SOLV z0dnf1.01.2Fa`La}3\kжԠWj5x86_64cvebugzillai686noarch3finalpackager@almalinux.orgrhsaself1ModerateImportantCopyright 2024 AlmaLinux OSkernel-tools-libs-develcross-headersCopyright 2025 AlmaLinux OSlibperfCopyright 2023 AlmaLinux OS1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_05.14.0-70.17.1.el9_0 22.1.el9_0python3-debugidletest.11-debug idle test1:1.8.0.342.b07-1.el9_025.0.2.0.10-1.el9.alma.10.8-22.el9_61:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.13:10.5.16-2.el9_0Copyright 2022 AlmaLinux OS4.17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.1python3.12-debug idle test1:2.06-27.el9_0.7.alma0.8-15.el920.el9python3-tkinterbind-devel1:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.148.4-2.el9.almalibgs-develxorg-x11-server-develpython3.11 -tkinter12.0.1-11.2.el92.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.74.16.4-101.el9 3.el9_1dotnet-sdk-6.0-source-built-artifactsjava-17-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug21.01.0-21.el9 3.el9_7Copyright 2026 AlmaLinux OSjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug3.11.11-2.el9 _6.123-5.el9_72-2.el9_2.125-1.el9_37-1.el9 _4.13569-7.el9 _5.1232.1-4.el9_4.342-1.el9_74.el9_75-2.el9 _5.1239-1.el9 _6.129.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_721.01.0-13.el9 4.el96.0.8-1.el9_013.18-1.el9_520-1.el9_52-1.el9_63-1.el9_7bind-docedk2-aarch64tools-docglibc-nss-develstaticlibsmbclient-develwbclient-develnss_dbhesiodsamba-develunbound-develdotnet-sdk-7.0-source-built-artifacts 8.0-source-built-artifactsLow13.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_43.0.21-37.el940.el9_4python3.12 -tkinterxorg-x11-server-sourcebind-libsjava-11-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug21-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug3.14.0-13.el96.el97.el9_7python3-ipatests3.9.10-3.el9_0edk2-toolslibtiff-toolspostgresql-docs private-devel server-devel tatic test upgrade-devel9.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6flatpak-develreerdp-develglib2-staticstreamer1-plugins-bad-free-devellibnetapi-develwinpr-develpoppler-cpp-develdevelglib-develqt5-develython3-samba-develqt5-qtbase-staticvarnish-develxorg-x11-server-Xwayland-develedk2-ovmfghostscript -tools-fontsprintingsamba-pidl6.0.108-1.el9_09.0.0-10.2.el9_25.0-7.el9_3.alma.1libvirt-devel ocs1.12.8-1.el99-1.el9_43.el9_4 58.1-3.el94.el9_49.3-2.el9_03.5.3-2.el9_0avahi-compat-howl-devel libdns_sd-develdevelglib-develbind9.18-devellibnghttp2-develvpx-develua-develprotobuf-compiler devel lite-develwireshark-devel1.3.3-13.el91.5.0-5.el9_5.alma.12.0.90-6.el9_17.el937.4-21.el9_74.0-7.el98.el9:2.11.2-1.el97-1.el9_7.124.1-5.el932:9.16.23-11.el9_2.12 4.el9_3.4 8.el9_4.16 24.el9_5.3 34.el9_7.1 5.el9_18.29-1.el9_5.1 4.el9_6.2 5.el9_7.2glibc-benchtestslibreoffice-sdk-docmysql-develtestsamba-test -libs20230524-3.el9 4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.31.2.12-2.el90.0.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.15.0-7.el9_5.alma.1:1.9.1-12.el9_52.70.1-2.el98.0-1.el96-1.el92.el9389-ds-base-devel:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6 3.el9_75.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 5.1.el9_78.0.30-3.el9_02-1.el9_26-1.el9_341-2.el9_53-1.el9_65.0-7.el9_1dotnet-sdk-9.0-source-built-artifactslibvirt-daemon-plugin-sanlockmariadb-develembedded-develtestingw32-glib2 -static64-glib2 -staticysql-libspostgresql-test-rpm-macros1.3.3-10.el9 _2.143.0-5.el9_2.1 3.1 4.3:2.3.16-11.el9_4.1 7.el923.2.7-1.el93.el9_64.el9_65.el9_75.4.2-4.el9_0.34-2.el9_13.el9LibRaw-develNetworkManager-libnm-develcups-filters-develdevice-mapper-multipath-develovecot-develflac-develontforgelibarchive-develksba-develnbd-develsndfile-develss_nss_idmap-developenexr-develjpeg2-devel toolsrepokey:type:idshadow-utils-subid-develturbojpeg -develzziplib-devel1.20.11-11.el9 7.el9 9.el924.el9 6.el9 8.el9_631.el9_6 2.el9_7:0.9.72-5.el920221207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_59:20200406-26.el9_2flatpak-session-helperpython3-samba-testxorg-x11-server-Xwaylandbind9.18-docruby-docyajl-devel15.6-1.el9.alma:7.1.8.1-11.el9.alma 2.el9_3.alma4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 8.el9_1.alma2.41-3.el932:9.16.23-1.el9_0.15.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1284.11.1.el9_2 25.1.el9_270.26.1.el9_0 30.1.el9_08.0.44-1.el9_7bind9.18-libsluanghttp20.11.0-7.el93.71-11.el9_4 2.el920.2-6.el91.1-1.el930.0-6.el91.1-65.el95.13-14.el9_78.7-20.el97.el9_0.11.0.31-8.el9 _5.216.2-19.el9_6.12.el93.el9 _3.158.el9_5.12.0-11.el92.1-2.el9_34.el92-3.el94.el9_68.7-11.el9_2.17.el9_43.3-0.el92.9-1.el9_55.1-5.el9_06.el9_16-17.el9_6.29.0-7.el9_2.alma.18.el9_59.el9_64-1.el9:1.42.0-2.el9_48.10-2.el9_5.alma.1 5.el9_53.4.10-4.el9 6.el9 8.el9_7.12.0.15-32.el9_532-5.el9_41.0-22.el95.2-1.el968.4-11.el94.el9_4.16.el9_6.28.el9_7.17.0-11.el9_7.39.4-11.el9_6.16.el9_47-4.el9_7.10201107-6.el9 7.el9_7:4.9-15.el98.el90.3-2.el9_6.13.1.1-2.el9_4.1 5.12.2-2.el93-5.el91.0-9.el9_3.alma.13.17-13.el95.3-4.el95.15.9-10.el9_41.el9_67.el99.el939-16.el94.0-5.el972-2.el96.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.1OpenIPMI-develautotracevahi-gobject -develbluez-libs-develfile-develgcc-plugin-develjq-devellasso-develibfdisk-develinput-develjose-develldb-develmicrohttpd-develrabbitmq-develsmartcols-develtdc++-statictirpc-develudisks2-develv-develmpg123-develunge-developencryptoki-develpmix-pmi-develrocps-ng-develtobuf-c-compiler develraptor2-develepokey:type:strspeex-develtexlive-lib-develpm2-tss-develwavpack-develyelp-devel0.42.2-3.el91:0.36.2-8.el92.0.7-6.el9bpftooldovecotflacreeradius-mysql perl ostgresql rest sqlite unixODBCkernel-abi-stablelistscoredebug -core devel-matched modules-extra vel -matchedocheadersmodules-extratools -libslibvirt-client-qemulock-sanlocknginx-mod-develocaml-libnbd -develperfoppler-glib-docython3-perf.12-setuptools-wheelqt5-devel0.99.9-5.el91.0.9-1.el92.0-7.el9_211-32.el9_08.10-2.el9.alma:0.82-6.1.el9_61.20.1-14.el9_2.1.alma.13.2.7b-11.el9_74.04-1.el9_62.0.2-4.el91.0-21.el94.5-8.el9_49.el9_45.2-9.el9_56.1-8.el9_67.0-10.el9_752-32.el9_4.alma.1:1.20.1-22.el9_6.2.alma.13.1.9-2.el9_624.31-5.el94.4.0-10.el92.el9 _4.13.el9_6.25.el9_7.22.el95.el9_17.el98.el9_25.1.8-6.el9_14.0-284.18.1.el9_2 30.1.el9_26.0.109-1.el9_010-1.el9_03-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.100-2.el9_31-1.el9_32-2.el9_33-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_44-1.el9_56-1.el9_67-1.el9_621-1.el9_62.0-18.el9_7.29.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_6aspnetcore-runtime-6.0 targeting-pack-6.0bash-develcc-develsdtarcorosync-vqsimdotnet-apphost-pack-6.0host fxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0xygen-doxywizardlatexfwupd-develgolang-github-cpuguy83-md2manrub2-efi-x64 -cdbootpctools -efi xtra minimaltk3-devel-docsjava-1.8.0-openjdk-demovelheadlesssrc1-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs7-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs25-openjdk-crypto-adapter-fastdebugslowdebugdemo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugmclibarchivefastjson-develguestfs-devel gobject-develinput-utilswebp-toolsua-guestfsmariadb-backupcommonembedded rrmsggssapi-serveroqgraph-enginepamserver-galerautilsingw32-binutilscppgcc -c++libgcc64-binutilscppgcc -c++libgccnetstandard-targeting-pack-2.1ocaml-libguestfs-develperl-JSON-XSYAML-LibYAMLhp-libguestfsqatzip-develrepokey:type:flexarrayuby-libguestfsshim-unsigned-x64x64ystemd-boot-unsignedtransfigzlib-static0.34-19.1.el9_641.2-3.el9_7.11.30-6.el99.4-10.el9_63.0.4-160.el9_07-162.el9_43.el9_54.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_42.2-1.el9_5.34.el9_6.1522.el9_7.15.15.3-1.el99-1.el968.2.2-3.el9_4.15.el9_6apache-commons-beanutilsbcc-docgrub2-commonefi-aa64-modules x64-modulespc-modulespc64le-modulesjava-1.8.0-openjdk-javadoc-ziplibguestfs-man-pages-jaukmicrohttpd-docmingw32-pixmanzlib -static64-pixmanzlib -staticperl-File-Find-RuleModule-ScanDepsython3-wheel -wheel.12-wheel-wheeltexlive-gnu-freefontvirt-v2v-man-pages-jauk2patch:ALBA-2022:8256SA-2022:5099249527695709369486003435218590610763913997007139018531482399586870980032262878139519420782152673178534001582034936433:00771942021030243440626951371068470693703879809092127656248596132640703458987519328299262134235815925661711452340576099158778325776424504869143621445369625396849708113344953838924624266533040369409316982945081844516675621312596785705712328446725357784914:014151262496567466805748951771027475918589397883111121932742418623930910427691750898182258213747698499204836647687992535377944336351225851607175884233306395016197548357895999407783494395056378738362374955676679928355192231334635338392899614663799735646452967757997734686798037117214762374446761780091435908893122867814790231771413394295016854386058275:00593123477422657891436101364889379585837627731140411849612627468343294660296244208785007101894296617406086398597018180708416237742760814951281815214911340958493050205185983892854660111101462240586531094224132342627689363148455259374244491697771079386357820130950954022233075869860090381428333376435581379080114884302330462517877806:0126374459170052939278323611434081078617913392039482127227686303466795189repokey:type:relidarrayCriticalrepokey:type:numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatus  ss||      ~~%%ggLL**++XX  YYcc  ZZbb[[^^aaWWXX]]``dd__\\}}~~nn{{wwpp  qqssvvoouuzz  tt  xxrryy5577//88..3344112200..00//66ddmmnnkkllCCccoommjjiiVPticb{{}}zz~~||fgTS  L55QQPPNNLL{{uuvvyyxxzzwwMMOIIXQQVMMMHHHPPOP111''HH((KKDD--))EE223344324kkkHHHQJJJuunnnyySSRRRSIIItaaallSSRRGGCCGDDCDZZZ___@@AABB<<::==??;;IINNOOeeVVWWWVxxzzwwyy{{xxvv      555ss  hh OOOttGGGcblll,,AABBEEAFFFEBMM```000///EEE--&&\\\fgl[[[hhgghg   UUUmmmfff,,**))*),++---(((+kkqqhhggjjrreemmoollppffiinnJJ   IIKKJJTJIKSOOObbbdddeeeNNN>>99XXXSSSPPPddaaaNNNQQQiYYY||ffFFFRRRKKK,,iiiUUUqqpprrTTT^^^```...FFVVVhhoooQQQPPPGGOO$$  !!##""]]WW]Wccc~ z{|}}~      ! "'#'$'%'&''' (&)&*&+&,&-& ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[ j\]^_`abcdefghijklmnopqrstuvwkxy z{|}~      !"#$%&' (C)C*C+C,C-C.C/C0C1C2C3C4C5C6C7C8C9C:C;CC?C@CACBCCC z{|}}     ~ ! D9E9FGH9I9J9K9L9M9NOP9Q9RSTUV9W9X9Y9     Zu       [w \B        ZI  ! " # $ ]=% & ' ( ) [$+ 0 [%1 2 3 4 5 6 7 8 9 < [&= \C> ? @ A B C D E F G H I J ZAK L M N O P R S T \DU X Y Z _ ` [ \ ['] ^ _ ` a b c d ZBe f g h i j k l m n o p q r `_s mnot [(u v w ZCx y z { | } ~   }mno ?TT        _`  r s  mno     [)   mno    ! " #$%&'()*+,[*-./0123U?U4567tu8[19`_:X?X;>?@BCDEFZDGHIJKLMNOPQRSTUVW_`XYZ[\]^_ZEbcdefghiklmnor!s!ponmq`_r[+stuvwxyz{|V?V}~_`[,ZF    tu [-`_omns"r"]<`_ [.!tu"#$%?WW&'^>()*+,-.tu/`_01[/23s#r#6_`7ut8[09:;<=>?@ABCDE[3G_ ` Hu"t"IJLMNOPQRSTUVXYZ[\u#t#]` _ ^_`[4abcdy*z*efgJhiZGjklnopqrstuvwxyzK{|~^AZHL   tu [5 u t _`[2u!t!_ ` ^? !#$mon%&'(nmo)*+,-./012345789^@:<>?@ABCFGHIJKLtuM_ ` N[6OPQRTUVY?YWXYZ[\]mmLLLLL L L L L LgLfLiLLLLLhLmmeL   w* $, %: ; &Q '(   )   *1Aj+,-./03K4}526x'&F7G7kU}&~&y&z&{&|&}}}}uuuF8G844"4#4&4'44444 4 44444z4{444|4}4 4!4 4 444hRiR\R]RnRoRpRqR`RaRtRuRxRyR^R_RvRwRlRmR:";"2"3"R"S"L"M"P"Q"J"K"T"U"V"W"B"C"6"7"<"="@"A"H"I"0"1"   !"~~~~#w$w%w&w'w(w)w*w+B,B-B.B/_0_1_2_3_4_5_6_7_8_9_:_;_<_m_l_=_>_|r{r?s@sAsBsCsDsEsFsGsHIJK+L+M+N+O+P+_QRSI>ITIIIU7V7W7X7Y7ZH[H\H]7^7_7`7a7b7c7d7e7f7g7h7i0j0k;l;m;n;o;p;q=r=s=t=UYuYvYwYx!y!zzzzzk{k|k}k~kkkkkkkkkk.. .'$($$$%$&$)$*$ $ $ $#$ dddddddddddddddd- 4`1`3`2`. sZpZtZqZ/  E!E %%%'%(% %*%#%&% %)%$%"J#J$JF9G955 5 5555555z5{555&5'5|5}5 5!55555 5 5"5#5<#=#2#3#0#1#V#W#6#7#:#;#H#I#B#C#J#K#P#Q#T#U#L#M#R#S#@#A#tSuSxSySvSwS^S_S`SaShSiSpSqS\S]SnSoSlSmSi1j1%s&s's(svvvv)4*4wwww &(&'&&&$&%& &*&#& &)&+C,C.C-C+8,8-8.8/808xxxxkLlLaLbLgLhLcLdLiLjLeLfLyyyy66 6 666666666 6!6"6#6&6'6 6 6|6}666z6{666J$K$<$=$T$U$L$M$V$W$B$C$P$Q$@$A$H$I$R$S$:$;$2$3$6$7$0$1$nToTtTuTlTmThTiT\T]TpTqT`TaT^T_TxTyTvTwTll|l}llllllzl{l~lll?b1b2b@b3Q4Q5Q6Q7Q8Q9Q:Q;QQUZuZvZwZc8^8]8e8b8d8`8_8a8f8g8h8ATAA>AA?@@@A@B@C@D@i2j2SRQE(F(G({{{{   HI~EEEEEzE{EJEKEELEMENEOEEEEPEE|E}EQE&B'BxB-D.D,D+DR S T V U V W }'~'{'|'y'z'WXYF:G:Z [ \ ] ^ _ ` a b c d  F!F''('$'%')'*' ' ' '&'#'zeeefegei3j3eMfMiMjMkMlMaMbMgMhMcMdMKLOPMNvw55 G!GF;G;TBB>BBB@%A%0%1%R%S%6%7%T%U%H%I%V%W%<%=%L%M%:%;%2%3%J%K%P%Q%B%C%77 7!7z7{777 7 77777"7#7|7}7 7 77777&7'777hUiUxUyUtUuUvUwU^U_UlUmUnUoU`UaUpUqU\U]UFFFFLFMFJFKFQFFF|F}FzF{FPFNFOFFFF~F|||| H!HF<G<X8Y8U8V8W866F=G= I!IhijjkjljmjnjojpjqjrjsjtjujvjwjZ[^_cd`]b\axyz{|}&('((( (*( (%()( ($(#(~!!!:e;e@eAeCTCF>G>pqnVoVtVuVpVqV\V]VvVwVlVmVhViVxVyV^V_V`VaV:&;&J&K&2&3&<&=&V&W&H&I&@&A&0&1&B&C&L&M&T&U&P&Q&6&7&R&S& J!J88 8 8 8 8|8}888 8!888888888&8'8"8#888z8{899999"K#K$KF?G? K!K|xy}{z1T2T@Tw[v[U[u[` E E EvwOPMN  G)F)E)a[^_dcb\]`Z%n&n'n(n     z}y|{x-y-x-aaanai+j+6666 6!6"/#/$/%:&:':$)%)))*) ) )#)')() )&)NGOGPGMGGGGGGGGJGKGzG{GQG|G}GGG~GLG(>)>*>+A,A-A.M/M0M1M2M3M4M5M6M7M8M9M:M;MM?Mxqwq xy{z|}@9A9B9C9D9E9F9G9H9I9J9K9L9M9N9O9P9Q9R9S9T9U9V9W9X9Y9Z9[9HHHHLHMHNHOH|H}HPHHHzH{H~HHJHKHQHHH:::::\Q]Q L!LF@G@kNlNaNbNiNjNeNfNgNhNcNdN^_`vX M!M\R]RFAGAN;O;F;G;@;A;D;E;J;K;Z;[;R;S;H;I;X;Y;B;C;V;W;P;Q;L;M;T;U;^W_WvWwW\W]WpWqWhWiWlWmWtWuWxWyW`WaWnWoW@'A'L'M'P'Q'H'I'6'7'0'1':';'V'W'J'K'2'3'<'='T'U'R'S'B'C'++"+#+z+{+ + +++ +!+++++ + +|+}+&+'+++++++ *(*&*'* *%*$*)***#* * N!NFBGB\S]SiOjOgOhOkOlOeOfOcOdOaObOQRSawbwwwww1U2U@Ug:h:e:f:a:b:6:c:d:i:j:k:l:kWxxxxaxbxcdefghijklm&1 1*1$1%1 1(1#1'1)1 1a[c_^`]\bdZ@X1X2XQRS<nop=qrs{(|(}(~(y(z(aybyyyyyt@u@v@ O!O\T]T%o&o'o(o$L#L"LSRQTDD>DDDlXmXnXoX^X_X\X]XvXwXpXqXhXiX`XaXtXuXxXyXP(Q(0(1(6(7(<(=(R(S(H(I(B(C(:(;(V(W(L(M(2(3(T(U(J(K(@(A(,,,,z,{, , , ,!,&,',,, , ,",#,,,|,},,,,,,,N<O<H<I<X<Y<P<Q<F<G<D<E<V<W<J<K<B<C<@<A<T<U<L<M<Z<[<R<S<vZU\u\v\w\n o p w?x?y?z${$|$}$~$$$C=B=A=?=@=D=O]P]M]N] ] ]?c1c2c@c F F F`_^i,j,`]dZ[\c_ba^-9.909,9/9+9ttttaibiiiii6N/N;N:N4N1N7N8NN2N3N5N?N9N''G G Goprp`4a3a1a2aaEEETE>EO[P[M[N[ [ [ 5 5 5jjajbjjj\U]U P!Pakbkkkkkveweneoeuemelepekesereqeteje;;;;;alblllllvY%p&p'p(p""kV!!!!!|xyz}{`]\ba[dc_^Z +(+ +*+&+)+$+%+#+'+ +mmambmmmFCGC\V]V`YaYtYuYlYmYxYyY\Y]Y^Y_YnYoYvYwYhYiYpYqYV)W)@)A)0)1)L)M)<)=)H)I)R)S)B)C):);)T)U)P)Q)J)K)6)7)2)3)-- -!- - -------&-'-z-{-"-#-|-}----- - ---X=Y=@=A=H=I=J=K=L=M=Z=[=N=O=B=C=F=G=T=U=R=S=V=W=P=Q=D=E=nnnnanbn C C C@V1V2V'q(q%q&q%%%O\P\ \ \M\N\c_\]`Z[^abd ,%, ,(,$,),*,#,&, ,',aobooooo7R8R=R>R3R4R5R6R9R:R;RF\W]Wapbpppppa'r(r%r&rqqaqbqqqkPlPgPhPiPjPaPbPePfPcPdPefkdlighjmc&-#-'-(-)-*- -$-%- - -c_\]a[Zd`^b}y{xz|"""""$0#0"0s<r<t<q<arbrrrrr~%{%|%}%%%z%ssasbsssYXWFDGD\X]X,,,^Z_ZtZuZhZiZvZwZ\Z]ZxZyZlZmZnZoZ`ZaZpZqZP*Q*:*;*6*7*H*I*V*W*T*U*L*M*B*C*@*A*2*3*<*=*0*1*R*S*J*K*...... .!.z.{.&.'..... . .".#...|.}. . ...@>A>F>G>R>S>Z>[>J>K>D>E>N>O>P>Q>L>M>B>C>H>I>X>Y>V>W>T>U>ttttatbtbd^_a[c\]Z` .*.'.(. .).$.%.&.#. .eflghkdijmcaubuuuuu<<<i-j-1W2W@W?d1d2d@d>>>>U]u]v]w]M^N^ ^ ^O^P^f|g|h|_|`|]|^|e|b||c|d|a|$$$ *!*"#dlfkdghimecj`]da[c_b^\Z$&%&&&&/'/(/ /$/%/ / /*/#/)/'I(I)I*7+7,744b1b2b3b5#####`]a[Z^_\bcdefikdjhclgm 0*0'0(0$0%0)0&0#0 0 0-^.^===vvvvavbv~"""zzzzazbz/+0+1+v[&'%'$'&/'///////////"/#/ / ///z/{/|/}/// /!/ / /T?U?@?A?H?I?J?K?R?S?B?C?L?M?F?G?V?W?D?E?P?Q?X?Y?Z?[?N?O?{{{{a{b{:f;f@fAf7?7@7a b     ababc<d<g<h<a<b<6<e<f<k<l<i<j<l#f#k#d#i#e#c#j#h#g#m#^ _ d ` ] a [ \ c Z b abA4B4C4 4%4'4(4&4$4 4#4 4*4)4ababab}*~*{*|*ab}}a}b}}}DJEJjJFJGJ})~)y)z){)|)>GGGTGGabv]HImabk;l;6;a;b;i;j;c;d;e;f;g;h;ab\\]\-b.babp]q]x]y]t]u]h]i]l]m]`]a]n]o]\]]]v]w]^]_]"2#22222z2{2 2 222 2 2|2}2&2'2 2!222222222RBSBLBMB@BABTBUBPBQBJBKBVBWBFBGBHBIBDBEBBBCBXBYBNBOBZB[Bi.j.ab@gAg:g;gHHFLELGLjLDLJ3K3L3abab{|}~E*F*G*abghmilfjecdk 5*5'5(5&5$5%5)5 5 5#5a~b~~~~~-_._\Y]Ym g h k d i e f j c l ^_c`]Z[d\abx[y[h[i[n[o[^[_[`[a[p[q[\[][v[w[l[m[t[u[ 0 0z0{000&0'000 0 0|0}0"0#0000000 0!00000P@Q@T@U@F@G@H@I@N@O@R@S@L@M@B@C@D@E@X@Y@Z@[@@@A@J@K@V@W@abpfkfvfwfnfofufmflfqfrfjftfsf$$ 2(2$2%2'2 2*2&2)2#2 2k!d!i!j!h!e!f!m!c!g!l!Z [ ` ] b a c _ \ d ^ CtDtFt@tEtBtAt?tGtU^w^v^u^????`_^M)N)p<l<o<n<m<k<vS"%%p(q(zxy}{|abO;P;Q;.!/!!U!V!?!;!5!3!W!6!2!{}yz|x\Z]Z-`.`abab`_^ab"M#M$Mabngogsgrgvgwgugmgpgkglgqgtgjg\[][-a.aabcT6##~#v\ab@@@w_v_U_@u_XY; D D DuQ=vhwhuhmhthohlhnhshrhjhkhphqhabd}`}_}}c}^}e}b}]}a}h}g}f}@>A>B>C>?>a"b"""""####a#b#@Y1Y2Yuimiviwipikitioisirijiniliqi   $$a$b$$$D?@?A?B???C?EuBuGuDu?u@uCuAuFu&&gTbTfTkTi^@d^{aJhjyTjjwTxTejTsjtjujvTrJpTnTmTojlJqJc` NOPSTUABCDEFHIJKLMRWXN_`~ YbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256 https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256 Iqatzip-devel-1.0.9-1.el9.x86_64.rpmIqatzip-devel-1.0.9-1.el9.x86_64.rpm| 3\BBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security updateDy|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099 https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099 Lmshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm{Lgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmuLgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmvLgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmyLgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmxLgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmgLgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmfLgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmiLgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmzLgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmwLgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmhLgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmMmshim-x64-15.6-1.el9.alma.x86_64.rpmeLgrub2-common-2.06-27.el9_0.7.alma.noarch.rpmLmshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm{Lgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmuLgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmvLgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmyLgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmxLgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmgLgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmfLgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmiLgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmzLgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmwLgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmhLgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmMmshim-x64-15.6-1.el9.alma.x86_64.rpmeLgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm1 3IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix updateDu https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249 kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm}kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmsbpftool-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm|kernel-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpmperf-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm~kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm}kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmsbpftool-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm|kernel-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpmperf-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm~kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm :tBBBBB#securityModerate: libarchive security updateD Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252 https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252 %'libarchive-3.5.3-2.el9_0.x86_64.rpmg'bsdtar-3.5.3-2.el9_0.x86_64.rpmL'libarchive-devel-3.5.3-2.el9_0.i686.rpmL'libarchive-devel-3.5.3-2.el9_0.x86_64.rpm%'libarchive-3.5.3-2.el9_0.x86_64.rpmg'bsdtar-3.5.3-2.el9_0.x86_64.rpmL'libarchive-devel-3.5.3-2.el9_0.i686.rpmL'libarchive-devel-3.5.3-2.el9_0.x86_64.rpm  {BBBBBsecurityModerate: libinput security updateD b3https://access.redhat.com/errata/RHSA-2022:5257RHSA-2022:5257RHSA-2022:5257 https://access.redhat.com/security/cve/CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/20749522074952https://errata.almalinux.org/9/ALSA-2022-5257.htmlALSA-2022:5257ALSA-2022:5257 *&libinput-1.19.3-2.el9_0.x86_64.rpm+&libinput-utils-1.19.3-2.el9_0.x86_64.rpmX&libinput-devel-1.19.3-2.el9_0.i686.rpmX&libinput-devel-1.19.3-2.el9_0.x86_64.rpm*&libinput-1.19.3-2.el9_0.x86_64.rpm+&libinput-utils-1.19.3-2.el9_0.x86_64.rpmX&libinput-devel-1.19.3-2.el9_0.i686.rpmX&libinput-devel-1.19.3-2.el9_0.x86_64.rpm 0BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement updateD+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695  java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmYjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmcjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm java-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmZjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmbjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm[java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm^java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmajava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmWjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmXjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm]java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm`java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmdjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm_java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm\java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmYjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmcjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm java-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmZjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmbjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm[java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm^java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmajava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmWjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmXjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm]java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm`java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmdjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm_java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm\java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement updateD@.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709 jjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm}java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm~java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmkjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm}java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm~java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmkjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement updateDne https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736 njava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm{java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmwjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmvjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmujava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmzjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmxjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmyjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmnjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm{java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmwjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmvjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmujava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmzjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmxjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmyjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm ABBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement updateD SiJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948 https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948 5Cmariadb-pam-10.5.16-2.el9_0.x86_64.rpm7Cmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm/Cmariadb-backup-10.5.16-2.el9_0.x86_64.rpm8Cmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm.Cmariadb-10.5.16-2.el9_0.x86_64.rpm3Cmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm4Cmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm1Cmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm2Cmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm0Cmariadb-test-10.5.16-2.el9_0.x86_64.rpm.Cmariadb-devel-10.5.16-2.el9_0.x86_64.rpm0Cmariadb-common-10.5.16-2.el9_0.x86_64.rpm/Cmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm6Cmariadb-server-10.5.16-2.el9_0.x86_64.rpm5Cmariadb-pam-10.5.16-2.el9_0.x86_64.rpm7Cmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm/Cmariadb-backup-10.5.16-2.el9_0.x86_64.rpm8Cmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm.Cmariadb-10.5.16-2.el9_0.x86_64.rpm3Cmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm4Cmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm1Cmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm2Cmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm0Cmariadb-test-10.5.16-2.el9_0.x86_64.rpm.Cmariadb-devel-10.5.16-2.el9_0.x86_64.rpm0Cmariadb-common-10.5.16-2.el9_0.x86_64.rpm/Cmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm6Cmariadb-server-10.5.16-2.el9_0.x86_64.rpmͯo ^BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateD https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003 https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003 +libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm+libvirt-docs-8.5.0-7.el9_1.x86_64.rpm+libvirt-devel-8.5.0-7.el9_1.x86_64.rpm+libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm+libvirt-docs-8.5.0-7.el9_1.x86_64.rpm+libvirt-devel-8.5.0-7.el9_1.x86_64.rpmܩK 59securityModerate: qt5 security and bug fix updateD N9https://access.redhat.com/errata/RHSA-2022:8022RHSA-2022:8022RHSA-2022:8022 https://access.redhat.com/security/cve/CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/20555052055505https://errata.almalinux.org/9/ALSA-2022-8022.htmlALSA-2022:8022ALSA-2022:8022 _qt5-devel-5.15.3-1.el9.noarch.rpm_qt5-devel-5.15.3-1.el9.noarch.rpmܣP 6zBsecurityModerate: unbound security, bug fix, and enhancement updateD 5https://access.redhat.com/errata/RHSA-2022:8062RHSA-2022:8062RHSA-2022:8062 https://access.redhat.com/security/cve/CVE-2022-30698CVE-2022-30698CVE-2022-30698https://access.redhat.com/security/cve/CVE-2022-30699CVE-2022-30699CVE-2022-30699https://bugzilla.redhat.com/21167252116725https://bugzilla.redhat.com/21167292116729https://errata.almalinux.org/9/ALSA-2022-8062.htmlALSA-2022:8062ALSA-2022:8062 Hunbound-devel-1.16.2-2.el9.i686.rpmHunbound-devel-1.16.2-2.el9.x86_64.rpmHunbound-devel-1.16.2-2.el9.i686.rpmHunbound-devel-1.16.2-2.el9.x86_64.rpmބ{ 8wGBBBsecurityModerate: bind security updateD < https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068 https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068 VIbind-libs-9.16.23-5.el9_1.i686.rpm>Ibind-doc-9.16.23-5.el9_1.noarch.rpmQIbind-devel-9.16.23-5.el9_1.x86_64.rpmQIbind-devel-9.16.23-5.el9_1.i686.rpmVIbind-libs-9.16.23-5.el9_1.i686.rpm>Ibind-doc-9.16.23-5.el9_1.noarch.rpmQIbind-devel-9.16.23-5.el9_1.x86_64.rpmQIbind-devel-9.16.23-5.el9_1.i686.rpmކ  9BBBBsecurityModerate: flac security updateD Ijhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078 https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078 J7flac-devel-1.3.3-10.el9.i686.rpmJ7flac-devel-1.3.3-10.el9.x86_64.rpmu7flac-1.3.3-10.el9.x86_64.rpmJ7flac-devel-1.3.3-10.el9.i686.rpmJ7flac-devel-1.3.3-10.el9.x86_64.rpmu7flac-1.3.3-10.el9.x86_64.rpmކG! :GBsecurityLow: wavpack security updateDK32https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139 https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139 nHwavpack-devel-5.4.0-5.el9.x86_64.rpmnHwavpack-devel-5.4.0-5.el9.i686.rpmnHwavpack-devel-5.4.0-5.el9.x86_64.rpmnHwavpack-devel-5.4.0-5.el9.i686.rpmއC" ;JBBBBBBBBBBsecurityModerate: poppler security and bug fix updateD e(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151 https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151 7poppler-qt5-devel-21.01.0-13.el9.x86_64.rpm7poppler-cpp-devel-21.01.0-13.el9.x86_64.rpm7poppler-devel-21.01.0-13.el9.i686.rpm7poppler-qt5-devel-21.01.0-13.el9.i686.rpm7poppler-cpp-devel-21.01.0-13.el9.i686.rpm7poppler-devel-21.01.0-13.el9.x86_64.rpm7poppler-glib-devel-21.01.0-13.el9.i686.rpm7poppler-glib-devel-21.01.0-13.el9.x86_64.rpm7poppler-qt5-devel-21.01.0-13.el9.x86_64.rpm7poppler-cpp-devel-21.01.0-13.el9.x86_64.rpm7poppler-devel-21.01.0-13.el9.i686.rpm7poppler-qt5-devel-21.01.0-13.el9.i686.rpm7poppler-cpp-devel-21.01.0-13.el9.i686.rpm7poppler-devel-21.01.0-13.el9.x86_64.rpm7poppler-glib-devel-21.01.0-13.el9.i686.rpm7poppler-glib-devel-21.01.0-13.el9.x86_64.rpmއc#  TOBBsecurityModerate: lua security update H8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 1Clua-devel-5.4.4-2.el9_1.i686.rpm1Clua-devel-5.4.4-2.el9_1.x86_64.rpmClua-5.4.4-2.el9_1.i686.rpm1Clua-devel-5.4.4-2.el9_1.i686.rpm1Clua-devel-5.4.4-2.el9_1.x86_64.rpmClua-5.4.4-2.el9_1.i686.rpmZ? fBBBBsecurityModerate: libjpeg-turbo security update .https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068 https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068 V8turbojpeg-2.0.90-6.el9_1.x86_64.rpmW8turbojpeg-devel-2.0.90-6.el9_1.x86_64.rpmW8turbojpeg-devel-2.0.90-6.el9_1.i686.rpmV8turbojpeg-2.0.90-6.el9_1.i686.rpmV8turbojpeg-2.0.90-6.el9_1.x86_64.rpmW8turbojpeg-devel-2.0.90-6.el9_1.x86_64.rpmW8turbojpeg-devel-2.0.90-6.el9_1.i686.rpmV8turbojpeg-2.0.90-6.el9_1.i686.rpm@ lBBsecurityImportant: kernel security, bug fix, and enhancement update.Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 xkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm8A pBBBBBBBBBBsecurityModerate: postgresql security update jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693 https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693 |Lpostgresql-server-devel-13.10-1.el9_1.x86_64.rpm{Lpostgresql-private-devel-13.10-1.el9_1.x86_64.rpmLpostgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm}Lpostgresql-static-13.10-1.el9_1.x86_64.rpm~Lpostgresql-test-13.10-1.el9_1.x86_64.rpmzLpostgresql-docs-13.10-1.el9_1.x86_64.rpm|Lpostgresql-server-devel-13.10-1.el9_1.x86_64.rpm{Lpostgresql-private-devel-13.10-1.el9_1.x86_64.rpmLpostgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm}Lpostgresql-static-13.10-1.el9_1.x86_64.rpm~Lpostgresql-test-13.10-1.el9_1.x86_64.rpmzLpostgresql-docs-13.10-1.el9_1.x86_64.rpmB |BBsecurityImportant: kernel security and bug fix updateq4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 ykernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpmC @BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update%https://access.redhat.com/errata/RHSA-2023:1879RHSA-2023:1879RHSA-2023:1879 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1879.htmlALSA-2023:1879ALSA-2023:1879 z6java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq6java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt6java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmv6java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo6java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmw6java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmx6java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr6java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmy6java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpms6java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm{6java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmu6java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn6java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp6java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmz6java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq6java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt6java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmv6java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo6java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmw6java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmx6java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr6java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmy6java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpms6java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm{6java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmu6java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn6java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp6java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmD \BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updateA2https://access.redhat.com/errata/RHSA-2023:1880RHSA-2023:1880RHSA-2023:1880 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1880.htmlALSA-2023:1880ALSA-2023:1880 X$java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm[$java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm_$java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm]$java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm\$java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpma$java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm`$java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm^$java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmW$java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmd$java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmb$java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmc$java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmZ$java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmY$java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmX$java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm[$java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm_$java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm]$java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm\$java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpma$java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm`$java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm^$java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmW$java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmd$java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmb$java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmc$java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmZ$java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmY$java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmwE xBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix updatesThttps://access.redhat.com/errata/RHSA-2023:1909RHSA-2023:1909RHSA-2023:1909 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1909.htmlALSA-2023:1909ALSA-2023:1909 Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmƷIF LBBBBBBBBBBBBsecurityImportant: samba security updateGhttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127 Cllibsmbclient-devel-4.16.4-103.el9_1.i686.rpmRlsamba-test-4.16.4-103.el9_1.x86_64.rpmCllibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpmGlsamba-devel-4.16.4-103.el9_1.i686.rpmDllibwbclient-devel-4.16.4-103.el9_1.x86_64.rpmSlsamba-test-libs-4.16.4-103.el9_1.x86_64.rpmGlsamba-devel-4.16.4-103.el9_1.x86_64.rpmDllibwbclient-devel-4.16.4-103.el9_1.i686.rpmlsamba-pidl-4.16.4-103.el9_1.noarch.rpm Cllibsmbclient-devel-4.16.4-103.el9_1.i686.rpmRlsamba-test-4.16.4-103.el9_1.x86_64.rpmCllibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpmGlsamba-devel-4.16.4-103.el9_1.i686.rpmDllibwbclient-devel-4.16.4-103.el9_1.x86_64.rpmSlsamba-test-libs-4.16.4-103.el9_1.x86_64.rpmGlsamba-devel-4.16.4-103.el9_1.x86_64.rpmDllibwbclient-devel-4.16.4-103.el9_1.i686.rpmlsamba-pidl-4.16.4-103.el9_1.noarch.rpmӿ(G