.rpmkrb5-libs-1.21.1-8.el9_6.x86_64.rpm krb5-pkinit-1.21.1-8.el9_6.i686.rpmkrb5-server-1.21.1-8.el9_6.x86_64.rpm_krb5-workstation-1.21.1-8.el9_6.x86_64.rpm libkadm5-1.21.1-8.el9_6.x86_64.rpmkrb5-pkinit-1.21.1-8.el9_6.x86_64.rpm   libkadm5-1.21.1-8.el9_6.i686.rpm krb5-server-1.21.1-8.el9_6.i686.rpm krb5-server-ldap-1.21.1-8.el9_6.i686.rpm krb5-libs-1.21.1-8.el9_6.i686.rpmkrb5-server-ldap-1.21.1-8.el9_6.x86_64.rpmkrb5-libs-1.21.1-8.el9_6.x86_64.rpm krb5-pkinit-1.21.1-8.el9_6.i686.rpmkrb5-server-1.21.1-8.el9_6.x86_64.rpm_krb5-workstation-1.21.1-8.el9_6.x86_64.rpm libkadm5-1.21.1-8.el9_6.x86_64.rpmkrb5-pkinit-1.21.1-8.el9_6.x86_64.rpmÊNK *_BsecurityModerate: libarchive security update% glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpmW glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpmL glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpmm glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpmx glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm& glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpml glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm' libnsl-2.34-168.el9_6.20.i686.rpm) glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpmp glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpmt glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm_ glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm^ glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpms glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm& glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpmY glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm} glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpmZ glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpmw glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm| glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpmk glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpm[ glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpmf glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpmi glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpmv glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpmM nscd-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpmq glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpmc glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpmX glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpmy glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpmo glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpm\ glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpmh glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm% glibc-2.34-168.el9_6.20.i686.rpmN glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm] glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpma glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpmb glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm' libnsl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpme glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm{ glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpmr glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpmz glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpmn glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpmd glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm glibc-common-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpmP glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm` glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpmu glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm~ glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpmj glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpmg glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm% glibc-2.34-168.el9_6.20.x86_64.rpmL glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpmW glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpmL glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpmm glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpmx glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm& glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpml glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm' libnsl-2.34-168.el9_6.20.i686.rpm) glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpmp glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpmt glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm_ glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm^ glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpms glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm& glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpmY glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm} glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpmZ glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpmw glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm| glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpmk glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpm[ glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpmf glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpmi glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpmv glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpmM nscd-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpmq glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpmc glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpmX glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpmy glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpmo glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpm\ glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpmh glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm% glibc-2.34-168.el9_6.20.i686.rpmN glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm] glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpma glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpmb glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm' libnsl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpme glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm{ glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpmr glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpmz glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpmn glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpmd glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm glibc-common-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpmÊaO .DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update% https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880"Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm#Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm$Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm*Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm"Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm#Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm$Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm*Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpmÓP /csecurityImportant: sudo security update%, shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978@sudo-1.9.5p2-10.el9_6.1.x86_64.rpm@sudo-1.9.5p2-10.el9_6.1.x86_64.rpmÐzQ 'esecurityModerate: tar security updateM~bhttps://access.redhat.com/errata/RHSA-2026:0067RHSA-2026:0067RHSA-2026:0067https://access.redhat.com/security/cve/CVE-2025-45582CVE-2025-45582CVE-2025-45582https://bugzilla.redhat.com/23795922379592https://errata.almalinux.org/9/ALSA-2026-0067.htmlALSA-2026:0067ALSA-2026:0067ytar-1.34-9.el9_7.x86_64.rpmytar-1.34-9.el9_7.x86_64.rpm˘nR 0hBsecurityImportant: libpng security updateM,`https://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238 nlibpng-1.6.37-12.el9_7.1.x86_64.rpm n libpng-1.6.37-12.el9_7.1.i686.rpm nlibpng-1.6.37-12.el9_7.1.x86_64.rpm n libpng-1.6.37-12.el9_7.1.i686.rpmUS 1kBsecurityModerate: cups security updateM}https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312$] cups-libs-2.3.3op2-34.el9_7.2.i686.rpm$]cups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm$] cups-libs-2.3.3op2-34.el9_7.2.i686.rpm$]cups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm˩rT 2nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateM0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445nkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm*nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm#nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm$nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm*nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm#nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm$nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm˩XU 3MsecurityImportant: gnupg2 security updateM,/bhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719Q gnupg2-2.3.3-5.el9_7.x86_64.rpmQ gnupg2-2.3.3-5.el9_7.x86_64.rpm˧iV 4OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateM,+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793okernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm*okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm$okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm#okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm*okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm$okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm#okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmW 5nBsecurityModerate: glib2 security updateM<https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936Nk glib2-2.68.4-18.el9_7.1.i686.rpmNkglib2-2.68.4-18.el9_7.1.x86_64.rpmNk glib2-2.68.4-18.el9_7.1.i686.rpmNkglib2-2.68.4-18.el9_7.1.x86_64.rpmdX 21securityImportant: python-urllib3 security updateM,Y7https://access.redhat.com/errata/RHSA-2026:1087RHSA-2026:1087RHSA-2026:1087https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1087.htmlALSA-2026:1087ALSA-2026:1087:ppython3-urllib3-1.26.5-6.el9_7.1.noarch.rpm:ppython3-urllib3-1.26.5-6.el9_7.1.noarch.rpm Y 6sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateM,https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143*pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm#pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm$pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm*pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm#pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm$pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm;Z 7RBBBBBBBBsecurityModerate: curl security updateM-Ahttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350"@curl-7.76.1-35.el9_7.3.x86_64.rpmv@libcurl-7.76.1-35.el9_7.3.x86_64.rpmw@ libcurl-minimal-7.76.1-35.el9_7.3.i686.rpm#@curl-minimal-7.76.1-35.el9_7.3.x86_64.rpmv@ libcurl-7.76.1-35.el9_7.3.i686.rpmw@libcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm"@curl-7.76.1-35.el9_7.3.x86_64.rpmv@libcurl-7.76.1-35.el9_7.3.x86_64.rpmw@ libcurl-minimal-7.76.1-35.el9_7.3.i686.rpm#@curl-minimal-7.76.1-35.el9_7.3.x86_64.rpmv@ libcurl-7.76.1-35.el9_7.3.i686.rpmw@libcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm [ 8\BBBsecurityImportant: openssl security updateM,nLhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473s openssl-libs-3.5.1-7.el9_7.i686.rpmsopenssl-libs-3.5.1-7.el9_7.x86_64.rpm1sopenssl-3.5.1-7.el9_7.x86_64.rpms openssl-libs-3.5.1-7.el9_7.i686.rpmsopenssl-libs-3.5.1-7.el9_7.x86_64.rpm1sopenssl-3.5.1-7.el9_7.x86_64.rpm̂\ 9aBBBsecurityModerate: python3.9 security updateM:bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 python3-3.9.25-3.el9_7.x86_64.rpm0python3-libs-3.9.25-3.el9_7.x86_64.rpm0 python3-libs-3.9.25-3.el9_7.i686.rpm python3-3.9.25-3.el9_7.x86_64.rpm0python3-libs-3.9.25-3.el9_7.x86_64.rpm0 python3-libs-3.9.25-3.el9_7.i686.rpmr] :fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateMDhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617qkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm"qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm$qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm*qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm#qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm"qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm$qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm*qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm#qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpm̖L^ ;EBBBBBBBBBBBBBBBBBBBsecurityModerate: util-linux security updateM`https://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 jutil-linux-user-2.37.4-21.el9_7.x86_64.rpmiutil-linux-core-2.37.4-21.el9_7.x86_64.rpm"libsmartcols-2.37.4-21.el9_7.x86_64.rpm" libsmartcols-2.37.4-21.el9_7.i686.rpmlibmount-2.37.4-21.el9_7.x86_64.rpm&libuuid-2.37.4-21.el9_7.x86_64.rpmhutil-linux-2.37.4-21.el9_7.x86_64.rpm libmount-2.37.4-21.el9_7.i686.rpm libblkid-2.37.4-21.el9_7.i686.rpm libfdisk-2.37.4-21.el9_7.i686.rpm& libuuid-2.37.4-21.el9_7.i686.rpmlibfdisk-2.37.4-21.el9_7.x86_64.rpmlibblkid-2.37.4-21.el9_7.x86_64.rpm jutil-linux-user-2.37.4-21.el9_7.x86_64.rpmiutil-linux-core-2.37.4-21.el9_7.x86_64.rpm"libsmartcols-2.37.4-21.el9_7.x86_64.rpm" libsmartcols-2.37.4-21.el9_7.i686.rpmlibmount-2.37.4-21.el9_7.x86_64.rpm&libuuid-2.37.4-21.el9_7.x86_64.rpmhutil-linux-2.37.4-21.el9_7.x86_64.rpm libmount-2.37.4-21.el9_7.i686.rpm libblkid-2.37.4-21.el9_7.i686.rpm libfdisk-2.37.4-21.el9_7.i686.rpm& libuuid-2.37.4-21.el9_7.i686.rpmlibfdisk-2.37.4-21.el9_7.x86_64.rpmlibblkid-2.37.4-21.el9_7.x86_64.rpm̫I_ |BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateMhttps://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722skernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpmskernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm$skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm"skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpm!skernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm*skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm#skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpmskernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm$skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm"skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpm!skernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm*skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm#skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpm:b ?[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security updateM'|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786Po glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm| glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm_ glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm% glibc-2.34-231.el9_7.10.i686.rpmL glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpmh glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpmd glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm~ glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpmY glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpma glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpm[ glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpmL glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm^ glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm` glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpmi glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpmv glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpmp glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpmr glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm% glibc-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm{ glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpmg glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpms glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpmf glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpmb glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm} glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpmy glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpmz glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm' libnsl-2.34-231.el9_7.10.i686.rpm$ glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm] glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpmW glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpmu glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpmX glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm glibc-common-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpmm glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm& glibc-gconv-extra-2.34-231.el9_7.10.i686.rpm\ glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpml glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpme glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpmM nscd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm& glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpmj glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpmn glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpmw glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpmq glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpmx glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpmZ glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpmk glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm' libnsl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpmt glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpmc glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpmPo glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm| glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm_ glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm% glibc-2.34-231.el9_7.10.i686.rpmL glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpmh glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpmd glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm~ glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpmY glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpma glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpm[ glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpmL glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm^ glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm` glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpmi glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpmv glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpmp glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpmr glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm% glibc-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm{ glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpmg glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpms glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpmf glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpmb glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm} glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpmy glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpmz glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm' libnsl-2.34-231.el9_7.10.i686.rpm$ glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm] glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpmW glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpmu glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpmX glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm glibc-common-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpmm glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm& glibc-gconv-extra-2.34-231.el9_7.10.i686.rpm\ glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpml glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpme glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpmM nscd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm& glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpmj glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpmn glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpmw glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpmq glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpmx glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpmZ glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpmk glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm' libnsl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpmt glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpmc glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpmׄDc xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateM#whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066tkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-5.14.0-611.35.1.el9_7.x86_64.rpm$tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpm!tkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm#tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm*tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm"tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpmtkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-5.14.0-611.35.1.el9_7.x86_64.rpm$tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpm!tkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm#tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm*tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm"tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpmtkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm̀-VmXZ Utils is an integrated collection of user-space filempressu@ities bas9the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl[ datai. TW?provide highÔioYkeepingde%time short. SecuWy Fix(es): * gzip: arbitrary--w%e vulneraby (CVE-2022-1271) For morota_aboutsgissue(sincludimgt,CVSS scG cknowledgments,j/r relin@n,ftoR pagm lis,R&encEs.egrub2 pu6sj ver82?GrUnifiTBoot Loadz(GRUB)ƪlynfigu3lecustomizb:l:wީ>dular}chpcturesuppbvarieSkernel 'sym uteVMhardwavi. mshimrtIJrfirst-stUEFIthatOndlo7trufull3unenviron: IBflowޢ_net_recv_ip4_ets28733)HCrafPNG yscalnmay leadDZ-of-nds sheap^1-3695]SRQd7huffma)Vg6gJPEhc>hbN,7ZOȤwhensp HTTPId/n4M[_lockXBrs non-iDe*dQb-r-freӳcmd_k()B=: Bovޢ6cYH7ViVi IMed)updgyim  vi editorv]Use.F<Powr OffsetvW0554@H-hOocts?943?y42024+621+&-ro'9'usf{utf_ptr2char51SExpatG C.bJB?XML docueC0ta,exhaDzv9typeM531= =copyStf:wC23Linux!,anyopeJ BC: Sma8[b siz[TCP sourcgen^o  k012){r diQ _evf_ƤTHprivTe^Y7YaU/asub$lrt966tomIP ESP tsco 76K Bug`make SHA512_ .sCRYPTO_USER4- (BZ#20726SR-IOVc an*> 50% d3483fix rrupiauyby dm-- 98218+ SCcli$-s6 peeloffns [al(_-9]<404#n|finasymmec ascsi_i l 049%tcw_/sched/cls_api0H&Power9 - LPAR:ShaGcm9 se[Hash]w48zH& up+nrun ss- `hadFIPSPd1c Inam4>338Jfs2=g sUmeghtK730| i/oiatoruo :Kwork;disgZ4.18.0-372.9.1.el8.x86_64)[825A( esn't3SSATA5974G/ tre@post migL  ^10{Oopr ltx  IRIP8de_attr__labg !sl18lBUG:% &t#xnlE fs4ton ;loorlps : Kaccebada,P g: 11 [#1]kc+tuNntL (P10/ ibmvnic/ )30OS^vmOUmap\e') Enh ^'Bommu/vt-d: , DMAR_UNITS_SUPPORTED U5326 ~%  dowf_from #r ouatocR Z=, F:DAP8{:lDialti322;Un5 miFs575-KRB7mtv98 O=SSL kim; <ogLaye:)T(TLS) aella)-ng-pureypt phy-Z: c hA scCj+29 CSigne[re nahpVOCSP_NOCHECKSo3oOPENH_LH_flus brhLD47D18GAESBa0me s>P g qa*Cy,n n}omgnutlsFFDHE8032q"Z3DES+549ptsI 1cara/t|N 5508]mU>ECDSA 5 licitkF eZ#s_ -gpip256k1>[ber X19/X448S6ConvX8p -onSl_? FKAT88jRkeys on9193+q&YOZhK7[wsu]sqi5[IBMR HW$T] POWER10e0s5\y[o view]R-R*78*DH t g*5856*EC*7*S+8+AND,9,zero ,61,HKDF5mit"1838bPacy 1 (GnuPGl GPGK&r ighl na lian PGP7S/MIME*ndx gpgS ofnt sts l?34@ dbus-brok@$ bu TbyWD-Bus'. It*imD ١iD$%l$Pa$orűzuexcljvete~ #YnAr/ekJ"entegfKWkaS Ex~s$l_$12]nS#p$DyXgQz aC. nft_s$eJ1?Y' RdS_йy_e0y z &R/mlx5numbf c{XLT q-227O8,x t+edQunw-Ye-nex7p-ob.- G5n$)4unl d MSR_ : WR0x199amazot4.32x tn941X86/pXS/UVS> UV5 )773+ l{:2sync s\softblk_mq_G_ch_ 9.0z]13&NVMe/dero+v%vonic,nic^77Adnvmeaj- 7~ (/tcp9tn#uses(_to_rq()_)l(ue)69ImhbY&929x 9/ppc64hIn\- & "C_ pe "=alscpu.d2171  */ d+w y~AMX flaamx_~8, bf16) H826: DmU!4!avf"194 i40e"9)7$#!sdoContfxmlN/406|  .X #s u , RD N O|  fit e0o xInNx -or!KMC++, PK, Pike,f . kRSH NUPG+$*E0䪈fo|have+p"a r *v :(3.7.6),;8) 3{ouj,_pkcs7_y.Q509QA] ["@u-r lP258xAKK5-CBCmg{>3/:(*2<2r10)KSBp/P c[Kasbaho%X."MS! i0yQ. R1th_s$9Gk */rK exG7 51 1-q &ath%w,t; ;P$!`21̔wuthbypas! d<nn'R's;ans t3l 19p :_Em 060B>VMLN78C zma[8 +$)Z^) 31l * J84 r6eld43 U)P8:rQ ?N# h/25" (dTDKgPTRACE_SEIZEW3O!SDCCOMP059 #%%T14/G2Dp+(mt7921e%56&v~-lle{#U0Matroxx aMscr vVGAz*put Di120nee1oa waL "ea#C DRBGfa5;y; ix| wdog%' .#30&734s! [sw/30:0]O7 5.16"BadQp}( qemu-kvm pfn:68a74600?,6f=E%s2M 6s>879Vh-t 2)9nNlo% hpilo* HPE RL3 Gen&ARMy.[(4 pretI0 aG./es3s,F k [eg yl0ynam.6dl. 3!K'BH4llCpi=O oI&windKu} -:7PyLong_F76dgvy `9oa#0-=plua> Lua! Vm+-wet+x >Len Lwlsontdp ,-u1kua:inG_msde.c; unxro3ra* ) $>30# -Ba,acker) vor MminoG 'sy9 3651 ]_*}nd N+@-smb20_ry_i NULL 01h'*id9nd__kicbdu.b[6{swiotlbt1H"\_F5_DEVICE?