ZBBsecurityImportant: edk2 security, bug fix, and enhancement update[ https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165 https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165 ?bedk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpmxbedk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm@bedk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm?bedk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpmxbedk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm@bedk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpmH ^BBBBBBBBBBsecurityModerate: freeradius security and bug fix update jfhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166 https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166 zQfreeradius-sqlite-3.0.21-37.el9.x86_64.rpmwQfreeradius-perl-3.0.21-37.el9.x86_64.rpmyQfreeradius-rest-3.0.21-37.el9.x86_64.rpm{Qfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpmxQfreeradius-postgresql-3.0.21-37.el9.x86_64.rpmvQfreeradius-mysql-3.0.21-37.el9.x86_64.rpmzQfreeradius-sqlite-3.0.21-37.el9.x86_64.rpmwQfreeradius-perl-3.0.21-37.el9.x86_64.rpmyQfreeradius-rest-3.0.21-37.el9.x86_64.rpm{Qfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpmxQfreeradius-postgresql-3.0.21-37.el9.x86_64.rpmvQfreeradius-mysql-3.0.21-37.el9.x86_64.rpm:I jBBsecurityModerate: xorg-x11-server security and bug fix update POhttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248 UZxorg-x11-server-source-1.20.11-17.el9.noarch.rpmaZxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmaZxorg-x11-server-devel-1.20.11-17.el9.i686.rpmUZxorg-x11-server-source-1.20.11-17.el9.noarch.rpmaZxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmaZxorg-x11-server-devel-1.20.11-17.el9.i686.rpm>J !nBBBBBBBBBBsecurityModerate: poppler security and bug fix update https://access.redhat.com/errata/RHSA-2023:2259RHSA-2023:2259RHSA-2023:2259 https://access.redhat.com/security/cve/CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/21245272124527https://errata.almalinux.org/9/ALSA-2023-2259.htmlALSA-2023:2259ALSA-2023:2259 8poppler-qt5-devel-21.01.0-14.el9.i686.rpm8poppler-qt5-devel-21.01.0-14.el9.x86_64.rpm8poppler-devel-21.01.0-14.el9.x86_64.rpm8poppler-cpp-devel-21.01.0-14.el9.i686.rpm8poppler-cpp-devel-21.01.0-14.el9.x86_64.rpm8poppler-devel-21.01.0-14.el9.i686.rpm8poppler-glib-devel-21.01.0-14.el9.i686.rpm8poppler-glib-devel-21.01.0-14.el9.x86_64.rpm8poppler-qt5-devel-21.01.0-14.el9.i686.rpm8poppler-qt5-devel-21.01.0-14.el9.x86_64.rpm8poppler-devel-21.01.0-14.el9.x86_64.rpm8poppler-cpp-devel-21.01.0-14.el9.i686.rpm8poppler-cpp-devel-21.01.0-14.el9.x86_64.rpm8poppler-devel-21.01.0-14.el9.i686.rpm8poppler-glib-devel-21.01.0-14.el9.i686.rpm8poppler-glib-devel-21.01.0-14.el9.x86_64.rpmSK #bYBBBsecurityModerate: bind security and bug fix update 8J https://access.redhat.com/errata/RHSA-2023:2261RHSA-2023:2261RHSA-2023:2261 https://access.redhat.com/security/cve/CVE-2022-2795CVE-2022-2795CVE-2022-2795https://access.redhat.com/security/cve/CVE-2022-3094CVE-2022-3094CVE-2022-3094https://access.redhat.com/security/cve/CVE-2022-3736CVE-2022-3736CVE-2022-3736https://access.redhat.com/security/cve/CVE-2022-3924CVE-2022-3924CVE-2022-3924https://bugzilla.redhat.com/21285842128584https://bugzilla.redhat.com/21640322164032https://bugzilla.redhat.com/21640382164038https://bugzilla.redhat.com/21640392164039https://errata.almalinux.org/9/ALSA-2023-2261.htmlALSA-2023:2261ALSA-2023:2261 VAbind-libs-9.16.23-11.el9.i686.rpmQAbind-devel-9.16.23-11.el9.x86_64.rpm>Abind-doc-9.16.23-11.el9.noarch.rpmQAbind-devel-9.16.23-11.el9.i686.rpmVAbind-libs-9.16.23-11.el9.i686.rpmQAbind-devel-9.16.23-11.el9.x86_64.rpm>Abind-doc-9.16.23-11.el9.noarch.rpmQAbind-devel-9.16.23-11.el9.i686.rpm[L $BBBBsecurityModerate: freerdp security update fhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326 https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326  @freerdp-devel-2.4.1-5.el9.x86_64.rpm @libwinpr-devel-2.4.1-5.el9.x86_64.rpm @libwinpr-devel-2.4.1-5.el9.i686.rpm @freerdp-devel-2.4.1-5.el9.i686.rpm @freerdp-devel-2.4.1-5.el9.x86_64.rpm @libwinpr-devel-2.4.1-5.el9.x86_64.rpm @libwinpr-devel-2.4.1-5.el9.i686.rpm @freerdp-devel-2.4.1-5.el9.i686.rpm%M %EsecurityModerate: libtiff security update h>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340 https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340 y2libtiff-tools-4.4.0-7.el9.x86_64.rpmy2libtiff-tools-4.4.0-7.el9.x86_64.rpm4N &GBsecurityModerate: unbound security update &9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370 https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370 Hunbound-devel-1.16.2-3.el9.x86_64.rpmHunbound-devel-1.16.2-3.el9.i686.rpmHunbound-devel-1.16.2-3.el9.x86_64.rpmHunbound-devel-1.16.2-3.el9.i686.rpmEO 'JBsecurityModerate: wireshark security and bug fix update _4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373 https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373 5(wireshark-devel-3.4.10-4.el9.i686.rpm5(wireshark-devel-3.4.10-4.el9.x86_64.rpm5(wireshark-devel-3.4.10-4.el9.i686.rpm5(wireshark-devel-3.4.10-4.el9.x86_64.rpm P (MBBsecurityImportant: kernel security, bug fix, and enhancement updateSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458 {kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm{kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm{kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm{kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpmCQ >QBsecurityModerate: device-mapper-multipath security and bug fix update f]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459 https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459 H device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpmH device-mapper-multipath-devel-0.8.7-20.el9.i686.rpmH device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpmH device-mapper-multipath-devel-0.8.7-20.el9.i686.rpmR )TsecurityModerate: fwupd security and bug fix update CM https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487 sfwupd-devel-1.8.10-2.el9.alma.x86_64.rpmsfwupd-devel-1.8.10-2.el9.alma.x86_64.rpm}S *VBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement updateKhttps://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519 GEsamba-devel-4.17.5-102.el9.x86_64.rpmDElibwbclient-devel-4.17.5-102.el9.i686.rpmEsamba-pidl-4.17.5-102.el9.noarch.rpmSEsamba-test-libs-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.i686.rpmGEsamba-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.x86_64.rpmhEpython3-samba-test-4.17.5-102.el9.x86_64.rpmCElibsmbclient-devel-4.17.5-102.el9.x86_64.rpmCElibsmbclient-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.i686.rpmDElibwbclient-devel-4.17.5-102.el9.x86_64.rpmREsamba-test-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.x86_64.rpmGEsamba-devel-4.17.5-102.el9.x86_64.rpmDElibwbclient-devel-4.17.5-102.el9.i686.rpmEsamba-pidl-4.17.5-102.el9.noarch.rpmSEsamba-test-libs-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.i686.rpmGEsamba-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.x86_64.rpmhEpython3-samba-test-4.17.5-102.el9.x86_64.rpmCElibsmbclient-devel-4.17.5-102.el9.x86_64.rpmCElibsmbclient-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.i686.rpmDElibwbclient-devel-4.17.5-102.el9.x86_64.rpmREsamba-test-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.x86_64.rpmfT +lBsecurityLow: libarchive security updateKYhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532 LBlibarchive-devel-3.5.3-4.el9.x86_64.rpmLBlibarchive-devel-3.5.3-4.el9.i686.rpmLBlibarchive-devel-3.5.3-4.el9.x86_64.rpmLBlibarchive-devel-3.5.3-4.el9.i686.rpmU -lDBBsecurityLow: lua security updateKmRhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582 Dlua-5.4.4-3.el9.i686.rpm1Dlua-devel-5.4.4-3.el9.x86_64.rpm1Dlua-devel-5.4.4-3.el9.i686.rpmDlua-5.4.4-3.el9.i686.rpm1Dlua-devel-5.4.4-3.el9.x86_64.rpm1Dlua-devel-5.4.4-3.el9.i686.rpmoV 6sBsecurityModerate: autotrace security update ?yhttps://access.redhat.com/errata/RHSA-2023:2589RHSA-2023:2589RHSA-2023:2589 https://access.redhat.com/security/cve/CVE-2022-32323CVE-2022-32323CVE-2022-32323https://bugzilla.redhat.com/21074712107471https://errata.almalinux.org/9/ALSA-2023-2589.htmlALSA-2023:2589ALSA-2023:2589 O autotrace-0.31.1-65.el9.x86_64.rpmO autotrace-0.31.1-65.el9.i686.rpmO autotrace-0.31.1-65.el9.x86_64.rpmO autotrace-0.31.1-65.el9.i686.rpm`W 9wsecurityModerate: golang-github-cpuguy83-md2man security, bug fix, and enhancement update 8chttps://access.redhat.com/errata/RHSA-2023:2592RHSA-2023:2592RHSA-2023:2592 https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2592.htmlALSA-2023:2592ALSA-2023:2592 t golang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpmt golang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpmoX .zBBBBsecurityImportant: mysql security updateLhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621 https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621 P'mysql-devel-8.0.32-1.el9_2.x86_64.rpmQ'mysql-test-8.0.32-1.el9_2.x86_64.rpm5'mysql-libs-8.0.32-1.el9_2.x86_64.rpmP'mysql-devel-8.0.32-1.el9_2.x86_64.rpmQ'mysql-test-8.0.32-1.el9_2.x86_64.rpm5'mysql-libs-8.0.32-1.el9_2.x86_64.rpmhY /@BsecurityImportant: cups-filters security updateihttps://access.redhat.com/errata/RHSA-2023:3423RHSA-2023:3423RHSA-2023:3423 https://access.redhat.com/security/cve/CVE-2023-24805CVE-2023-24805CVE-2023-24805https://bugzilla.redhat.com/22030512203051https://errata.almalinux.org/9/ALSA-2023-3423.htmlALSA-2023:3423ALSA-2023:3423 Gcups-filters-devel-1.28.7-11.el9_2.1.i686.rpmGcups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpmGcups-filters-devel-1.28.7-11.el9_2.1.i686.rpmGcups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpmZ 0CsecurityImportant: .NET 6.0 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:3581RHSA-2023:3581RHSA-2023:3581 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3581.htmlALSA-2023:3581ALSA-2023:3581 m:dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpmm:dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm.[ 3qBTBBBBBBBBBsecurityImportant: python3.11 security updateyhttps://access.redhat.com/errata/RHSA-2023:3585RHSA-2023:3585RHSA-2023:3585 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3585.htmlALSA-2023:3585ALSA-2023:3585  python3.11-idle-3.11.2-2.el9_2.1.i686.rpm python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm python3.11-test-3.11.2-2.el9_2.1.i686.rpm python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpmc python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm python3.11-debug-3.11.2-2.el9_2.1.i686.rpmb python3.11-3.11.2-2.el9_2.1.i686.rpm python3.11-idle-3.11.2-2.el9_2.1.i686.rpm python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm python3.11-test-3.11.2-2.el9_2.1.i686.rpm python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpmc python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm python3.11-debug-3.11.2-2.el9_2.1.i686.rpmb python3.11-3.11.2-2.el9_2.1.i686.rpm\ 4PsecurityImportant: .NET 7.0 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:3592RHSA-2023:3592RHSA-2023:3592 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-32032CVE-2023-32032CVE-2023-32032https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126152212615https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3592.htmlALSA-2023:3592ALSA-2023:3592 IFdotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpmIFdotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm] 6uKTBBBBBBBBBsecurityImportant: python3.9 security update+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595 'python3-idle-3.9.16-1.el9_2.1.x86_64.rpm'python3-debug-3.9.16-1.el9_2.1.x86_64.rpm'python3-test-3.9.16-1.el9_2.1.i686.rpm'python3-test-3.9.16-1.el9_2.1.x86_64.rpm'python3-debug-3.9.16-1.el9_2.1.i686.rpm'python3-idle-3.9.16-1.el9_2.1.i686.rpmP'python3-tkinter-3.9.16-1.el9_2.1.i686.rpmO'python3-3.9.16-1.el9_2.1.i686.rpm'python3-idle-3.9.16-1.el9_2.1.x86_64.rpm'python3-debug-3.9.16-1.el9_2.1.x86_64.rpm'python3-test-3.9.16-1.el9_2.1.i686.rpm'python3-test-3.9.16-1.el9_2.1.x86_64.rpm'python3-debug-3.9.16-1.el9_2.1.i686.rpm'python3-idle-3.9.16-1.el9_2.1.i686.rpmP'python3-tkinter-3.9.16-1.el9_2.1.i686.rpmO'python3-3.9.16-1.el9_2.1.i686.rpmx^ 7]BBsecurityImportant: texlive security updateA https://access.redhat.com/errata/RHSA-2023:3661RHSA-2023:3661RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700CVE-2023-32700CVE-2023-32700https://bugzilla.redhat.com/22089432208943https://errata.almalinux.org/9/ALSA-2023-3661.htmlALSA-2023:3661ALSA-2023:3661 zetexlive-gnu-freefont-20200406-26.el9_2.noarch.rpmletexlive-lib-devel-20200406-26.el9_2.x86_64.rpmletexlive-lib-devel-20200406-26.el9_2.i686.rpmzetexlive-gnu-freefont-20200406-26.el9_2.noarch.rpmletexlive-lib-devel-20200406-26.el9_2.x86_64.rpmletexlive-lib-devel-20200406-26.el9_2.i686.rpm׺y_ 8asecurityModerate: libtiff security update Nphttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711 https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711 y3libtiff-tools-4.4.0-8.el9_2.x86_64.rpmy3libtiff-tools-4.4.0-8.el9_2.x86_64.rpmi` 9cBBBBBBBBBBsecurityModerate: postgresql security update >Shttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714 zMpostgresql-docs-13.11-1.el9_2.x86_64.rpm~Mpostgresql-test-13.11-1.el9_2.x86_64.rpm|Mpostgresql-server-devel-13.11-1.el9_2.x86_64.rpm{Mpostgresql-private-devel-13.11-1.el9_2.x86_64.rpmMpostgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm}Mpostgresql-static-13.11-1.el9_2.x86_64.rpmzMpostgresql-docs-13.11-1.el9_2.x86_64.rpm~Mpostgresql-test-13.11-1.el9_2.x86_64.rpm|Mpostgresql-server-devel-13.11-1.el9_2.x86_64.rpm{Mpostgresql-private-devel-13.11-1.el9_2.x86_64.rpmMpostgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm}Mpostgresql-static-13.11-1.el9_2.x86_64.rpma :oBBBBBBsecurityModerate: libvirt security update }https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715 https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715 libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-devel-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-devel-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm b ;wsecurityImportant: kernel security and bug fix updatehttps://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723 5kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm5kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpmVc Bbind-doc-9.16.23-11.el9_2.1.noarch.rpmVBbind-libs-9.16.23-11.el9_2.1.i686.rpmQBbind-devel-9.16.23-11.el9_2.1.i686.rpmQBbind-devel-9.16.23-11.el9_2.1.x86_64.rpm>Bbind-doc-9.16.23-11.el9_2.1.noarch.rpmVBbind-libs-9.16.23-11.el9_2.1.i686.rpmQBbind-devel-9.16.23-11.el9_2.1.i686.rpmٟ f BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update u"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158 ^%java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmY%java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmd%java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmZ%java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm_%java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmW%java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm\%java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm[%java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm]%java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmb%java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmc%java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmX%java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm`%java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpma%java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm^%java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmY%java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmd%java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmZ%java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm_%java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmW%java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm\%java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm[%java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm]%java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmb%java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmc%java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmX%java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm`%java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpma%java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm g ^BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update Nhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177 o7java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmx7java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn7java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmu7java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmq7java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmv7java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmz7java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmr7java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{7java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms7java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmw7java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmt7java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmy7java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmp7java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmo7java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmx7java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn7java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmu7java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmq7java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmv7java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmz7java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmr7java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{7java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms7java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmw7java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmt7java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmy7java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmp7java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{h zBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update eyhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178 https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178 Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm-i NBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update ^https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325 DFlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpmCFlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpmDFlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmFsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpmRFsamba-test-4.17.5-103.el9_2.alma.x86_64.rpmSFsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpmhFpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpmCFlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmGFsamba-devel-4.17.5-103.el9_2.alma.i686.rpmGFsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpmDFlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpmCFlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpmDFlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmFsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpmRFsamba-test-4.17.5-103.el9_2.alma.x86_64.rpmSFsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpmhFpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpmCFlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmGFsamba-devel-4.17.5-103.el9_2.alma.i686.rpmGFsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm<j dBBsecurityImportant: kernel security, bug fix, and enhancement updatef0 https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377 |kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm|kernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm|kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm|kernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm0k hsecurityImportant: .NET 7.0 security, bug fix, and enhancement updatehttps://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642 IHdotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpmIHdotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpml jsecurityImportant: .NET 6.0 security, bug fix, and enhancement update-https://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644 m<dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpmm<dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm/m lBBBsecurityImportant: flac security updateDwhttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048 https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048 u8flac-1.3.3-10.el9_2.1.x86_64.rpmJ8flac-devel-1.3.3-10.el9_2.1.i686.rpmJ8flac-devel-1.3.3-10.el9_2.1.x86_64.rpmu8flac-1.3.3-10.el9_2.1.x86_64.rpmJ8flac-devel-1.3.3-10.el9_2.1.i686.rpmJ8flac-devel-1.3.3-10.el9_2.1.x86_64.rpm5n qsecurityImportant: kernel security, bug fix, and enhancement update;_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069 6kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm6kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpmxo ssecurityModerate: .NET 6.0 security update Rhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143 m=dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpmm=dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm}p usecurityModerate: .NET 7.0 security update lRhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146 IIdotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpmIIdotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpmnq wsecurityImportant: libwebp security update>-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214 ,libwebp-tools-1.2.0-7.el9_2.x86_64.rpm,libwebp-tools-1.2.0-7.el9_2.x86_64.rpm]r yBBBBBBBBBBBBsecurityImportant: glibc security updatek https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453 https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453 Ajglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpmBjglibc-static-2.34-60.el9_2.7.i686.rpmEjnss_db-2.34-60.el9_2.7.i686.rpmAjglibc-nss-devel-2.34-60.el9_2.7.i686.rpmFjnss_hesiod-2.34-60.el9_2.7.x86_64.rpmFjnss_hesiod-2.34-60.el9_2.7.i686.rpmEjnss_db-2.34-60.el9_2.7.x86_64.rpmBjglibc-static-2.34-60.el9_2.7.x86_64.rpmMjglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm Ajglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpmBjglibc-static-2.34-60.el9_2.7.i686.rpmEjnss_db-2.34-60.el9_2.7.i686.rpmAjglibc-nss-devel-2.34-60.el9_2.7.i686.rpmFjnss_hesiod-2.34-60.el9_2.7.x86_64.rpmFjnss_hesiod-2.34-60.el9_2.7.i686.rpmEjnss_db-2.34-60.el9_2.7.x86_64.rpmBjglibc-static-2.34-60.el9_2.7.x86_64.rpmMjglibc-benchtests-2.34-60.el9_2.7.x86_64.rpmms MBzBBBBBBBBBsecurityImportant: python3.11 security updatewihttps://access.redhat.com/errata/RHSA-2023:5456RHSA-2023:5456RHSA-2023:5456 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5456.htmlALSA-2023:5456ALSA-2023:5456 python3.11-idle-3.11.2-2.el9_2.2.i686.rpmpython3.11-debug-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-debug-3.11.2-2.el9_2.2.i686.rpmbpython3.11-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.i686.rpmcpython3.11-tkinter-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-idle-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-idle-3.11.2-2.el9_2.2.i686.rpmpython3.11-debug-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-debug-3.11.2-2.el9_2.2.i686.rpmbpython3.11-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.i686.rpmcpython3.11-tkinter-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm=t PBBABBBBsecurityImportant: ghostscript security update`https://access.redhat.com/errata/RHSA-2023:5459RHSA-2023:5459RHSA-2023:5459 https://access.redhat.com/security/cve/CVE-2023-36664CVE-2023-36664CVE-2023-36664https://bugzilla.redhat.com/22177982217798https://errata.almalinux.org/9/ALSA-2023-5459.htmlALSA-2023:5459ALSA-2023:5459 `libgs-devel-9.54.0-10.el9_2.i686.rpmghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpmghostscript-tools-printing-9.54.0-10.el9_2.i686.rpmghostscript-9.54.0-10.el9_2.i686.rpm`libgs-devel-9.54.0-10.el9_2.x86_64.rpm`libgs-devel-9.54.0-10.el9_2.i686.rpmghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpmghostscript-tools-printing-9.54.0-10.el9_2.i686.rpmghostscript-9.54.0-10.el9_2.i686.rpm`libgs-devel-9.54.0-10.el9_2.x86_64.rpm\u TmYBBBBBBBBBsecurityImportant: python3.9 security updateqhttps://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462 P(python3-tkinter-3.9.16-1.el9_2.2.i686.rpm(python3-idle-3.9.16-1.el9_2.2.x86_64.rpm(python3-test-3.9.16-1.el9_2.2.x86_64.rpm(python3-debug-3.9.16-1.el9_2.2.i686.rpm(python3-test-3.9.16-1.el9_2.2.i686.rpm(python3-idle-3.9.16-1.el9_2.2.i686.rpm(python3-debug-3.9.16-1.el9_2.2.x86_64.rpmO(python3-3.9.16-1.el9_2.2.i686.rpmP(python3-tkinter-3.9.16-1.el9_2.2.i686.rpm(python3-idle-3.9.16-1.el9_2.2.x86_64.rpm(python3-test-3.9.16-1.el9_2.2.x86_64.rpm(python3-debug-3.9.16-1.el9_2.2.i686.rpm(python3-test-3.9.16-1.el9_2.2.i686.rpm(python3-idle-3.9.16-1.el9_2.2.i686.rpm(python3-debug-3.9.16-1.el9_2.2.x86_64.rpmO(python3-3.9.16-1.el9_2.2.i686.rpmIv cBsecurityImportant: libvpx security update https://access.redhat.com/errata/RHSA-2023:5539RHSA-2023:5539RHSA-2023:5539 https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22411912241191https://bugzilla.redhat.com/22418062241806https://errata.almalinux.org/9/ALSA-2023-5539.htmlALSA-2023:5539ALSA-2023:5539 0!libvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm0!libvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm0!libvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm0!libvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpmxw fBBBBsecurityImportant: galera and mariadb security updateUhttps://access.redhat.com/errata/RHSA-2023:5684RHSA-2023:5684RHSA-2023:5684 https://access.redhat.com/security/cve/CVE-2022-32081CVE-2022-32081CVE-2022-32081https://access.redhat.com/security/cve/CVE-2022-32082CVE-2022-32082CVE-2022-32082https://access.redhat.com/security/cve/CVE-2022-32084CVE-2022-32084CVE-2022-32084https://access.redhat.com/security/cve/CVE-2022-32089CVE-2022-32089CVE-2022-32089https://access.redhat.com/security/cve/CVE-2022-32091CVE-2022-32091CVE-2022-32091https://access.redhat.com/security/cve/CVE-2022-38791CVE-2022-38791CVE-2022-38791https://access.redhat.com/security/cve/CVE-2022-47015CVE-2022-47015CVE-2022-47015https://access.redhat.com/security/cve/CVE-2023-5157CVE-2023-5157CVE-2023-5157https://bugzilla.redhat.com/21060282106028https://bugzilla.redhat.com/21060302106030https://bugzilla.redhat.com/21060342106034https://bugzilla.redhat.com/21060352106035https://bugzilla.redhat.com/21060422106042https://bugzilla.redhat.com/21301052130105https://bugzilla.redhat.com/21636092163609https://bugzilla.redhat.com/22402462240246https://errata.almalinux.org/9/ALSA-2023-5684.htmlALSA-2023:5684ALSA-2023:5684 0emariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm/emariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm.emariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm0emariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm/emariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm.emariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm0x XUBBBsecurityImportant: bind security updateeEhttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689 https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689 QCbind-devel-9.16.23-11.el9_2.2.i686.rpmVCbind-libs-9.16.23-11.el9_2.2.i686.rpm>Cbind-doc-9.16.23-11.el9_2.2.noarch.rpmQCbind-devel-9.16.23-11.el9_2.2.x86_64.rpmQCbind-devel-9.16.23-11.el9_2.2.i686.rpmVCbind-libs-9.16.23-11.el9_2.2.i686.rpm>Cbind-doc-9.16.23-11.el9_2.2.noarch.rpmQCbind-devel-9.16.23-11.el9_2.2.x86_64.rpm~y qsecurityImportant: dotnet6.0 security update*ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708 m>dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpmm>dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpmpz ssecurityModerate: nginx security update Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711 nginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpmnginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm;{ uBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update jEhttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733 https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733 Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm| IBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update /&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744 https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744 b&java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmX&java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmc&java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm[&java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm\&java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmW&java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm^&java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmY&java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpma&java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm]&java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm_&java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm`&java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmZ&java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmd&java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmb&java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmX&java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmc&java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm[&java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm\&java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmW&java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm^&java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmY&java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpma&java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm]&java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm_&java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm`&java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmZ&java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmd&java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm˶ } esecurityImportant: .NET 7.0 security updateUohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749 IJdotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpmIJdotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm~ gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update D<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753 z8java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmq8java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpms8java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm{8java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmv8java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmx8java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt8java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmp8java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmo8java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmu8java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmy8java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmr8java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmw8java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmn8java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmz8java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmq8java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpms8java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm{8java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmv8java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmx8java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt8java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmp8java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmo8java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmu8java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmy8java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmr8java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmw8java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmn8java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm˩n CBBBsecurityImportant: nghttp2 security update-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838 9nghttp2-1.43.0-5.el9_2.1.x86_64.rpm/9libnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm/9libnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm9nghttp2-1.43.0-5.el9_2.1.x86_64.rpm/9libnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm/9libnghttp2-devel-1.43.0-5.el9_2.1.i686.rpmÙ1 HBsecurityImportant: varnish security update-https://access.redhat.com/errata/RHSA-2023:5924RHSA-2023:5924RHSA-2023:5924 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5924.htmlALSA-2023:5924ALSA-2023:5924 Kvarnish-devel-6.6.2-3.el9_2.1.i686.rpmKvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpmKvarnish-devel-6.6.2-3.el9_2.1.i686.rpmKvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpmz !KsecurityModerate: .NET 6.0 security update =Qhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242 m?dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpmm?dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm} "MsecurityModerate: .NET 7.0 security update Qhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246 IKdotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpmIKdotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpmI &cBBkBBBBsecurityImportant: ghostscript security update_https://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265 ghostscript-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.x86_64.rpmghostscript-tools-printing-9.54.0-11.el9_2.i686.rpmghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpmghostscript-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.x86_64.rpmghostscript-tools-printing-9.54.0-11.el9_2.i686.rpmghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm~ )gBnBsecurityModerate: edk2 security, bug fix, and enhancement update `Bhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330 https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330 xTedk2-tools-20230524-3.el9.x86_64.rpm?Tedk2-aarch64-20230524-3.el9.noarch.rpm@Tedk2-tools-doc-20230524-3.el9.noarch.rpmTedk2-ovmf-20230524-3.el9.noarch.rpmxTedk2-tools-20230524-3.el9.x86_64.rpm?Tedk2-aarch64-20230524-3.el9.noarch.rpm@Tedk2-tools-doc-20230524-3.el9.noarch.rpmTedk2-ovmf-20230524-3.el9.noarch.rpm *XBBsecurityModerate: xorg-x11-server security and bug fix update "https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340 a[xorg-x11-server-devel-1.20.11-19.el9.i686.rpmU[xorg-x11-server-source-1.20.11-19.el9.noarch.rpma[xorg-x11-server-devel-1.20.11-19.el9.x86_64.rpma[xorg-x11-server-devel-1.20.11-19.el9.i686.rpmU[xorg-x11-server-source-1.20.11-19.el9.noarch.rpma[xorg-x11-server-devel-1.20.11-19.el9.x86_64.rpmP +\BsecurityModerate: LibRaw security update &Ghttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343 https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343 ELibRaw-devel-0.20.2-6.el9.x86_64.rpmELibRaw-devel-0.20.2-6.el9.i686.rpmELibRaw-devel-0.20.2-6.el9.x86_64.rpmELibRaw-devel-0.20.2-6.el9.i686.rpm  ,_BBsecurityModerate: qt5 security and bug fix update m https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369 https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369 `qt5-devel-5.15.9-1.el9.noarch.rpmEqt5-qtbase-static-5.15.9-7.el9.x86_64.rpmEqt5-qtbase-static-5.15.9-7.el9.i686.rpm`qt5-devel-5.15.9-1.el9.noarch.rpmEqt5-qtbase-static-5.15.9-7.el9.x86_64.rpmEqt5-qtbase-static-5.15.9-7.el9.i686.rpm] -cBBBBBBsecurityModerate: libvirt security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409 https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409  libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm-libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm-libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpmO  .ksecurityModerate: libfastjson security update [https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431 https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431 &libfastjson-devel-0.99.9-5.el9.x86_64.rpm&libfastjson-devel-0.99.9-5.el9.x86_64.rpmv  /mBsecurityModerate: wireshark security update tGhttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469 https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469 5)wireshark-devel-3.4.10-6.el9.x86_64.rpm5)wireshark-devel-3.4.10-6.el9.i686.rpm5)wireshark-devel-3.4.10-6.el9.x86_64.rpm5)wireshark-devel-3.4.10-6.el9.i686.rpm  0pBsecurityModerate: librabbitmq security update ;Whttps://access.redhat.com/errata/RHSA-2023:6482RHSA-2023:6482RHSA-2023:6482 https://access.redhat.com/security/cve/CVE-2023-35789CVE-2023-35789CVE-2023-35789https://bugzilla.redhat.com/22157622215762https://errata.almalinux.org/9/ALSA-2023-6482.htmlALSA-2023:6482ALSA-2023:6482 \librabbitmq-devel-0.11.0-7.el9.i686.rpm\librabbitmq-devel-0.11.0-7.el9.x86_64.rpm\librabbitmq-devel-0.11.0-7.el9.i686.rpm\librabbitmq-devel-0.11.0-7.el9.x86_64.rpm  3qBBBBBBBBBBBsecurityModerate: python3.11 security update bhttps://access.redhat.com/errata/RHSA-2023:6494RHSA-2023:6494RHSA-2023:6494 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://access.redhat.com/security/cve/CVE-2023-41105CVE-2023-41105CVE-2023-41105https://bugzilla.redhat.com/22357952235795https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6494.htmlALSA-2023:6494ALSA-2023:6494 python3.11-idle-3.11.5-1.el9_3.x86_64.rpmpython3.11-debug-3.11.5-1.el9_3.x86_64.rpmbpython3.11-3.11.5-1.el9_3.i686.rpmpython3.11-debug-3.11.5-1.el9_3.i686.rpmcpython3.11-tkinter-3.11.5-1.el9_3.i686.rpmpython3.11-test-3.11.5-1.el9_3.x86_64.rpmpython3.11-test-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.x86_64.rpmpython3.11-debug-3.11.5-1.el9_3.x86_64.rpmbpython3.11-3.11.5-1.el9_3.i686.rpmpython3.11-debug-3.11.5-1.el9_3.i686.rpmcpython3.11-tkinter-3.11.5-1.el9_3.i686.rpmpython3.11-test-3.11.5-1.el9_3.x86_64.rpmpython3.11-test-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.i686.rpm?  4~BBsecurityModerate: libreoffice security update t/ https://access.redhat.com/errata/RHSA-2023:6508RHSA-2023:6508RHSA-2023:6508 https://access.redhat.com/security/cve/CVE-2022-38745CVE-2022-38745CVE-2022-38745https://access.redhat.com/security/cve/CVE-2023-0950CVE-2023-0950CVE-2023-0950https://access.redhat.com/security/cve/CVE-2023-1183CVE-2023-1183CVE-2023-1183https://access.redhat.com/security/cve/CVE-2023-2255CVE-2023-2255CVE-2023-2255https://bugzilla.redhat.com/21820442182044https://bugzilla.redhat.com/22085062208506https://bugzilla.redhat.com/22101852210185https://bugzilla.redhat.com/22101862210186https://errata.almalinux.org/9/ALSA-2023-6508.htmlALSA-2023:6508ALSA-2023:6508 Nnlibreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpmOnlibreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpmNnlibreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpmOnlibreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm 7uBMBBBsecurityModerate: flatpak security, bug fix, and enhancement update #whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518 https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518  flatpak-devel-1.12.8-1.el9.i686.rpmf flatpak-1.12.8-1.el9.i686.rpmg flatpak-session-helper-1.12.8-1.el9.i686.rpm flatpak-devel-1.12.8-1.el9.x86_64.rpm flatpak-devel-1.12.8-1.el9.i686.rpmf flatpak-1.12.8-1.el9.i686.rpmg flatpak-session-helper-1.12.8-1.el9.i686.rpm flatpak-devel-1.12.8-1.el9.x86_64.rpmT ;xBBNBBBBsecurityModerate: ghostscript security and bug fix update rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544 https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544 ghostscript-tools-fonts-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.x86_64.rpmghostscript-9.54.0-13.el9.i686.rpmghostscript-tools-printing-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.i686.rpmghostscript-tools-fonts-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.x86_64.rpmghostscript-9.54.0-13.el9.i686.rpmghostscript-tools-printing-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.i686.rpm TsecurityModerate: libtiff security update 6N https://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575 https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575 y+libtiff-tools-4.4.0-10.el9.x86_64.rpmy+libtiff-tools-4.4.0-10.el9.x86_64.rpm} VBBBBsecurityModerate: protobuf-c security update }https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621 https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621 h6protobuf-c-devel-1.3.3-13.el9.i686.rpmg6protobuf-c-compiler-1.3.3-13.el9.x86_64.rpmh6protobuf-c-devel-1.3.3-13.el9.x86_64.rpmg6protobuf-c-compiler-1.3.3-13.el9.i686.rpmh6protobuf-c-devel-1.3.3-13.el9.i686.rpmg6protobuf-c-compiler-1.3.3-13.el9.x86_64.rpmh6protobuf-c-devel-1.3.3-13.el9.x86_64.rpmg6protobuf-c-compiler-1.3.3-13.el9.i686.rpm_ ?\BsecurityLow: glib2 security and bug fix updateKohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631  /glib2-static-2.68.4-11.el9.x86_64.rpm /glib2-static-2.68.4-11.el9.i686.rpm /glib2-static-2.68.4-11.el9.x86_64.rpm /glib2-static-2.68.4-11.el9.i686.rpm _BsecurityLow: shadow-utils security and bug fix updateKpYhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632 https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632 U:shadow-utils-subid-devel-4.9-8.el9.i686.rpmU:shadow-utils-subid-devel-4.9-8.el9.x86_64.rpmU:shadow-utils-subid-devel-4.9-8.el9.i686.rpmU:shadow-utils-subid-devel-4.9-8.el9.x86_64.rpm @E_BBBBBBBBBsecurityModerate: python3.9 security update I https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659 )python3-debug-3.9.18-1.el9_3.x86_64.rpm)python3-test-3.9.18-1.el9_3.i686.rpm)python3-test-3.9.18-1.el9_3.x86_64.rpm)python3-debug-3.9.18-1.el9_3.i686.rpmO)python3-3.9.18-1.el9_3.i686.rpm)python3-idle-3.9.18-1.el9_3.x86_64.rpm)python3-idle-3.9.18-1.el9_3.i686.rpmP)python3-tkinter-3.9.18-1.el9_3.i686.rpm)python3-debug-3.9.18-1.el9_3.x86_64.rpm)python3-test-3.9.18-1.el9_3.i686.rpm)python3-test-3.9.18-1.el9_3.x86_64.rpm)python3-debug-3.9.18-1.el9_3.i686.rpmO)python3-3.9.18-1.el9_3.i686.rpm)python3-idle-3.9.18-1.el9_3.x86_64.rpm)python3-idle-3.9.18-1.el9_3.i686.rpmP)python3-tkinter-3.9.18-1.el9_3.i686.rpmE mBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update iK https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667 hGpython3-samba-test-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.i686.rpmCGlibsmbclient-devel-4.18.6-100.el9.x86_64.rpmGGsamba-devel-4.18.6-100.el9.i686.rpmDGlibwbclient-devel-4.18.6-100.el9.i686.rpmGsamba-pidl-4.18.6-100.el9.noarch.rpmGpython3-samba-devel-4.18.6-100.el9.i686.rpmSGsamba-test-libs-4.18.6-100.el9.x86_64.rpmGpython3-samba-devel-4.18.6-100.el9.x86_64.rpmRGsamba-test-4.18.6-100.el9.x86_64.rpmCGlibsmbclient-devel-4.18.6-100.el9.i686.rpmDGlibwbclient-devel-4.18.6-100.el9.x86_64.rpmGGsamba-devel-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.x86_64.rpmhGpython3-samba-test-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.i686.rpmCGlibsmbclient-devel-4.18.6-100.el9.x86_64.rpmGGsamba-devel-4.18.6-100.el9.i686.rpmDGlibwbclient-devel-4.18.6-100.el9.i686.rpmGsamba-pidl-4.18.6-100.el9.noarch.rpmGpython3-samba-devel-4.18.6-100.el9.i686.rpmSGsamba-test-libs-4.18.6-100.el9.x86_64.rpmGpython3-samba-devel-4.18.6-100.el9.x86_64.rpmRGsamba-test-4.18.6-100.el9.x86_64.rpmCGlibsmbclient-devel-4.18.6-100.el9.i686.rpmDGlibwbclient-devel-4.18.6-100.el9.x86_64.rpmGGsamba-devel-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.x86_64.rpm0 CBsecurityLow: tpm2-tss security and enhancement updateK4Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685 https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685 m>tpm2-tss-devel-3.2.2-2.el9.i686.rpmm>tpm2-tss-devel-3.2.2-2.el9.x86_64.rpmm>tpm2-tss-devel-3.2.2-2.el9.i686.rpmm>tpm2-tss-devel-3.2.2-2.el9.x86_64.rpm  FBsecurityLow: procps-ng security and bug fix updateKHhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705 https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705 fAprocps-ng-devel-3.3.17-13.el9.x86_64.rpmfAprocps-ng-devel-3.3.17-13.el9.i686.rpmfAprocps-ng-devel-3.3.17-13.el9.x86_64.rpmfAprocps-ng-devel-3.3.17-13.el9.i686.rpm# IBBBBBBBBBBBBBBBBsecurityModerate: avahi security update Nhttps://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 ,Mavahi-devel-0.8-15.el9.x86_64.rpm*Mavahi-compat-libdns_sd-0.8-15.el9.i686.rpm)Mavahi-compat-howl-devel-0.8-15.el9.i686.rpm*Mavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm)Mavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm,Mavahi-devel-0.8-15.el9.i686.rpm+Mavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm-Mavahi-glib-devel-0.8-15.el9.i686.rpm-Mavahi-glib-devel-0.8-15.el9.x86_64.rpm(Mavahi-compat-howl-0.8-15.el9.i686.rpm(Mavahi-compat-howl-0.8-15.el9.x86_64.rpm+Mavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm ,Mavahi-devel-0.8-15.el9.x86_64.rpm*Mavahi-compat-libdns_sd-0.8-15.el9.i686.rpm)Mavahi-compat-howl-devel-0.8-15.el9.i686.rpm*Mavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm)Mavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm,Mavahi-devel-0.8-15.el9.i686.rpm+Mavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm-Mavahi-glib-devel-0.8-15.el9.i686.rpm-Mavahi-glib-devel-0.8-15.el9.x86_64.rpm(Mavahi-compat-howl-0.8-15.el9.i686.rpm(Mavahi-compat-howl-0.8-15.el9.x86_64.rpm+Mavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm [securityModerate: python-wheel security update _?https://access.redhat.com/errata/RHSA-2023:6712RHSA-2023:6712RHSA-2023:6712 https://access.redhat.com/security/cve/CVE-2022-40898CVE-2022-40898CVE-2022-40898https://bugzilla.redhat.com/21658642165864https://errata.almalinux.org/9/ALSA-2023-6712.htmlALSA-2023:6712ALSA-2023:6712 xqpython3-wheel-wheel-0.36.2-8.el9.noarch.rpmwqpython3-wheel-0.36.2-8.el9.noarch.rpmxqpython3-wheel-wheel-0.36.2-8.el9.noarch.rpmwqpython3-wheel-0.36.2-8.el9.noarch.rpm& DBBYBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732 `libgs-devel-9.54.0-14.el9_3.i686.rpmghostscript-tools-printing-9.54.0-14.el9_3.i686.rpmghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpmghostscript-9.54.0-14.el9_3.i686.rpm`libgs-devel-9.54.0-14.el9_3.x86_64.rpm`libgs-devel-9.54.0-14.el9_3.i686.rpmghostscript-tools-printing-9.54.0-14.el9_3.i686.rpmghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpmghostscript-9.54.0-14.el9_3.i686.rpm`libgs-devel-9.54.0-14.el9_3.x86_64.rpm dBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix update https://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738 k9java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmq9java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmh9java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmg9java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmj9java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmr9java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpme9java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmm9java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmo9java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpml9java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmp9java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmf9java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmi9java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmn9java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmk9java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmq9java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmh9java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmg9java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmj9java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmr9java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpme9java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmm9java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmo9java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpml9java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmp9java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmf9java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmi9java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmn9java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm @BBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update 9Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744 CHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmDHlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmhHpython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmRHsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpmDHlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmHsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpmSHsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmGHsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmGHsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpmCHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmCHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmDHlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmhHpython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmRHsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpmDHlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmHsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpmSHsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmGHsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmGHsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpmCHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm VBBBsecurityImportant: nghttp2 security update-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746 :nghttp2-1.43.0-5.el9_3.1.x86_64.rpm/:libnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm/:libnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm:nghttp2-1.43.0-5.el9_3.1.x86_64.rpm/:libnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm/:libnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpml  [securityModerate: dotnet8.0 security update ?https://access.redhat.com/errata/RHSA-2023:7253RHSA-2023:7253RHSA-2023:7253 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7253.htmlALSA-2023:7253ALSA-2023:7253 JQdotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpmJQdotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpmٍ! ]securityModerate: dotnet7.0 security update [1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255 ILdotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpmILdotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpmr" _securityModerate: dotnet6.0 security update .https://access.redhat.com/errata/RHSA-2023:7257RHSA-2023:7257RHSA-2023:7257 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7257.htmlALSA-2023:7257ALSA-2023:7257 m@dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpmm@dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpmو9# aBBBBBBBBBBsecurityImportant: postgresql security update: https://access.redhat.com/errata/RHSA-2023:7784RHSA-2023:7784RHSA-2023:7784 https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7784.htmlALSA-2023:7784ALSA-2023:7784 |Npostgresql-server-devel-13.13-1.el9_3.x86_64.rpm{Npostgresql-private-devel-13.13-1.el9_3.x86_64.rpm~Npostgresql-test-13.13-1.el9_3.x86_64.rpmzNpostgresql-docs-13.13-1.el9_3.x86_64.rpmNpostgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm}Npostgresql-static-13.13-1.el9_3.x86_64.rpm|Npostgresql-server-devel-13.13-1.el9_3.x86_64.rpm{Npostgresql-private-devel-13.13-1.el9_3.x86_64.rpm~Npostgresql-test-13.13-1.el9_3.x86_64.rpmzNpostgresql-docs-13.13-1.el9_3.x86_64.rpmNpostgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm}Npostgresql-static-13.13-1.el9_3.x86_64.rpmb$ mBsecurityImportant: gstreamer1-plugins-bad-free security update@https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791 https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791  gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpmM% 0securityModerate: ipa security update ]4https://access.redhat.com/errata/RHSA-2024:0141RHSA-2024:0141RHSA-2024:0141 https://access.redhat.com/security/cve/CVE-2023-5455CVE-2023-5455CVE-2023-5455https://bugzilla.redhat.com/22428282242828https://errata.almalinux.org/9/ALSA-2024-0141.htmlALSA-2024:0141ALSA-2024:0141 vXpython3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpmvXpython3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm[& qsecurityImportant: .NET 7.0 security updateghttps://access.redhat.com/errata/RHSA-2024:0151RHSA-2024:0151RHSA-2024:0151 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0151.htmlALSA-2024:0151ALSA-2024:0151 IMdotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpmIMdotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpmS' ssecurityImportant: .NET 8.0 security updatexfhttps://access.redhat.com/errata/RHSA-2024:0152RHSA-2024:0152RHSA-2024:0152 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0152.htmlALSA-2024:0152ALSA-2024:0152 JRdotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpmJRdotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm( usecurityImportant: .NET 6.0 security update^ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156 mAdotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpmmAdotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpmv) wBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateE! https://access.redhat.com/errata/RHSA-2024:0249RHSA-2024:0249RHSA-2024:0249 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0249.htmlALSA-2024:0249ALSA-2024:0249 m;java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmg;java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmk;java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmh;java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmr;java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmn;java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpml;java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmj;java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmi;java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmq;java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmf;java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmo;java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpme;java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmp;java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmm;java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmg;java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmk;java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmh;java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmr;java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmn;java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpml;java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmj;java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmi;java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmq;java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmf;java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmo;java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpme;java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmp;java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm* SBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix updatef1https://access.redhat.com/errata/RHSA-2024:0265RHSA-2024:0265RHSA-2024:0265 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0265.htmlALSA-2024:0265ALSA-2024:0265 Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm+ gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updatephttps://access.redhat.com/errata/RHSA-2024:0266RHSA-2024:0266RHSA-2024:0266 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0266.htmlALSA-2024:0266ALSA-2024:0266 ^'java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm]'java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm`'java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmW'java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmZ'java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmY'java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmb'java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm\'java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmX'java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmc'java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm['java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm_'java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmd'java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpma'java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm^'java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm]'java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm`'java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmW'java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmZ'java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmY'java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmb'java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm\'java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmX'java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmc'java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm['java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm_'java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmd'java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpma'java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmC, CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update*https://access.redhat.com/errata/RHSA-2024:0267RHSA-2024:0267RHSA-2024:0267 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20932CVE-2024-20932CVE-2024-20932https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577202257720https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0267.htmlALSA-2024:0267ALSA-2024:0267 t+java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr+java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmn+java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms+java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmz+java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmx+java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp+java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmw+java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmq+java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm{+java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmy+java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmu+java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmv+java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmo+java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmt+java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr+java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmn+java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms+java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmz+java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmx+java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp+java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmw+java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmq+java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm{+java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmy+java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmu+java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmv+java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmo+java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm3- WrXBBBBBBBBBsecurityModerate: python3.9 security update 1chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466 *python3-idle-3.9.18-1.el9_3.1.i686.rpmP*python3-tkinter-3.9.18-1.el9_3.1.i686.rpm*python3-idle-3.9.18-1.el9_3.1.x86_64.rpm*python3-debug-3.9.18-1.el9_3.1.i686.rpm*python3-debug-3.9.18-1.el9_3.1.x86_64.rpm*python3-test-3.9.18-1.el9_3.1.i686.rpmO*python3-3.9.18-1.el9_3.1.i686.rpm*python3-test-3.9.18-1.el9_3.1.x86_64.rpm*python3-idle-3.9.18-1.el9_3.1.i686.rpmP*python3-tkinter-3.9.18-1.el9_3.1.i686.rpm*python3-idle-3.9.18-1.el9_3.1.x86_64.rpm*python3-debug-3.9.18-1.el9_3.1.i686.rpm*python3-debug-3.9.18-1.el9_3.1.x86_64.rpm*python3-test-3.9.18-1.el9_3.1.i686.rpmO*python3-3.9.18-1.el9_3.1.i686.rpm*python3-test-3.9.18-1.el9_3.1.x86_64.rpmˤ. jsecurityImportant: dotnet7.0 security updatexhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805 INdotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpmINdotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm@/ lsecurityImportant: dotnet6.0 security update xhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807 mBdotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpmmBdotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm20 nsecurityImportant: .NET 8.0 security updatewhttps://access.redhat.com/errata/RHSA-2024:0848RHSA-2024:0848RHSA-2024:0848 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0848.htmlALSA-2024:0848ALSA-2024:0848 JSdotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpmJSdotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm 1 pBBBBBBBBBBsecurityImportant: postgresql security update{ https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951 ~Opostgresql-test-13.14-1.el9_3.x86_64.rpmOpostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm|Opostgresql-server-devel-13.14-1.el9_3.x86_64.rpmzOpostgresql-docs-13.14-1.el9_3.x86_64.rpm}Opostgresql-static-13.14-1.el9_3.x86_64.rpm{Opostgresql-private-devel-13.14-1.el9_3.x86_64.rpm~Opostgresql-test-13.14-1.el9_3.x86_64.rpmOpostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm|Opostgresql-server-devel-13.14-1.el9_3.x86_64.rpmzOpostgresql-docs-13.14-1.el9_3.x86_64.rpm}Opostgresql-static-13.14-1.el9_3.x86_64.rpm{Opostgresql-private-devel-13.14-1.el9_3.x86_64.rpm2 |BsecurityImportant: unbound security update[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977 Hunbound-devel-1.16.2-3.el9_3.1.i686.rpmHunbound-devel-1.16.2-3.el9_3.1.x86_64.rpmHunbound-devel-1.16.2-3.el9_3.1.i686.rpmHunbound-devel-1.16.2-3.el9_3.1.x86_64.rpm3 BBBBsecurityModerate: kernel security update _https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274 wlibperf-5.14.0-503.15.1.el9_5.x86_64.rpmwkernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpmwkernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpmwlibperf-5.14.0-503.15.1.el9_5.x86_64.rpmwkernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpmwkernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpmn4 !_BfBsecurityImportant: edk2 security update~6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075 https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075 xUedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpmUedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm@Uedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm?Uedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmxUedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpmUedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm@Uedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm?Uedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmO5 "HBBBBBBBBBBBsecurityImportant: postgresql security update4`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791 :postgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpmz:postgresql-docs-13.18-1.el9_5.x86_64.rpm{:postgresql-private-devel-13.18-1.el9_5.x86_64.rpm6:postgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm}:postgresql-static-13.18-1.el9_5.x86_64.rpm~:postgresql-test-13.18-1.el9_5.x86_64.rpm|:postgresql-server-devel-13.18-1.el9_5.x86_64.rpm:postgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpmz:postgresql-docs-13.18-1.el9_5.x86_64.rpm{:postgresql-private-devel-13.18-1.el9_5.x86_64.rpm6:postgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm}:postgresql-static-13.18-1.el9_5.x86_64.rpm~:postgresql-test-13.18-1.el9_5.x86_64.rpm|:postgresql-server-devel-13.18-1.el9_5.x86_64.rpmy6 #securityImportant: ruby security update%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858 kWruby-doc-3.0.7-163.el9_5.noarch.rpmkWruby-doc-3.0.7-163.el9_5.noarch.rpm 7 $VBBBBsecurityModerate: kernel security update 9Ahttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939 xkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpmxkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpmxlibperf-5.14.0-503.16.1.el9_5.x86_64.rpmxkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpmxkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpmxlibperf-5.14.0-503.16.1.el9_5.x86_64.rpm(8 'eBwBBBBBBBBBsecurityImportant: python3.12 security updatez-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978 https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978 Ipython3.12-debug-3.12.5-2.el9_5.2.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.2.x86_64.rpmJpython3.12-idle-3.12.5-2.el9_5.2.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.2.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.2.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.2.i686.rpmKpython3.12-test-3.12.5-2.el9_5.2.i686.rpmSpython3.12-3.12.5-2.el9_5.2.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.2.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.2.x86_64.rpmJpython3.12-idle-3.12.5-2.el9_5.2.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.2.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.2.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.2.i686.rpmKpython3.12-test-3.12.5-2.el9_5.2.i686.rpmSpython3.12-3.12.5-2.el9_5.2.i686.rpm9 )hb_BBBBBBBBBsecurityModerate: python3.9:3.9.21 security update 'https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983 P1python3-tkinter-3.9.21-1.el9_5.i686.rpm1python3-test-3.9.21-1.el9_5.x86_64.rpm1python3-debug-3.9.21-1.el9_5.x86_64.rpm1python3-idle-3.9.21-1.el9_5.i686.rpmO1python3-3.9.21-1.el9_5.i686.rpm1python3-idle-3.9.21-1.el9_5.x86_64.rpm1python3-test-3.9.21-1.el9_5.i686.rpm1python3-debug-3.9.21-1.el9_5.i686.rpmP1python3-tkinter-3.9.21-1.el9_5.i686.rpm1python3-test-3.9.21-1.el9_5.x86_64.rpm1python3-debug-3.9.21-1.el9_5.x86_64.rpm1python3-idle-3.9.21-1.el9_5.i686.rpmO1python3-3.9.21-1.el9_5.i686.rpm1python3-idle-3.9.21-1.el9_5.x86_64.rpm1python3-test-3.9.21-1.el9_5.i686.rpm1python3-debug-3.9.21-1.el9_5.i686.rpmI: ,jBHBBBBBBBBBsecurityModerate: python3.11 security update EMhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111 https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111 python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-debug-3.11.9-7.el9_5.2.i686.rpmpython3.11-debug-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.2.i686.rpmpython3.11-test-3.11.9-7.el9_5.2.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmbpython3.11-3.11.9-7.el9_5.2.i686.rpmpython3.11-idle-3.11.9-7.el9_5.2.i686.rpmpython3.11-idle-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-debug-3.11.9-7.el9_5.2.i686.rpmpython3.11-debug-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.2.i686.rpmpython3.11-test-3.11.9-7.el9_5.2.