--?3rsidoq@N6%$'-g:UMi10:spcm_hw_iM0 0)%w46o8/[Bk10urywbF00 drmma=,+K/,.@! T2goDF 6._sfa_>> 63`s&-@pE!3dinD&e n-upM-/4 ka SBDRN\ 3Ni]lGaDlTST5Ta$C)_DRPW_*po~0toN c!cho\021+~:+tBl A@J Sp)pC[$[i35.s&H^3816, 9900nBranT C$uZ  b)Lcedj r$5_uR&8*hrn$zOsly> a a8. S.γǤoist/oU$1Rinq] Y95: holM umi ol v t9n pc8~}:<8H IPv63 D517'<7SambLn4-I AS4M 0BH*(SMB[8C(A(rn>SIF7vPC-/lw ; ne ,~ ZC.6d%s,>6.4)V+4G2:@w?s?E1$2742@$lMd-"m#!%-'API/n*$/'TDB k4(2.5.2 AD  u + add.0!}F#,-quaF5.onDWgF4Ъ-%$a [ sW[redi7u glyph0ff4W]U"sfOB _NB4L.>Seiviol a FNT_S _RH5HtHTBOG=4%3.9.],I24| %)'O/4@!X2azse 1A15GD^X 3z;/http/.Gc&(1">O e2fsG2a7afo5/=, (7 = @]gz 2,3: O/[Q13:;>MfBuzzo+n,ihRbRYORh4Uhape-f%.c7 MADHH5 c~PC(DHCPY2X ~ D0n MGto gei wNctjKa.ika br c'dhV: {g@ISC K9 Dt'hdm s. 5NSowB -chisoDe1220A}ogro*usb"rYlobyiiuaH^9/Fmod=n i &: u-W*;B tirpchk&SunDZ'sS3-ipd5 3I-a)Z=F\ 7 e6- :}lot754682Az,8R_()7 )B' 7<%/&`AZf "# Pho42C"PoFos P auth&c#e0[^乍ylEby ea0natn-" !;8dB!eLNL= <=tocGmahel'ncrrs"#Pd ib$4Le*KDCAkrb5+ i- ACvh4t38fesud4H/? 1sD o@F 2X&t iGsrN$Zu<.iut]4+gasgrsT hot,+RunA;,3-2&-X1c"POSTPUT|*j2221U2E:9 )&1{k~*,U!Fa" X88179_beAwUSB eK .V64Vi91KGPbILB Zï]9_ 13ï\ '0M,S"3=gX X3I9ò2{ un1lAU?smt_n/30KY=f-HvhN\MiN2<|3%2<58HN-OZglt7t"lyt5EMC8st~NDU0d33i@N/@=9)"w-WARNIN==b6 PI/3440PY1/xQmm/:.c:a_haYcr_f+0x3f/0x50f458 2v4:l9 of4X_>Y4_3ikg)&or$ i61|/pz'+th{Rdysfg `.*"-EINVALJ9S69DEl4:_'i@?1m5RHerc12.J9U*4Jl+P?monj!6}4^ER-Ybio/ee4015P aq-\<"DummyiP ar/t%4 M2.8SQ8eoz7Re's]calef0z?*]Z397;0faKS{in 4egs2t-t gofng%5AMdCLIENT:?z`l#H^ "no:"̪mp18\528Az0 :=)I-v:ECI_5MA@MEMORYme%VMe ~S5]0S z}bam:Himes?eploynUp qg\e led + s16#TT- O @760^Bsidg Eil>7)DV!-Bus is a system for sending messages between applications. It9used both:theI-wideB bfservice, and asper-uslogin-s,Z4facility. Secur Fix(es): * dW:-daem;crashwhreceiv wiincortly ned parent8eskbrackets (CVE-2022-42010)zan)y@varray lengnsi|ntelem typep1p`__marshal_byteswap` doesn't procv fdsdł"eign" ann) u2) Fm3 detailbout殐issue(s),lu: impact,CVSS scG cknowledgs o/rlainmf,feWoRgm l<,R&ences:.Tckvn man-rLinux,8tiblEuSysV7LSBitriptv4ggrvehallem0pabieu{sopRDav tart`7ofs on-demæ#of ekeeps tԢ)eâ. cgroupddiupportnapshotcWrCorqtmnrsIunauto poi1 borBns onalpy-ba}rol Mcalso worksdrop-iplacrYysvj/:p overrun_tilpan() funQ3821PEx.C.rytC3680sxml2{develop<oolboxzWHJvario^ndardu: eflowUPARSE_HUGEw0303)Adictpupe cyclesM4SQLiteCthW(ta 3ine. A largebs&ȡ&92Ned%leteA!torHlesk filZ^API(v#*TvenieMxi linktenjoew GrUnBoot Loadz(GRUB)highfiguraǢ5cusY izb:l: moduAchOb# eke '2 su VMhX wa: B\ _f _1_glyphg Yleadowrxpo#bypas[ 260dHlyedVsW\V_punisequ7OvSSL{h ki <s Lay:)!c(;)tocola%ll-?geneI-pureuyptographyko? : r:brH& QttdJRSA De:  Idou&c8\PEM__bio_exD450Dc-GfolCBIO_new_NDEF@3-85@in_ e d2i_PKCS7M6MNULLB\a D(picmyE7EX.400S.uDG N L8ՒduԤF J42 BugHMAC[s ljeb s < 112 trad,xFIPSue Z#214I,na mum1- PBKDF2Xstun,um) almeypTCP5nahf p8ɭ8SHAKEdigesp-OAEP>g10gSSVPLag 5a psizh ,ٙ2 UaI 79.31dm5o-224,38512P56es YDRBGsЙ 5-167ުáQ欘hv9e^2048_ EVPEY_ uw5179.1 N\[0912] - 6or:93:itene routi::n giFlonP bmca7 loca.so.4 (3.9mHche um need3pd6584 * O oca!,yop{ng_ EPl2(mJ_sdu2 net/bluetoU/'.c 56gs% do_pB_dvecskip_spa 4378QŹQ__nfs42_ssc_fs/n4c ComoDD  ~9~NetNvul1ftbyJ )py_vla 1[7 Qi2c-tiv 287W 9.0: LTP T+ 8 ak14 ShirdapiFPl8280+|3308d1  NMI watchdog's LPM5FMDSERVERF::dp1*&K oa$127Rqla2xxVMe-FC: WARNING: CPU: 0 PID: 124072xs/scsi/=_c:70S_ɹne_tn+0x25/0x30 [#]X Reon: Kn Lvo T4+cAH40 USB-Ck V327Sc r U+al2).79E4, Nx_Gzip: not cdecrI yšun(ur7blpa D. (FW10/ DL MSFT, MANAET PG-9: race."CQ:n_ipWRfixb50zvPCIW  Vi-MSIB459BÕVMploy# FgsR~F93'' {5woZim3#Kbs390x gL881.RH3syncWupam v6.0K61341CEEphf#'i?ORIPI:ns_q_unef8]p416 :Ц2535py3 $tup"sa co"g en sPBXbu t&" at7^NNp:*d(ReDoS`_i!x.pL$089G 7t% ac! b^ -ore g3gupe#'Il ex,yl dynamJdl.#f t0q #XC8$9o/ w޴O}7#via fVIDNAo85064#C& k eV&-dump1 re/fs.su64xd{ fa a l9%5 %ua ua"V-we V >e LuaYfrt d#,%-a7kua|s ndd&Es;1,94<1_umldo.cSa H?fwld357Vi"Vi IM0ednj d vi o$vim:$5ret#qu}XCheGC({702k'GNU tarfsaveK pai"in~vOfro!zj:$VC_he¹g! yt8O) !nut 53"Gnu%J  i^gormsp\ch&,D"s-chD1l(Y a4+3 CCMgkb,miLfs93j5)* accmdl [q]: E izYle s1elf ir;0cC2vov qun_ _&#!ALSA: pcrMo:rwsem ! s n4tl_4 <v UA 6uBsoftTupTCr-to- a26/P9- zfc+\mi Bs nMust6t!278&1} _v2_eU7eO3" /ers#pu1 fys skSaIusr o쵠37%dd%Q i^x_-rtbug:] &circR u(&n->_%->&p-> wai860CS .s _@bal!3 di_ }+1!/k@) ]'*#k K+1gpioD8set IhR/* E59  orvs'swiotlb $ infidenL`7>E((IBM ] FEATbEQETHgn e.'l6%l_ SPRAMX: I nf%DO85cV:+1ydDF5 0DHTTP, FeLDAP }:0{ 239& ]FUSEA -prppedrobu7,xY pth)m()_`)Sambn#-s3cP7N!Me>B= (SMB +aCAn2Fl S-(CIFI+$ j PC-Dmachm#u,]ZP?C4/M(-MD5k!Log16 dakb3  2UG[##($_C)$4289-ul| rnULPT,4" TDyjlGecubeyondcon( AnchZ1/34[p c.,F,PUT_VSCREE FO tlz@% OOB//*Z3365 M !tty_sA146 F,d-kvm_mmu_-pcgvaF78 ~ p| _-1`/1>=W88nV: IBPB 9O 1Svr"y11G%:m%"_ C+/D Dxfrm&be_ s×/n0I o%Wib_nh_mI! ipv4/!stic34Ȩhu lYo_R mm/'2> {6_re/o<5 s-3 _af;'P optK KIG{/Nű(cv_aclLP(6* 0Q_ptSgup.c+usokeuy\2X]~8v8raGal'is$Y|+l2tpE o: _i όdgigmiY_mc_]y xo,i 2-qG 6 IMA,15usb_8~_~_xm2/&* 2JnI:-ndro>T/KBX4374Hn&mn _r gm ^VM_PFNMAP /s (oB91¢flush5 :misI 7KnV_PMPTEDm{oMt8vl dfg8<1__n0 416**f to on_vmareG270]ss_(wirel/1 72"B9 Cj_([^&beaco)n P2P-P:HĢ/ n-r47 trc !Cj H*9HrawRp_pf@ 399q_g6D290G!07hostn/7it/=sq3-119{Tce63Q A$@s:Ҥjc%TiE lBE, se.RAes AedZ R-"atC*;%t; ;()&! =͔:AJ$ J/C/shmsym`F11951\I1Ycha+ixok]-P, 5LQUCa-ggeb!x>nJ n35P>fwR  Je&aTNB QNfirm`n: ad>)ce(KDC)7krb5 (1.20.10163b[8 aFR S4U2PV0-x*4= //95 _/C H BL FHbfZ?UNIXm'he0necLi!D h:=WS n$( _B()'J3O13-cF; dp7-7-arb aHh\s DNSomUi) ss Volkav~H-a UDP MF~3206F %rlT.ae JnD43^KP-kB$l&c 6{_r6[[$ xu~u_gvGZynXZpo _ /\I#\Aifasil  o<a5aCY8@B;F?I[IV -0-AES-XTS 64xV ARMY12_/$ 4WW42onc{Na>@9586W yeXordX RXi4i@L G@o JZn6IVSsl\NVCd /I?sa?-9z@```_lgCl!