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmbpython3.11-3.11.9-7.el9_5.2.i686.rpmpython3.11-idle-3.11.9-7.el9_5.2.i686.rpm}; /mBPBsecurityModerate: edk2:20240524 security update Bhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219 https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219 @Xedk2-tools-doc-20240524-6.el9_5.3.noarch.rpmXedk2-ovmf-20240524-6.el9_5.3.noarch.rpm?Xedk2-aarch64-20240524-6.el9_5.3.noarch.rpmxXedk2-tools-20240524-6.el9_5.3.x86_64.rpm@Xedk2-tools-doc-20240524-6.el9_5.3.noarch.rpmXedk2-ovmf-20240524-6.el9_5.3.noarch.rpm?Xedk2-aarch64-20240524-6.el9_5.3.noarch.rpmxXedk2-tools-20240524-6.el9_5.3.x86_64.rpmV< @BsecurityModerate: unbound:1.16.2 security update T https://access.redhat.com/errata/RHSA-2024:11232RHSA-2024:11232RHSA-2024:11232 https://access.redhat.com/security/cve/CVE-2024-8508CVE-2024-8508CVE-2024-8508https://bugzilla.redhat.com/23163212316321https://errata.almalinux.org/9/ALSA-2024-11232.htmlALSA-2024:11232ALSA-2024:11232 Hunbound-devel-1.16.2-8.el9_5.1.i686.rpmHunbound-devel-1.16.2-8.el9_5.1.x86_64.rpmHunbound-devel-1.16.2-8.el9_5.1.i686.rpmHunbound-devel-1.16.2-8.el9_5.1.x86_64.rpm~= DBsecurityModerate: libsndfile:1.0.31 security update _+https://access.redhat.com/errata/RHSA-2024:11237RHSA-2024:11237RHSA-2024:11237 https://access.redhat.com/security/cve/CVE-2024-50612CVE-2024-50612CVE-2024-50612https://bugzilla.redhat.com/23220572322057https://errata.almalinux.org/9/ALSA-2024-11237.htmlALSA-2024:11237ALSA-2024:11237 Olibsndfile-devel-1.0.31-8.el9_5.2.i686.rpmOlibsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpmOlibsndfile-devel-1.0.31-8.el9_5.2.i686.rpmOlibsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm:> 0HBsecurityModerate: mpg123:1.32.9 security update qhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242 https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242 bmpg123-devel-1.32.9-1.el9_5.i686.rpmbmpg123-devel-1.32.9-1.el9_5.x86_64.rpmbmpg123-devel-1.32.9-1.el9_5.i686.rpmbmpg123-devel-1.32.9-1.el9_5.x86_64.rpm? 1KBBBBsecurityModerate: mysql security update {thttps://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141 https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141 Q(mysql-test-8.0.36-1.el9_3.x86_64.rpmP(mysql-devel-8.0.36-1.el9_3.x86_64.rpm5(mysql-libs-8.0.36-1.el9_3.x86_64.rpmQ(mysql-test-8.0.36-1.el9_3.x86_64.rpmP(mysql-devel-8.0.36-1.el9_3.x86_64.rpm5(mysql-libs-8.0.36-1.el9_3.x86_64.rpmy@ 2QBBBBsecurityModerate: kernel security update oc$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486 ylibperf-5.14.0-503.19.1.el9_5.x86_64.rpmykernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpmykernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpmylibperf-5.14.0-503.19.1.el9_5.x86_64.rpmykernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpmykernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpmaA WBsecurityModerate: opencryptoki security update RWhttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239 https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239 d@opencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpmd@opencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpmd@opencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpmd@opencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpmDB 3ZsecurityModerate: .NET 7.0 security update )Fhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309 IOdotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpmIOdotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm˥sC 4\securityModerate: .NET 8.0 security update oEhttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310 JTdotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpmJTdotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpmeD 5^BBsecurityImportant: libreoffice security update4https://access.redhat.com/errata/RHSA-2024:1427RHSA-2024:1427RHSA-2024:1427 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-1427.htmlALSA-2024:1427ALSA-2024:1427 Nolibreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpmOolibreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpmNolibreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpmOolibreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpmzE 6bBsecurityImportant: varnish security updateGthttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691 https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691 Lvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpmLvarnish-devel-6.6.2-4.el9_3.1.i686.rpmLvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpmLvarnish-devel-6.6.2-4.el9_3.1.i686.rpm=F 7eBsecurityImportant: unbound security update;6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750 https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750 Hunbound-devel-1.16.2-3.el9_3.5.x86_64.rpmHunbound-devel-1.16.2-3.el9_3.5.i686.rpmHunbound-devel-1.16.2-3.el9_3.5.x86_64.rpmHunbound-devel-1.16.2-3.el9_3.5.i686.rpmFG 9xqBBBsecurityImportant: bind security updateqGhttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789 QDbind-devel-9.16.23-14.el9_3.4.x86_64.rpm>Dbind-doc-9.16.23-14.el9_3.4.noarch.rpmQDbind-devel-9.16.23-14.el9_3.4.i686.rpmVDbind-libs-9.16.23-14.el9_3.4.i686.rpmQDbind-devel-9.16.23-14.el9_3.4.x86_64.rpm>Dbind-doc-9.16.23-14.el9_3.4.noarch.rpmQDbind-devel-9.16.23-14.el9_3.4.i686.rpmVDbind-libs-9.16.23-14.el9_3.4.i686.rpmH :mBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update 8 https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818 Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmhI ;ABBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update Wn https://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822 `(java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmY(java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmZ(java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm[(java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmd(java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmW(java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpma(java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmb(java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm\(java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm](java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmc(java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm_(java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmX(java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm^(java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm`(java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmY(java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmZ(java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm[(java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmd(java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmW(java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpma(java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmb(java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm\(java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm](java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmc(java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm_(java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmX(java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm^(java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmQJ <]BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update E$ https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825 p,java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmz,java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmn,java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpms,java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmx,java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmy,java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmv,java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmq,java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmr,java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmu,java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm{,java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmw,java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmt,java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo,java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmp,java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmz,java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmn,java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpms,java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmx,java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmy,java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmv,java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmq,java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmr,java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmu,java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm{,java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmw,java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmt,java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo,java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm(K =yBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update iHhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828 m<java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmj<java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmi<java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmo<java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmg<java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmh<java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmf<java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmr<java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmq<java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmk<java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmp<java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpme<java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmn<java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpml<java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmm<java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmj<java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmi<java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmo<java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmg<java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmh<java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmf<java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmr<java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmq<java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmk<java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmp<java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpme<java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmn<java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpml<java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmVL >UBsecurityLow: LibRaw security updateK1https://access.redhat.com/errata/RHSA-2024:2137RHSA-2024:2137RHSA-2024:2137 https://access.redhat.com/security/cve/CVE-2023-1729CVE-2023-1729CVE-2023-1729https://bugzilla.redhat.com/21882402188240https://errata.almalinux.org/9/ALSA-2024-2137.htmlALSA-2024:2137ALSA-2024:2137 ELibRaw-devel-0.21.1-1.el9.i686.rpmELibRaw-devel-0.21.1-1.el9.x86_64.rpmELibRaw-devel-0.21.1-1.el9.i686.rpmELibRaw-devel-0.21.1-1.el9.x86_64.rpmIM ?securityModerate: ipa security update Iuhttps://access.redhat.com/errata/RHSA-2024:2147RHSA-2024:2147RHSA-2024:2147 https://access.redhat.com/security/cve/CVE-2024-1481CVE-2024-1481CVE-2024-1481https://bugzilla.redhat.com/22621692262169https://errata.almalinux.org/9/ALSA-2024-2147.htmlALSA-2024:2147ALSA-2024:2147 vZpython3-ipatests-4.11.0-9.el9_4.noarch.rpmvZpython3-ipatests-4.11.0-9.el9_4.noarch.rpm N YBBsecurityModerate: xorg-x11-server security update >https://access.redhat.com/errata/RHSA-2024:2169RHSA-2024:2169RHSA-2024:2169 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22447362244736https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2169.htmlALSA-2024:2169ALSA-2024:2169 U\xorg-x11-server-source-1.20.11-24.el9.noarch.rpma\xorg-x11-server-devel-1.20.11-24.el9.x86_64.rpma\xorg-x11-server-devel-1.20.11-24.el9.i686.rpmU\xorg-x11-server-source-1.20.11-24.el9.noarch.rpma\xorg-x11-server-devel-1.20.11-24.el9.x86_64.rpma\xorg-x11-server-devel-1.20.11-24.el9.i686.rpm$O ]BsecurityModerate: libsndfile security update >&https://access.redhat.com/errata/RHSA-2024:2184RHSA-2024:2184RHSA-2024:2184 https://access.redhat.com/security/cve/CVE-2022-33065CVE-2022-33065CVE-2022-33065https://bugzilla.redhat.com/22389342238934https://errata.almalinux.org/9/ALSA-2024-2184.htmlALSA-2024:2184ALSA-2024:2184 O libsndfile-devel-1.0.31-8.el9.i686.rpmO libsndfile-devel-1.0.31-8.el9.x86_64.rpmO libsndfile-devel-1.0.31-8.el9.i686.rpmO libsndfile-devel-1.0.31-8.el9.x86_64.rpmSP `BsecurityImportant: pmix security updated:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199 https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199 e?pmix-pmi-devel-3.2.3-5.el9.i686.rpme?pmix-pmi-devel-3.2.3-5.el9.x86_64.rpme?pmix-pmi-devel-3.2.3-5.el9.i686.rpme?pmix-pmi-devel-3.2.3-5.el9.x86_64.rpmWQ cBBBBBsecurityModerate: libnbd security update <https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204 https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204 N$libnbd-devel-1.18.1-3.el9.x86_64.rpm$ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpmN$libnbd-devel-1.18.1-3.el9.i686.rpm$ocaml-libnbd-1.18.1-3.el9.x86_64.rpmN$libnbd-devel-1.18.1-3.el9.x86_64.rpm$ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpmN$libnbd-devel-1.18.1-3.el9.i686.rpm$ocaml-libnbd-1.18.1-3.el9.x86_64.rpmLR jBBBBsecurityModerate: freerdp security update Zihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208 https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208  =libwinpr-devel-2.11.2-1.el9.i686.rpm =libwinpr-devel-2.11.2-1.el9.x86_64.rpm =freerdp-devel-2.11.2-1.el9.x86_64.rpm =freerdp-devel-2.11.2-1.el9.i686.rpm =libwinpr-devel-2.11.2-1.el9.i686.rpm =libwinpr-devel-2.11.2-1.el9.x86_64.rpm =freerdp-devel-2.11.2-1.el9.x86_64.rpm =freerdp-devel-2.11.2-1.el9.i686.rpmS pBBBBsecurityModerate: libvirt security update Chttps://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236 https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236 ]libvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm]libvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm-]libvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm]libvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm]libvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm-]libvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpmiT vBBsecurityImportant: edk2 security updateYjhttps://access.redhat.com/errata/RHSA-2024:2264RHSA-2024:2264RHSA-2024:2264 https://access.redhat.com/security/cve/CVE-2022-36763CVE-2022-36763CVE-2022-36763https://access.redhat.com/security/cve/CVE-2022-36764CVE-2022-36764CVE-2022-36764https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-45229CVE-2023-45229CVE-2023-45229https://access.redhat.com/security/cve/CVE-2023-45231CVE-2023-45231CVE-2023-45231https://access.redhat.com/security/cve/CVE-2023-45232CVE-2023-45232CVE-2023-45232https://access.redhat.com/security/cve/CVE-2023-45233CVE-2023-45233CVE-2023-45233https://access.redhat.com/security/cve/CVE-2023-45235CVE-2023-45235CVE-2023-45235https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22575822257582https://bugzilla.redhat.com/22575832257583https://bugzilla.redhat.com/22586772258677https://bugzilla.redhat.com/22586882258688https://bugzilla.redhat.com/22586912258691https://bugzilla.redhat.com/22586942258694https://bugzilla.redhat.com/22587002258700https://errata.almalinux.org/9/ALSA-2024-2264.htmlALSA-2024:2264ALSA-2024:2264 ?cedk2-aarch64-20231122-6.el9.noarch.rpmxcedk2-tools-20231122-6.el9.x86_64.rpm@cedk2-tools-doc-20231122-6.el9.noarch.rpm?cedk2-aarch64-20231122-6.el9.noarch.rpmxcedk2-tools-20231122-6.el9.x86_64.rpm@cedk2-tools-doc-20231122-6.el9.noarch.rpmhU zBsecurityModerate: qt5-qtbase security update Cshttps://access.redhat.com/errata/RHSA-2024:2276RHSA-2024:2276RHSA-2024:2276 https://access.redhat.com/security/cve/CVE-2023-51714CVE-2023-51714CVE-2023-51714https://access.redhat.com/security/cve/CVE-2024-25580CVE-2024-25580CVE-2024-25580https://bugzilla.redhat.com/22558562255856https://bugzilla.redhat.com/22644232264423https://errata.almalinux.org/9/ALSA-2024-2276.htmlALSA-2024:2276ALSA-2024:2276 Fqt5-qtbase-static-5.15.9-9.el9.i686.rpmFqt5-qtbase-static-5.15.9-9.el9.x86_64.rpmFqt5-qtbase-static-5.15.9-9.el9.i686.rpmFqt5-qtbase-static-5.15.9-9.el9.x86_64.rpmeV }BsecurityModerate: gstreamer1-plugins-bad-free security update 6P https://access.redhat.com/errata/RHSA-2024:2287RHSA-2024:2287RHSA-2024:2287 https://access.redhat.com/security/cve/CVE-2023-40474CVE-2023-40474CVE-2023-40474https://access.redhat.com/security/cve/CVE-2023-40475CVE-2023-40475CVE-2023-40475https://access.redhat.com/security/cve/CVE-2023-40476CVE-2023-40476CVE-2023-40476https://access.redhat.com/security/cve/CVE-2023-50186CVE-2023-50186CVE-2023-50186https://bugzilla.redhat.com/22545872254587https://bugzilla.redhat.com/22545882254588https://bugzilla.redhat.com/22545892254589https://bugzilla.redhat.com/22556392255639https://errata.almalinux.org/9/ALSA-2024-2287.htmlALSA-2024:2287ALSA-2024:2287  gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpmkW @securityModerate: libtiff security update : https://access.redhat.com/errata/RHSA-2024:2289RHSA-2024:2289RHSA-2024:2289 https://access.redhat.com/security/cve/CVE-2022-40090CVE-2022-40090CVE-2022-40090https://access.redhat.com/security/cve/CVE-2023-3618CVE-2023-3618CVE-2023-3618https://access.redhat.com/security/cve/CVE-2023-40745CVE-2023-40745CVE-2023-40745https://access.redhat.com/security/cve/CVE-2023-41175CVE-2023-41175CVE-2023-41175https://access.redhat.com/security/cve/CVE-2023-6228CVE-2023-6228CVE-2023-6228https://bugzilla.redhat.com/22158652215865https://bugzilla.redhat.com/22349702234970https://bugzilla.redhat.com/22352642235264https://bugzilla.redhat.com/22352652235265https://bugzilla.redhat.com/22409952240995https://errata.almalinux.org/9/ALSA-2024-2289.htmlALSA-2024:2289ALSA-2024:2289 y,libtiff-tools-4.4.0-12.el9.x86_64.rpmy,libtiff-tools-4.4.0-12.el9.x86_64.rpmX JBxBBBBBBBBBsecurityModerate: python3.11 security update @rhttps://access.redhat.com/errata/RHSA-2024:2292RHSA-2024:2292RHSA-2024:2292 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-2292.htmlALSA-2024:2292ALSA-2024:2292 python3.11-test-3.11.7-1.el9.i686.rpmbpython3.11-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.i686.rpmpython3.11-test-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.i686.rpmcpython3.11-tkinter-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.x86_64.rpmpython3.11-test-3.11.7-1.el9.i686.rpmbpython3.11-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.i686.rpmpython3.11-test-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.i686.rpmcpython3.11-tkinter-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.x86_64.rpm9Y MBBBBsecurityModerate: libjpeg-turbo security update 2Rhttps://access.redhat.com/errata/RHSA-2024:2295RHSA-2024:2295RHSA-2024:2295 https://access.redhat.com/security/cve/CVE-2021-29390CVE-2021-29390CVE-2021-29390https://bugzilla.redhat.com/22355212235521https://errata.almalinux.org/9/ALSA-2024-2295.htmlALSA-2024:2295ALSA-2024:2295 W9turbojpeg-devel-2.0.90-7.el9.x86_64.rpmV9turbojpeg-2.0.90-7.el9.i686.rpmW9turbojpeg-devel-2.0.90-7.el9.i686.rpmV9turbojpeg-2.0.90-7.el9.x86_64.rpmW9turbojpeg-devel-2.0.90-7.el9.x86_64.rpmV9turbojpeg-2.0.90-7.el9.i686.rpmW9turbojpeg-devel-2.0.90-7.el9.i686.rpmV9turbojpeg-2.0.90-7.el9.x86_64.rpmZ SBBsecurityModerate: mingw components security update Bhttps://access.redhat.com/errata/RHSA-2024:2353RHSA-2024:2353RHSA-2024:2353 https://access.redhat.com/security/cve/CVE-2023-1579CVE-2023-1579CVE-2023-1579https://bugzilla.redhat.com/21809052180905https://errata.almalinux.org/9/ALSA-2024-2353.htmlALSA-2024:2353ALSA-2024:2353 >tmingw64-binutils-2.41-3.el9.x86_64.rpm9tmingw32-binutils-2.41-3.el9.x86_64.rpm>tmingw64-binutils-2.41-3.el9.x86_64.rpm9tmingw32-binutils-2.41-3.el9.x86_64.rpm/[ WBsecurityModerate: zziplib security update Fhttps://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377 https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377 Xzziplib-devel-0.13.71-11.el9_4.x86_64.rpmXzziplib-devel-0.13.71-11.el9_4.i686.rpmXzziplib-devel-0.13.71-11.el9_4.x86_64.rpmXzziplib-devel-0.13.71-11.el9_4.i686.rpm/\ ZBBBBsecurityImportant: kernel security, bug fix, and enhancement updateT%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394 https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671ilibperf-5.14.0-427.13.1.el9_4.x86_64.rpmikernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpmikernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpmilibperf-5.14.0-427.13.1.el9_4.x86_64.rpmikernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpmikernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm] `BBBBBBBBBBBBBBBBsecurityModerate: avahi security update yO https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433 ,Navahi-devel-0.8-20.el9.i686.rpm-Navahi-glib-devel-0.8-20.el9.x86_64.rpm*Navahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm+Navahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm(Navahi-compat-howl-0.8-20.el9.i686.rpm,Navahi-devel-0.8-20.el9.x86_64.rpm*Navahi-compat-libdns_sd-0.8-20.el9.i686.rpm(Navahi-compat-howl-0.8-20.el9.x86_64.rpm)Navahi-compat-howl-devel-0.8-20.el9.i686.rpm)Navahi-compat-howl-devel-0.8-20.el9.x86_64.rpm+Navahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm-Navahi-glib-devel-0.8-20.el9.i686.rpm ,Navahi-devel-0.8-20.el9.i686.rpm-Navahi-glib-devel-0.8-20.el9.x86_64.rpm*Navahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm+Navahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm(Navahi-compat-howl-0.8-20.el9.i686.rpm,Navahi-devel-0.8-20.el9.x86_64.rpm*Navahi-compat-libdns_sd-0.8-20.el9.i686.rpm(Navahi-compat-howl-0.8-20.el9.x86_64.rpm)Navahi-compat-howl-devel-0.8-20.el9.i686.rpm)Navahi-compat-howl-devel-0.8-20.el9.x86_64.rpm+Navahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm-Navahi-glib-devel-0.8-20.el9.i686.rpmt^ rsecurityModerate: systemd security update Hhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463 https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 N'systemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpmN'systemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm_ tBsecurityLow: file security updateKIBhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512 https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512 SGfile-devel-5.39-16.el9.i686.rpmSGfile-devel-5.39-16.el9.x86_64.rpmSGfile-devel-5.39-16.el9.i686.rpmSGfile-devel-5.39-16.el9.x86_64.rpm` 9wsecurityModerate: mingw-pixman security update https://access.redhat.com/errata/RHSA-2024:2525RHSA-2024:2525RHSA-2024:2525 https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2024-2525.htmlALSA-2024:2525ALSA-2024:2525 opmingw32-pixman-0.42.2-3.el9.noarch.rpmrpmingw64-pixman-0.42.2-3.el9.noarch.rpmopmingw32-pixman-0.42.2-3.el9.noarch.rpmrpmingw64-pixman-0.42.2-3.el9.noarch.rpmua >zBBsecurityLow: mingw-glib2 security updateK% https://access.redhat.com/errata/RHSA-2024:2528RHSA-2024:2528RHSA-2024:2528 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32636CVE-2023-32636CVE-2023-32636https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://bugzilla.redhat.com/22118332211833https://errata.almalinux.org/9/ALSA-2024-2528.htmlALSA-2024:2528ALSA-2024:2528 4amingw64-glib2-static-2.78.0-1.el9.noarch.rpm3amingw64-glib2-2.78.0-1.el9.noarch.rpm1amingw32-glib2-2.78.0-1.el9.noarch.rpm2amingw32-glib2-static-2.78.0-1.el9.noarch.rpm4amingw64-glib2-static-2.78.0-1.el9.noarch.rpm3amingw64-glib2-2.78.0-1.el9.noarch.rpm1amingw32-glib2-2.78.0-1.el9.noarch.rpm2amingw32-glib2-static-2.78.0-1.el9.noarch.rpmTb TlBBBsecurityImportant: bind security updateDhttps://access.redhat.com/errata/RHSA-2024:2551RHSA-2024:2551RHSA-2024:2551 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-2551.htmlALSA-2024:2551ALSA-2024:2551 VEbind-libs-9.16.23-18.el9_4.1.i686.rpmQEbind-devel-9.16.23-18.el9_4.1.i686.rpmQEbind-devel-9.16.23-18.el9_4.1.x86_64.rpm>Ebind-doc-9.16.23-18.el9_4.1.noarch.rpmVEbind-libs-9.16.23-18.el9_4.1.i686.rpmQEbind-devel-9.16.23-18.el9_4.1.i686.rpmQEbind-devel-9.16.23-18.el9_4.1.x86_64.rpm>Ebind-doc-9.16.23-18.el9_4.1.noarch.rpm)c DBBBBsecurityModerate: libvirt security and bug fix update R2https://access.redhat.com/errata/RHSA-2024:2560RHSA-2024:2560RHSA-2024:2560 https://access.redhat.com/security/cve/CVE-2024-1441CVE-2024-1441CVE-2024-1441https://access.redhat.com/security/cve/CVE-2024-2494CVE-2024-2494CVE-2024-2494https://bugzilla.redhat.com/22638412263841https://bugzilla.redhat.com/22701152270115https://errata.almalinux.org/9/ALSA-2024-2560.htmlALSA-2024:2560ALSA-2024:2560 [libvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm[libvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-[libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm[libvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm[libvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-[libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm!d JBsecurityModerate: sssd security and bug fix update Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571 P5libsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpmP5libsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpmP5libsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpmP5libsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpmCe MBBBBsecurityModerate: kernel security and bug fix update L&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758 https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743jkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpmjlibperf-5.14.0-427.16.1.el9_4.x86_64.rpmjkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpmjkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpmjlibperf-5.14.0-427.16.1.el9_4.x86_64.rpmjkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpmhf SsecurityImportant: .NET 8.0 security updater"https://access.redhat.com/errata/RHSA-2024:2842RHSA-2024:2842RHSA-2024:2842 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2842.htmlALSA-2024:2842ALSA-2024:2842 JUdotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpmJUdotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpmCg UsecurityImportant: .NET 7.0 security update#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843 IPdotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpmIPdotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpmlh WBBBBsecurityModerate: kernel security and bug fix update 7x https://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306 https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890klibperf-5.14.0-427.18.1.el9_4.x86_64.rpmkkernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpmkkernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpmklibperf-5.14.0-427.18.1.el9_4.x86_64.rpmkkernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpmkkernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpmi ]BBBBBBBBBBBBsecurityImportant: glibc security update/ https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339 Meglibc-benchtests-2.34-100.el9_4.2.x86_64.rpmEenss_db-2.34-100.el9_4.2.i686.rpmBeglibc-static-2.34-100.el9_4.2.x86_64.rpmBeglibc-static-2.34-100.el9_4.2.i686.rpmAeglibc-nss-devel-2.34-100.el9_4.2.i686.rpmFenss_hesiod-2.34-100.el9_4.2.i686.rpmFenss_hesiod-2.34-100.el9_4.2.x86_64.rpmEenss_db-2.34-100.el9_4.2.x86_64.rpmAeglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm Meglibc-benchtests-2.34-100.el9_4.2.x86_64.rpmEenss_db-2.34-100.el9_4.2.i686.rpmBeglibc-static-2.34-100.el9_4.2.x86_64.rpmBeglibc-static-2.34-100.el9_4.2.i686.rpmAeglibc-nss-devel-2.34-100.el9_4.2.i686.rpmFenss_hesiod-2.34-100.el9_4.2.i686.rpmFenss_hesiod-2.34-100.el9_4.2.x86_64.rpmEenss_db-2.34-100.el9_4.2.x86_64.rpmAeglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpmtj kBBBsecurityModerate: nghttp2 security update ?mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501 https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501 /;libnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm;nghttp2-1.43.0-5.el9_4.3.x86_64.rpm/;libnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm/;libnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm;nghttp2-1.43.0-5.el9_4.3.x86_64.rpm/;libnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm>k pBBBBsecurityModerate: kernel security and bug fix update ,bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619 llibperf-5.14.0-427.20.1.el9_4.x86_64.rpmlkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpmlkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpmllibperf-5.14.0-427.20.1.el9_4.x86_64.rpmlkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpmlkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpmFl 6securityImportant: ipa security updatewhttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754 https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754 vYpython3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpmvYpython3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpmѧmm wBBsecurityImportant: libreoffice security updateXhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835 Nplibreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOplibreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNplibreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOplibreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmn {securityImportant: 389-ds-base security update]mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837 https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837 d"389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpmd"389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpmo !=securityModerate: ruby security update JXhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838 kVruby-doc-3.0.7-162.el9_4.noarch.rpmkVruby-doc-3.0.7-162.el9_4.noarch.rpmp $bB\BBBsecurityImportant: flatpak security update"|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959 https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959 f!flatpak-1.12.9-1.el9_4.i686.rpm!flatpak-devel-1.12.9-1.el9_4.x86_64.rpmg!flatpak-session-helper-1.12.9-1.el9_4.i686.rpm!flatpak-devel-1.12.9-1.el9_4.i686.rpmf!flatpak-1.12.9-1.el9_4.i686.rpm!flatpak-devel-1.12.9-1.el9_4.x86_64.rpmg!flatpak-session-helper-1.12.9-1.el9_4.i686.rpm!flatpak-devel-1.12.9-1.el9_4.i686.rpm@q (eBB]BBBBsecurityImportant: ghostscript security updateqhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999 https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999 ghostscript-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.i686.rpmghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.x86_64.rpmghostscript-tools-printing-9.54.0-16.el9_4.i686.rpmghostscript-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.i686.rpmghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.x86_64.rpmghostscript-tools-printing-9.54.0-16.el9_4.i686.rpmЧr +iB`BBBBBBBBBsecurityImportant: python3.11 security update0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077 python3.11-test-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpmpython3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmbpython3.11-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpmpython3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmbpython3.11-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.1.i686.rpmIs -laIBBBBBBBBBsecurityImportant: python3.9 security update?https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078 +python3-idle-3.9.18-3.el9_4.1.i686.rpm+python3-test-3.9.18-3.el9_4.1.x86_64.rpmP+python3-tkinter-3.9.18-3.el9_4.1.i686.rpm+python3-test-3.9.18-3.el9_4.1.i686.rpm+python3-debug-3.9.18-3.el9_4.1.x86_64.rpmO+python3-3.9.18-3.el9_4.1.i686.rpm+python3-idle-3.9.18-3.el9_4.1.x86_64.rpm+python3-debug-3.9.18-3.el9_4.1.i686.rpm+python3-idle-3.9.18-3.el9_4.1.i686.rpm+python3-test-3.9.18-3.el9_4.1.x86_64.rpmP+python3-tkinter-3.9.18-3.el9_4.1.i686.rpm+python3-test-3.9.18-3.el9_4.1.i686.rpm+python3-debug-3.9.18-3.el9_4.1.x86_64.rpmO+python3-3.9.18-3.el9_4.1.i686.rpm+python3-idle-3.9.18-3.el9_4.1.x86_64.rpm+python3-debug-3.9.18-3.el9_4.1.i686.rpm#t ._BBBBsecurityModerate: kernel security and bug fix update Thttps://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 mkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpmmlibperf-5.14.0-427.24.1.el9_4.x86_64.rpmmkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpmmkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpmmlibperf-5.14.0-427.24.1.el9_4.x86_64.rpmmkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpmru /esecurityModerate: dotnet6.0 security update bJhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439 https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439 mCdotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpmmCdotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpmIv 0gsecurityImportant: dotnet8.0 security update,&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450 https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450 JVdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpmJVdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm w 1iBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateRPhttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563 Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm+x 2}BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update"Ohttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567 \)java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm^)java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmY)java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm])java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm[)java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmW)java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmd)java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpma)java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmb)java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm_)java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm`)java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmX)java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmZ)java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmc)java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm\)java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm^)java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmY)java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm])java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm[)java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmW)java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmd)java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpma)java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmb)java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm_)java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm`)java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmX)java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmZ)java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmc)java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmwy 3YBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updateqi https://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568 o-java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmx-java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmq-java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmw-java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmv-java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmu-java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmy-java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn-java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmr-java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm{-java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmp-java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmz-java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpms-java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmt-java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmo-java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmx-java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmq-java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmw-java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmv-java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmu-java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmy-java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn-java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmr-java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm{-java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmp-java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmz-java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpms-java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmt-java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmnz 4uBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateZi https://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573 i=java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmk=java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmj=java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmr=java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpme=java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmn=java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmm=java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmq=java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmg=java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmp=java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpml=java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmf=java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmo=java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmh=java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmi=java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmk=java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmj=java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmr=java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpme=java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmn=java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmm=java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmq=java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmg=java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmp=java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpml=java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmf=java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmo=java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmh=java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm{ 5QBBBBsecurityImportant: kernel security updateC$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583 nkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpmnkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpmnlibperf-5.14.0-427.26.1.el9_4.x86_64.rpmnkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpmnkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpmnlibperf-5.14.0-427.26.1.el9_4.x86_64.rpm| 6WBsecurityImportant: qt5-qtbase security update]@https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623 https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623 Cqt5-qtbase-static-5.15.9-10.el9_4.i686.rpmCqt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpmCqt5-qtbase-static-5.15.9-10.el9_4.i686.rpmCqt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm} 9wBcBsecurityModerate: edk2 security update Lhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749 https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749 Vedk2-ovmf-20231122-6.el9_4.2.noarch.rpm?Vedk2-aarch64-20231122-6.el9_4.2.noarch.rpm@Vedk2-tools-doc-20231122-6.el9_4.2.noarch.rpmxVedk2-tools-20231122-6.el9_4.2.x86_64.rpmVedk2-ovmf-20231122-6.el9_4.2.noarch.rpm?Vedk2-aarch64-20231122-6.el9_4.2.noarch.rpm@Vedk2-tools-doc-20231122-6.el9_4.2.noarch.rpmxVedk2-tools-20231122-6.el9_4.2.x86_64.rpmK~ :]BBsecurityModerate: libreoffice security update ihttps://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755 https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755 Oqlibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNqlibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmOqlibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNqlibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm% ;aBsecurityModerate: libuv security update whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756 https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756 a%libuv-devel-1.42.0-2.el9_4.x86_64.rpma%libuv-devel-1.42.0-2.el9_4.i686.rpma%libuv-devel-1.42.0-2.el9_4.x86_64.rpma%libuv-devel-1.42.0-2.el9_4.i686.rpm5 Fbind-doc-9.16.23-18.el9_4.6.noarch.rpmQFbind-devel-9.16.23-18.el9_4.6.i686.rpmQFbind-devel-9.16.23-18.el9_4.6.x86_64.rpmVFbind-libs-9.16.23-18.el9_4.6.i686.rpm>Fbind-doc-9.16.23-18.el9_4.6.noarch.rpmn YsecurityModerate: .NET 8.0 security update /}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334 https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334 JWdotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpmJWdotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpmR [BBBBsecurityImportant: kernel security update,4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363 plibperf-5.14.0-427.31.1.el9_4.x86_64.rpmpkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpmpkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpmplibperf-5.14.0-427.31.1.el9_4.x86_64.rpmpkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpmpkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpms  !securityImportant: python3.12-setuptools security update`https://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533 apython3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpmapython3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm_  bBBsecurityModerate: libreoffice security update w{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583 https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583 Orlibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNrlibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOrlibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNrlibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmW  fBBBBsecurityImportant: kernel security updaterThttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928 qkernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpmqlibperf-5.14.0-427.33.1.el9_4.x86_64.rpmqkernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpmqkernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpmqlibperf-5.14.0-427.33.1.el9_4.x86_64.rpmqkernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm   lBBBBBBBBBBsecurityImportant: postgresql security update https://access.redhat.com/errata/RHSA-2024:5999RHSA-2024:5999RHSA-2024:5999 https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5999.htmlALSA-2024:5999ALSA-2024:5999 |Ppostgresql-server-devel-13.16-1.el9_4.x86_64.rpmPpostgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm~Ppostgresql-test-13.16-1.el9_4.x86_64.rpm{Ppostgresql-private-devel-13.16-1.el9_4.x86_64.rpmzPpostgresql-docs-13.16-1.el9_4.x86_64.rpm}Ppostgresql-static-13.16-1.el9_4.x86_64.rpm|Ppostgresql-server-devel-13.16-1.el9_4.x86_64.rpmPpostgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm~Ppostgresql-test-13.16-1.el9_4.x86_64.rpm{Ppostgresql-private-devel-13.16-1.el9_4.x86_64.rpmzPpostgresql-docs-13.16-1.el9_4.x86_64.rpm}Ppostgresql-static-13.16-1.el9_4.x86_64.rpmy  MBkBBBBBBBBBsecurityModerate: python3.12 security update https://access.redhat.com/errata/RHSA-2024:6146RHSA-2024:6146RHSA-2024:6146 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6146.htmlALSA-2024:6146ALSA-2024:6146 Kpython3.12-test-3.12.1-4.el9_4.3.x86_64.rpmIpython3.12-debug-3.12.1-4.el9_4.3.i686.rpmKpython3.12-test-3.12.1-4.el9_4.3.i686.rpmTpython3.12-tkinter-3.12.1-4.el9_4.3.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.3.x86_64.rpmJpython3.12-idle-3.12.1-4.el9_4.3.i686.rpmSpython3.12-3.12.1-4.el9_4.3.i686.rpmIpython3.12-debug-3.12.1-4.el9_4.3.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.3.x86_64.rpmIpython3.12-debug-3.12.1-4.el9_4.3.i686.rpmKpython3.12-test-3.12.1-4.el9_4.3.i686.rpmTpython3.12-tkinter-3.12.1-4.el9_4.3.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.3.x86_64.rpmJpython3.12-idle-3.12.1-4.el9_4.3.i686.rpmSpython3.12-3.12.1-4.el9_4.3.i686.rpmIpython3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm' PvBBBBBBBBBsecurityModerate: python3.9 security update +hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163 P-python3-tkinter-3.9.18-3.el9_4.5.i686.rpmO-python3-3.9.18-3.el9_4.5.i686.rpm-python3-idle-3.9.18-3.el9_4.5.x86_64.rpm-python3-test-3.9.18-3.el9_4.5.i686.rpm-python3-test-3.9.18-3.el9_4.5.x86_64.rpm-python3-debug-3.9.18-3.el9_4.5.x86_64.rpm-python3-idle-3.9.18-3.el9_4.5.i686.rpm-python3-debug-3.9.18-3.el9_4.5.i686.rpmP-python3-tkinter-3.9.18-3.el9_4.5.i686.rpmO-python3-3.9.18-3.el9_4.5.i686.rpm-python3-idle-3.9.18-3.el9_4.5.x86_64.rpm-python3-test-3.9.18-3.el9_4.5.i686.rpm-python3-test-3.9.18-3.el9_4.5.x86_64.rpm-python3-debug-3.9.18-3.el9_4.5.x86_64.rpm-python3-idle-3.9.18-3.el9_4.5.i686.rpm-python3-debug-3.9.18-3.el9_4.5.i686.rpm RB|BBBBBBBBBsecurityModerate: python3.11 security update hhttps://access.redhat.com/errata/RHSA-2024:6179RHSA-2024:6179RHSA-2024:6179 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6179.htmlALSA-2024:6179ALSA-2024:6179 python3.11-debug-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.i686.rpmbpython3.11-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.i686.rpmpython3.11-debug-3.11.7-1.el9_4.5.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.5.i686.rpmpython3.11-debug-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.i686.rpmbpython3.11-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.i686.rpmpython3.11-debug-3.11.7-1.el9_4.5.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm8 UBBCBBBBsecurityModerate: ghostscript security update {Mhttps://access.redhat.com/errata/RHSA-2024:6197RHSA-2024:6197RHSA-2024:6197 https://access.redhat.com/security/cve/CVE-2024-29510CVE-2024-29510CVE-2024-29510https://access.redhat.com/security/cve/CVE-2024-33869CVE-2024-33869CVE-2024-33869https://access.redhat.com/security/cve/CVE-2024-33870CVE-2024-33870CVE-2024-33870https://bugzilla.redhat.com/22939502293950https://bugzilla.redhat.com/22939582293958https://bugzilla.redhat.com/22939592293959https://errata.almalinux.org/9/ALSA-2024-6197.htmlALSA-2024:6197ALSA-2024:6197 `libgs-devel-9.54.0-17.el9_4.x86_64.rpmghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm`libgs-devel-9.54.0-17.el9_4.i686.rpmghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpmghostscript-9.54.0-17.el9_4.i686.rpm`libgs-devel-9.54.0-17.el9_4.x86_64.rpmghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm`libgs-devel-9.54.0-17.el9_4.i686.rpmghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpmghostscript-9.54.0-17.el9_4.i686.rpm/ YBFBBBsecurityImportant: bubblewrap and flatpak security updateHJhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356 g"flatpak-session-helper-1.12.9-3.el9_4.i686.rpm"flatpak-devel-1.12.9-3.el9_4.x86_64.rpm"flatpak-devel-1.12.9-3.el9_4.i686.rpmf"flatpak-1.12.9-3.el9_4.i686.rpmg"flatpak-session-helper-1.12.9-3.el9_4.i686.rpm"flatpak-devel-1.12.9-3.el9_4.x86_64.rpm"flatpak-devel-1.12.9-3.el9_4.i686.rpmf"flatpak-1.12.9-3.el9_4.i686.rpmc dBsecurityModerate: glib2 security update  https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464 https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464  0glib2-static-2.68.4-14.el9_4.1.i686.rpm 0glib2-static-2.68.4-14.el9_4.1.x86_64.rpm 0glib2-static-2.68.4-14.el9_4.1.i686.rpm 0glib2-static-2.68.4-14.el9_4.1.x86_64.rpm0 ]KBBsecurityModerate: dovecot security update ,https://access.redhat.com/errata/RHSA-2024:6529RHSA-2024:6529RHSA-2024:6529 https://access.redhat.com/security/cve/CVE-2024-23184CVE-2024-23184CVE-2024-23184https://access.redhat.com/security/cve/CVE-2024-23185CVE-2024-23185CVE-2024-23185https://bugzilla.redhat.com/23059092305909https://bugzilla.redhat.com/23059102305910https://errata.almalinux.org/9/ALSA-2024-6529.htmlALSA-2024:6529ALSA-2024:6529 I<dovecot-devel-2.3.16-11.el9_4.1.i686.rpmt<dovecot-2.3.16-11.el9_4.1.i686.rpmI<dovecot-devel-2.3.16-11.el9_4.1.x86_64.rpmI<dovecot-devel-2.3.16-11.el9_4.1.i686.rpmt<dovecot-2.3.16-11.el9_4.1.i686.rpmI<dovecot-devel-2.3.16-11.el9_4.1.x86_64.rpmZ kBBBBsecurityModerate: kernel security update Kl8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567 https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567 rlibperf-5.14.0-427.35.1.el9_4.x86_64.rpmrkernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpmrkernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpmrlibperf-5.14.0-427.35.1.el9_4.x86_64.rpmrkernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpmrkernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpmO qBBBBBsecurityModerate: libnbd security update 7Qhttps://access.redhat.com/errata/RHSA-2024:6757RHSA-2024:6757RHSA-2024:6757 https://access.redhat.com/security/cve/CVE-2024-7383CVE-2024-7383CVE-2024-7383https://bugzilla.redhat.com/23028652302865https://errata.almalinux.org/9/ALSA-2024-6757.htmlALSA-2024:6757ALSA-2024:6757 N%libnbd-devel-1.18.1-4.el9_4.i686.rpm%ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm%ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpmN%libnbd-devel-1.18.1-4.el9_4.x86_64.rpmN%libnbd-devel-1.18.1-4.el9_4.i686.rpm%ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm%ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpmN%libnbd-devel-1.18.1-4.el9_4.x86_64.rpm| !xBBBBsecurityImportant: kernel security update+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997 https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997 skernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpmslibperf-5.14.0-427.37.1.el9_4.x86_64.rpmskernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpmskernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpmslibperf-5.14.0-427.37.1.el9_4.x86_64.rpmskernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm} "~BsecurityImportant: cups-filters security updateLhttps://access.redhat.com/errata/RHSA-2024:7346RHSA-2024:7346RHSA-2024:7346 https://access.redhat.com/security/cve/CVE-2024-47076CVE-2024-47076CVE-2024-47076https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://access.redhat.com/security/cve/CVE-2024-47176CVE-2024-47176CVE-2024-47176https://bugzilla.redhat.com/23142522314252https://bugzilla.redhat.com/23142532314253https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-7346.htmlALSA-2024:7346ALSA-2024:7346 Gcups-filters-devel-1.28.7-17.el9_4.x86_64.rpmGcups-filters-devel-1.28.7-17.el9_4.i686.rpmGcups-filters-devel-1.28.7-17.el9_4.x86_64.rpmGcups-filters-devel-1.28.7-17.el9_4.i686.rpm߷* #AsecurityImportant: .NET 6.0 security updatei"https://access.redhat.com/errata/RHSA-2024:7867RHSA-2024:7867RHSA-2024:7867 https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://errata.almalinux.org/9/ALSA-2024-7867.htmlALSA-2024:7867ALSA-2024:7867 mDdotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpmmDdotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm2 $CsecurityImportant: .NET 8.0 security update  https://access.redhat.com/errata/RHSA-2024:7869RHSA-2024:7869RHSA-2024:7869 https://access.redhat.com/security/cve/CVE-2024-38229CVE-2024-38229CVE-2024-38229https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://bugzilla.redhat.com/23161612316161https://errata.almalinux.org/9/ALSA-2024-7869.htmlALSA-2024:7869ALSA-2024:7869 JXdotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpmJXdotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpmM %EBsecurityModerate: OpenIPMI security update !:https://access.redhat.com/errata/RHSA-2024:8037RHSA-2024:8037RHSA-2024:8037 https://access.redhat.com/security/cve/CVE-2024-42934CVE-2024-42934CVE-2024-42934https://bugzilla.redhat.com/23083752308375https://errata.almalinux.org/9/ALSA-2024-8037.htmlALSA-2024:8037ALSA-2024:8037 N,OpenIPMI-devel-2.0.32-5.el9_4.i686.rpmN,OpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpmN,OpenIPMI-devel-2.0.32-5.el9_4.i686.rpmN,OpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm] &HBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update [r https://access.redhat.com/errata/RHSA-2024:8117RHSA-2024:8117RHSA-2024:8117 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8117.htmlALSA-2024:8117ALSA-2024:8117 Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpmk '\BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update Mq https://access.redhat.com/errata/RHSA-2024:8121RHSA-2024:8121RHSA-2024:8121 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8121.htmlALSA-2024:8121ALSA-2024:8121 `*java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmb*java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmZ*java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmW*java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm\*java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm_*java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm]*java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpma*java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm^*java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpmc*java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm[*java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpmY*java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpmd*java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmX*java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm`*java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmb*java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmZ*java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmW*java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm\*java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm_*java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm]*java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpma*java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm^*java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpmc*java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm[*java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpmY*java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpmd*java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmX*java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpmh (xBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update >q https://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124 p.java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt.java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmw.java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmx.java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn.java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmy.java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmv.java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmu.java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms.java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr.java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo.java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm{.java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq.java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmz.java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmp.java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt.java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmw.java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmx.java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn.java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmy.java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmv.java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmu.java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms.java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr.java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo.java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm{.java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq.java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmz.java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn )TBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update / https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127 k>java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmg>java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpml>java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmn>java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmr>java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmh>java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmm>java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmo>java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpme>java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmq>java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmj>java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmi>java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmf>java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmp>java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmk>java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmg>java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpml>java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmn>java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmr>java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmh>java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmm>java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmo>java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpme>java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmq>java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmj>java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmi>java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmf>java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmp>java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm_ *pBBBBsecurityModerate: kernel security update E<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162 tkernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpmtkernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpmtlibperf-5.14.0-427.40.1.el9_4.x86_64.rpmtkernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpmtkernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpmtlibperf-5.14.0-427.40.1.el9_4.x86_64.rpm{  -kBKBBBBBBBBBsecurityModerate: python3.11 security update Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374 cpython3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmbpython3.11-3.11.7-1.el9_4.6.i686.rpmpython3.11-debug-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-debug-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.i686.rpmcpython3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmbpython3.11-3.11.7-1.el9_4.6.i686.rpmpython3.11-debug-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-debug-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.i686.rpmw! /nbsBBBBBBBBBsecurityModerate: python3.9 security update U\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 .python3-test-3.9.18-3.el9_4.6.x86_64.rpm.python3-idle-3.9.18-3.el9_4.6.x86_64.rpm.python3-idle-3.9.18-3.el9_4.6.i686.rpm.python3-test-3.9.18-3.el9_4.6.i686.rpm.python3-debug-3.9.18-3.el9_4.6.x86_64.rpmP.python3-tkinter-3.9.18-3.el9_4.6.i686.rpmO.python3-3.9.18-3.el9_4.6.i686.rpm.python3-debug-3.9.18-3.el9_4.6.i686.rpm.python3-test-3.9.18-3.el9_4.6.x86_64.rpm.python3-idle-3.9.18-3.el9_4.6.x86_64.rpm.python3-idle-3.9.18-3.el9_4.6.i686.rpm.python3-test-3.9.18-3.el9_4.6.i686.rpm.python3-debug-3.9.18-3.el9_4.6.x86_64.rpmP.python3-tkinter-3.9.18-3.el9_4.6.i686.rpmO.python3-3.9.18-3.el9_4.6.i686.rpm.python3-debug-3.9.18-3.el9_4.6.i686.rpm" 2pB\BBBBBBBBBsecurityModerate: python3.12 security update 1 https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447 Kpython3.12-test-3.12.1-4.el9_4.4.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.x86_64.rpmIpython3.12-debug-3.12.1-4.el9_4.4.i686.rpmTpython3.12-tkinter-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.i686.rpmSpython3.12-3.12.1-4.el9_4.4.i686.rpmIpython3.12-debug-3.12.1-4.el9_4.4.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.4.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.x86_64.rpmIpython3.12-debug-3.12.1-4.el9_4.4.i686.rpmTpython3.12-tkinter-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.i686.rpmSpython3.12-3.12.1-4.el9_4.4.i686.rpmIpython3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm # 3WBBBBsecurityModerate: kernel security update >>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617 ulibperf-5.14.0-427.42.1.el9_4.x86_64.rpmukernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpmukernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpmulibperf-5.14.0-427.42.1.el9_4.x86_64.rpmukernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpmukernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm<$ 4]BsecurityImportant: openexr security update|:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800 Q<openexr-devel-3.1.1-2.el9_4.1.x86_64.rpmQ<openexr-devel-3.1.1-2.el9_4.1.i686.rpmQ<openexr-devel-3.1.1-2.el9_4.1.x86_64.rpmQ<openexr-devel-3.1.1-2.el9_4.1.i686.rpm% 5`securityModerate: libtiff security update 6 https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914 https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914 y-libtiff-tools-4.4.0-12.el9_4.1.x86_64.rpmy-libtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm& 8vBlBsecurityModerate: edk2 security update AEhttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935 https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935 ?Wedk2-aarch64-20231122-6.el9_4.4.noarch.rpmxWedk2-tools-20231122-6.el9_4.4.x86_64.rpm@Wedk2-tools-doc-20231122-6.el9_4.4.noarch.rpmWedk2-ovmf-20231122-6.el9_4.4.noarch.rpm?Wedk2-aarch64-20231122-6.el9_4.4.noarch.rpmxWedk2-tools-20231122-6.el9_4.4.x86_64.rpm@Wedk2-tools-doc-20231122-6.el9_4.4.noarch.rpmWedk2-ovmf-20231122-6.el9_4.4.noarch.rpmw' 9eBBsecurityModerate: edk2 security update = https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088 https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088 ?dedk2-aarch64-20240524-6.el9_5.noarch.rpmxdedk2-tools-20240524-6.el9_5.x86_64.rpm@dedk2-tools-doc-20240524-6.el9_5.noarch.rpm?dedk2-aarch64-20240524-6.el9_5.noarch.rpmxdedk2-tools-20240524-6.el9_5.x86_64.rpm@dedk2-tools-doc-20240524-6.el9_5.noarch.rpm6( ;zpBBsecurityModerate: xorg-x11-server-Xwayland security update C:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093 i>xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm>xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm>xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpmi>xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm>xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm>xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm]) wBBBBBBBBBBBsecurityModerate: poppler security update "+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167 https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167 |poppler-glib-devel-21.01.0-21.el9.i686.rpm|poppler-glib-devel-21.01.0-21.el9.x86_64.rpm|poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm|poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm|poppler-devel-21.01.0-21.el9.x86_64.rpm|poppler-glib-doc-21.01.0-21.el9.noarch.rpm|poppler-qt5-devel-21.01.0-21.el9.i686.rpm|poppler-cpp-devel-21.01.0-21.el9.i686.rpm|poppler-devel-21.01.0-21.el9.i686.rpm |poppler-glib-devel-21.01.0-21.el9.i686.rpm|poppler-glib-devel-21.01.0-21.el9.x86_64.rpm|poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm|poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm|poppler-devel-21.01.0-21.el9.x86_64.rpm|poppler-glib-doc-21.01.0-21.el9.noarch.rpm|poppler-qt5-devel-21.01.0-21.el9.i686.rpm|poppler-cpp-devel-21.01.0-21.el9.i686.rpm|poppler-devel-21.01.0-21.el9.i686.rpmV, ?DBsecurityModerate: jose security update MRhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181 https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181 Y$libjose-devel-14-1.el9.x86_64.rpmY$libjose-devel-14-1.el9.i686.rpmY$libjose-devel-14-1.el9.x86_64.rpmY$libjose-devel-14-1.el9.i686.rpm@- GsecurityModerate: gtk3 security update +https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184 https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184 |*gtk3-devel-docs-3.24.31-5.el9.x86_64.rpm|*gtk3-devel-docs-3.24.31-5.el9.x86_64.rpm0. IBsecurityLow: bcc security updateKJvhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187 https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187 fbcc-devel-0.30.0-6.el9.x86_64.rpmdbcc-doc-0.30.0-6.el9.noarch.rpmfbcc-devel-0.30.0-6.el9.x86_64.rpmdbcc-doc-0.30.0-6.el9.noarch.rpmT/ BBJBBBBBBBBBsecurityModerate: python3.12 security update @Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190 Kpython3.12-test-3.12.5-2.el9.i686.rpmIpython3.12-debug-3.12.5-2.el9.i686.rpmJpython3.12-idle-3.12.5-2.el9.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9.i686.rpmSpython3.12-3.12.5-2.el9.i686.rpmKpython3.12-test-3.12.5-2.el9.x86_64.rpmIpython3.12-debug-3.12.5-2.el9.x86_64.rpmJpython3.12-idle-3.12.5-2.el9.i686.rpmKpython3.12-test-3.12.5-2.el9.i686.rpmIpython3.12-debug-3.12.5-2.el9.i686.rpmJpython3.12-idle-3.12.5-2.el9.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9.i686.rpmSpython3.12-3.12.5-2.el9.i686.rpmKpython3.12-test-3.12.5-2.el9.x86_64.rpmIpython3.12-debug-3.12.5-2.el9.x86_64.rpmJpython3.12-idle-3.12.5-2.el9.i686.rpm>0 EBRBBBBBBBBBsecurityModerate: python3.11 security update Rhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192 python3.11-test-3.11.9-7.el9.i686.rpmbpython3.11-3.11.9-7.el9.i686.rpmpython3.11-idle-3.11.9-7.el9.x86_64.rpmpython3.11-debug-3.11.9-7.el9.i686.rpmcpython3.11-tkinter-3.11.9-7.el9.i686.rpmpython3.11-debug-3.11.9-7.el9.x86_64.rpmpython3.11-test-3.11.9-7.el9.x86_64.rpmpython3.11-idle-3.11.9-7.el9.i686.rpmpython3.11-test-3.11.9-7.el9.i686.rpmbpython3.11-3.11.9-7.el9.i686.rpmpython3.11-idle-3.11.9-7.el9.x86_64.rpmpython3.11-debug-3.11.9-7.el9.i686.rpmcpython3.11-tkinter-3.11.9-7.el9.i686.rpmpython3.11-debug-3.11.9-7.el9.x86_64.rpmpython3.11-test-3.11.9-7.el9.x86_64.rpmpython3.11-idle-3.11.9-7.el9.i686.rpmf1 bBsecurityLow: NetworkManager security updateKXjhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 F&NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpmF&NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpmF&NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpmF&NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpmF2 IHVBBBBBBBBBsecurityModerate: python3.9 security update Bkhttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371 https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371 P/python3-tkinter-3.9.19-8.el9.i686.rpm/python3-idle-3.9.19-8.el9.x86_64.rpm/python3-idle-3.9.19-8.el9.i686.rpm/python3-debug-3.9.19-8.el9.x86_64.rpm/python3-debug-3.9.19-8.el9.i686.rpm/python3-test-3.9.19-8.el9.x86_64.rpmO/python3-3.9.19-8.el9.i686.rpm/python3-test-3.9.19-8.el9.i686.rpmP/python3-tkinter-3.9.19-8.el9.i686.rpm/python3-idle-3.9.19-8.el9.x86_64.rpm/python3-idle-3.9.19-8.el9.i686.rpm/python3-debug-3.9.19-8.el9.x86_64.rpm/python3-debug-3.9.19-8.el9.i686.rpm/python3-test-3.9.19-8.el9.x86_64.rpmO/python3-3.9.19-8.el9.i686.rpm/python3-test-3.9.19-8.el9.i686.rpm73 pBsecurityModerate: bluez security update -+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413 https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413 RIbluez-libs-devel-5.72-2.el9.i686.rpmRIbluez-libs-devel-5.72-2.el9.x86_64.rpmRIbluez-libs-devel-5.72-2.el9.i686.rpmRIbluez-libs-devel-5.72-2.el9.x86_64.rpmJ4 6sBsecurityModerate: fontforge security update Xehttps://access.redhat.com/errata/RHSA-2024:9439RHSA-2024:9439RHSA-2024:9439 https://access.redhat.com/security/cve/CVE-2024-25081CVE-2024-25081CVE-2024-25081https://access.redhat.com/security/cve/CVE-2024-25082CVE-2024-25082CVE-2024-25082https://bugzilla.redhat.com/22661802266180https://bugzilla.redhat.com/22661812266181https://errata.almalinux.org/9/ALSA-2024-9439.htmlALSA-2024:9439ALSA-2024:9439 K7fontforge-20201107-6.el9.i686.rpmK7fontforge-20201107-6.el9.x86_64.rpmK7fontforge-20201107-6.el9.i686.rpmK7fontforge-20201107-6.el9.x86_64.rpmL5 ;wBBsecurityModerate: mingw-glib2 security update =(https://access.redhat.com/errata/RHSA-2024:9442RHSA-2024:9442RHSA-2024:9442 https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-9442.htmlALSA-2024:9442ALSA-2024:9442 4bmingw64-glib2-static-2.78.6-1.el9.noarch.rpm1bmingw32-glib2-2.78.6-1.el9.noarch.rpm2bmingw32-glib2-static-2.78.6-1.el9.noarch.rpm3bmingw64-glib2-2.78.6-1.el9.noarch.rpm4bmingw64-glib2-static-2.78.6-1.el9.noarch.rpm1bmingw32-glib2-2.78.6-1.el9.noarch.rpm2bmingw32-glib2-static-2.78.6-1.el9.noarch.rpm3bmingw64-glib2-2.78.6-1.el9.noarch.rpm36 LBpBBBsecurityImportant: bubblewrap and flatpak security updateeRhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449 f#flatpak-1.12.9-3.el9_5.i686.rpm#flatpak-devel-1.12.9-3.el9_5.x86_64.rpm#flatpak-devel-1.12.9-3.el9_5.i686.rpmg#flatpak-session-helper-1.12.9-3.el9_5.i686.rpmf#flatpak-1.12.9-3.el9_5.i686.rpm#flatpak-devel-1.12.9-3.el9_5.x86_64.rpm#flatpak-devel-1.12.9-3.el9_5.i686.rpmg#flatpak-session-helper-1.12.9-3.el9_5.i686.rpm47 OBrBBBBBBBBBsecurityModerate: python3.11 security update 7\https://access.redhat.com/errata/RHSA-2024:9450RHSA-2024:9450RHSA-2024:9450 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9450.htmlALSA-2024:9450ALSA-2024:9450 python3.11-test-3.11.9-7.el9_5.1.i686.rpmpython3.11-idle-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-idle-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.1.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.i686.rpmbpython3.11-3.11.9-7.el9_5.1.i686.rpmpython3.11-test-3.11.9-7.el9_5.1.i686.rpmpython3.11-idle-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-idle-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.1.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.i686.rpmbpython3.11-3.11.9-7.el9_5.1.i686.rpmy8 RBzBBBBBBBBBsecurityModerate: python3.12 security update  https://access.redhat.com/errata/RHSA-2024:9451RHSA-2024:9451RHSA-2024:9451 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9451.htmlALSA-2024:9451ALSA-2024:9451 Kpython3.12-test-3.12.5-2.el9_5.1.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.x86_64.rpmSpython3.12-3.12.5-2.el9_5.1.i686.rpmKpython3.12-test-3.12.5-2.el9_5.1.