+fip(F_Ffs_$ XB eZ ( +?M@VE) o)9Y o()DHX ,r3v^&rFEC__O0(R__"rgLe_+ pairwio=uc-4 rZLDHTOgalwayZ^llb=2Ab;pkcs5 j}>B11Bb>GEMBD&,W V>=itciǥP4q/_'jt>sm as5dP%x9>d > 7re[i&7[_= CIPHERSbAH9,396r[ Z _YA_cD{WPVDH@EIC2e4FC[5.n]pFWb4m /1 <6* 23.K2n~zed qVj0$5k'rFS-H15H[ "gi:6_sl_)_xfIN9NH8o_+gI52y8 % qAQlA=- (Dg=768RPL-P IOTG/ S :Dc85ag:to-R*kPTl'!172jBUGiwlmvmfi0Q"hF676bC 9yqck.G9m/7a0a36f2fd6wa54afhc8Ae9b [99FixQl0unHe}rekvmc1Y t1”blk nvme/047aESl7Ohifar+esr&7y3l J2 h s`70[F]: t& Ri颲:1778eM\Qeo$ nlock bef4turnom)_treeOnnܥ904x86_64, kdump 2^nelromGpanicg"kvm-08-gwt25.hv2"_10614)The "l'" utilitya textleowsthatsembl"m", bull# us movewardstfMasks!. Sido]nokad8ireFputEtartup, isos quickn(dinaryedit. SecurFix(es): m: crd dataTnulw -R" ANSI escape sasSơ(mCVE-2022-46663) F0ailbout5s=(s), -ludt imp+,CVs cknowledg$s,o/r{D3,f㤩Cgm lis,R&c:.Samba5kpen-sourcleAServiMEB(SMB) toco+CaAInttlHymLIFS;, which PC-pb1machinsbpt%ou-s\MB20ckeignieDcwhen$= d"0set3-3347 1otrushiptweeGis 5s5 mai:aily23600)LibeCf7flexHiguralibrors!mankey=2/. Is snippetsdift roriesibuildsfKBit:ck-baseXr ovin_Q()7/get>t.cx22652hxml2dloplbox=vi»XMLkndu: NULLnr ma1upCojxTy4848 IHasho mptyMcysn't* `i946I python- s`pa deaedake HTTP 9easy et: Uni2d\leakProxy-Au)riz4hr2681 {s9e1}] vow aRG ss , FeLDAP}Z DN$ dc m y³$ImfpC fica[ V 32 VPOST--PUT6Ro |3 !,!anyds E: ipvlan: %-of--ndsT Uu(eaW kb->cbvG )Ocls_erS[l_ _gen_opt5P5788QKVM: /mmu: e N_f_faE N 58Nu B po Cdo_prlit:/P0[YS:v2 T mgcblL <199<O SSH a supLa ,, UNIXsvlar e  bo!cli_^ ssh:motbdx*m-agMPKCS#11840D-BuZsenm^sX appld:I-wBO urvasp-logi,4acdW:-dae:XP ure4a c=dri^{bled49 subscrip- rgrams u# U4yBos;oetR p5ɷ: de yaJ ofb.k.RHSM1 ftOaly\ 9 ! in!UP!p*rp pI( throu-Get-Ydmt Pl 64 Ith w BIOExt/Firm7D0(EFI),Xp4o?/DMI.isstypinyt}ufr,namzsenl^, gZtag,(ɰpns;-bo% a9x? 63_f $ $ AicNehwmd: Cross-P'L'405934VfoYhay up r yt mt:(5.14.0) UAFnf>s 0kup_globGggy 0hbl dnonymEs0Xb3nt7nf_o;Hina ca hjNFT_MSG_NEWRULEx61x/sKJwpon(b ploits 8c cf_cinA f776nf7ie reipipapo_j4004 \_newrul d]a  BA_<_CHAIN_ID\Űy1y3īݶibyid1248O"-aYbyte)er_e4001Vse/rMSRsS3 s*Q163&bypass`d eSa Q110g[6 9.3 BU5"[SPR][EMFHF] ACPI:1w5up+ 802[D"TM!!j"WD19TBSSwi'VGA/DVI-CngsjrtmuH MBibwok)uein "3_adja_p1*21 AWS ARMgs+DMichif2s3!.xadat SEV-SNP |!>LU# u ne b)blkush_m562 'rq-x ".\70hf)bz2069//ral;(reg-suit )aarch (s[pid]/w )'d392eE(FEAT] ,**_pn<HWP IO *s3,l7Y- New MB,AMP* C~ Maya}+aod)X896XZMDRA - Uk Ge  Add5 -+1#r'w"4 IX.1t er 6)[a15 Mie !&Ovk#__dupG 2603>Meo y p!#ct E 6 gp C(/ʬ%;),Am%m)ڢi s (nscd)y mip,Ho Withseqc  l$):%ld.*aovge*li910QS$ HUgQddrno-aK527Kpi uPr806Baih_i@ P[$pre3, vobj1-znQmlup*u*clTex Q ,yY1l% dyic, ng. |?yllC.Aw W%: TLSMke0217&ch%a&p*SOCKS5pxyq85Sci jnu8Xnghttp2 , 0T pP" 2 (/2_/{C, web?vul3 tdDDoS1_(RapLResL448#C sus. marF3Tf%.M3Bcryptph34z$iI< uthCcmaԢI7igitad E+aW$7Q4 kcs] rdos__* rc_ 970Ad(Gm s:Ҥjߤ%Ti;leF7 R NomWkedb;tGUa cL]of)qZma0( inK0 'ar, , gf, , nmanTaLf,z.pm 2lin]  /l)_bfd_t_geymbol[_))2:>r:;.ac4rol2soe(R) PROS?Wi)WiFi+276;A\40964\,meisma63<ʾ9vR/in]31]2RD;A.Pre3{";v056H807 ' n2# =dAcC*./!@/@./3424o4m6x o?~*C "6ty'PyCA'I  i Cibv6|:via2 l2393BeA-'C% Goo>!QBy[:c(9=_' _me38468<G%29>?4s26teC ] -GNOMEs?kFyn #g<0cms @,#: GVaGaf$-e t*\"i'&=9 Wg_vX'swa(t4&ime n9Y  )26ide- Dm E''[Y6AK7(--#Mn zword[(,X4Tuser|g+2p oun:ºE1" ylZ'd(1)QY46B* c-ar@fFaeKchJsDN DDN ) .4re@Lv{API.6 /(1.1#)A#103! 32%_sq ()+misy?K(^90 aBaUnd2in _ )3112D)Ficp;0KnJ#fIDsQ&Q oToo.CARES_RANDOM_FIT/R*) mpiF\ :|=I, >( 0 to.=^<)m re~Hpalg2hmG,6/166Z8:i}in_T_ 28Q!}z!43.9 (.187: 1PKKy65cE07$5*=$ gR?GNU Mr"& arbit p aes,sC};ff# o )H4l0 BORCs1-4^7=AӎR4@s,(4:.6<1x 1isRox:R@aN;-va/m!ze`9E6<]>qosnR0/Ki(v~syEby eBn ~n-}chI4S6s/Jin une$0orm"tPsV weeachֻahelfa`hip 1y} # buceD(KDCIrb5: Den^8Od'un}B 60`hPdou=' TGS8 c3997AlLQa "TR #wpP,XZ ,GgL nVt[,TFOvm?,F!pwdx:sAH4>s5D®K =shed DW198= jsmbd }4to& xiNC@QQoof96)3k6 uJt5 d-onn[ b]?9R"rpcH" g!d Uslee)76T4D hz)'[cS@lkl vX 5~ANTMK{#B- (envideW 2'GrUnifiTBo>Lo(GRUB)Ʋ3lyfigurablcumizb:l:@aprchcturSbekern '%%,`uVMhardwavic: bypass workX'fea` 001 nutl!NU TsLayhI(GnuTLSgCEcryptphHalgorm]ocol6SSL, RD : tis-0SA-PSK au nt$598K+fixz+:4-0553:reefjeT d7ibutruJ67FNet/kSi"(NS k . sa pelopmc-enndij a @nsvulneMin?aL"Tk?6135sudota1ut ows  to= FusersQpermisy,ex te privgomms,oXC ^ purpo hav]oga BugREncH(8487: SdoT escape'rol in0reutpS6SmN42465NT Cu ,Reg St V|sOpenSC/ ismG cws.Tfocuse" n Boper zirq, ТI#d/tal Zszj=k c PKCS#1.dM92 luggA4MO (PAM)aAuplpoAIne oi @hV H.  *m: ImEpHost e IS in(_acc L oACzB 1096  P Linux!,yo K] pf: runn@kw41009)IUSB:ia mos7840: crashhWumeF2244Fcxl/\--fret-of- ercoshutn_50226tu  %s U*x1lectMro )x: `scpt_``}-jarbit,sTd 2336)si5sanz*`>_K` meJ/ cre()`7p7)<net/smcil# rmb_d2 uSMC-Dndump26615block alizteg-zero befwriitmMai385ii u ur_- __fault()V499VT: &tx > O5018O, do &eUn_"ctx hb669l: avoidtundSq$c_pkt_len_̩[ UFO\9nfty~:Ӳf!lSkb_=}51k qVirtuai vironw(v ) 83~=quotthK 9287)[ vd}IPv6ӡFuxe 1168v tLQrh W T004\c: 2 h[X 3 ssp;HTTP, FeLDAP}2 ~j8 exploa mixcflaw321SH ]"a numbe L? UNIXs rIt7 %bo4Tsh(4 trat BineP@P(BPP)87*nTjr via vmehP51$ 3c Btow21 null-ptr-deբ__ eZu2739@ AdPF_PROG_TYPE_CGROUP_SKB:hG6l3LINK_CREATEi64ivaBvrrin# afe 0 fs 4D ttr_s. ed  7͢_ube_m i_k"_Ĭ7675sdiv  ;988 arm64: ysO movrokenR (D"ral) eV5NxfrBone-*inNO11SCOUAFp_soH25HISHisHnKVM&SIgnnCR3[4:0] $-8IX t s lkexhaO2-0480NULL2--8966221527546 257 8414l\!kN2_|8r!b/#J c459a _!sK*"_ 604|GC'.0 ,unix_6*eg( ic()o31hO\ zp9Wroup(),&l067)ev '_s!u9u3F C|6y A Dtn,40Nird,;572K;dou}8#_cLnvb9W84HCI: glob )syncd86Sb"1e!pUARTSETgTOIGua$tty_ioct*3fH745y89912IP_CMD_ADDSWAPU /k"f&__w![586Csmb:c9 OOB/mb2h8+5mm/s1Vinan ->u V8$Cc&teav#_pe1dic28F[ ?A258V]dge:#/in - "_h _fh)_fW2hƯ78]/:DETH_P_1588 dP ^î0Pi: f _cd& l,ooo g6CIFS jDeM0I,V$CoE*Vyfr:%_ ed_*d&9u66a wet &! 3LR#X2g j@sG4֔txx2u՚ lxswp ru0l_tc#F cD3Ki2c801mp@-on r 7/mc,pucvfsU,-W unNd?<*y.GdestiR1b1<]&DFa"$ymb6)`Q1076gHarfBD-e &To$iFMhRbR:;O(n^2) g#! conE9.:Avahi DNS??0vB/ M *t#Z2CCT?iT/It B/atddd/an7`H~ -ab?|le= HC2RK,/no,I$peo tot0O٣ fi harE~ A k"Q<S~sM"(:&g"d"-",h$aT -G9 '-E"y "f1AES-SIV&z /a 'D;i=-emptyocien+9 9~Exd  ntO;DH H+s2y:4 OqHN1#!Ga Xly n'9.42ore*!bvN9. ;8ÎPOLY1305 MACsI- PRPC[9i")p|P23;'V -N=&P--8g,ab,b (pseWJ-)#*10$Q$caes/ntfs%unMce 692]N \8AY F-H Mn :š70/V7LSB A C?sXgrODK?p, RD-Bus?r,泌s, o&;39#b/keepsA:fe:2=lin316<l s^! >30wpa> d y80_]3mglruI-u1>e2\RcacheB92B[EMR] [TBOOT OS] SUT ld1gonSps9.2 TOS O>CPU -16 ^BUSYɄ6$F t - NMIv+E30Eg0:6f:00.^PTP getCL l[fm/I*7dhunbinZx/O664$1 /V[ "13@Zl 34^ ;inEĻsm7S0R0.91penXt^m+NsglaUd 4F /<p),AmR7%mXi:J (nscH#p9$otWo$seqv0 l ")_;Licgs 2z}Or2-CN-1 9Se<F335PGMuOin) YY2marmB0'lVrLZ1Zascs N03 K#n-[g4TngDv$ HypkKpV (X/2(%{Cyp8ONTINUATION N9sPSP18 4 K](U1 K S8r+ K KOSXf2487' ipv6r{= S7 Ufs:F >9in_br_ e_0 S89 #c-aOdefi|hn.