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.x86_64.rpmSpython3.12-3.12.5-2.el9_5.1.i686.rpm|9 U}GBBBBBBBBBsecurityModerate: python3.9 security update \https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468 0python3-test-3.9.19-8.el9_5.1.x86_64.rpm0python3-idle-3.9.19-8.el9_5.1.x86_64.rpm0python3-debug-3.9.19-8.el9_5.1.x86_64.rpm0python3-test-3.9.19-8.el9_5.1.i686.rpmP0python3-tkinter-3.9.19-8.el9_5.1.i686.rpmO0python3-3.9.19-8.el9_5.1.i686.rpm0python3-debug-3.9.19-8.el9_5.1.i686.rpm0python3-idle-3.9.19-8.el9_5.1.i686.rpm0python3-test-3.9.19-8.el9_5.1.x86_64.rpm0python3-idle-3.9.19-8.el9_5.1.x86_64.rpm0python3-debug-3.9.19-8.el9_5.1.x86_64.rpm0python3-test-3.9.19-8.el9_5.1.i686.rpmP0python3-tkinter-3.9.19-8.el9_5.1.i686.rpmO0python3-3.9.19-8.el9_5.1.i686.rpm0python3-debug-3.9.19-8.el9_5.1.i686.rpm0python3-idle-3.9.19-8.el9_5.1.i686.rpm: bsecurityImportant: .NET 9.0 security update|fhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543 https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543 ,^dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm,^dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpmO; dBsecurityImportant: openexr security updateb:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548 Q=openexr-devel-3.1.1-2.el9_5.1.x86_64.rpmQ=openexr-devel-3.1.1-2.el9_5.1.i686.rpmQ=openexr-devel-3.1.1-2.el9_5.1.x86_64.rpmQ=openexr-devel-3.1.1-2.el9_5.1.i686.rpmX< gBBBBsecurityModerate: kernel security update 'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605 vkernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpmvkernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpmvlibperf-5.14.0-503.14.1.el9_5.x86_64.rpmvkernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpmvkernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpmvlibperf-5.14.0-503.14.1.el9_5.x86_64.rpm:= mBsecurityModerate: libvpx security update C>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827 https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827 0"libvpx-devel-1.9.0-8.el9_5.i686.rpm0"libvpx-devel-1.9.0-8.el9_5.x86_64.rpm0"libvpx-devel-1.9.0-8.el9_5.i686.rpm0"libvpx-devel-1.9.0-8.el9_5.x86_64.rpmZ> pBBBBsecurityImportant: kernel security update https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059 https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059 zkernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpmzkernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpmzlibperf-5.14.0-503.21.1.el9_5.x86_64.rpmzkernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpmzkernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpmzlibperf-5.14.0-503.21.1.el9_5.x86_64.rpm4? vBsecurityImportant: raptor2 security update @https://access.redhat.com/errata/RHSA-2025:0312RHSA-2025:0312RHSA-2025:0312 https://access.redhat.com/security/cve/CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/23369212336921https://errata.almalinux.org/9/ALSA-2025-0312.htmlALSA-2025:0312ALSA-2025:0312 i+raptor2-devel-2.0.15-32.el9_5.i686.rpmi+raptor2-devel-2.0.15-32.el9_5.x86_64.rpmi+raptor2-devel-2.0.15-32.el9_5.i686.rpmi+raptor2-devel-2.0.15-32.el9_5.x86_64.rpm@@ 9securityModerate: ipa security update Kahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334 https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334 v[python3-ipatests-4.12.2-1.el9_5.3.noarch.rpmv[python3-ipatests-4.12.2-1.el9_5.3.noarch.rpmvA zBsecurityModerate: Security and bug fixes for NetworkManager ,Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 F'NetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpmF'NetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpmF'NetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpmF'NetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm B }BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5 xfhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422 y/java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp/java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmw/java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo/java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmv/java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmu/java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr/java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq/java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt/java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn/java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm{/java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmz/java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmx/java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms/java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmy/java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp/java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmw/java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo/java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmv/java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmu/java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr/java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq/java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt/java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn/java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm{/java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmz/java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmx/java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms/java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmQC YBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5 ^https://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426 p?java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmk?java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmj?java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmr?java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpml?java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmq?java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpme?java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmg?java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmf?java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmh?java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmo?java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmi?java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmn?java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmm?java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmp?java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmk?java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmj?java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmr?java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpml?java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmq?java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpme?java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmg?java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmf?java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmh?java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmo?java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmi?java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmn?java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmm?java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmɲ%D !uBBBBsecurityModerate: kernel security update aEhttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578 {kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm{kernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm{libperf-5.14.0-503.22.1.el9_5.x86_64.rpm{kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm{kernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm{libperf-5.14.0-503.22.1.el9_5.x86_64.rpmՕE "{BBBBsecurityModerate: galera and mariadb security update &4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914 https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914 0fmariadb-test-10.5.27-1.el9_5.x86_64.rpm/fmariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm.fmariadb-devel-10.5.27-1.el9_5.x86_64.rpm0fmariadb-test-10.5.27-1.el9_5.x86_64.rpm/fmariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm.fmariadb-devel-10.5.27-1.el9_5.x86_64.rpm6F ABBsecurityModerate: mingw-glib2 security update Zhttps://access.redhat.com/errata/RHSA-2025:0936RHSA-2025:0936RHSA-2025:0936 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://bugzilla.redhat.com/23253402325340https://errata.almalinux.org/9/ALSA-2025-0936.htmlALSA-2025:0936ALSA-2025:0936 1cmingw32-glib2-2.78.6-2.el9.noarch.rpm2cmingw32-glib2-static-2.78.6-2.el9.noarch.rpm4cmingw64-glib2-static-2.78.6-2.el9.noarch.rpm3cmingw64-glib2-2.78.6-2.el9.noarch.rpm1cmingw32-glib2-2.78.6-2.el9.noarch.rpm2cmingw32-glib2-static-2.78.6-2.el9.noarch.rpm4cmingw64-glib2-static-2.78.6-2.el9.noarch.rpm3cmingw64-glib2-2.78.6-2.el9.noarch.rpmG $cpuBBBBBBBBBsecurityImportant: python3.9 security updateog https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 3python3-test-3.9.21-2.el9_6.1.i686.rpm3python3-test-3.9.21-2.el9_6.1.x86_64.rpm3python3-idle-3.9.21-2.el9_6.1.i686.rpmO3python3-3.9.21-2.el9_6.1.i686.rpm3python3-debug-3.9.21-2.el9_6.1.x86_64.rpm3python3-debug-3.9.21-2.el9_6.1.i686.rpmP3python3-tkinter-3.9.21-2.el9_6.1.i686.rpm3python3-idle-3.9.21-2.el9_6.1.x86_64.rpm3python3-test-3.9.21-2.el9_6.1.i686.rpm3python3-test-3.9.21-2.el9_6.1.x86_64.rpm3python3-idle-3.9.21-2.el9_6.1.i686.rpmO3python3-3.9.21-2.el9_6.1.i686.rpm3python3-debug-3.9.21-2.el9_6.1.x86_64.rpm3python3-debug-3.9.21-2.el9_6.1.i686.rpmP3python3-tkinter-3.9.21-2.el9_6.1.i686.rpm3python3-idle-3.9.21-2.el9_6.1.x86_64.rpmÓDH 'eBlBBBBBBBBBsecurityImportant: python3.11 security updateVg https://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148  python3.11-debug-3.11.11-2.el9_6.1.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm python3.11-idle-3.11.11-2.el9_6.1.i686.rpmb python3.11-3.11.11-2.el9_6.1.i686.rpm python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.1.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm python3.11-idle-3.11.11-2.el9_6.1.i686.rpmb python3.11-3.11.11-2.el9_6.1.i686.rpm python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpmÔoI *hBtBBBBBBBBBsecurityImportant: python3.12 security update=g https://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189 K"python3.12-test-3.12.9-1.el9_6.1.x86_64.rpmI"python3.12-debug-3.12.9-1.el9_6.1.i686.rpmT"python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpmK"python3.12-test-3.12.9-1.el9_6.1.i686.rpmJ"python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpmS"python3.12-3.12.9-1.el9_6.1.i686.rpmJ"python3.12-idle-3.12.9-1.el9_6.1.i686.rpmI"python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpmK"python3.12-test-3.12.9-1.el9_6.1.x86_64.rpmI"python3.12-debug-3.12.9-1.el9_6.1.i686.rpmT"python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpmK"python3.12-test-3.12.9-1.el9_6.1.i686.rpmJ"python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpmS"python3.12-3.12.9-1.el9_6.1.i686.rpmJ"python3.12-idle-3.12.9-1.el9_6.1.i686.rpmI"python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpmÔdJ +gBBBBsecurityImportant: kernel security update$] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379 kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpmlibperf-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpmlibperf-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpmÿ}K mBsecurityModerate: jq security update  https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585 https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585 U jq-devel-1.6-17.el9_6.2.i686.rpmU jq-devel-1.6-17.el9_6.2.x86_64.rpmU jq-devel-1.6-17.el9_6.2.i686.rpmU jq-devel-1.6-17.el9_6.2.x86_64.rpmþDL ,pBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837  kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm libperf-5.14.0-570.26.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm libperf-5.14.0-570.26.1.el9_6.x86_64.rpmQM -vBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862 \java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm \java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm+N .JBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867 o1java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmv1java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms1java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmz1java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn1java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmu1java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmy1java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt1java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr1java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmx1java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp1java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq1java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmw1java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm{1java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmo1java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmv1java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms1java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmz1java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn1java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmu1java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmy1java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt1java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr1java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmx1java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp1java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq1java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmw1java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm{1java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm޿kO /fBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update qhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873 jAjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmkAjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmhAjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmiAjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmpAjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmqAjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmlAjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmeAjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmoAjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmmAjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmgAjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmfAjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmrAjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmnAjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmjAjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmkAjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmhAjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmiAjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmpAjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmqAjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmlAjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmeAjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmoAjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmmAjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmgAjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmfAjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmrAjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmnAjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmĨpP 0BBsecurityModerate: glib2 security update ~https://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140  1glib2-static-2.68.4-16.el9_6.2.x86_64.rpm 1glib2-static-2.68.4-16.el9_6.2.i686.rpm 1glib2-static-2.68.4-16.el9_6.2.x86_64.rpm 1glib2-static-2.68.4-16.el9_6.2.i686.rpm޽/Q 1EBBBBsecurityImportant: kernel security updateVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411  kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm libperf-5.14.0-570.28.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm libperf-5.14.0-570.28.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpmĂ*R 2KBsecurityImportant: unbound security updateXhhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849 https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849 Hunbound-devel-1.16.2-19.el9_6.1.x86_64.rpmHunbound-devel-1.16.2-19.el9_6.1.i686.rpmHunbound-devel-1.16.2-19.el9_6.1.x86_64.rpmHunbound-devel-1.16.2-19.el9_6.1.i686.rpmĞ]S 3NBBBBsecurityModerate: kernel security update @https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861  libperf-5.14.0-570.30.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm libperf-5.14.0-570.30.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpmįT 4TBBBBsecurityImportant: kernel security updateNhttps://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262 https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262 |kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm|kernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm|libperf-5.14.0-503.23.2.el9_5.x86_64.rpm|kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm|kernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm|libperf-5.14.0-503.23.2.el9_5.x86_64.rpmuU 5ZBBBBsecurityImportant: kernel security updatekohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746 https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746  libperf-5.14.0-570.32.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm libperf-5.14.0-570.32.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpmҙiV 6 securityModerate: python3.12-setuptools security update ZJhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834 bpython3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpmbpython3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpmsW 'aBBBBsecurityModerate: doxygen security update $ehttps://access.redhat.com/errata/RHSA-2025:1329RHSA-2025:1329RHSA-2025:1329 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1329.htmlALSA-2025:1329ALSA-2025:1329 q_doxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpmp_doxygen-1.9.1-12.el9_5.x86_64.rpmr_doxygen-latex-1.9.1-12.el9_5.x86_64.rpmq_doxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpmp_doxygen-1.9.1-12.el9_5.x86_64.rpmr_doxygen-latex-1.9.1-12.el9_5.x86_64.rpmfX 7hBBBBsecurityModerate: gcc security update Khttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 T7gcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmT7gcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm^7libstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm^7libstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpmT7gcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmT7gcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm^7libstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm^7libstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpmY 8nBBBBsecurityModerate: kernel security update THhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602  libperf-5.14.0-570.33.2.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm libperf-5.14.0-570.33.2.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpmZ 9tBBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpmlibperf-5.14.0-570.35.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpmlibperf-5.14.0-570.35.1.el9_6.x86_64.rpmŠZ[ :zBBBBsecurityImportant: kernel security update-!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420 kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpmlibperf-5.14.0-570.37.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpmlibperf-5.14.0-570.37.1.el9_6.x86_64.rpmŻj\ ;@BBBBBBBBBBBsecurityImportant: postgresql security updateNNhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878 }<postgresql-static-13.22-1.el9_6.x86_64.rpm<postgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm{<postgresql-private-devel-13.22-1.el9_6.x86_64.rpm6<postgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpmz<postgresql-docs-13.22-1.el9_6.x86_64.rpm|<postgresql-server-devel-13.22-1.el9_6.x86_64.rpm~<postgresql-test-13.22-1.el9_6.x86_64.rpm}<postgresql-static-13.22-1.el9_6.x86_64.rpm<postgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm{<postgresql-private-devel-13.22-1.el9_6.x86_64.rpm6<postgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpmz<postgresql-docs-13.22-1.el9_6.x86_64.rpm|<postgresql-server-devel-13.22-1.el9_6.x86_64.rpm~<postgresql-test-13.22-1.el9_6.x86_64.rpmŚg] >|BQBBBBBBBBBsecurityModerate: python3.12 security update ;https://access.redhat.com/errata/RHSA-2025:15007RHSA-2025:15007RHSA-2025:15007 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15007.htmlALSA-2025:15007ALSA-2025:15007 K#python3.12-test-3.12.9-1.el9_6.2.i686.rpmI#python3.12-debug-3.12.9-1.el9_6.2.i686.rpmT#python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpmK#python3.12-test-3.12.9-1.el9_6.2.x86_64.rpmI#python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpmJ#python3.12-idle-3.12.9-1.el9_6.2.i686.rpmJ#python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpmS#python3.12-3.12.9-1.el9_6.2.i686.rpmK#python3.12-test-3.12.9-1.el9_6.2.i686.rpmI#python3.12-debug-3.12.9-1.el9_6.2.i686.rpmT#python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpmK#python3.12-test-3.12.9-1.el9_6.2.x86_64.rpmI#python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpmJ#python3.12-idle-3.12.9-1.el9_6.2.i686.rpmJ#python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpmS#python3.12-3.12.9-1.el9_6.2.i686.rpm%^ BYBBBBBBBBBsecurityModerate: python3.11 security update W;https://access.redhat.com/errata/RHSA-2025:15010RHSA-2025:15010RHSA-2025:15010 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15010.htmlALSA-2025:15010ALSA-2025:15010  python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmb python3.11-3.11.11-2.el9_6.2.i686.rpm python3.11-test-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmb python3.11-3.11.11-2.el9_6.2.i686.rpm python3.11-test-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm!_ cBBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011 https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpmlibperf-5.14.0-570.39.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpmlibperf-5.14.0-570.39.1.el9_6.x86_64.rpm` iBsecurityImportant: udisks2 security update)https://access.redhat.com/errata/RHSA-2025:15018RHSA-2025:15018RHSA-2025:15018 https://access.redhat.com/security/cve/CVE-2025-8067CVE-2025-8067CVE-2025-8067https://bugzilla.redhat.com/23886232388623https://errata.almalinux.org/9/ALSA-2025-15018.htmlALSA-2025:15018ALSA-2025:15018 `4libudisks2-devel-2.9.4-11.el9_6.1.i686.rpm`4libudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm`4libudisks2-devel-2.9.4-11.el9_6.1.i686.rpm`4libudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpmWa DQYBBBBBBBBBsecurityModerate: python3.9 security update ?;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019 4python3-debug-3.9.21-2.el9_6.2.i686.rpm4python3-idle-3.9.21-2.el9_6.2.x86_64.rpmP4python3-tkinter-3.9.21-2.el9_6.2.i686.rpm4python3-debug-3.9.21-2.el9_6.2.x86_64.rpm4python3-idle-3.9.21-2.el9_6.2.i686.rpmO4python3-3.9.21-2.el9_6.2.i686.rpm4python3-test-3.9.21-2.el9_6.2.x86_64.rpm4python3-test-3.9.21-2.el9_6.2.i686.rpm4python3-debug-3.9.21-2.el9_6.2.i686.rpm4python3-idle-3.9.21-2.el9_6.2.x86_64.rpmP4python3-tkinter-3.9.21-2.el9_6.2.i686.rpm4python3-debug-3.9.21-2.el9_6.2.x86_64.rpm4python3-idle-3.9.21-2.el9_6.2.i686.rpmO4python3-3.9.21-2.el9_6.2.i686.rpm4python3-test-3.9.21-2.el9_6.2.x86_64.rpm4python3-test-3.9.21-2.el9_6.2.i686.rpmb wBBBBsecurityImportant: kernel security updatezWhttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429 https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429 kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpmlibperf-5.14.0-570.41.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpmlibperf-5.14.0-570.41.1.el9_6.x86_64.rpmƟc }BBBBsecurityImportant: kernel security updateQ https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661 https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661 kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpmlibperf-5.14.0-570.42.2.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpmlibperf-5.14.0-570.42.2.el9_6.x86_64.rpmƤGd CBBBBsecurityModerate: kernel security update khttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740 https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740 libperf-5.14.0-570.44.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpmlibperf-5.14.0-570.44.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpmԃe IB@BBsecurityModerate: mysql security update khhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086 https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086 P*mysql-devel-8.0.43-1.el9_6.x86_64.rpm5*mysql-libs-8.0.43-1.el9_6.x86_64.rpmQ*mysql-test-8.0.43-1.el9_6.x86_64.rpmP*mysql-devel-8.0.43-1.el9_6.x86_64.rpm5*mysql-libs-8.0.43-1.el9_6.x86_64.rpmQ*mysql-test-8.0.43-1.el9_6.x86_64.rpmof MBBBBsecurityModerate: kernel security update q https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398 https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398 libperf-5.14.0-570.46.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpmlibperf-5.14.0-570.46.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm^g SBBBBsecurityModerate: kernel security update xhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659 https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659 }kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm}libperf-5.14.0-503.26.1.el9_5.x86_64.rpm}kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm}kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm}libperf-5.14.0-503.26.1.el9_5.x86_64.rpm}kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm5h NLBBBsecurityImportant: bind9.18 security update rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670 .Jbind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpmjJbind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm.Jbind9.18-devel-9.18.29-1.el9_5.1.i686.rpmJbind9.18-libs-9.18.29-1.el9_5.1.i686.rpm.Jbind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpmjJbind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm.Jbind9.18-devel-9.18.29-1.el9_5.1.i686.rpmJbind9.18-libs-9.18.29-1.el9_5.1.i686.rpm3i ^BBBBsecurityImportant: mysql security update{*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671 https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671 P)mysql-devel-8.0.41-2.el9_5.x86_64.rpm5)mysql-libs-8.0.41-2.el9_5.x86_64.rpmQ)mysql-test-8.0.41-2.el9_5.x86_64.rpmP)mysql-devel-8.0.41-2.el9_5.x86_64.rpm5)mysql-libs-8.0.41-2.el9_5.x86_64.rpmQ)mysql-test-8.0.41-2.el9_5.x86_64.rpm݄cj QTBBBsecurityImportant: bind security update%Xhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681 >Gbind-doc-9.16.23-24.el9_5.3.noarch.rpmQGbind-devel-9.16.23-24.el9_5.3.i686.rpmQGbind-devel-9.16.23-24.el9_5.3.x86_64.rpmVGbind-libs-9.16.23-24.el9_5.3.i686.rpm>Gbind-doc-9.16.23-24.el9_5.3.noarch.rpmQGbind-devel-9.16.23-24.el9_5.3.i686.rpmQGbind-devel-9.16.23-24.el9_5.3.x86_64.rpmVGbind-libs-9.16.23-24.el9_5.3.i686.rpmܴk iBBBBsecurityModerate: kernel security update }i https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880 https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880 kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpmlibperf-5.14.0-570.49.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpmlibperf-5.14.0-570.49.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpmhl /securityImportant: ipa security updatefghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084 v]python3-ipatests-4.12.2-14.el9_6.5.noarch.rpmv]python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm8m 2psecurityModerate: perl-JSON-XS security update Mshttps://access.redhat.com/errata/RHSA-2025:17162RHSA-2025:17162RHSA-2025:17162 https://access.redhat.com/security/cve/CVE-2025-40928CVE-2025-40928CVE-2025-40928https://bugzilla.redhat.com/23938782393878https://errata.almalinux.org/9/ALSA-2025-17162.htmlALSA-2025:17162ALSA-2025:17162 Fperl-JSON-XS-4.04-1.el9_6.x86_64.rpmFperl-JSON-XS-4.04-1.el9_6.x86_64.rpmn sBBBBsecurityModerate: kernel security update @Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377 https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377 kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpmlibperf-5.14.0-570.51.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpmlibperf-5.14.0-570.51.1.el9_6.x86_64.rpmǝ=o yBBBBBBBBBBBsecurityImportant: postgresql security update'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742 |;postgresql-server-devel-13.20-1.el9_5.x86_64.rpm6;postgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm{;postgresql-private-devel-13.20-1.el9_5.x86_64.rpm~;postgresql-test-13.20-1.el9_5.x86_64.rpm};postgresql-static-13.20-1.el9_5.x86_64.rpmz;postgresql-docs-13.20-1.el9_5.x86_64.rpm;postgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm|;postgresql-server-devel-13.20-1.el9_5.x86_64.rpm6;postgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm{;postgresql-private-devel-13.20-1.el9_5.x86_64.rpm~;postgresql-test-13.20-1.el9_5.x86_64.rpm};postgresql-static-13.20-1.el9_5.x86_64.rpmz;postgresql-docs-13.20-1.el9_5.x86_64.rpm;postgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpmsp FBBBBsecurityModerate: kernel security update -d https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760 https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760 kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpmlibperf-5.14.0-570.52.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpmlibperf-5.14.0-570.52.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm¿q LsecurityImportant: .NET 8.0 security updateMhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149 J\dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpmJ\dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm\r NsecurityImportant: .NET 9.0 security update^Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151 ,bdotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpm,bdotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpmȡhs PBBBBsecurityModerate: kernel security update +https://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281 https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281 kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpmlibperf-5.14.0-570.55.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpmlibperf-5.14.0-570.55.1.el9_6.x86_64.rpmct VBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update @\https://access.redhat.com/errata/RHSA-2025:18815RHSA-2025:18815RHSA-2025:18815 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18815.htmlALSA-2025:18815ALSA-2025:18815 ]java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm ]java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm]java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmȍIu jBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update https://access.redhat.com/errata/RHSA-2025:18821RHSA-2025:18821RHSA-2025:18821 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18821.htmlALSA-2025:18821ALSA-2025:18821 r2java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmz2java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmw2java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmn2java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmq2java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmu2java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpms2java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm{2java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmy2java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmx2java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmv2java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmp2java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmt2java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmo2java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmr2java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmz2java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmw2java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmn2java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmq2java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmu2java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpms2java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm{2java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmy2java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmx2java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmv2java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmp2java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmt2java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmo2java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpmȌlv FBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update !lhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824 lBjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmeBjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmkBjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmpBjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmoBjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmrBjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmfBjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmgBjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmjBjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmhBjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmqBjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmiBjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmmBjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmnBjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmlBjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmeBjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmkBjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmpBjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmoBjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmrBjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmfBjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmgBjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmjBjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmhBjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmqBjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmiBjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmmBjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmnBjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmȌWw bsecurityImportant: libtiff security update <https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113 y.libtiff-tools-4.4.0-13.el9_6.2.x86_64.rpmy.libtiff-tools-4.4.0-13.el9_6.2.x86_64.rpmȁ1x dBBBBsecurityModerate: kernel security update Ihttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409 https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409 kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpmlibperf-5.14.0-570.60.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpmlibperf-5.14.0-570.60.1.el9_6.x86_64.rpmȷHy jBBBBsecurityModerate: galera and mariadb security update M! https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584 /gmariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpm0gmariadb-test-10.5.29-2.el9_6.x86_64.rpm.gmariadb-devel-10.5.29-2.el9_6.x86_64.rpm/gmariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpm0gmariadb-test-10.5.29-2.el9_6.x86_64.rpm.gmariadb-devel-10.5.29-2.el9_6.x86_64.rpmȶ9z !pBBBBsecurityModerate: kernel security update n9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930 https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930 kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpmlibperf-5.14.0-570.62.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpmlibperf-5.14.0-570.62.1.el9_6.x86_64.rpmѲA{ #bUBBBsecurityImportant: bind9.18 security update'phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950 .Kbind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpmjKbind9.18-doc-9.18.29-4.el9_6.2.noarch.rpmKbind9.18-libs-9.18.29-4.el9_6.2.i686.rpm.Kbind9.18-devel-9.18.29-4.el9_6.2.i686.rpm.Kbind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpmjKbind9.18-doc-9.18.29-4.el9_6.2.noarch.rpmKbind9.18-libs-9.18.29-4.el9_6.2.i686.rpm.Kbind9.18-devel-9.18.29-4.el9_6.2.i686.rpm1| ${BBBBsecurityModerate: kernel security update Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518 https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396%libperf-5.14.0-611.5.1.el9_7.x86_64.rpm%kernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm%kernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm%libperf-5.14.0-611.5.1.el9_7.x86_64.rpm%kernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm%kernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm7} ABsecurityLow: shadow-utils security updateKohttps://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559 https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559 U9shadow-utils-subid-devel-4.9-15.el9.i686.rpmU9shadow-utils-subid-devel-4.9-15.el9.x86_64.rpmU9shadow-utils-subid-devel-4.9-15.el9.i686.rpmU9shadow-utils-subid-devel-4.9-15.el9.x86_64.rpm~ %DBsecurityModerate: zziplib security update vhttps://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838 https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838 Xzziplib-devel-0.13.71-12.el9.i686.rpmXzziplib-devel-0.13.71-12.el9.x86_64.rpmXzziplib-devel-0.13.71-12.el9.i686.rpmXzziplib-devel-0.13.71-12.el9.x86_64.rpmt &securityImportant: ipa security updateghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928 v^python3-ipatests-4.12.2-22.el9_7.1.noarch.rpmv^python3-ipatests-4.12.2-22.el9_7.1.noarch.rpmɵV 'HBsecurityImportant: sssd security updateo/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954 https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954 P6libsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpmP6libsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpmP6libsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpmP6libsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpmɵ (KsecurityImportant: libtiff security update<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956 y/libtiff-tools-4.4.0-15.el9_7.2.x86_64.rpmy/libtiff-tools-4.4.0-15.el9_7.2.x86_64.rpm/ *ieBBsecurityModerate: xorg-x11-server-Xwayland security update Z https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960 Axorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpmAxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpmiAxorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpmAxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpmAxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpmiAxorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpm7 +QBBsecurityModerate: xorg-x11-server security update dyhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961 a`xorg-x11-server-devel-1.20.11-32.el9_7.i686.rpmU`xorg-x11-server-source-1.20.11-32.el9_7.noarch.rpma`xorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpma`xorg-x11-server-devel-1.20.11-32.el9_7.i686.rpmU`xorg-x11-server-source-1.20.11-32.el9_7.noarch.rpma`xorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpm -ljBBBsecurityImportant: bind security update]~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110 QHbind-devel-9.16.23-34.el9_7.1.x86_64.rpmQHbind-devel-9.16.23-34.el9_7.1.i686.rpm>Hbind-doc-9.16.23-34.el9_7.1.noarch.rpmVHbind-libs-9.16.23-34.el9_7.1.i686.rpmQHbind-devel-9.16.23-34.el9_7.1.x86_64.rpmQHbind-devel-9.16.23-34.el9_7.1.i686.rpm>Hbind-doc-9.16.23-34.el9_7.1.noarch.rpmVHbind-libs-9.16.23-34.el9_7.1.i686.rpm< /nmBBBsecurityImportant: bind9.18 security update[phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111 .Lbind9.18-devel-9.18.29-5.el9_7.2.i686.rpmLbind9.18-libs-9.18.29-5.el9_7.2.i686.rpmjLbind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm.Lbind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpm.Lbind9.18-devel-9.18.29-5.el9_7.2.i686.rpmLbind9.18-libs-9.18.29-5.el9_7.2.i686.rpmjLbind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm.Lbind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpmɵ 0_BsecurityCritical: lasso security update_K$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462 https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462 V3lasso-devel-2.7.0-11.el9_7.3.i686.rpmV3lasso-devel-2.7.0-11.el9_7.3.x86_64.rpmV3lasso-devel-2.7.0-11.el9_7.3.i686.rpmV3lasso-devel-2.7.0-11.el9_7.3.x86_64.rpm  1bBBBBsecurityModerate: kernel security update o;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405 https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405 kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpmlibperf-5.14.0-611.11.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpmlibperf-5.14.0-611.11.1.el9_7.x86_64.rpmۅ] 2hBBBBsecurityModerate: kernel security update *Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865 https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865 kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpmlibperf-5.14.0-611.13.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpmlibperf-5.14.0-611.13.1.el9_7.x86_64.rpmʊz  3nBBsecurityModerate: mysql security update }[https://access.redhat.com/errata/RHSA-2025:23109RHSA-2025:23109RHSA-2025:23109 https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23109.htmlALSA-2025:23109ALSA-2025:23109 Qmysql-test-8.0.44-1.el9_7.x86_64.rpmPmysql-devel-8.0.44-1.el9_7.x86_64.rpmQmysql-test-8.0.44-1.el9_7.x86_64.rpmPmysql-devel-8.0.44-1.el9_7.x86_64.rpmD  4rBsecurityImportant: wireshark security updateX&https://access.redhat.com/errata/RHSA-2025:23142RHSA-2025:23142RHSA-2025:23142 https://access.redhat.com/security/cve/CVE-2025-13499CVE-2025-13499CVE-2025-13499https://bugzilla.redhat.com/24162932416293https://errata.almalinux.org/9/ALSA-2025-23142.htmlALSA-2025:23142ALSA-2025:23142 5*wireshark-devel-3.4.10-8.el9_7.1.i686.rpm5*wireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm5*wireshark-devel-3.4.10-8.el9_7.1.i686.rpm5*wireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm#  5uBBBBsecurityImportant: kernel security update~Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241 https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241 kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpmlibperf-5.14.0-611.16.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpmlibperf-5.14.0-611.16.1.el9_7.x86_64.rpm  8vBEBBBBBBBBBsecurityModerate: python3.12 security update Kghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323 https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323 Jpython3.12-idle-3.12.12-1.el9_7.x86_64.rpmSpython3.12-3.12.12-1.el9_7.i686.rpmTpython3.12-tkinter-3.12.12-1.el9_7.i686.rpmKpython3.12-test-3.12.12-1.el9_7.i686.rpmJpython3.12-idle-3.12.12-1.el9_7.i686.rpmKpython3.12-test-3.12.12-1.el9_7.x86_64.rpmIpython3.12-debug-3.12.12-1.el9_7.x86_64.rpmIpython3.12-debug-3.12.12-1.el9_7.i686.rpmJpython3.12-idle-3.12.12-1.el9_7.x86_64.rpmSpython3.12-3.12.12-1.el9_7.i686.rpmTpython3.12-tkinter-3.12.12-1.el9_7.i686.rpmKpython3.12-test-3.12.12-1.el9_7.i686.rpmJpython3.12-idle-3.12.12-1.el9_7.i686.rpmKpython3.12-test-3.12.12-1.el9_7.x86_64.rpmIpython3.12-debug-3.12.12-1.el9_7.x86_64.rpmIpython3.12-debug-3.12.12-1.el9_7.i686.rpmʥ  :y^qBBBBBBBBBsecurityModerate: python3.9 security update 2x https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342 https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342 5python3-test-3.9.25-2.el9_7.x86_64.rpm5python3-idle-3.9.25-2.el9_7.x86_64.rpmP5python3-tkinter-3.9.25-2.el9_7.i686.rpm5python3-debug-3.9.25-2.el9_7.x86_64.rpm5python3-test-3.9.25-2.el9_7.i686.rpm5python3-idle-3.9.25-2.el9_7.i686.rpm5python3-debug-3.9.25-2.el9_7.i686.rpmO5python3-3.9.25-2.el9_7.i686.rpm5python3-test-3.9.25-2.el9_7.x86_64.rpm5python3-idle-3.9.25-2.el9_7.x86_64.rpmP5python3-tkinter-3.9.25-2.el9_7.i686.rpm5python3-debug-3.9.25-2.el9_7.x86_64.rpm5python3-test-3.9.25-2.el9_7.i686.rpm5python3-idle-3.9.25-2.el9_7.i686.rpm5python3-debug-3.9.25-2.el9_7.i686.rpmO5python3-3.9.25-2.el9_7.i686.rpmʥu ;QBBBBsecurityImportant: kernel security update*9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627 https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627 ~libperf-5.14.0-503.31.1.el9_5.x86_64.rpm~kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm~kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm~libperf-5.14.0-503.31.1.el9_5.x86_64.rpm~kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm~kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm =securityImportant: apache-commons-beanutils security update*ihttps://access.redhat.com/errata/RHSA-2025:9114RHSA-2025:9114RHSA-2025:9114 https://access.redhat.com/security/cve/CVE-2025-48734CVE-2025-48734CVE-2025-48734https://bugzilla.redhat.com/23689562368956https://errata.almalinux.org/9/ALSA-2025-9114.htmlALSA-2025:9114ALSA-2025:9114 cTapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpmcTapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpmÔ37 2BsecurityImportant: libvpx security update8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118 https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118 0#libvpx-devel-1.9.0-9.el9_6.x86_64.rpm0#libvpx-devel-1.9.0-9.el9_6.i686.rpm0#libvpx-devel-1.9.0-9.el9_6.x86_64.rpm0#libvpx-devel-1.9.0-9.el9_6.i686.rpmÔ@8 3securityImportant: ipa security updateKghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184 https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184 v\python3-ipatests-4.12.2-14.el9_6.1.noarch.rpmv\python3-ipatests-4.12.2-14.el9_6.1.noarch.rpmÊE9 4CBBBBsecurityModerate: kernel security update 2 https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302 libperf-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpmlibperf-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpmÙ;: 6uUBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security updateLz https://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303 @xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm@xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpma_xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpmU_xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpmi@xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpma_xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm@xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm@xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpma_xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpmU_xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpmi@xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpma_xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpmÊ; QsecurityImportant: perl-YAML-LibYAML security updateFnhttps://access.redhat.com/errata/RHSA-2025:9330RHSA-2025:9330RHSA-2025:9330 https://access.redhat.com/security/cve/CVE-2025-40908CVE-2025-40908CVE-2025-40908https://bugzilla.redhat.com/23696302369630https://errata.almalinux.org/9/ALSA-2025-9330.htmlALSA-2025:9330ALSA-2025:9330 Gperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpmGperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpmØy< 7TBsecurityModerate: qt5-qtbase security update 4.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462 https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462 Dqt5-qtbase-static-5.15.9-11.el9_6.i686.rpmDqt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpmDqt5-qtbase-static-5.15.9-11.el9_6.i686.rpmDqt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpmÊ= securityImportant: perl-File-Find-Rule security updateb4https://access.redhat.com/errata/RHSA-2025:9517RHSA-2025:9517RHSA-2025:9517 https://access.redhat.com/security/cve/CVE-2011-10007CVE-2011-10007CVE-2011-10007https://bugzilla.redhat.com/23704242370424https://errata.almalinux.org/9/ALSA-2025-9517.htmlALSA-2025:9517ALSA-2025:9517 uQperl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpmuQperl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpmÊ> 8YBBBBBBBBBBBBsecurityModerate: glibc security update 2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877 Mhglibc-benchtests-2.34-168.el9_6.20.x86_64.rpmBhglibc-static-2.34-168.el9_6.20.x86_64.rpmEhnss_db-2.34-168.el9_6.20.x86_64.rpmBhglibc-static-2.34-168.el9_6.20.i686.rpmEhnss_db-2.34-168.el9_6.20.i686.rpmFhnss_hesiod-2.34-168.el9_6.20.i686.rpmAhglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpmAhglibc-nss-devel-2.34-168.el9_6.20.i686.rpmFhnss_hesiod-2.34-168.el9_6.20.x86_64.rpm Mhglibc-benchtests-2.34-168.el9_6.20.x86_64.rpmBhglibc-static-2.34-168.el9_6.20.x86_64.rpmEhnss_db-2.34-168.el9_6.20.x86_64.rpmBhglibc-static-2.34-168.el9_6.20.i686.rpmEhnss_db-2.34-168.el9_6.20.i686.rpmFhnss_hesiod-2.34-168.el9_6.20.i686.rpmAhglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpmAhglibc-nss-devel-2.34-168.el9_6.20.i686.rpmFhnss_hesiod-2.34-168.el9_6.20.x86_64.rpmÊt? 9gBBBBsecurityModerate: kernel security update H https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 libperf-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpmlibperf-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpmÓb@ :mBBBBBBBBBBBsecurityModerate: poppler security update~ Qxhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126 https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126 }poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm}poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm}poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm}poppler-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-devel-21.01.0-23.el9_7.i686.rpm}poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-glib-devel-21.01.0-23.el9_7.i686.rpm }poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm}poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm}poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm}poppler-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-devel-21.01.0-23.el9_7.i686.rpm}poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-glib-devel-21.01.0-23.el9_7.i686.rpmqA ;zBBBBsecurityImportant: mariadb security update~I8https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137 https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137 .hmariadb-devel-10.5.29-3.el9_7.x86_64.rpm/hmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm0hmariadb-test-10.5.29-3.el9_7.x86_64.rpm.hmariadb-devel-10.5.29-3.el9_7.x86_64.rpm/hmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm0hmariadb-test-10.5.29-3.el9_7.x86_64.rpmB <@BBBBsecurityModerate: kernel security update~ 0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445 libperf-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpmlibperf-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm˩FC =FBBBBBBBBBBBsecurityModerate: postgresql security update~ 1[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491 z=postgresql-docs-13.23-1.el9_7.x86_64.rpm~=postgresql-test-13.23-1.el9_7.x86_64.rpm}=postgresql-static-13.23-1.el9_7.x86_64.rpm|=postgresql-server-devel-13.23-1.el9_7.x86_64.rpm6=postgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpm{=postgresql-private-devel-13.23-1.el9_7.x86_64.rpm=postgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpmz=postgresql-docs-13.23-1.el9_7.x86_64.rpm~=postgresql-test-13.23-1.el9_7.x86_64.rpm}=postgresql-static-13.23-1.el9_7.x86_64.rpm|=postgresql-server-devel-13.23-1.el9_7.x86_64.rpm6=postgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpm{=postgresql-private-devel-13.23-1.el9_7.x86_64.rpm=postgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm˩WD SsecurityModerate: transfig security update~ Phttps://access.redhat.com/errata/RHSA-2026:0700RHSA-2026:0700RHSA-2026:0700 https://access.redhat.com/security/cve/CVE-2025-46397CVE-2025-46397CVE-2025-46397https://bugzilla.redhat.com/23620582362058https://errata.almalinux.org/9/ALSA-2026-0700.htmlALSA-2026:0700ALSA-2026:0700 Otransfig-3.2.7b-11.el9_7.x86_64.rpmOtransfig-3.2.7b-11.el9_7.x86_64.rpm˩QE VsecurityImportant: jmc security update~\"https://access.redhat.com/errata/RHSA-2026:0752RHSA-2026:0752RHSA-2026:0752 https://access.redhat.com/security/cve/CVE-2025-66566CVE-2025-66566CVE-2025-66566https://bugzilla.redhat.com/24195002419500https://errata.almalinux.org/9/ALSA-2026-0752.htmlALSA-2026:0752ALSA-2026:0752 $]jmc-8.2.0-18.el9_7.2.x86_64.rpm$]jmc-8.2.0-18.el9_7.2.x86_64.rpm˽F >YBBBBsecurityImportant: kernel security update~~+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793 libperf-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpmlibperf-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpmtG ?_BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update~)dhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927 r3java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmv3java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq3java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn3java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmx3java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmy3java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp3java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt3java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmw3java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo3java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmz3java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmu3java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm{3java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms3java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmr3java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmv3java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq3java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn3java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmx3java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmy3java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp3java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt3java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmw3java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo3java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmz3java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmu3java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm{3java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms3java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm2H {BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update~ )https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928 k:java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpml:java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmr:java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmm:java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmn:java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmf:java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpme:java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmq:java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmj:java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmh:java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmp:java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmo:java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmg:java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmi:java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmk:java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpml:java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmr:java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmm:java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmn:java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmf:java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpme:java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmq:java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmj:java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmh:java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmp:java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmo:java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmg:java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmi:java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm&I WBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update~6whttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932 ^java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ^java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmJ kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update~-fhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933  java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm! java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm# java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm" java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm! java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm# java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm" java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpmK KBsecurityModerate: glib2 security update~ https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936  2glib2-static-2.68.4-18.el9_7.1.i686.rpm 2glib2-static-2.68.4-18.el9_7.1.x86_64.rpm 2glib2-static-2.68.4-18.el9_7.1.i686.rpm 2glib2-static-2.68.4-18.el9_7.1.x86_64.rpmeL NBBBBsecurityImportant: kernel security update~0https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143  kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm libperf-5.14.0-611.26.1.el9_7.x86_64.rpm kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm libperf-5.14.0-611.26.1.el9_7.x86_64.rpm/M EBOBBBBBBBBBsecurityModerate: python3.12 security update~ M,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408 Ipython3.12-debug-3.12.12-4.el9_7.x86_64.rpmTpython3.12-tkinter-3.12.12-4.el9_7.i686.rpmKpython3.12-test-3.12.12-4.el9_7.x86_64.rpmSpython3.12-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.x86_64.rpmKpython3.12-test-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.i686.rpmIpython3.12-debug-3.12.12-4.el9_7.i686.rpmIpython3.12-debug-3.12.12-4.el9_7.x86_64.rpmTpython3.12-tkinter-3.12.12-4.el9_7.i686.rpmKpython3.12-test-3.12.12-4.el9_7.x86_64.rpmSpython3.12-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.x86_64.rpmKpython3.12-test-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.i686.rpmIpython3.12-debug-3.12.12-4.el9_7.i686.rpmN HBWBBBBBBBBBsecurityModerate: python3.11 security update~ y,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410  python3.11-idle-3.11.13-5.el9_7.x86_64.rpm python3.11-test-3.11.13-5.el9_7.x86_64.rpmb python3.11-3.11.13-5.el9_7.i686.rpm python3.11-test-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.i686.rpmc python3.11-tkinter-3.11.13-5.el9_7.i686.rpm python3.11-idle-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.x86_64.rpm python3.11-idle-3.11.13-5.el9_7.x86_64.rpm python3.11-test-3.11.13-5.el9_7.x86_64.rpmb python3.11-3.11.13-5.el9_7.i686.rpm python3.11-test-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.i686.rpmc python3.11-tkinter-3.11.13-5.el9_7.i686.rpm python3.11-idle-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.x86_64.rpmJO KNSBBBBBBBBBsecurityModerate: python3.9 security update~ %bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 6python3-debug-3.9.25-3.el9_7.i686.rpmO6python3-3.9.25-3.el9_7.i686.rpm6python3-test-3.9.25-3.el9_7.x86_64.rpm6python3-idle-3.9.25-3.el9_7.i686.rpm6python3-debug-3.9.25-3.el9_7.x86_64.rpmP6python3-tkinter-3.9.25-3.el9_7.i686.rpm6python3-test-3.9.25-3.el9_7.i686.rpm6python3-idle-3.9.25-3.el9_7.x86_64.rpm6python3-debug-3.9.25-3.el9_7.i686.rpmO6python3-3.9.25-3.el9_7.i686.rpm6python3-test-3.9.25-3.el9_7.x86_64.rpm6python3-idle-3.9.25-3.el9_7.i686.rpm6python3-debug-3.9.25-3.el9_7.x86_64.rpmP6python3-tkinter-3.9.25-3.el9_7.i686.rpm6python3-test-3.9.25-3.el9_7.i686.rpm6python3-idle-3.9.25-3.el9_7.x86_64.rpmuP uBBBBsecurityModerate: kernel security update~ Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617 https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617 !libperf-5.14.0-611.27.1.el9_7.x86_64.rpm!kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm!kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm!libperf-5.14.0-611.27.1.el9_7.x86_64.rpm!kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm!kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm̖4Q {BBBBsecurityModerate: util-linux security update~ Khttps://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 ]:libsmartcols-devel-2.37.4-21.el9_7.i686.rpmW:libfdisk-devel-2.37.4-21.el9_7.x86_64.rpm]:libsmartcols-devel-2.37.4-21.el9_7.x86_64.rpmW:libfdisk-devel-2.37.4-21.el9_7.i686.rpm]:libsmartcols-devel-2.37.4-21.el9_7.i686.rpmW:libfdisk-devel-2.37.4-21.el9_7.x86_64.rpm]:libsmartcols-devel-2.37.4-21.el9_7.x86_64.rpmW:libfdisk-devel-2.37.4-21.el9_7.i686.rpm̫ER securityImportant: python3.12-wheel security update~ghhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939 https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939 yRpython3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpmyRpython3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm̫!S BBsecurityImportant: fontforge security update~Othttps://access.redhat.com/errata/RHSA-2026:2039RHSA-2026:2039RHSA-2026:2039 https://access.redhat.com/security/cve/CVE-2025-15269CVE-2025-15269CVE-2025-15269https://access.redhat.com/security/cve/CVE-2025-15275CVE-2025-15275CVE-2025-15275https://access.redhat.com/security/cve/CVE-2025-15279CVE-2025-15279CVE-2025-15279https://bugzilla.redhat.com/24264212426421https://bugzilla.redhat.com/24264232426423https://bugzilla.redhat.com/24264292426429https://errata.almalinux.org/9/ALSA-2026-2039.htmlALSA-2026:2039ALSA-2026:2039 K8fontforge-20201107-7.el9_7.x86_64.rpmK8fontforge-20201107-7.el9_7.i686.rpmK8fontforge-20201107-7.el9_7.x86_64.rpmK8fontforge-20201107-7.el9_7.i686.rpm̙JT FBBBBsecurityImportant: freerdp security update~Chttps://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048 https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048  >freerdp-devel-2.11.7-1.el9_7.1.i686.rpm >libwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpm >libwinpr-devel-2.11.7-1.el9_7.1.i686.rpm >freerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm >freerdp-devel-2.11.7-1.el9_7.1.i686.rpm >libwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpm >libwinpr-devel-2.11.7-1.el9_7.1.i686.rpm >freerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm̫uU LBBBBsecurityModerate: kernel security update~ au"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212 https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212 "libperf-5.14.0-611.30.1.el9_7.x86_64.rpm"kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm"kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm"libperf-5.14.0-611.30.1.el9_7.x86_64.rpm"kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm"kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm̶#V RBBBBsecurityModerate: kernel security update~ Vhttps://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722 https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722 #kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm#kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm#libperf-5.14.0-611.34.1.el9_7.x86_64.rpm#kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm#kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm#libperf-5.14.0-611.34.1.el9_7.x86_64.rpm,W SBEBsecurityModerate: edk2 security update~ mGhttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776 @Yedk2-tools-doc-20241117-4.el9_7.3.noarch.rpmxYedk2-tools-20241117-4.el9_7.3.x86_64.rpmYedk2-ovmf-20241117-4.el9_7.3.noarch.rpm?Yedk2-aarch64-20241117-4.el9_7.3.noarch.rpm@Yedk2-tools-doc-20241117-4.el9_7.3.noarch.rpmxYedk2-tools-20241117-4.el9_7.3.x86_64.rpmYedk2-ovmf-20241117-4.el9_7.3.noarch.rpm?Yedk2-aarch64-20241117-4.el9_7.3.noarch.rpm׆=X [BBBBBBBBBBBBsecurityModerate: glibc security update~ 4|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786 https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786 Biglibc-static-2.34-231.el9_7.10.x86_64.rpmMiglibc-benchtests-2.34-231.el9_7.10.x86_64.rpmAiglibc-nss-devel-2.34-231.el9_7.10.i686.rpmEinss_db-2.34-231.el9_7.10.x86_64.rpmFinss_hesiod-2.34-231.el9_7.10.i686.rpmAiglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpmEinss_db-2.34-231.el9_7.10.i686.rpmBiglibc-static-2.34-231.el9_7.10.i686.rpmFinss_hesiod-2.34-231.el9_7.10.x86_64.rpm Biglibc-static-2.34-231.el9_7.10.x86_64.rpmMiglibc-benchtests-2.34-231.el9_7.10.x86_64.rpmAiglibc-nss-devel-2.34-231.el9_7.10.i686.rpmEinss_db-2.34-231.el9_7.10.x86_64.rpmFinss_hesiod-2.34-231.el9_7.10.i686.rpmAiglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpmEinss_db-2.34-231.el9_7.10.i686.rpmBiglibc-static-2.34-231.el9_7.10.i686.rpmFinss_hesiod-2.34-231.el9_7.10.x86_64.rpmׄ Y iBsecurityImportant: munge security update~0}https://access.redhat.com/errata/RHSA-2026:3034RHSA-2026:3034RHSA-2026:3034 https://access.redhat.com/security/cve/CVE-2026-25506CVE-2026-25506CVE-2026-25506https://bugzilla.redhat.com/24387152438715https://errata.almalinux.org/9/ALSA-2026-3034.htmlALSA-2026:3034ALSA-2026:3034 c munge-devel-0.5.13-14.el9_7.x86_64.rpmc munge-devel-0.5.13-14.el9_7.i686.rpmc munge-devel-0.5.13-14.el9_7.x86_64.rpmc munge-devel-0.5.13-14.el9_7.i686.rpm̀;Z lBBBBsecurityModerate: kernel security update~ -whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066 https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066 $kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm$libperf-5.14.0-611.35.1.el9_7.x86_64.rpm$kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm$kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm$libperf-5.14.0-611.35.1.el9_7.x86_64.rpm$kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm̀[ rBBBBsecurityImportant: freerdp security update~$^https://access.redhat.com/errata/RHSA-2026:3067RHSA-2026:3067RHSA-2026:3067 https://access.redhat.com/security/cve/CVE-2026-22855CVE-2026-22855CVE-2026-22855https://access.redhat.com/security/cve/CVE-2026-22858CVE-2026-22858CVE-2026-22858https://access.redhat.com/security/cve/CVE-2026-22859CVE-2026-22859CVE-2026-22859https://bugzilla.redhat.com/24296452429645https://bugzilla.redhat.com/24296492429649https://bugzilla.redhat.com/24296532429653https://errata.almalinux.org/9/ALSA-2026-3067.htmlALSA-2026:3067ALSA-2026:3067  ?freerdp-devel-2.11.7-1.el9_7.2.i686.rpm ?libwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpm ?freerdp-devel-2.11.7-1.el9_7.2.x86_64.rpm ?libwinpr-devel-2.11.7-1.el9_7.2.i686.rpm ?freerdp-devel-2.11.7-1.el9_7.2.i686.rpm ?libwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpm ?freerdp-devel-2.11.7-1.el9_7.2.x86_64.rpm ?libwinpr-devel-2.11.7-1.el9_7.2.i686.rpm̀\ xBBBBBBBsecurityImportant: protobuf security update~9https://access.redhat.com/errata/RHSA-2026:3095RHSA-2026:3095RHSA-2026:3095 https://access.redhat.com/security/cve/CVE-2026-0994CVE-2026-0994CVE-2026-0994https://bugzilla.redhat.com/24323982432398https://errata.almalinux.org/9/ALSA-2026-3095.htmlALSA-2026:3095ALSA-2026:3095 3uprotobuf-devel-3.14.0-17.el9_7.i686.rpm4uprotobuf-lite-devel-3.14.0-17.el9_7.i686.rpm2uprotobuf-compiler-3.14.0-17.el9_7.x86_64.rpm4uprotobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpm3uprotobuf-devel-3.14.0-17.el9_7.x86_64.rpm2uprotobuf-compiler-3.14.0-17.el9_7.i686.rpm3uprotobuf-devel-3.14.0-17.el9_7.i686.rpm4uprotobuf-lite-devel-3.14.0-17.el9_7.i686.rpm2uprotobuf-compiler-3.14.0-17.el9_7.x86_64.rpm4uprotobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpm3uprotobuf-devel-3.14.0-17.el9_7.x86_64.rpm2uprotobuf-compiler-3.14.0-17.el9_7.i686.rpm-] AsecurityModerate: 389-ds-base security update~ ;https://access.redhat.com/errata/RHSA-2026:3189RHSA-2026:3189RHSA-2026:3189 https://access.redhat.com/security/cve/CVE-2025-14905CVE-2025-14905CVE-2025-14905https://bugzilla.redhat.com/24236242423624https://errata.almalinux.org/9/ALSA-2026-3189.htmlALSA-2026:3189ALSA-2026:3189 d&389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpmd&389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm̀NFor detailed information changes this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.Tgrub2 packagprovide vers2 of?Grand UnifiVBoot Loader (GRUB), a highly configurable 5customizb:l:with modular architure. supportbvarietykernel .s, fi]system computeVs,hardwareuvi. mshimrénsrfirst-stUEFIthat hTlining to7truull3unurenvironmentSiFix(es): *: IntegBflow_net_recv_ip4_ets (CVE-2022-28733)HCrafPNGaysca=imnmay Kdout-of-bors wrJsheap^1-3695]SRQd7huffma)Vg6gJPEhc>hbN,7ZOȤwhensplit HTTPId/n4M[_lockXBls non-iDe*dQbuse-r-freӳcmd_k()B=: Bovޢ6cYH+moF+bګ[sissue(sinclu[ imt4CVSS scG cknowg o/ra,1Rgms, wf3S!,wanyoper vC: Smaڡ8b sizTCP sourcgen^algor+m*k1012){racdi-qp_evf_ƤT|privJe^Y729Yacsub$lrt966tbmIP ESPwansco76K Bug`make SHA512_.sCRYPTO_USER4-(BZ#207264SR-IOVn*> 50%d348303fix arupia d by dmgt=F98218_SC1cli$-sjpeeloffns [al(_-9]<404N#n finasymmetricV warequi~uTboh-D}HeSLPBF4=<-D..fips=f e=,ڢan{cbtr{F1l,ha} rI7fe,Ṇ-1@r=a Mae smF(!ed¶3)MaDBaF-u, th SQLFbr4pomp5My4. 5gra (2611),db0.5. ysql-sel~(C5)K=: ough M9ack/onr_co_to_i`BIGINTtypl,1-4v blengf -lfo-copym= $xed-;s-d8˒7exGLbjjp.( X,v50 abefsusa4u1uCONNECT StorapEng H1OvPkEkVp2pr3r !I_s::walk D6Dpoisqlex/"volgblobX7Xnsh0Z_tmp_)::f;&F8F]_B or:: e_r _X9Xmy_d ::uor=A80AField::s!defa=yzs cTRfx![s/updm+_map__ oSr$ca8bit` Ic*.cV3V#ɺ<ct::_5 r_c)rGW4enquery_a a$SEL?%view`d(__s8V]HAVI>#NOT EXIST d0 [a744_]f445IS NULLޡ _;BTj_MJHv l it)#oupGR4/iLz .ccA;wiw in ess ORDBYO5 ‘u˔5LWHERE h 8 eqd(˩VD/:/_ȴh K"dupue" erro; f@giqueP$)o5'*%Tun d/=bup/ds 31622XkCex VIEW ggreg\9S| 5  nfi_:dg^an mond%b(CTED 1˚ 13_,::VɹB&>|3|+ &s'_postjo=a# ă4 0sȏbe#jk Ĉ5- y~D2IN 8(m(csi_ioq!h*049[kc,w_(#(/s d/cls_api% J!ower9 - LPAR&t&Sha,cC&s[HT22H.+\&e-ss-ng`sO5RiV|nam>3 gfs,Fy0(Ll 5*en tP0tK730i/o i~ u:Kwork;jg 372.9.1.el8.x86_[82k c(tesv3SSATAM76Guestre3 migB21 -J<({Oops ~lt[ ?IRIPq +_K__labelr g+!sl1\l BUG:UH%tas (n'fs4ton ;lookuprlpaɢ: Kokada=ig:C$[# +tubontD(P10/ ibmvnic/L)3)S^vmOUmq\e') Enhf^'Bu/vt-d+DMAR_UNITS_SUPPORTED U5326).NETVd-sfrD.5 a}-eEC- API^ s(niPu CLRZ. N/_ddaT'vailD3 dU'VS%108%dot: ExtOE2"InjK2XML`natG1. 47:IZJ-9Q9L9MNDenOfS\iceASP]CMVCH0<MlS Diru.v801wRubaensp:.-or&0-he25 tYO5-,sks4Pr(3 " "Y428)JHou!( Rxp!59:5 =S-to-FPtEL f>fbiaM.daem0d)m5 2k1al"7Hw ((0J 8J2i6: r2und>%(2 Apr r#412, 43567840529678xD3NRe$V5VInno/j1512DDL/2iFTS$=27NGPlugi%5ʲPAM Au ZJulZ5/ZεLog" #R60R!` 505;52678O30153o69R "5+T3 gP= d .22vede,d$@4: cryi#_d z{,Dr logro) [wr78l92)Dd=A=nft_#9r3491 ?>3>Rd7r%06A0l"Rz/mlx5minunedly0C(sECDSASECD$("FsGdG108g! Nuget7%߱1 &orld-+A}U4r2Urh87FByp(M (JGSS}7607q8216g eex EaA ci8.5W#`Crk(h5Nh26hHttpSnoHcountmr<82 we8 M2c# c̯2MQ$NTLMhs26,9_nsj*F9QiJNDIM s0ƿ4_ SNI{ /2 (N!O9393939 PrIe 4 ,rvnr37(17;5= 329nA ob HVK718-KSB)p̱cKasbah?Rs8(wellMS eCBly;5. xZthi9 =M S/MIMETLSDkCMrU1P&O-(aqst; ;~<,!O~̔:("$Wby C,Wd!n"U2byT#?X,>-rzl 204M.gSS[5 fM4743Uix  r1, . "S$Un(dTKTPTRACE_SEIZEWO/-SPEND_COMP0D059-/Z0g0T14/G2DpV(mt7921e})0K1vjAt4e./7MabExeascr&vVGA*:iU somea]120UoaF9hU.o DRBGf1miyc] E  1\wod03+ #30G2$34s! [swq/30:0]O78\#j(D"l B}6p*qemu-kvm pfn:68a7_#0?vfioJEp0sE2M s>879VhH2)9$FNW.1 h*o?@HPE RL3 GenARMQXY34PY{ #B, aGYO,ZP,[[J3TMHy3l dynam`.sZ 4FnL _F9,nam{ddKtgv )g t`to3S0-?plua> LuapfulV-x lp2ed>/ Lwlso%.FJ| F , d-T\5/ u s#o G_!msde.c>unx}K0)?f30ibg!fM ࡖd `le8k _yein g$0As0 211! " 9C$s:ҤjRRk-v2v %7? cKV$# V-M-) hype|4sor. E iI3)*}%OUioci{+Qa.zso,)b-!%;ۢIObf` p#2P$Google'QuQ.3CenvsOQmd? dyetO6Rfl n68"autommeismser<Łc -c& ? nnchar. fbolN%ptry1-+c 9Shxa pajT e# +AchE$sM?vo(s(unw ,M-/Zx:kid@ad_saY$s E?NWAV- 23R@>  s$& n(^{il19Xs.qY,~();of~edG0885.80603<3JnwCFCoNumOfNWF7Kd=s' HF8q>Qt5 Qt 5, 5thcroFy/I)-q(QPaZLX?r%(GFosxPATHgm>8unbu2wXc`m Q ,-+Z5ZCj2a74:T'gT! dP/Z +LZPi^d4cS!6Ic1qu!4'1>YwaRRs .+: :1j"Y5r{03z: FLAC0F L A8oGM. * sOgg Vorbi2bu 8.0V^c7D'QZMr2R=, a command-line program to encode  de FLAC files,;metadata editor f2. Security Fix(es): * flac: out of bouWw$e in append_to_verify_fifo_interleaved_4stream_r.c (CVE-2021-0561) Fmoretails abpthe sissue(s),xcluding impact(CVSS scG cknowledgmento/r relatedFmation,fUR pagm lis,R&es:6AdO al Changes:Ҥj c%TiseasseefAlmaLinuxp Not0kNfromΎWavP ispletely o a7oressWviSlossl, high-qual~yVunique hybridNm. Jwavp: HeapR-of-RaeW#Sas()044269<1Popgr1Portable Docu F!(PDF) r'ibrarus`by lic\uch as Evil[py: A_gic error:Hi:: fun caudeniAaervice'2-27337<'Ttiff aiconn$scipulXTagghIm= le_TIF` }: DSvirafRIHiBNull source l"^2^Has.865.O R !cp=924=st-buf-oflow:rininK2-135Ą_memcpy>T_xp284Ĕh “extrWS[9pPd\avrgbFetchN[lsdirü0908tDi e By Zerorop89RawD StripedfÒN:O JPEGn [B iE2000= ajpeg:mfaultFopj2_ ? dueh[nvw zҶ122<DcotIMAP SݲU UNIXR khym)(tOpr*rio withind. It also7r sl POP3txsupp s e-mBeiŢ box SQL driIs u1nt plug-zrPOsub d): Pr&leescalZwhSimilasnon-db|: 30550<X.Org-i[ AX WSس!s bas -level $th f-fkphic useEtaasign&up:qxorg-x11-: SProcXkbSetGeo acc[31W7bDe Ist hI< @kben t2=Yet AnJSON(YAJL)[nt-SAX-style)7parANSI CKCvda 5generaGyajl a# ,?O Tput atc5S4795kern3W!,1anyfr(sE ff-pat't e1)j oTer8atm's TCsa0-36516h-r-fre6ulbiinI_sock_sms# N1N40Msmb2_ioctl_ry_ NULL derI 16S *udf_expaC[ _x icbd)glba[617wiotlb!k| DMA_FROM_DEVICE?8\ *i reg4 trnft_do_ui|$9,UM 0rac*nWspcm_hw_lv M4S o4bmŷarup e 8#ywbetwe`drmCt ,k_get xsb28cKYpfkey_:353 in P9k_htc_be_ Ocouldan of ß67) x86_eme_S nêGoSN85#fa- suse$d:tew. hG99nf_s ss-pot | @£lo g258uFsG= "^ _sfa_sf263`slab-~ etcv23din cn-upmhi-shp 乮 SBDRNY3Ni]archcturallTST5TpecifT RCL_DRPW_6po0debugNzochoA149AMD:+tBle@Arbitf Sp)v~ExO~2urLnuq 816, 9900nBranTyp[nfuFretb)LcInostt rriSB P iȓ637douHR_usb_rt_xmia/net//!