___seDJIRA:Alma1-2894BUG: untfe faultaddrcf16bf752f593ff8 [aTlT9.4.z]k35672k[HPE & ]quQ mergg icnsl patfix6220x9]/ 4\/_de.c:51!\68: DPLL-ݡ71)CNB95schedpda(TCtm v6.y764.IPv6: SR: bemXS69TRFE] BOt sswapuo U825#IDs,uwsp 5Ogfun^8  d.ۈ595ީ]autoc VFbetTx MDD nt9083MC»REGRESSION] N bos: brok'z10+ sockets495ybnx2x*1 sh PCI qe,s | k432  aff0P 409' TIPC m=mb$ =ilb688 e7is/c_dsaf_ c ;array @ f /ge_srFby_l 548ā cw hclgevfnd_mbx_msgV9v memlap whenlecharbuf,Y2-4862j ca"j1939:! MadlchY#_s_rw 3mm/vmsfu+ akeup_k\d[w g zon? dex 7ns Us%bi,eBPTP WQ xmitb on ckocs pulMm' pÐ85B f_t usel  <ze"Sa| 7avmw fAd tag cW435e;injcriptehavior) tcpc9 _Q__zrcp_twsk_uniqu.90 ( _hmm.c: src_pfnc \854Ir8169bIu RracTxRa`r givcfr#8841^ytxy iWuf. /s2isdhv3+ octe0x2: aoff-by-r7y sHpaO95blk-cdK io 1 663z  Libndp (C NetworkManPr)Eat vi_ , er$a 4bDisP alsoDlUi dp n&NDPYl:9[r< ngfield5564t _ firmwa| 8e B$. rT  eoRi'g spTm sb*iize3-31346Comm (ino (CUPS)- Yp*lay( c: CdM*nbitchW 0140777~2$ 4dpkres,4032'b k ull Ari) l.c ogictBz{eZgn[524P 4w ngM= IW 5_1try_b: f m U 7J bp acd7 _ r_ cel_a c3 dm:6{umf ho YsuspendK88ip ;ip6_y_mp ify8USquNfs nis&vd uh8^98^nf  >s } { sepa^rs[(sO3UicmpSNULL|-_build_b!58 bbigeirq;NAPI ~s0Rsto.shut_nĚ8 scsimfdfc_l _ptp_ up8Ghc_ o Īrx_kp],`X5`pRel} baef$_l _þ 24]MovPIV'@unregistto#n uph5*9o$-xgbaunde I7e: bXer"lifeŒdE0/ph6mipleaws6808, 706599e?:R2awifiԄ97Ą52451ä78¤4493794122r6igc!5Admaee/idxd,182,R7419036,"5ǂe!6sw#eep$4<5!91ŭp׺/x86*6\i40M602Ÿrtr0/2 push hg-239 l-t sc,enh xd ib~i=%5v+ 7^N;pa/ .H #d_/{,n\6345(f*f _rb;(skip  v/ gcz6581I;t_li:"figuI I%elgegd6vfio/pcL ehINTxs p 1 ._bridV  %/**so!xo*p.^%^rmut< }gcq_ͫab >e25e% -#__nexpr_lu!t7$c;b19bSc:i(pe\H6H:rm cas3epa,mtackj415j+l svf!Aa 3xA~ diL"r  gR*ba$h#onl7l y4ecnOcoc'OX]I96v aLAGJ)deYyY*_vf00  eTmP:s>CcS ZseeR RDRANDCoCo V8J%=tlbLF&;Nv;SiufFPdoas_ikspli 7pt_aS\Gn-of-b.sopsê8map_Hc7in&_'Oxusb-storaealaud:CG\AlaO,86ms$=Ÿ9Vc-EnSpied6 N ŗ5+xhHt EDѲ=%DO-=$[ Bi'_]ETIahF7lai-as-LCP but aaOCe" V{#>Ln0t<_4_}BD/MSIDmsi0p@(67x6" WARNgx.{_mop000.pr6gN ro% JƕRe t 4;2Is10o6 isB>or-mF  ":v c=<'KXK_oha vpFX0XfcEfi: d?(% vma ql is P' ) hDl%&(>P/pf,M; P v _I*]v% ~$ V"0KSe * gpioTw~ w_2Ieda:Y4YW"f;i fPalA & -eCL; Jr<$cppc_WJ2_&, wx&iJHgLC274C-L b[Bechr/4cQcy3orKUp()T)á75.6ec IGZ:n-_(r}bC4w6HJc0h,r ?WX(F 9 5 im(bl"N0rU cil,ah Yfig,p6 l2$ tartript)pcmJ Aur ] q: unau rizHIDnPn s asP rokjarbitcomms v 86Z: AoT AVRCP IGpIVv df Arrs IndemEhV! 7vp ookQrt/vt51596tOBEXD-of-,rI `4`aLavrcprse_ma_d2z2ze3{89{m_mQribute_s4n0nsy2(44431^0`t29F-dnss8|at sNDNS3definZer symbol c&taJu)yP,chd,@d op=  &dhshtubQsol948G tpm2-ps5(set "+zTruP; M(TP2.0susMsp 9:qugo und'y5_check)Q4Q03Zpcrl value not WPeTCGNU nano smalfdlext E: runnp`ch`K own`̢2e2 ;ZreplH-rgyU#o^6a r -k-A5742B@Bubrw (/usr/bin/b %engun%derEworks,uivin n 7R 2fpak  ssboxpnt= (--)c4247d5"V:cDosa vD tr_"le  h !s\623[ CUNIXS(CUPS]@a p*lay,Isimila~ pecupFppd:  kredPPDvKerberosnet e\c. yourE? elimtn-_ np*8dsm/Jun.Z ]o,eaH helpxx <rdty,"#)Xce (KDC) rediugc3(RExpQsyXML docu 6>eN: DoSC_ResCPr 060B Tu !  l|txp:g almeldd dumpå(422mSieufuRequiri al_inve_ ]6824]mptcp|7 uaf__tiU _d JsyncF58)&p| /auxsAUX0<q71RDMA/bnxt_reGaE+  up L( -2 PBLM0?!mlxsw:'rum_ipip_me$kee6 eIPv6r4 d52uc> ?ubcain&_rcv_ _adju5312rdy b.e .y*hronY R$lHrro.9 .Yoi aRbecatonly[ifin hadwhol. lsomirror LKdfo㱓UZtd S%Cont7157NzMr8 1>s,^mp{ oep :.v! avaY ^ spUEK,rel0,bbroadb(WWAN)APPPoE, TVPN g etd t+H mHfoRoutm KtBin are5drea[aAl2-9.5.z] (JIRA:X-730iUerWstoinu#sieipv4.'e-%ڂ1Zydo@\-rqsg7g3661  H%opD GipuM^8ff؊68 h /dcDon' pK()eqsk_queu n}(= j15 arm64/sve^ih* cCPU tehaSt)i40Rfr({nAl'ntex,#zip2Caly',-qua #> Jbodalc'pde4(hEYh'#:DxT(hd-il19900)!T! '*sQ b ep=0S5-#PBy)O*Qoymk(o1di. O 718kEdb}v_5P.i#EAwLeGt8~lhm#S51K&) W/zgets1 'J 6Oc :keRCUAtigmp6_ ()|2175'OovlUAF9_dey_,nvZmovdput+_upd887d&atmiaf[!H!ɬ200udfsR-o' in*_f_X2-4982vmx3al&a izin'_pS1_xd37799p#PTra:b,in+*=,%7,Ijqltwenflex6Q-l!JSONEY =likdF" . You:/sl,,p,ns sctuOQs{#!Zsawk, gw#DF/Rf $ -jq:ha-ig# e&+Wjv.c:jvp_a._2333hOASazNo,j-Xq_fuzz_"Sjqt_vfm!8#xml2 dhop "a5" {: He$(z)<D*(97/WTyYfuL6L IO3BuildQN,OLbtB1ok6{4) x86/:/< -p NUMA 99GL.=s b<k mteM C [-GNOME%loopD,n l; ,unդ-V  xg:1i__msoY525}E$$dN9Z9$Ų:"9O.<mii_nw re<+6Z/m :b(eo  P 457/% ya11 SQL2(7n ((ba0. Aqubt&92N<ed%A!a sk.!APIB*v ǫesp N aga\"enjo&powerJEn 14admsth<"fgx)D ql5 T3s i 96"rnL|34Uni%GICUQEr ull-fb7!{icu: SRBR5::Tag 52T&mslUAF x&"atrrup.APtJ 62"Wrequ1 -; H.(rcials*9URL-708* SkiCIfry8gUHVS_UNDEFINEDӡ9~C +'p y 44eZ2/ G:l-ish-hi y[$tp_&_.ver928+_Ycclb)5 W[8Ee{'"uoF`6.-53;x{1bDqn'_drve2/e'/vmw_vI:foici_host_do_m!eB_278 pPneas Q qGi 7890 tiZ R%_a _e6ne]80\0]^ ztap{_ _*1+7nO8*SSL ki=>o s L;:(:)T.+m(TL:t~l ` jthPPy o FC7250(keLcH ,n'trt*S_%9T iV {MB241! ;b;SmaIDCFillN^Tn6Ngccq [ mp rC, C++, J/, F+, Oz!CAda 95 H30i jUn@?O<~ > tar(HTM9s3t!OMj$3,hod0-2No:O XIyt%N}g 04 [ K :\if_h -_pi7P# 12k#&?G2W'bpf,6_ _skb_pkt_18=;'dR!'$G cxIl32895U tlb[8MY<V)(sp,+pufEqgYS1D rtw88[''C"to:"R Y cQ3]]_N flushz5Ai2c/WwaC @PH3$tTl! f!/c<"sorIL473 arv]e p 6$sev@a7KsLT",s7ioISO 9660 CD-R im. L #{ybsdt7)(*,=_Rws CYY񤄦poH )Sskt* 9? R>at_9_Y_^Sk?6&K ..U59%D5ҢFpioU>Zo o>583 dYIapHbR?@ =  HDelay putR6c->imldޢH55B( Qgdata types and dynamicing. Python supports interfac.to many system callClibraries, as well.vouindow_;s. Security Fix(es): * p-cryptography: NULL-derefnce when loadWPKCS7 certificat(CVE-2023-49083) For more detaibout the sissue(s),clu] impact CVSS scG cknowledgmento/r reldFformation, R pagmCs,Rs:. Tgnutpw8rovide4GNU Trans Layic(GnuTLShy,?ichle oalgo9hmhtocols6SSL, RD : Vulnerabilnn tool p:rs~5-32990)NSCT extensiJ89JName SANT_I8I po< T_$_figure_common_cipdsuite()\6395BugQoEnhaP(3dBZ#235962+`F1)\E2l53125)PKdwc3: gadg^checkat evKudonot*ce bufGv7810jdo_c;ge_(ܩuse "n unmoed/lours s]8498]s390/sclp:<$CB;es>9694)mmig: fn8D"orrppdN724^*fil f_sntrcrashiremovaltuninitiaٺϡ2yc72cmbli*Y-afv-fre cifs_oplock_breakQ527Qctline ze\ongsosT%_rcvK71hlAzero-ordsd{rx_8io_/futeluure_waitcle up lyef¢-y8)/keyslab-<-of-b)d3_task_fmIp4-50301KVM: x86/hy2-v: Skip aica^ ddSsPV B flus835_w : ath12DecrD TID+RX pefragtJerr%E761EiputFbas fowaworkI Go:x govnlowf4896&Vim (Vi IMed)odhz ver*Pvi eds vimh gpa| raF.K5 6),i-*' HID:L ardeC32ton(g~s n0 bib 55T pol Fwemi-unrrfD614DALSAv -ao  UAC3 cHbsescripÜ975ID qiv -6e EBUSY l 37Vsshba=SSHL. It caee d{. serv lr B:  sf l* nfsd`n't ignU^rFrnedesvc_c_regr2firmwaDarm_scpE _9yab gn!9h\fŦd2w 08 unrpc ysY zale71K?ƣWK6fiFf*d #_dpa 81 cfg80211P e:p iQ_# a_v ult`49csiO pfc / rdcdreiv]1)ipv6rMAC #isrbjant-tim:70UAF/GPFgnil~mdt_)trol36%x#4+( l via ex@vsoAMDHcr 4-3635^4U0vjapAdd7di\ IBPB m g4_* : )pot% C$pxra0)'283,so qimd-dMshameykWC,WB&4668wSqucsanrsymbolk~zeF74 vbeenw icelo f()&]kŤtd"in-MMIO"$@72 rx]>aĢso}sI/O c4-6iG we r heduley{06Mm_pcdd H_cl _(I?in /1e d 2posix-c'dspec64n_)_s=m 1~V>cau_#!M29o/rwsSNOWAITvO_DIREu#write[305a6 4Pir%/vKdc_queuEG11VMX: Bu0Il PT_ulzgu1/ho mH)hiCONFIG_BROKENj3xePX3t]YsafejulvvetI6Advis4 s2 sRDMA/rxe"sqp n reqG2&bafErq@lPttags 7 easei Q/ o8icu_Ĝ16NafdoZ? d skin_iG6603k-cgrou+R @cg_unE_onH7nfivmoc# R)_(_a T6Tbpf. chg/FhRCUavLj1939_se_newMkb2  xX4XU pX C  l$di\ =%pa &_ +elj- p*+iowqkill2bef:ƾ70 rtcH____ wasz$- fulZr'73jput '@%gM&is 5 deO \8*ig/" invT gb__ul233pvu B?4zed5`p_vsfkd3689mp?ximumshtableC INT_MAXZ164!2Hkd,(bulk Nai=s u!a D, bfq'wakq_splvR3zLK0B~gr@  M zswap:synchrze\c "@ CPU\tQlugc9caLWD  ics Ud-wpE/P Um#m ap9cpfifo_ _en 8 etȱjt$$==TU| incKBo 6powe /xH$Jicp aO4:NAPIom d 3iuc99papr>{ ss'0'd_353v |MimaJ!@N60 l/dVdi3+byL DIMD \s1b œ26a1ra#_m uî4/x%bmap >BOe1D G m-UEFIL e Bo) T2c 8X ta-ar$ ep->rdl%#8J h)=Ll.=In&:^ap-$aenp-thgh ,l4NFSL# 4_shut#/n_ bFSea p/A !pm72p_:_r6Y44BluetotrtK+inup  79brcm cT r)cWwlnhy_iqc}! ms_nd80&ûbc@},_z(_bo_naC7 .W=mlx5PicODP &Ɵdrm/xe/PTP Uk495hidmaQ_\by{ jrtw8 1c.l_hw_s le/ 7X`mt76925gl n,vi 798`I%'x FhOPPi x]ert void$ fu,ıadtin&_[_Tto_vi acl_/ aBmLogc(Co]  E:gred?vrf:Aul3ml_l3_oWf te beuEAM_OPTION_TYPE_STRING &]0xhw2 wp2pZ3ūvxlO _vni  uoff,17c6ip6_ads6ASoCOF[ thda-daiDAI18/®?LG @T'?b8 ýX l.[.weightways<+-L80lun%_buddyj. 4颎pm_p_bw_* bX( ;a61iwmvaOd 'tp'@( ac"1upSTA8 Exy 2 ify \v6i/kv vcpu7 81xsj IsVofeld_&54OZspso H. $c ]!ra a vh%VL8^ "xe_0up+0x12c/70 [rd]" ua:DR6QeLye|._ru*loSf*_ lypy SQEs at z}W!6soft|L r0_u_ j64k_90ibmv0l& sen!o VIOSOA4N"n:_h i&_med_)%d 8D +holz3m!8hE-iCc nulf_imsg_ ǶtcAdT"'a'#!? r?-dstX6ds < r]M t:, las6 U7mm/;8i S; f."o LRUH 5pIX6, :op+6TfpFfp!rl1 8Mt_mNgeneopt)Bf onƨ20oa @hea * 8 c disp 3  +14j5$ke_k&C$(B$xim LSM Sc3 & Y&A=]jsp&֤n\ 'X ,WAlma&R NoedW'grub2V'pPC224GrUni daGRUB)Yh n@n 5cum٢b:l:'r e ". EbREetyo .f,"`E,&uVhP/L K1!:-5/gbxg l HeOOB W.457h C8)D-8; 1gI* QUNIXwFsP,G9ana&us{nd . 9::*|gn_WL/etc/low.2 ldǺ romi4!433ASQL 6C 6{ 6(b`e/)'A l~et&92#ed%eA!to6, ]*iskPEis 9$4niN ofiq6Q(enjo wflexiL -kadm[sthp44sag S4 sqli"CTiI*sH988k=S:Si&Daemi SSSD)Y$ 6d'PO tEW*ori7nuthent!sisOI2XEgLScNSS# !P&g@ A[MC)/ PAM.0tPwar< iJ-E!#-8 f[t b' vs] Kerb!3w| $legsAD-joi3 115COpenWPNki;=d$S2sP(:0QQ a f6-Bu--purO2eQyQ o&RFC 3 KEKawra}9255'6}*slub,5kK+|e,_ {|ADs QXMLcu XeK w^Z3U rigr mV/(sq1 b+³937Vxml2dlopbox?4f|W xslۢ1 ife =6a1&Dyn9FJ rfin"/.c&'[%, P)_l X0\*#i BnOC7A9 "BfOm,!1e1000eDh&_eepZJ&"N,c,u$C9OCl&t/sk(sk)->fa@_rs(? 9R)*MGMT7s~+%s?$i=$u/vt-disKV ty %icoh l^%40058X%prxamQԤ.6P40pd  rhad-vr V7LSB !>J a ggOD7# @R]uO=RD-Bus actE= X99Bd5dM :I3D>kK4_w92F 9ic_p_G_noš)N0]:>o<DExSyM*m98mUAFs61 I7S>$Sn@fE[l0IEx.};A!:!"_n;sen__:s9l2I'pRe SECqD "^F8[h9KA$s?7i V&5?$glc1g(/POS0Yp),Am*%m)ۢi YOL (nsc*uy=(nm W-fqL@ Da!c#_ ?:oaCgE'siF5|v%URLfedV0ub8"qdom H93 8r/jpegX8JPEGL C8KGs/RAMi<=fP#P5P(]9Zf96afs/:KB OOB write in the heap (CVE-2024-45781) * grub2: fs/hfs+: refcount can be decremented twiceF3Fcommand/gpg: Use-after-freIue to hooks not]ing ]ov\on module unloadg5-0622fUFS: Iger =rflow may leadebasXut-of-bdswhen hlsymr77rrXshQ90) ForrYtails ab8secu5y issue(s),clud impact, a CVSS scG cknowledgsn/rlainformation,R pagm lis,R&ences:. Addi al CAges:֤nc'Xise,WejAlmaLinuxR Not/MfromΑ OpenSSH is protocol.lsupporbyBnumbf z, UNIXthtctx e 216 M : q" A: Avoi;Xrl@ 8007ZtpTkvc()nt/acpi H5Hrtpcf85063:x pPCF$ NVMEMZ69Znvme-tcpUme,yru],_,_Sv_pdu\]iscsi_ibft: UBS hifA1arn._r_show_nicf9vahic ; = S Di'Mul st# ^ZfigurTN7 i9& P ~Mdd/a~ -aapplz{ lug \e S nd,v nw, ewzpeoplAc0prr< fih LnP a:W-AOrPUict> a IDj52616Vim (Vi IM d)dz dsvi ed jvi)u2in< $_l_get_exp4/vp3-4752oExpat}C docuW eN: 3Re^SECnDhF817gv4:IepWbiunQdu756hdm-flagu_bI byt<ea d6bppdd eckskbn'__txmuY377i8s#plHMWa$gmaxh$w4)Us  F2%_sext_s0oni 2-3424q  RCU g_Q _y" 7+gs  ownhiu__udp_ 5v :c'derlydes A0Axsk xp_crey__agn_u5 XgennggH2054Isdotdot_ r8Hw : 12#W#in"_dx_h_Vcap_n@b943g c- ie /)OSIX p),Am%m)ۢin!-cacheemRnsc dmp#| Wi"qż"n/+ ly : c uidc K dl_(*inO$arxLD_LIBRARY_PATHN4802)Uet)bnxv efOb-xdp-!c1(Blue!OL2CAP,slab-ERi2 W_cmd]a dir a qcfgN11:cwiphy_&efrcS7ŲUUAF,in( >mdu( purpo-7hav^o -inE r PEC 63246{ 2 save#>n r'! cp: Tu450A58a VaL* m PorH$% G. NG)  pG3?N3Q 3@B850188o'i ng__#os B6629qCZPA'&inS(CUPS |pp*lV03 ,A t'denJ cupsd.'%om69x Aun 8-A843*P$HID:to` Emt_*up$39+,#au'h _d _X4|mm/Q-f(dVM_BUG_ONGE(PKPoisoS())funpktp:)-NULL derunkpis n' 0P acy Gu 4PG=GP,=enddigU,&T&s, )ia+FPG:S/MIME :I,losdVarbit9D 1H6897cdrm/xM((a-fG?r870`lerB0dvH_s< "main0_7 vmwgfxhFe / der9aga@ SVGA_CMD_MAX_DATASIZE?7#usbhwc1FrI=c?b eonwrj+_CL_tClA 828o}ep)2-ha`ma>osd_ma-\5*G 0>; 1SteC]PF-GNOME?!'2,n  g^4} y 7Nig_es\!e5_i13601!HurlR3:Unne#:mprH#". Uchaus{o64a SAPI70lysIly |H]71]=l[GmbgD ET foZHTTP >4Hs®660!446g~YSi$CEerSt&zU' 1rG9:E34#7 vm_7_ioctl"uyOC$ 3ьo2S#48 p4:2_?$&4OĬO W' MGMT s"É9u/-atlafra)[RXl  30(hc&3F8vVAi32a5cZ[ : or d/6W$upgCIeLDAP dA Cxo0>cWie#908UL!ki8D=Hs;E(:)UEREa ll-A 0r7nEyD .ss6?vXtOughyd PKCS#12#111 qBnDn>xd )}CMS ;:546τk0l&8dQUICo8o m-: V`+ dgst` sil? n o9Qw -a5[WG1.3s?eH ~6619~oIOCv(160a6 {$e$B@ -d OCBon/-- 9 ?8pi/pZmal^21%^%S%`=pon0Y0"6ub< X5f7Ul"c*: Quad L~xml.dom.["d  U-:/ qptc e\y;385aASoC" U@cr_rt56409qui/]yW40WJ: r>` $in&_"_4s_9Aoy[25O JXuxGet"d, %aal/OH=gss-fnkH|H; %6 >: H"pw$mv256-B&U4B~ lTJ ic lo^ sz8ab3o+FaDcoWZ77R, Hm1P2r,u5J) Jl>asiblyIilLmebdsL#6p..def bf>nN. 0Scvy-sb: FP5p#+lG vs#ne5BdVt() ac@irqc1B/gv2 W8%9RDMA/H"KACO: p6_xmit83=88(>(Fn_9N<ˇ0* Ɖ = |+v_@;/ 7.Å27 ALSA(oi 8H='Al2cBLd9#ue_oW3(ttb_hw_qJ U%_6mwCK33032smWm__pne*>c_n#I06 fb&C B ,[30ӗ *wfont#yphNFSv4/pNr/ _INO_LAYOUTCOMMITqnBmark_.}_Geid_g6svcr0( rc_ cpy 'K81X*tX%Xxve799$9'memg$C3~ APW\-7u CryV1Owh*WWRDE_REUSEyAPPEND"reJ/ edO/1wd*$_p  b]yc<#in_w$2/KD$AexFAT! a 3820~