/)839xf٦XSUNRPCw)589 impr9 dc_sched/cl32Ę958k5?ӣ`fqnl_m leC/nf hueê3694dis0bin8alyD91nfs_ _(s *aENOTDIR44: baM,Blo) SMB)toco+8C!otxtSIFS;,jPC-ma ne^{!pr*vou,Csh foUk haibT up;a7upK! xGX,(4.16.4). (BZ#207748v 287 A E1?274=xSldbp Jmc %LDAPAPI/< rZor TDBu4(2.5.2 AD(si ua lp addodh 6<Pythonpre, acFb-o n&mVluvpdu[clexcepx ve$ dynamR tD dl. hto y cCib'sell.w@7Vp3.9 (.1H24%e#6:2cap: fia() donsa zsefA150^OW reQy;/http/.py cr&ur 1 >.(#rpcSunU's| s7-i *rd9#- )dT&FC$iye - l: 9lotsonnsz46828@zgcuc ilfC++, Java,-&y, OF3Ada 95 GNUD):re&ib%y/rusTe,461>G!u*!?b=)*Cdu-GNOMEm%loop!,nse=/)stcRur: g;replaG_FILE_CREATE_REP/E STINATIc\|emptV tdm1w>zldl-pur /!x/sb` difwLR-1w FKr(- &der8. 8A03=<.NETn an#*ftwework.mWC-@sevywV CLR"N0 O `(a nfil&dU'VSDK 7.0.1)RC 2Rme&4 dot67X(} 3464 ;'7,jcach,son-zld-+Z 41W9 Cm!Yf78hodP2919PVarnish C7"6p`nVHTTP)l%)storebm"soHn't:toL aw@%g, giv*(s )ant e)vForgVP50606q133.<6s5445nParrb ppe3I)J#2(5sh3-2  j -17-;2dk <2 17Environ+S2Dop,Ki2?:*keA(DTLS:JSS#57411)83!Ysg baiURL Blo'(SI93I4BugpIn FIPSedof a1+ NwTm:  K!-only]-no PIN )edir8-ed…4e^_(Do뢏%. P"L fuwop"t-ps.nG2.@+nd-H'anffiguRF>lt.*9or to ly9LAs\~tuE (RH04747"P_5n c?rf/J01,6) [a9l0 -9]3097)G1G1G+G0j18k77{*k.8.0n8m*&li''regTFCORBA d*%6 (Sv5vE&Fv8u362t991C-solr brok~.,3"Be"io.%PE1(" "/>/pki/!/cas"ws-863594Sf AT>F'>E>2@q+057J-ԢV+Gc)0%HotFD at%?j*5s7\%1?&@^9 0^AsAfa:;20QIn60-aCl_V_cW g7eOff/.!),& un-ded o-d&,vsu b1ktO,OFo*=,ee (&xJ a-a&K. Ss68Ő6ǐW*4Keys0HZ8E:@tz/6[ l% @495USTAX88179_178A 3;USB eK-5.V64Vi915WeNGPU TLBushïralm$>413ït$;u1me{.9RgIX3945ò2n"b& e5ngtV5@Gismt_ 57YUndU+n'[PTR SEIZEe O_SUSPENDCCOMP1q0 wtW9.2:MD3avf b)fixesm)789vfMOQ5mi!t32M 7|)51>nvme-tcpCoc ro)CXm";EMCw NDU13qD4 U/5.19)-@WARNING: CPU: V6534406/8/mm/c:105_l9f}+0x3f/0x5058` ::e9ljK-:acy_scr9_095io:&or$ m np%elaroughfs3*"-EINVALIS69DE ::02i5+boo)HZ7RT~ c12"921 Nwal=2̷VGA monSt!:^. 9-acy5oee401 P>dy6"Dummyit"N kar!t9M2=ppc64lQun, oGpane's calef6zswLt/Z39fatalt:tK=G 8$g3q;rb!Mb0 AMdCLIENT: 5 ame"no:"̪ 8\ 7\zI:4I v* 9-ECI_5MA@MEMORYme0VM' S50910S z-:imes oynVMs9t gy)+  s16 9 !T0ODE R760, esobgEunessl>bashB(Bou- ll)'de8KB p:bc __,^71)KS(pd Kasbah#Et ke_G% s }MS e Hl9 4by . Both<K)omQ/MIME, ks,4>tWKde& y 762 a }5rl2N2_reW#mbl?du;blueto/';5 oAcCwL|c_skip_sp\ 78Q76__ 42_ss;i$s/n4r T~4 N<3fDpay6)py_vlas [u0AQX -* >5 8> H): Lk TeG YA f 14Shirda s Pum0+ 308L d1dNMI(dog'srLPM xFDSERVERFmdpsi#MtoT Gg a8`qla2xxx NVMe-F 0 122@scsi/=_? 70S__$e_wa2 25/ 0 [#21Reg,: 1 Lvo T480. AHp -C/4  59 S@u~M (9.2).79 < .fNx_Gzinr^{ _cr ,r#edu dlpa lD ](FW)0 / DLPAR4RMSFT, 0 A #Pp-9:{onL -CQ4(*n_i&Rf,b51k[ v W$;3o1EMLB4FBÕ D Fgs&F94'' 1oZ ?Kbs=Cx gL881HtoncW$$K613XCEE *hfs:d ;*i?BIPI9:Bs_r6Yef8]p41|%yzP!Ц25'+},^!:IDNb506ua| ILuaXSVght-weC>e  LuCVf?D 2,f#alonek ua YG_$SaWEs~ G<$y ::a^^1 7ibZ-!b$y[m;*yYGp0hmFbjMseb-V-'CasK{betEM?nc ^gL_rgb_rowo rdppm1:8[btuavoidKYQ_9 ALSAUAcmMo-rwsiuEn Re-) UAF 2M-y.TMTCGNr  -to-).H©f y- zbBx #?uesthusR ` Cgps_v28reOE*c/ , )puEf 79sk~l?QgFeTz: Adderai ) -rW>u: OcirMrR|Ac+Pe(&n->_%->&p->&  606S.AN_bal;3b86< 10 ! /kipQC1kdumpK690#gpioes3X9mKphd&*+E5 9 orvs lVolT;`,Ce V7u E"k(IBMl F= 1WQETH % .^ l' _ SPRAMXrnf~spBO8YQ)OQW`{ adv"j 3a-z# (DBMS)pdsq<Y.\ s#pseloy]# 6R_CflF<"n be7# QJ`(E7186"FUSE(&l]` W_"}3V(i_idEagle/ jn3Cstop'")buhutex p,em/()_`.4i&ա ut00(-44H_21WSHTML p6Y>y2>9>'\%oU.A$cFS'Z8191Z\Z`5 LS ?^negoM]3]67] N/jE&[l$62O KP B6e 5]8˭slZURI K4& 6Js6DcrypteiJalgorm:e"edD ;+c[i\%+6gD%$C4-Clc69Sribu. l;mf ;inhS5868e Pr(ly4X # runntoy./; e2 x+r7 b.7k-sedń18PKCS#5[d7i sF@t1ssome&( Yw]hyf{u-an#oun-.n,mrE ?)$|&dNs6 #78ҲI938) * OpenJDK: missing check for slasharacters in URI-to-patonvion (8298667) (CVE-2023-2196b FJmore details about the security {ue(s),cclud imp{, a CVSS scG cknowledgmentsnd o/r relatedFmat,ftoR pagm lis,R&ences:. Bug Fix(es): /T(SAPSSSignaturleo works wi") keys viacSun: provider. HoweIt did not fullytha/Nyuld be useyOfnattemptJo do so, lead3obilof errobe"ren_customms. validswill all!Ih"luch2wheat can. (RHBZ#2188024)Samba?[ o-sourcǐܫ~ervrMess Blo^(SMB)tocol+JCommAInnet lHys]IFS;,iPC-compb1machinesSe fHpriZvarioukSvs: RC4/HMAC-MD5 NetLog1h6el weakbsh>avoyd2-38EDK (EmbedD[lopu Kit),j/`enaUEFIxpportVirtual M;pɲ<nLpA64-bHfirmwIQEMUKVM. ssl: X.400 addr typkfuiX.509 GeneralNamet0286edk2: XgEun_fimmEntryPoingn5pot*iSMMvescalMo1/57Gtim}a[oDecryp;z4304IdoufreftcX\PEM_r_bio_exD450D!-<-GfoCBIO_new_NDEF@15Addi ges:Ҥj c%T㡑eass3fAlmaLinuxp NokNfrFxRADIUSzhigh-pn lyiguraRemi Au^cDIs$icee) s,siedFcezaRoriza rTus:Uln&REAP-PWD1859)=Cro :un*1ASIMA60Ain}inary a<1<X.OrgX WindH. It s basic -la  " -fkgraphic uRfaa߽upOxorg-x11->: bufov<_GetCounStr ()xkb/.cJ5VXkbEKbdBy283ATestSwapFakeInpsnD634͇IPa veUngp -of-bo.sc~H1HvdiS0ctVo3ify֡H2HSc)nSa SetAtabuK#IProk 4IDeepCop0erCl5ȓ?1_49emey6Qc( j=PoprP DocuH F (PDF) ;_ Ilibro,aE`s as Evilpy JBIG2coumalQ 8784<Berk8yDomaiBINDf )5JDNIl E  , (na);# olz (rh ~uw \ ~;tool=vfy Zabr"lyb:w+ar#de*may[veyg e1 279 ^&oUPDATEAqu/_DoS(0EsϢDspecif?rie@PcaSaP736;P92= DP Desktop((<),depache l nse!x dp cliAcan neW'Microsoft, , xJBox dp:z`/parel` cLl] s=mt r0unini8M 8 g`/v /h3h A*zgfx#>316>fi behavi ?7?d zero8>rleng0OG9Gheap B20ˊsaG`dr% `H47Hi N7N> fs$6EbmpuXTagdIm TIF x ~}Bc 7> wg]_= cpy./_MxQ97QextCogSsShif24% /͹98goS^leSW9s S6260eSg xXRRGBATGExϲVm W;pKI4645IBb  TAG_INKNAMESFNUMBEROF$Su30774zH32~,0Z==un`=$ng[Nc g0 SEC l: NRD M nrolSjcum4(Non-Resp LAL X2z>8wikxVwalyzelcap^!3br*fCrunn}oMhu" +5ethLiInfx *oo:-cyVyle so 190@3kOl03W!,1,anysYg2p_ le_I)c/b^th/7reb289Y-ulm rUL"et,* cpu: AMD CPU)ex౺beyonddi br7hZ1-2mar"m FPUT_VSCREENINFO ioOOB Z3365]]$?ra rty_sA146V4!ULLP der>Lkvm_mmu_pcid_gvaF785 ~_pipe_^W%eO W88nVMX IBPfexinegiSpv2G'G tnf k_im$ha>%orD669m_be_algs×U /g"N fib_nh_5ch ipv4/!seb };ȨhugetlYo_ mm/) 2T{6_re![s()5 s<k->_af;do_PsQK66KIG/3 ű\v_aclLP36/dj?h0!#Q_p SguZ dueoiso$e:$\2X]#fCdev,o!_m_getQUSB-C! brcmfR-"mul%t; ;modulumge!9͔:Ad7 i"-/C/shmsymj 00973@\fwN|,9x o 060n:b4lad% ;/etc/&/redf.cT- 328f shim: 3r (&-vbootd ?/1-@2-@=H52ha"beenv%20 rstkm&:z5 (4.17.5).&695GnuTLS gnutl_ ndvan gpics)ra"mH16>2+ araog{ 4l' $ 'kfS./7KsGNU ,ioeISO 9660 CD-ROM.Riy-$:bsdK ( 0,ri9l0u'i#_%py2n-񤄦+ula%qr L $_Yl2>?ua8Lua1p)t+.VVlso)aspg8-purpot-alonekouT Q2+<=*7oTj۶c@{! ve@4?aWtW-H?1#%?aDpbm0$23<}go-md2m+rofm s)go:gexp/syb x: +417> MySQL-usM; th]B#&b\-8cq#n0* M31dae (mysqld)Sm.Gss iD4 wD.0.32 77731, >: #:/+s0e ulaC(</r *E1_O mi#TO"&ƴtorEP2dc$[9[ICDB#I60ʥ,608511ɞ(n. Ha$^7@A0_3Re %V353AU9T0BT8@T1ʩDMLNJ 28 6%T63AT4AT5AT7ATJI357*7.EnG$_AG7+SA78ATI8*T1ATGIS%N* TT @oz A,c: -n*L$ e), #wascr4UNIX n1UPdisEbutn=@de)"UV2r<:=-_in&,; %4R.NETd-s#H1+#eɣC- APIDk+l'eICLR^NewB`DOaZav;y>adU'VS(P6 118Runt=)87zdotU (s2123})"7:KeV &: pZBX PCf 933JWC.5NuGehe-P_%$*a"v7vU@CE- SvtT.gcL%)&+BT rPilT,sB?JBSr TN?X 9 Pn }-,OLVOynQyRdƱp2V^*O*a1mphL"u) :e7ary hIvaO)@z(ird-]"Ni:7@l+.te b <"329 707 7= 7 r B E'Nof#u5-vAr$$.E >ToD6Kor%>inli:.] virtag nP ntV^Cu q S?S^v Es.aa',,* 7Y_~ed Z:2p(lwAPCIZTFLi;"nup UzGE|wX;oup_V [At{KPe#YEv42ZDnPEbE~3QbDTY 1F 2$KxB: Un{ded/Ve 0E_'s XFS=3-4Hi2cx_slrE2c_xNN9N4:Ho_5g>EZ\B3/4vE ,sn17l QAT U,:- ()*6zRPL-P IOTG/ S :HJ1cs:8i:zFIm,doeytxJto2n)RCTAPT l'6j8172jBUGiwlmvmEfi@Q.MeshF672NAz*,9 B2{Gq9b?7a0a36396f2fd6368a54a020f420c8916e9b [IIFDUYNreBcs]822blk nvme/047aE753$U-nqso clus,bee)rea"Olth hours`70 [-rt]:6sk8a*e_:-8Se3\Q5o$U8Kf8 ;GeJMkJ5JY2.w~H:los!0occձ JwRe^9234wG_wd |dog+Grigge-une0ec?58i2'"u:GNSRptp4s1v "smp<:ehersBwwob7, ٩!"nohz_hN15g})%D`Kk!FSQ[al-9]P2CFJ: [REG] NYiCQCOMMIT_.$4ERR_DELAY!p!Y3r- "ev- 2: '_layFc_}_G5'" b'_{V`4g,hximum 255'74( &DcuT2rpmi'$Ee/+s/zh_CN/G/mA c-nupr.rst82hcZD:w"smCp Jus CD9.101aefc40a7fTwro>n=/tsY)_treP908Xx86_64*d|U 2ns j*BAY=Py $38 D6DO$20DJE4 E'h'Js. s: 9@bgn Vc.Oer)8@Mj"-ndEjd[<} 11g,VEnon+Sx~ZIPAn; (830*, DfznAESD DQD\qKhaJ~30531e @fbuzz:oO(n^,gthc>co{KYǥuprnO4{?dyic dump featuschecksummouldeach%ui-olvIuuX7dgSial builH(RHf1650782852.8.08*&JD[/y8u3x066xSambaLann-sourc kServMBlock (SMB)tocol{CommAInnetlHʩIFS;, whiPPC-compbl9nes[sh,)Epvlan: -of-ndr DdIeakb->cb090)Ocls_erSl_'_ve_opt()P5788QKVM: x86/mmu: gndi]#r__fa:N2-45869Nspve6rQo_prlimiJ:/P.c0[YSpr 2OT mg bl<199<.NET6n5d8\fr . ItH+sub&MC- APIssevlwi eICLRN0rsd`thaddr aZvul bil nt&ila.upd6U'VSy1100dot: RCE und c*a/3d4Kelž3r attacf l 0on ice$i818i6}2121`FLAC D FreossNAo' dec. *N laoOgg Vorbibl8 0djecnsf ťod x libr21-l| fgrO@> ;ma e2flac:Smote" ExeLU )bbitfr_{_ fun},supplycrafp>ͭ v0-9vDT Vfo Yhave  up%deda r :(5.14.0) UAFnftS P Ukup_globOtriggeref{>dnonym) >batz e@ t nf_:x HinransQlogvBrt #jNFT_MSG_NEWRULEx61x/s7dj w`poncan4exploitMcq urecf_c1 iv'x776 -T-fdueezmovipipapo_e 4004 \_qru3]a iEBA_<_CHAIN_IDd+Űy1y3īݶibyid 1Os- -Ybyteorde4 001Vse/r MSRsS3sd*um163hwqmKCrO-ProcI{ L9205bypaskdeSaerrOQ= 2e&[l 9.3 BUG] [SPR][EMFHF] ACPI:1R wakeup2[DelT2TMonFl.lWD19TBSSUTlwi'VGA/DVIype-C nglej946rtmutex: Mbibwok)uQin2_3_adj _p1 ^A\AWS ARME3 DMichif2D23H9.x ` SEV-SNP g>Lrupfrom ne bblkush_m562 /p9 rq-x ".\70hbz20`9//lN~g-suit d #64Ps[pid]/w brd392bE(FEAT] cpuf:l_p:N<HWP IO bof@az7Y- MB,AMP C~ Mayay (ad)X896XZMDRA - Uk Ge  Add5 -uy1Xl2l2 l-C#Ci#dn,79QUQnU webpM"atool= LWebP 9 p.- geassydigitahQ=sP5$ba oVP8i+$( n chq F(RIFF)wmaste7  d#bBsera to,$%ribut Ce'ly (eap%#nJ8g@ Cie/POSIX& p$Am|%m)ڢie s= dae"(nscd)TWm`ip*s&Wseqm[ cy'): &sogpgscal ;91 QSHUgdrno-a m K527Kp n_'TP8*Baih_i@1 Py8nkac @,Qgh-l,a) ydƩ^ml u}, $ed\)mphasim!n &enLy hav~ ird-p&yp: TLS^k)n0217Gho+ treP1S+PDF cu.P 4=mapdaB)_playpry'd: ltOSwinj+misermiG.fzip6664Qlob8-orMP) 0~T.,qx y_ _-_ l. >LmKllC as ll.o)w`/+9vpx! ' B G+n/ǫe 26C ,G''x Mm 2$   vp85H sbOVP9A44M aDB&-u , BSQL pis a^-My4.6 gal (2m ),4iadC+(5 (:esTp *: nmysqgfaH15HdW Osop|/_'#l_ _`1tur0a.c 2-320 _jra Z ->g! _coun == 0`dict0\2\a_ $!"ylectK4K&Yi5_luq::0K_"M9MJO CACHE:: orfiela'N9Ep_$@r0fN87NNULL-spi db_m>::_/sl e-701{2XBerkHy1ND/(BIND)2)51DN1 EM '($); a 5r&rout1 apc{"yW,~;7v@ f '  %$"I hausntrol d2yDoS 3:W:33K;/2: MSyrR JQ?,RapidJ  nxohhxy T=,f: o | me6 . 4\;h iMed 94043?I !deserizGGCORBA:33 97Hc F+PL'G@authe c"d9966d8(Axime> t s%Ope, f.jar.-S(5S&,:?iduc[;z Yg-d/*6bde3)8!>eb72mi!soJAR(07w;92rstA&6c(w"13*f/usr//jf! aE+J w ow by_%1D1D+&9de:r "p)FZip$2E[r<F>,-'u zipA貪 b)"l.1,V)GJ*Bapk/pI3q[ )%thzsT27B'-D|..`ExFV==eB37W)I\ gXD)97u=) ei3HD6se2q,7 #d|&y12432-$^32\jcmMPE, ravtj(-#!,myƘ6)*7*$B'$=''Y ,MLl1A_iVAVX217J22ITk98$*68*M*-*651)nghttp20B1t#J"!PI =*I|5hV!C3(%DtIt*4j Om{#f8'tto{P@Z7, g(*(sh$aJ)'pep5 V 44k/!2[P`Pm~*: PDLHC`eUGY$G31!EP(Embed !+ ^I` UEFI09V%MS p Pa964-b[HfirmIQE>>P[edk2=u,1GetEfiGFV#2#8+ur=,#& DxeI3V"Ha%#19-145: yJ: ߪASN=<+ idenI D6z=C3;s:ҤjV0%Tse j=R)No2wBX.OrUaVXZ,$, *+b 1c-&3af-fked$7a2&,am1up:xorg-xS; : nWOl9$U(A(FMzP3E3Vj13 :LibRaZ 15RAWobO9mera.RW/CRNEF,<DNGOs:+&h- __",+::g Li)rc/w .cppE1-4273X>i~d=8197Un `Hv[%Gm-sPerEmC257=c 1irtcW C(&nte45n,^/%cap% 'X=aRs.$-C,Gm,,V _~ed40v1(9c10)F' 7+3aKStYJgePObjLi e>,dW> fj2 n8=O fsJSON) ]WT MMrAJ@ C8utpm7!-bE1cL# reԭaf|-c,H]d7_1XmV#0-12762@wihar&netayzjJ p%3Cmtf runcoMY4uLVHuOTHPdiso4066@1IEEE C378{nchh-?cG8GCPiMbme: 5:VMS TWOPtJb=Ne 78ƱXRA 895AFb_qH"0AdvPgQTP;(AMQP)'" youdn "8 J 0-9-I- U eeals-@w9Z>Ap)fCalcv 9vWL/yt 3- 33dloUutpromp@IFg 2 :Fp*`IfoRt4,P  s boxeE7\f(1`.8Y!9 =4eGIOCLINUXIsenda/?sU \f >C:ol81'YgMe-gH NSI Q?o~v lemia,^ ϹLyS/sbcp.ceQc/}~D)YOm [gn.c:3_pcxD_rl4rf"QB8 ;ditional Changes: For detailed informa$ c% this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.Yet Anor JSON Library (YAJL) oa small event-dri (SAX-style)7parsCwrittANSI C, andCvalidng5generator. Secu=y Fix(es)* yajl: MemokY_tree_u fun (CVE-2023-33460)X;e]boutsoissue(s),[clud impact,CVSS scG cknowgms߬@at,ftoR)gms, Ady+GNU'bmicrohttpdC9that makt cyrun) HTTP (vas5t ofAapplicaÁ:m DoS27371<T{tiff paiconn$̾s fanipulTagghIm=l (TIFF) fs}: nuppointe rLZWDecode()3/_lzw.c%$WYpaClosap16Lm[Á3574heap-bd uaffrviaecrdEoadRj26965kBufOflow9uv_<:>Mprotobuf-cPvideNbin=DGoogle's P3col+[: unsignteg@oA_required_b!2-48468=Hd s% buil?blockbiesR -sv C. It]obj sy,m]1GNOME,%mloopley largutilstr0comm aucturg: GVanafhtab"Hsizep)eckis_nl9499)Wg_vX_bywap-can`keoime with so non-Yfputs2611^pe doeXcWpec'[Y>kshadow-u m7gramUNIX-sswordP, we<#V agTu' |groupcou. º:ssiyadur[d(1)QY464= Pytho + pre, a&vjy-onmmVlu, whi"sdun, clӢexcepk, y highveEyna Mtypel. supportt aԩyc Cu.Rous2n̤;rfollohave beei pd HZ upsams죯3.9 (.18). (BZ#2210783)6:rK dct tracE07-4559<Sambaopen-sourc'_NASMess BgMB) :+8CdIn0RS(CIFS;aa PC-pKmachinnre,<"C7s,(4.6190412: -of-bFda#B AUTH_CRAP 2127)@inite n mdssvc RPC icrotltt4K|Bfu L˜#2-s hscureE= tpm2-ts? 5lTruP# M(TPM) 2.0APIpy. Tť  r Ue KJdecs3 TSS2_RC_@N 274A cps-6QiL _y#wpP=killgrepn(?,Tup` mst w pwdxq:s bYf 0%:GAvahi }DNS\yDi0= MultCst#ifSZerodgurTNetv kO h= atdddooc*n7. ~ -awyouplug mJRK,no{,7ewpeopleRcB0n fDrYPa: LbyFbusy-n o /4/C-dae /so11-3i 4 rL_s_host_ sol_stwhen edo  badly-˺?>s502®bb rashedDBuI198=Whew3t.ard,defi> PEP 427M-M:arscadeni-3)rR tpocli 4089A Gscript, twAkl=ݼ s6  hpVirtuM (JVsh r^s9Ieres& a ~+ > is@&get 4cOertIEv%)QH6 In l}:saI-leEf! sűd*inct.jsap)be yDShvve5 at ' ac>ǥu:e( !um*e,àumould"on h*<` "4l/usr//jfratisow by>519]jcmolNQ, ratth-ds)*$ e8)O smbd 2iunix #(ao"096"d"\tr w-on(Tmi 9R"rpcecho" ,slee#llAD DCh0#ng,2 ئHyextp(I e-/2{CZ,:  webs)vulDap ReA)4487.NET#ed frr+subWC-sevZ,wit CLRdot: ArNPWrXD2V':-Ftp(+604$\SP\ By$ZWBlazorsX55N0sd`N r<lZvil.upd6U' 7 144. {62525w^~SQL advanc)pi )b آ (DBMudsqB68 E1array g(?z586X8$Eggi u8)K8K en 9@tits@ ^quoH Dn5ĭ39417bRole5!_Xl_ba]  Bx u ,!79GS'er8'med 5]$phB h;on;gVer1- *-br 6aa lof2 -Pj:614;6"442m1IMXFmuxer-6FzIM(Ido6centrzedOӦ:(G.zbgeth*/\udeye!ipIn_CSRFM.57-   IDD.SqlCN(MD@&P.Y4-OaX509 Cs -  a:Az,L7LDq&M >2131e80166$o43Lr'{C mpir$4+WjRSA "i n -.(: ag3 ALS%547b52b$ Gv* fieclawun t@2C'2959g -op ܣI30Ʊ21Ilog* digit#pIukeysO6976O4'1.#8"*!aōi1/or84N6p,)I+# r #COcFh2Bu392)(RPM G8Q&-S&#PD'"  s{?fJRR8` _$$TEt>2(p!.nc 4i (exa( , "RG>6ÿ 1:.""'T'#^2@40`5-7w-?.w2w2Av^@*W7r 'REFRESH MATERIALIZED VIEW CONCURRENTLY'r098unb a'desa c gISECK rEW Q9: KeyTrXC- J>emPUH)s:SoF&038{OPHLa a53 -est en +e++exhaus8s]+M3! @ody+k .22 *K: bpf:-n@r[v *O4100iIUSB:C!:s7840:xIresumeF2244Fcxl/ +,99tcYqdrkutd8_5G+wE(Ee`dj+1^a` UEFI(Aq-sd 64-bmHfirmkIQEMUKVM>edk"9B-DHCPv6;cL+T4R5054inU`J66* 89)1044UDF#1>N@RAPIDanP4P4- 6T1S25671234^_8` : Encryp3_Privileges%_sV7* %R\UN9:N8$N  Firewa $_$Njzstd:Tb run# util.c82-489"Q3PluggAuth$Y4Y!Bug fb#33630199`8.0.32 troduC regressz--set-gtid-purged=OFF (AlmaLinuxy454)tTkernel pva?IȤ3!,c=opsyom Klueto: l2cap: fnull-ptr-deբ_chan_=eZO73Wbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type eGcegl3LINK_CREATEi385igaBٲr crashPstUsafe(45020Lnfsensu^that4_fr_args.ext!CoeiU6697͢J-after-free_u be_a_link_Ĭ7675sdiv;9888;arm64: ys?m= broktLDR (Pl) suppor500xfrmB-*leakalgo dumpO OSCOUAF on_sockH25HISHisHnKVM&SIgnnCR3[4:0]loaXPDPTEs from me yš:valid[ new SA'seSlenA[SA familyrsel.ixe42 bnewild--accto_unrXVirqchip/gic-v4Oon't a VMOVPra dyVPEO9Шhci__ed_cs\25qsched/numaWpotialfinjask_8_work5'3\-of-ndritM_get_nW_keyPVeoki2.11>PKCS#,l#jTIBM CNcardsuP/4ϡ5 u '. *\}G58ephicProo withêfirmwaed)Je MAjlMFC 4#1S pLD Exp/ 2:0863 F 7E=z)AP Ai sĔFunV3VKEbr softt[ ccaed OÓhH) Slot Dgpkcssjge l Y: -U ide- nbtRlR v1.5d$cipK-Ma&n09 .NET,ana -fe+subC-sev i" LRRN0M`i.Z nvr upd6U'VSDK 7 117RunL7fdotnet$Sb9C/ YARP HTTP 2 WebS1 21392E8,03E%DL0eOffi uZ,%mmun7 veldգ-p}tsu l ktop apiqa tdHsp shee&ula edit8  rawY. raO6,visimyrrtced#en\ 3-6186e6 riou lawJIRA:PA5 AVarniCachigh-p`N a zstore"bm DZ R!sa havecrtea:@g/ , giv*(s 9gnifi t upv:/2 B?WindAky den] O8 4 un esiveca;DNS SEC:olA{wasS}Udu*orredefamios,  | stgroupPmo%fyr figutbin " rolm$-c4 :@"$ eiexit" us  IPZf8" WcouldKrCssf Gn;Bltlhost N89fi al6~(.is ?unpJdkvanipupnin,ly wA 3,g1mrquet%.d bߣ {meseWdisrup(Ll eT{ g f "/etc/,/E.d/rt f"s>en ml, "R\vwo di“nxd-re”eչC~51V+lar Om@| yexUЪO44 *H ju-1.5-jdk ?<Jw##vamEnviron*SDI+Kit>:q(E7(831#1#10n(Mlge1C1pil 83"22XXP.,.|7 cI14IW$IC24fP"ej _n__sray"7507[9"1O+h[3\lookFO57{N77+U22+ͣGRay(3 rRAW bed'digithora RW/CR 1NEF,<DNGs)<: jeap---Z2im_exj%329 t+TCg)7j#c%Ti-_se,Sp NsVk;Ident:M(IdM centr=zeuth,b:m:B(orizxQ / ud-: snd>C YE  ^Ed%gg%AIF AU,WAV. @ src/ 47au.cO'$2-33$<%zH/ . (PMI)p+m+WMPICAascQxR 'v t7O!dard fl (J)s #e~s ` pmix: r"+7k_=@ Il3"rbitaI4=Netc,Bok NBD pn+J.hY1#ks9 -lik!)' n"nbdg^ sp1zfZzS:M%)4N=ez:87a?C&hisbe(i P.!"%Uep"!`2>F RDP@: :c D,P(<),d undp*lice8xardpF'MsMicro/ ] m$xJVirtualBox .E qy,00c<' DOSz3GK=DGN8 Der\C@in9FXL1Lin* *đOOf B#W S2S)ngS{ Ss~ gdiu CLAll s=2 <<E(E:+*. ju& UEFI>~1 /p9 64-b+H!>IQEMU~XBedk2:Vh;'*>+M0)HCPv6xyEvw's3"K523#2Tcg2Mu'GptT*67LFPeIE>mu;IA_NA/TAAjl o Bj D](O}/c@`1finyp(unnȲ73Lhea e2eaJ$dN.c]Y/:$ sp heckiDHC9},-44=QHAolki;- qt5#aA-st&, mlXn)3Qtq(F >$+Rqt:E`hKTX ] F>GStsmʹy ,m+m?on* w9h e";] gVer1-pOedle1- ji TMXFI6(un o 47IAES3A!diy5y_H.2bG[er{Mk6k3P3A t %X:XTag! ]l (T)O }&vaG? 4NA<9uV"&hClT teAI _pedic`28Flc?A258VD^R7: /in - "_hae___'shƯ78]/:o'OETH_P_1588 d ^orPaPPb: _cdskb coo g6dCIFS2DeiI(V'+CEx V`(e(e^ed_0ofe56taO^ex+KK 3L%cklog&`h;G4֔tx {u!Ԛ lxsw;!m_acl_t>cI7Ki2c801<."a“nxdH di”eed~51VPa}7OmyexЪloaO44P Buga-dyndb-ldap:.tt ABI0virt APIwPterv^Cuz/:XqVr t_~edQJ*X: -by-erro +vL5fa+ByS{us4-144Knegatng_new0ngun o Y249* Y.p[ahl8-9] (JIRA:{-2:n9515)1r\Ss DU (SSS~ }Zo uthEme,e S ()!Plugg A[Modul(PAM)war# de-ҢicSAcry u6 2eI5743 hw: amd-7rai##VC'Uat iW AMD-SN-3u,L2*ffdhe*gohm+~duc60a2e5b909z.fips_wed=1 l5pwcy t s009mm/mglru:x r }egeche235B[EMR] [TBOOT OS] SUT ld;go{S3 9.2 Tbo'OS Oy n -16 runBUSYɄ6<j  te- NMIpo pE30678E0:6f:00.0; TP e g C110.NETdd-softe a>bC-Q s5 Li CLR N0p iBd`a > rFhfn{il. updU'VSDK 8.0.105Run75dot?9Dou 4w4?;i%Oenv!n ipa lA"xyA.}ousFanstt8xz@ob"ash @L Y:5md clinrute-v318K+LicOfff &!?*mun-d lddvsuY kt!,,=%)p *orsp sheepr ԣ&$ e8t)awYo . )s OOimi'bu/c# *lt((mprx1pUVzo}bit<gstm/itec@6180hW i.macromion`w&bz(389 DRFLDAPx3 (v3)"s.* sݣvLiwejA^)R %*-Y$tor%dministg-ds:7>viW> Rr-r osZ-REQiO s365)hMal@.P,_shdo_mod*lapd/)1 8i _DRub\)" 8e=,&-n/lul?ha ea& @ +Ȣ"taskfouhavepge2" r /":by (3.0).3/cgi-: .spli/ GI 1 2n ?2 3UR33 7553&464B#>S IO7280wCE6.rdoc_o!RDocEA ɖ_RP+xarchV FNp  w*,but saz#oxed z:G $6KR)B Cal:246z~{;GB6ssr ^P1S1PDF u1 Pm3s4co]+ mC'ϡE') bep 'iaPVP zZ Dri'1Py"0)%vek m,i m",W'* v(hG veyb(32l. 06Z"y=llCcaell. -Lw0@;p}@(>-v n 5p.To' a 597/Gzi8. lD13mbs   f/mlx5eV$pedbu ~Imph:i_po]152626=Blueto>/ voi mhc> )_Kt8Y%o: qd- / rI&AER x?U974Uxe2rrܡd.akb_@_fcycl73ga`f%ny_cre__on;b ___x(9BUG:hage\ul= :&16bf752f593ff84+.4.z8+3>0[HPE & ] <gz'= l p4ex6220x+/\/_de.c:51!\68DPLL-f,D71)CNB95sd:" TCto6.y764.IPSR:*4XSCTRFE] BOt`67 ?DU825#IDsw tu(Ou8!sir_ ۈ59 )]@at]VFb9%x MDD !9083MC8)4 REGRESS] Lbob): oke10+ ,s495ybnx2x* PCI/iJR432)6.0iT'6;'32O'32 O'S%GX.509 'nPOd 8fiJ80 )9,7B7A\S T_ .Js$0,)2v)8 2640j-1.- jd}0'J J1Ea *SD+KRG>3k9C?Eli &iarradex&(8321h"114Pz UTF8?B/7B31BEZ:symbo2e62He@W9WW8W (c%e-Lt05480[P200}r>;,i)ere2106e4eOC "|2D[O \O454O1L11M+N7N7N+nN2727+uZTIPC*F sembly~AP 3688e7isil3_dsaf_Kc /NQ/ge_srseL_i vÁw>hclgevf_sYmbx_msgV9vb$l#F=.IharתR3Y R62ciPj1939j6*9bysGY#_s_t/Cw `&3?vmsfuMup_kd[Aaz5MUb>UH%bi,eBO>WQ x@+~Woccu.R5poQm4_c#858)cwe.87avmh5 +rved(gFHA5Jinc97$or e)iortcIiD_Q_$_zK+c8wsk_8/q75)98S2_hmm.c:3src_pfn  6\85E:rD9Iu CncTxRa`g!r givc#!8841^ytp82sil Pif1+*;bledf9%|2oB0x2:MYHu)2paO95blk-ZdK+oB664QtpKkiK2)qt5j.KW9,lʱ*3Qt. qt.Delay2g lP!eu(r,>-6e?E (E=d 6UUEFI`%VGM50chRisڮٳ(W 64-b%HfirmIQEMUKVM:%eXC"HobF HOB OR/W2KT*a4kRPVPcUTCPm3ip St #N?_"452A4w W8PseudoRand; Ge RDz&(!KMc6$i-N)z %promp#Bll e @bJ/t-$ȩ cMA a]0^l70vA-p_Z)$ foc)oTynch *I/Ob8iWLookup *&SSRF UaU[u2480YK) [< ()Kay#ll T<tBumerhC3UQrh^,+zf3 - 8 RuaGD9 Y$pLQtfUeTfRzH*NetC(IOELoHT8[$.'Y' prhe rs+032+ggYc+Iil.c6jBmAL9jg 5 4uncIIin5_&. c_bfE7!Lbp|;`beX?en_@r_c( l_a^pFc7 cdm:+/ umho/YDsuspqXK88/GZ00ip6_`e_mp3 >8,USquC+GGn:|Mqc  uh^98MfKd30y s [9;P;sOa^r[(sO3UicmSNULL|-_ <Hbe1Obig1 @_irq(Z N^iy R90Rs#3shut_nĚCGscsiffc_l _ptpru 8Wh_so(~2rx_krI],`M25`pdhbazef($_4_þ\24]MovPIV'1 unregi9C~.c@h5QY-xgb54aYI7e5:-bec7lifeŒ`3FRADIUS`-B{l!bfigu8R5H^DaUs^(e`E, 5e0KKaI 0Ku4org /:EG: ' v$EG5a=EGF.?gCG6#$'j'spzs|zhS :RRs `st s@namc1O *ijIG(0 'kJ975JAssi othqWve`!C=n!4074848$3I, mi+JlsS: 1.>C3MBARGOEDK58bB8Nabout the security issue(s), including impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.Tkernel pv7s conta3Linux!, ofyopersyom. SFix(es): *J: phy: (-2024-26600)!netfilter: multiple flaws6808, 706535899e5fcifs:R28"wifiԄ97Ą5243-52651ä78¤27434493794122857n6igc!53!dmaengine/idxd,182,ipv6 R74159690340961avt‚CƂe!mlxsw#52Eeprom$4<ce!91ŭpֺ/x86*+864L40M602Ÿrt%coco*c seeRRDRANDZ CoCoV80tlbmi_,Nv`"r{k!i)fFP"do s_i<'z%splhiopt_aS804'-of-bosopsê8mapH[ru#in&_' f!I%usb-sD a6 alauda: C\ag iG$izM/ 6% ms/x Ÿ9!'f:b Spiedf' Nmina55Pxh](Haj TD Ѳ=0stmO!0Hemlm_'_./sɵsolvhF')lai-as-LCP,a h e6&VL #vF)T/ng_)topfn_4_^%pN)PCI/MSI si_cap(7x /WARN8x{P!_o,lA082Js-'g ro "JƕReJ t 4;2Is10@"l$y+NBrot*g g%J3KLdou'P,i13yu079,Net)^De1 NBDmpEo28#.Ihan d!)NnE nbdgrmywM|BDaS:*` d3 certif )738 ] u6in_2k +C_mirr %'t@rTB/ w4p yskb dARe 9*/&fm %&{ i1@dno-m  $3*Gv pS/KK`ha( vp &X0XfcX E f: dV0k%vma l isHa g/ o D'n1l<.&0U&8pf,ck P(&(_'`2]-, 0 V"0_ra7Y pgpiok%w w_chHed_-(yY+>Yn*f=-:i o alA l - f.a*be j JsVi cppc_WJ2 O"P5Cfs2H=0gonPN)nl0+AOGcul8Tof 0 rradvg/I/y8 -add /os//umef. ACPICA + I\ [ BARY=K. )+v,3E ,t7V2?_@\ _ J22/9nr*ReEPERM,n , xs_=l)uo j+e cups-2<`e, #\i1S(CUPS)Z=!Aw02t+%%ws Yd'UDP7ADDR_ANY:631F:n 6] o()_ : `cfGeterA` API+ p!o5qz oIPP%47+~pp[Y3kh rot&PPD` .M4 3+d-- q)_+eC- sha-wi) CLR N0o(`m@7Zj~(avail %dU'VSDK 6.0.135R9@35 doC:.IO.A(- M>DoS ve u?SLis +,ZDSAoT*.JX2@5@ ACa$o9hfIPEe4{. 890 k<2t Z HTTP/38' cG s%Dq382NHlg#FIPMI#Q - H*toR5M™,#In1ligeP&M5, (). admj?toKtoa GD#lth GiT-g ipmo@P$? -o.LAN|#HGo429349j-1.-:jdkC?J J1En:on*S#D)J+Kit'ifHeap-B O7Im2SaD7Scr2RGB F3-481P* hG832@212,ARi]AmaxHSP2#PxAPUnied^/c-N;833144SPSIm:Wr - r,Y263&111+77+}21xTee}S<#Loc" LWu_n (R) AtJpuU287Z-nR_L&GGioG@4 ,e ,upP74M%nL:)&exXchPUfn coBsteQN#:^Hv],w]o5Srm_8[le-CPU8-9[hwm [w83792d)[WSNU&ry 5el"A\3Grmp[e+sn!x82#oCKR-,P%_9!"OOB_'!_H"ITa /)DNOh2[,0*vN+ O=%fxr=t ?Ue-9]ic1#ntHnapiL95y*xfrm67&pMst_iա8[`(uS+tM--" U%_*_J&Q20_.R'ctJke c5fd}in zR\_ht_YW27KRnon+ _J2_bZ8 @@@t5i1ReDo#sH"tra$BN7@w623B<S R UYҡL YJ Xs${L2LSL1_xhw.: NatBranHi1:yv2IBHI2. -m)y.toJ[  9=A668 hre-b)S +e#mE =e1giGhorl7sbQ()TJá-57Vec * 9gaO-_(S ^ bl20^Ue,Xh3H8r?W31'w12Oi<bl9K@4:Xr4ffCtdr(!ito cyc!`62:xAkog r b Ga_h_W18up`94 !inn`ahmeta 9#ŷUSB:[ :2c-wd8["dCa4fY;5une45<~];'rt6_pA646-\AB @-K0p2hu chg<_b71infWEHnfr__5n<^eA__<_l_g LZkp|$in_XlEBR P1f i mI\< = LNJ g $gS~&'Dgt DP :8^ t a ofMma='7TagOFIFI(TIFF)\ 3: t!k7006E(EdLdZ"! A =UEFIV}BuMasn|5Lsam+64-bmHk/IQEMU rssPhCMX.509o;61FimysMaOLY1305 MACZO1 IsM. r]PowerPC,61?]Ep x! RSA@bli sR237Rs=Is072CedkTempo(/253AC?s ֤n 'Xij, senAlma RN%ZAeM<Xw Xe#>XE W2. : Security Fix(es):  * xorg-x11-server: Heap buffer oread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080).bPassiveGrabDeviceb1bUse-after-freORenderAddGlyphƮ3) For more details about the sCissue(s),Wcluding impact, a CVSS scG cknowledgm#nd o/r relahE-spac)m5urun m.pV alsoVAPIs5nag/a with/H&opr;m;NFt"؊66v j-17-jdk= J%17AEC+SNDop,Ki A:^cedc*hal5-21BBrely--igs+a]b."Klis }beD/to,R oT=Ė E2%o %year@Ir,867, 712).\ 21 +R% /dc Don'# p)AQ(reqsk_queuo^k().< 15parm64/svE,eEst'S7t 75&40Rf rKnV CIdfA'[ute x 2 MaDB HndukQ MySQLxE. , ) d "B Cr_lD/sf %dae$((mdbd?+8 X !&| /S(S 'mysqpInnoZunO ..Or)20&\1KC:VAprV421096 +:0inu_ _ms253"!!T!'*s  bKrUor=0P 3kPBypa%OQoymk(o+1diCp2718kEdb}n~"_5+4"A7.e"t8lpathvS51K&),m tPJ'138x6Mc1:keRCUAtigmp6_s2 @75?Oovl[UAF9_ry_ v:byvdput#+_upd887d<%atmiq`HUɬ200audfR!si-o:@in*_f_X2-)46Xvmx3O!al&a+Us;in'_p\(_xd377)jqlLtwencxiHp=-lt(JSON o3=lik"^. YouE8sl,m, >, thoEYDd same4Wseawk,bYeDsimi3% yGtM jq:p5lejv.c:jvp__:2333OA#SaQ(zB -Xq_fuzz_p5Sj#y_vfm9e8060)fx86/& '/AMDp7 - NUMA. 99+&.8.0)8G*(FBet[ gQ+a 07hHuTLSDl66Is9?^B 4614˚4Y0On$r  5Q(VL w%"ES((ei$[`-D..-BSA=trueeo!I6 %X/)ceh d ^I.= Lo\ HDc Nw9reKgy /h+y8 9;H+sh/behavio+en$]SolarK"ٲi"viHW@'U> .L @wi: Ĵ_].M%04, 56789101#[HTTPR8 5005t/6ZD HdefaUc/L3yWay+7. "cau;aa5iltL*t)X11y awt.RoboQ s{ake cr#c+O,duaank 4($RPM8rev ew>2PipeW>28so Đ'f6666970 .$`8384   choomi,,tas#81O $anY i1 ga#cgoGG1A5Regionos,ac 9ato)d0u?Nob| re #c$sug, bOheP l)UK -to-T Qao93ȭ "cmid-O llO&lwaykJcLp/0<}903 81^B#$?B?U!5or23&/g.c\ gnx_r(ch^437$gv*vcg;=m}d#@80-Fsunrpleg+C_GARBAGEtsvc5 as^ 80XzB $4[\rsxg DNSSECr. 8r:s{C>soG 9,[=9nux operating system. Security Fix(es): * kernel: media: uvcvideo:( double free in error path (CVE-2024-57980)Kwifi: iwllimit printed strfrom FW fi`M5-21905MRDMA/mlx5page_size variaoverflowG2091Gext4:o!ut-of-bound readܡ_xattr_inode_dec_ref_all()Z12Zavoid journalb updatinvd pmd migntryZ958Dz: ch9200WuninitiMsXaccesSu_mii_nwaystartZ8086Z/mdiobuseoti,s } 457/wSeya11 Fmtails abO the sissue(s),clud impact,CVSS s,kknowledgmso/rlaainformV, y toR?m 4,Res:. T! pw8onɤ4Lio!, ofy4Skiprs;sgtype UVC_VS_UNDEFINEDӡ9_.e_ 3104)pa/pkord72!HID: l-ish-hiy[$tp_&^m1928+_Ycclb9bcif'ggwhproYclosetimeoluntt`62Eemstick: rtsx_usb_mqslab-n'_drv20eisc/vmw_vmcanleakU_host_doRceivg%2-4978bwiZ6em asild qd890tipa R%_a _Nrypne52]tztao_z_notm7nPytho"pre4, a'vobj2-orie *mlanguq,$chemoduleexce& Yygh levdyic dl. suppofat c ClibraJell.j oundow0s 1uptoolP6 TrasVV+*IndexI4J3IDoxygenvn eTon] e browsGIHTML)/a{TuJ#LaTeX)U aKdocuu t cem ;~ eJirlyNV>9¼also bWnfigur9Fqde uctureNF Ζ KjqueP UnOd]ex0via <\> :s DOM4ipulme$d 0- 2dgcc J 4mpmrs fC, C++, Java, F(rayOi?CAda 95 GNUd? B [A  A o:gif_hash -7_$p79P 12kN C 9G292)bpfPe run D_skb_pkt_[ 86i &( R'orgllo 4-2895r(tlb: shareMbleVMA sp$ , \ n f^ 4Ybm_fvs GUP-fast racP+ dp g !se3 E l g_S12Ť rtw88['a' buffkWoc5mBlueQ thNq flushz5li2c/ ig]OzPH3%t alH fh usockL471)Ǭk|F.205etad91esA,! 2 sc 1sxgreSQLwadva#dfq+al basa(DBMS) pjsq{v e|rbit y|t871BW N4Acp: Cjjoop%a O819:gdY;< | 8Wi40MMIO - a N in1ear_hw 0 i!iwcm( workh cm_id !uvb1,"OA   cs- eempsX  n_ 46 vy Ks_* TOCTOU:xfrm@ Đ?h]9_"=technologuF: O"%%UDD,06mgudma1`a<9"O-ef k0kdpXǡKtrolmxinl3+drm/vk#t(-8 ud+d*+~%scs+pf#U/em()BIOSs33#ix-cpu-$r~Kbetwe0*y)_)_)() f+s7 cquifrGEMs&(K(449)ipv6ec<: Dyt+c->iumldѢK!5 My ltir&r, th0 A# [. IJsc*bM (my7d.clqo K:dumpspec&d'(CPU Apr 072NOmlr#N62(NSd P=)d1##U99UUDF%1;<Re %P3PC"(nVSIi#XPI-"215747DN8Ě0DInnoDB%7;0ND$$40S%Y62G709_KsA$L:0]ĝ70le3<2)Kdwc3: gadgl>ethaYvy&'ye )vV1L9ec+: un1:ed/l*4Eu]84390al'SCCB p+'>96+}mmG;@8D"orG6pp@24:BIND (Berkeleyvt/t NBDom)gmpl( DNS((4S)toc. d`a3B(Cd)olv$<CIP*re; a&rTrout8P>v*);_9=WifCP䥰is ly b:9: Mrec?^ik#exhaus}4261 ]-O-HTTsc.plej @heavy8+oms2\`nssSSL0w#n:__ 5538rbGGnmAtok43737vuASN.11s72$" OG 2123 X Plugin#M1% ͜4C$ Sma%7Wd ͣ1$: N0!>GpGCS%ZAFT%HHealMo o%C1H-3!Κ36K$6K2PS%GHw48:3+Y%r@ssw 943!?5" 2214S6 VM>52H (Priv.'[DenLfBDpę)5I0=5]NHs$O4Bk Unau)rd8+)Modif35%P4h)͢<NP`n*3;49AlmaIde:MuA(IdM; cUEeHuth,ci:An#Abora`/4ud-P6ise viron EFIPA:es46;1dadmin'?74ni7vea7PerlCQJSON vS9imgoa]\1ituond'HRacGl^Ӥ't w7IteC -XS: =X,6a Hfa7Mf840Y'/keyXo;_task_fmicZJ 8YKVM=86/hy2-vL]non-TcHPV TLB Jx35_MDecrTIDRX pee5g V6O`97F>EoGquoAPIs %" usyx " foencoQIA1%'^L arden#2ton9g~sDw0 b%L PO$pBA#semn8e>Ncu96wKALSA %-auc: VeCC3 clVrd#ripZÜ975 IRseqivDRHe EBUSYy C%3Z.NET d-soft9O:ND e+subZXC-ӢseverawiteICLRN2^r b]n(1YilQN[fdU'VSDK 8.0.cRnN:21.1dot'4DisD_ 5K%$ Fl?@ByEG37G ĉ7910hfsAxd'gnU^ren Qesh0vegrWfirmUarmyKp E _9K,asU!hlŦd21dsunrhe}&sV_tt l-&K?WK6fivYF#g9 #_d_`81 cfg80 e:p2' UW__#zecttl9@9849CL/L Nicd2g o]1j-1.-(jdk#K@OJ[ aE*SDkIop+Kit :DKPheFaZK~90Ce t62 BugySiA8.8te0)9.2hasd bufNreedjnmaj EZ. Wot, sOiw$eobyf ]Jolܥ@8.2,46fQ OnJomw's FIPSell$XblLpi&>wprTM#Kbeha +-DQ..fips=fb-77, 89717+־88OL +6Sx1617  fb a fun4 STagImaF9QF (TIFF) :l9b4M-A  AWrQ-WweH 99Uc]Msr MAC is pnxnt- 7S xQtFc]aZgwww.g*r>NVb 'B.a~db%;(,C$D$E?[BG"$oy};"MoI_+r_view-~K7(7|O!)Ivulnerability (CPU Apr 2025)VE- -30693) For more details about the securEissue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoR pagm lis,R&ences:. Tkernel pw8s conɤ4Linux!, ofyop/tsypm. SFix(es): *K: leak via transi ex@some AMD prosors4-36350)j4U7Ux86/vmscape: Add7di\al IBPB m g8403008BIND (Berkeley Intt NaFDom@)le ;UDNS ((4S<)tocols. des3serv(n3dwhichsolv$host sIP addres;@&rbrarrou-fapplic>use_enfacwith);_tool=Wifya ( ly *bind: CacIpoison;attsuniciRRsg778)Gduew{PRNG;80;R7urce@hausAmalO|KEY hl]L8677)(can: tp: fixtidCAN fr;recepraceȣ0_rcv(2-4883soc: qcomimd-db: Map sharmey as WC, not WB46689OSquashfsYanױuckmb  izeF744FvAbetweevice_inoتf()&iput]767Ťtdx:t "in-MMIO"@72rxrpc>aĢOksupI/Orea"\986io_ng:if needdule¢& ovlow flush[5006Mm_pci:ssH_class_free_de?Nbe/r vethodl2ġnhposix-cl'dtipec64n_)_650195~V>cgllsM29o/rwsSNOWAITO_DIRECT start wrx[3052[aǢurs49vir%/vKdc_queu5 G11KVM: VMX: Bu0l PT_ualizguest/:mH)hiCONFIG_BROKENj3xePXhyt]afe ag(splvve(6Advis[)s241sRDMA/rxe"sqpwars\reqG2&buafErq^lPttags 7nfs1resvc_expkey/ o8rcu_wor216NetEdoZ? dmskiG6603k-cg [CUAF@cg_unpin_onl H7cpiivmoc--of-n,R[)_(_ctlT6Tbpfnisch_g/Fh RCUav Lj1939_ses_new( skb2 unX4XryptoZ -u  laydireyY padata_do_par+eljreturn -EBUSYp*+iowqn kill2bef:ƾ70 rtcH____T uc fulZr'73jp 's is 53b/ O \8*ig/" inv gb5Jķ2332ZpvUB9 un@iGs`p_vs kd3689etfil:Z ntrampi ximumshtableC NT_MAXZ5-C48Z2Hke bulk Nairnγsa D, bfq'wakqaf_splvR3zLKT  B7B~gejr@ f urMmmswap: nchrR ze 3 cr. s EhotQlugc9c s+D i{ c2eronUc6r uffd-wpE/PU n m ap9cpfifo_ _en: D 8 etȱj->li == 0U70Xusb| i rrcKBo 6powe /xH본Jicp_opaO4:NAPIom d 3druc99papr_scdon't{ s'0'db_353v |MimaJ!@N60 l/dimVdivid4 yL DIMD \sIDœ26a1tegnT raise_m urepî4/xrVtma>BOefb D G ce( fUEFIL e Bo) T2c 8X ta-ar$ ep->rdl#8J h)=L=In&:^ap-craenp-thgh Yl4NFSD# 4_shutdown_ bFSendgs% ousA !pm72p_:_r6Y445BluetotrtKNULLup  7982wibrcm cT rXecclc_phy_iqc}! ms_nd801ûbc@de_geWoard_Ǽq=mlx5PH ODPƟdrm/xe/PTP Uk495HIhidemas Q_G{ jrtw8 1mcel_hw_scan -/ 7X`mt76925gl n_ch:_vi `ath12(x FhOPP:ex]ert void$ fu9uıtin&_[_aseto_vi acl_/ defaultmLogico]  E:greord#d?vrf:Aul3ml_l3_oWf te beuEAM_OPTION_TYPE_STRIg] Wh'<  wmpZrt3ūvxlO _vni  uoffonlo,clcpv6ip6_ads6ASoCOF[ thda-daiDAIdge_ s®?LG @T'?b ýX let.[.weightways%next_h icemed_nd 8D +holzutexm!8hE-iCc nulf_imsg_ ǶtcAdT"4 s!as urr?-dstX6ds < r]M t:, las6 U7mm/migrX i S; f."o LRUH 5pIX6, vwopcodX6TfpFfp!rl1 8Mt_mNgeneopQf onƨ20oa @headl 8 c diay 3  H814jan$ke_k&C$(B$xim LSM Sc3 & Y&A=]jsp&֤n\ 'X ,WAlma&R NoedW'k&w-ls]')c) QUNIXw fil tP,5l)4a-$usn : ' ] |o gudL/etc/low. eldrc9i4433Ezzbq a5X^,,(nraF Y; )c,oUravz !t@b7%/-m6*c18-6T ?; Id>M%IdM.{!auth,, i:m:F(orhbo'ra/)ud-baeOs: 'on xFA IPAPrlegAs"d/admi?743S;S/i&Da SSSD) s$:d'~t+motei7)Isog"1SOcNSS!PZ"g^A[M$PA0Wowar< pJ-# c$mf[t1 # ss] Kerb\/.N w*&AD-jo#di/ 115 ?tiW0a 4/0TagggImF*F (TIFF):ob4 UA-) VE78)AW>-WhWher:0Xl_5XPer Xs un W2 xorgqm+:aXP-V_$&05-62 -XwX &valRv2ƫVKRSetComM&H1 .Orgwn-9)7X WP b c l l3la|sf-fe aph` aQi&up x> 99s9 999N9y9c'9}3< o 3L\ yli' Si5gn-On sSAML٢2ifaP {aw'a fe-cycl(e T!N _eZ3 -#id_rm72cfg+" cm/$3=e1000eDp _eepJ)%N. u'C91CC_)tY2sk(sk)->fa@ _rs*69,MGMTHK=sB.'s?&i'u/vt-Dis| O6%iScoh wal"(40058Xlj(ptrTxau/0F]W.B2 NETDEV_UNREGISTER+$*>2f'/f< WffoMu+V W$9BU_>PAW13499*Slz-at*$S7,ke "2+h?"CAP_SYS_ADMINr. 3n<$m f v5(ab$E cript)m6$ty"wai;p)8D8)i if*_p&)2, LPydnQ5e4, acF, ob.-nRm3XmT,0exK y7:dy^ic/"4'l. sup& BeZyH*,$.v: w< Scp")"Ef C kD"(EOC9L ocz%3$.-)_g:.1f]IE0OSSL nA KeJt9-19cNPNwV%'? ̥HTMLParNd&clex 6C _Qʦis...*vYs"3r=8d temp2'+ACPI`,t)?5".z3[H60sM/M-JKcocc/inAk->L202@:$7-_ d3|:I3E?6L4pr4show92KG 9 E_p_H_no_fšN1LS&.-aQA?oL %eExWyMbo7 m9.)&d-)4wNT Ia9&XC-'seveHi*LRZaaN2veQ bw ]nav&. upd9U'VSDK 9.0.104RMU3.dot:D)E&$nIn?*r. A MRS2OB0JEnh :(TBZ#2^7z.8143Un] 5r C" http@ok-$Q7592Wj-1.-UjdM#6J J1E!3*SDBop+Kit @:K)FLSnV15F7ImmpiRA50S:@/D%98717+21 +dL9o_Pu:adsIab7?50g c* C3 (/POS?ep),AmD%m)ۢi- s9$[f#nscd#by*r s Wi l ^ #Pc3i;0/:;RaGNU-L ,'s r+(03Q:389!"e.7 LDAP 3 (v3) ,Sgj%{%~- ?jV!P!^)R;P-kLB% =ist- -ds6-U'ueAC '>f948%+URL p+eure b+e?2B93B*BE p ( dGoo{7 W .3+ enaP>d? 8,/yeT 3Ra ?x,8"MFomHF !ā : m6 a䲿FT2-19o?>B-x11-_ : # n'7s:2H0q96i4rSB-r3gcso_65RBS>%T.Tq1HPMSdETsK0KnicReJY5.YOqUPCCe0Barr`CfX8XBCoTOfKeyM7MH:K`HCSymsGN/Xo?rg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s),Ucluding impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,toR pagm lis,R&ences:. Addi al Changes:֤n c'XiseasseejAlmaLinuxR Not/linkMfromΑ X is Xrvfounn;X cli undW2StFix(es) * xorg-x11-P: tig nc: heap-bd bprivge escalvulnerabilh4-9632)lX.O^: Use-after-fr%ofroot s[4GFSyncInitTrig601HPlaydEv]K0KuJalizHpointIi/ompRedirWindowJ9YOut-of-Qnds wףCrePaBarrierCX8XTypesOfKeyM7MH?KWCSymsG6%ە_Tgstemer1 p alconn+CmaO*work, Ggraphsfilhich op;te" _Sr_kable73-4675V UX{ E H0j6952YAr CExtht xtctx erro163Msojq6 &voiEXnumbe, 8007ZtpT dkvoc"elog/acpi^ H5Hrtpcf85063:Sx OOBPCF$ NVMEMZ69Znvme-tcpU_,_,_du192Tsi_ibfLF_UBSAN shifXSarRih._x5how_nicf93?Yelpm h browse`GNOMEsktop -ignZt5you9 a 871 yao> cralFolra m#s fo a|te DocBook y" 155Avahi= i$ exDNSd DiyMulticast#\ f<; ZConfigu Net/facl * n dd/an7. ~ -awlzwvtlug^u aRK n ,ewB eopl 0A ] fish YP a:W-ArPrct k IDQR261ȵ : NPDL :@mpr i~s78Q.NET6d-8i+subsetC-severKwit9 CLRN2 _fbadd]nil|upd9U'VSDK 8.0.116Rume6.Fdot:4=VisuSto oofV 46F9-0F5Eg@v k: KeepWbinl deGu| 7Mdm-fla_ 8 o _bbyt0A#t 6b.pp5 dd' eckskb '_@_txmungT 7749)8 ss[+R"le Wacregmaxhunt4Ge$#&#$-q d1' a le1-( / &: H%c#R38CgUG) FG)gru_p_'_0ob2-34[5: RCU_g__7VCacc-lor storesO=i  \s n'tP vrX*aQ @ogX, gA +(s'1peup Jv:*ques6mugoI4790ggsmxownhip__udp_62 v+: ece.ly tG,A0Axskaxp___as[_uXgen nggH20H4I,whs T dot - 8Hw: ?12v*.d? "_d_Vcap_n@b943g&)st{ar)' (/POSIX zp),Am%m)ۢincodae(nscd)&mps &o߾W&qż#no.un ly /:t?s~&idK dl) inO$ar LD_LIBRARY_PATHV80g7g7!G = 0399X766g et. bnx0es+jmb-xdp-pass c *) 61BT,tooOL2CAPs3-u"7Rfi 2se cmd] D C"T cfg11:Pcwiphy_efrcS7ŲUUAF_giny >md ;Z\-l laX f4ݡ[i'uJ*9'faaQ<*up C-@CC./ X /&Exk%AnimzCuCZ9d)'/Bigst6(tUnB ' o DuBy&I {80ud91.1,Awas oFin6b."6Pyn"rRub -:EbP5My4 jm~d':-j llr3e=imj O"Z 136+HID:to`t<;$mt;D_*up39_<auBQin _nre_dl_X4Vmm/+-f dVM_BUG_ONX"GE(PKRso())7%unppktp:>NUL<6r%unkA%D6iIi 2stgreFadvpbj%-qigL(DBMS) jsqCREATE STATISTICS^5 ma+\J4281'] q=(s },wdar7U9fig(T2 9FIG ((x@)9PIC ;e?t<(LaTeXn&exa,0:(TM)LiMt2,O:re s(i.e.EyO:B:v tyb).7 h?fna,a2ݪ cer -^:0sZ=TMm pu63*JN$MCool pow/uNowAHotSpOJVMshah%3 enVs ef7,ysisve-23FlMeKMn?inncoLLYYzr1W ` [lyOlof=w&d 7lz4-ji: I@tKGsuE U3Clea% 665'7' drm/x7 M8a-fO safe 0 8700 -$l2/Fd=v fy_TO, /ire_ &vmwgfx* em r &22~SVGA_CMD_MAX_DATASIZE 7/usbhwcGFj r.GP Nt+_ /S2\_ ESU8oep "'&53_ma 'osd_DA? \2D-17-\jdk3WL{,?*E+SDa,Ki n#Ame JMXn6{21HgPkS5E==Enhz5CyenJh64t n2}/PNGB6:Z031X850 Bug%Wz & P11SecVK |C#5n3#\(iIPS mPKCS11 ould KR_ATTRIBUTE_VALUE_INID ahas!e&c_Gj 4'KA_ENCRYPT=* ibutH>IiU -8xe"R. ($-142862, 81#34567 2r`^^+^076789( ..48/*.36678.7123,S5 5+5peG'R,t0%bloC3D#^$VC,<-Wd0loop!7),n le)^uC#T'tRK 9#p+g_1peZ_ip'Y:qCmfr@&z*1brze[\E3fMEj7vm_pN_ioctl5 O%F73ьNo=pAHK2\8\mp\2_2:4OĬAr; MGMTc es{>atla5 ?)U+RX830dh12084af  net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (CVE-2025-38568) * kernel: ASoC: Int bytcr_rt5640: Fiinvalid quirk put mappW40154Wdevlink: rate: Unset poior&_"_nodes_troy[251) For more3tails abothe secuy issue(s),[clud impact, a CVSS scG cknowledgmsnd o/r reldFformation,ftoRgm lis,R&ences:. Tutil-ux p{p6_xmit83=BluetNISOpoIbUAF so_ _9N41ه0Ɖ5WzUi_mdiN+ e2.Å271Ѕ ALSAari3 g clo@HÈ6hci_syncrcmdqueue_onW318*ttb_hw_qte shif%_6mw_3- 32smWu__pnDf _d_n#I06 OfbIB ,[30ӗI*wRglyphNFSv4/p/ _INO_LAYOUTCOMMITqnfs_mark_lay}_stid_g6834svcrdma rc_ofemcpy K81nvme-tc NULLder2*ucp_build_pdu_ica 299EDK (Embedd)Dopv Kit)5aenaEFI) ME;ihLsa  64-b. HfirmwWIQEMUKVM f ss&RFC 3211 KEKwrc )92gcvSt{ar (/POSIX&7p),Ah%m)ۢi,qcdaem nscd)d multi Ps% ZWi$nnotu ly /gg[gE 086iPWzero-u wo{ryV9 O%dexp wiWRDE_REUSEyAPPENDy r rn6 edobl8MUNGE (UR'N' GEmpumn thcucdis ebely Mii HPC -seuironKx_xPUIDG DMABy group1hsvomd&d+lm fia ar cryptphG.t Qwues>Uroog s;*frjpb-specifhod B:2mg@aȪSg25506)V _p+  _ ycles _r 3812s KDou[exFAT 382-285:global<8