SOLV N0dnf1.01.2xy܀y'QnmT}fX)x86_64noarchcvebugzilla2.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7i6863finalpackager@almalinux.orgrhsaself1kernel-abi-stablelistsModeratekernel-coredebug -core modules-extramodules-extratools -libs2.9.4-6.el9_47-4.el9_7.1kernel-debug-modules-core uki-virtmodules-coreuki-virtCopyright 2025 AlmaLinux OS4.17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.1kernel-uki-virt-addonsCopyright 2024 AlmaLinux OSImportant5.14.0-70.17.1.el9_0 22.1.el9_0Copyright 2023 AlmaLinux OSpython3-libsbpftoolpython3-perf5.14.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_54.16.4-101.el9 3.el9_15.14.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_2427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 5.1.el9_7libcurl-minimal5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_170.26.1.el9_0 30.1.el9_0openssl-libs2.37.4-21.el9_71:2.06-27.el9_0.7.alma46.el9_1.3.alma70.el9_3.2.alma.194.el9_5.alma.1252-32.el9_4.alma.155.el9_7.7.alma.1libxml211.5.0-5.el9_5.alma.1python31:1.48.10-2.el9_5.alma.1 5.el9_54.16.1.3-27.el9_31:2.06-104.el9_6.alma.114.el9_7.alma.177.el9.alma.1250-12.el9_1.1 31.19.1-24.el9_120.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_6Copyright 2022 AlmaLinux OSexpatkrb5-libspkinitserver -ldaplibkadm5gnutlscurl-minimalps-libsglibc-gconv-extralibnslsmbclientwbclientpython3-sambasamba-client-libsommon-libslibswinbind-modules7.76.1-14.el9_0.5Lowopenssl1.46.5-3.el9libsshpam7.76.1-19.el9 _1.1223.el9 _2.1246.el9 _3.239.el9_4.135.el9_7.3python3-libxml2grub2-commonefi-aa64-modules x64-modulespc-modulesvim-filesystem1.29.33.1-2.el9_2.alma.13.90.0-6.el9_31:3.0.1-41.el9_02:8.2.2637-16.el9_0.233.21.0-9.el9_3.alma.1glib2libarchivenetapisamba-dc-libsqlite-libsystemd-containerlibs18.168.6.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4:1.12.20-7.el9_12.12.5.2-1.el9311.2-1.el9_423.1-1.el9_5krb5-workstationsamba-commonCopyright 2026 AlmaLinux OS8.7p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.1grub2-efi-x64 -cdbootpctools -efi xtra minimalopenssh-clientskeycatservervim-minimal0.8.7-20.el97.el9_0.112:4.4.2-17.b1.el9 8.b1.el93.5.3-2.el9_0avahi-libsc-areslibnghttp2ssh-configua-libsopensc0.8-15.el920.el92.el9_66.2-10.20210508.el9glibc-all-langpackscommonlangpack-aafgrkmnprstyczbemrghboinorxsyncaehrkbmnrhsbvydaeoisbvzelnostufafilorurygadezluvhakeifnersbtuyiadgkstujakabklmnoksuwylbgijnotvzhmagifeghriqjwklniwrstynanbdsehniulnrsoocmrspaplstquzrajouwsahtcdegshnsidklmoqrstvwzltacyegheigklnopirstugknmrzveiwaeloxhyiouewzhuminimal-langpacknscdsamba-common-toolswinbind20230310-135.el9_2.alma.1814-140.el9_340603-143.1.el9_4905-143.3.el9_4grub2-ppc64le-modulesiwl100-firmware0-firmware5-firmware35-firmware2000-firmware30-firmware3160-firmware5000-firmware150-firmware6000g2a-firmware b-firmware50-firmware7260-firmwarelibertas-sd8787-firmwarenux-firmware-whencenetronome-firmwaresystemd-rpm-macros1.0.8-10.el9_5:3.0.1-43.el9_0 7.el9_17-16.el9_225.el9_3 7.el9 8.el9_46.el9_22.2-6.el9_5.15.1-4.el9_77.el9_72.2.10-12.el9_0.235.2-42.el967.el9_7.19.13-10.el9_61.el9_62.el9_64.el9_73.el9_1 2.15.el9_36.el9_4 5.12:4.9-15.el98.el93.9.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_75.2.5-8.el9_039-16.el972-2.el9NetworkManager-libnmbinutilsdbus-libsevice-mapper-multipath-libsharfbuzzlibipa_hbacksbasss_certmapidmapnss_idmapsimpleifptasn1repokey:type:idshadow-utils-subidssd-client0.10.4-11.el93.el95.el9_677.el9_73.3.17-13.el9python3-samba-dcsamba-dcerpcldb-ldap-modulestoolsusersharesystemd-oomdpamresolvedudevpython3-requestssetuptools-wheelurllib315.6-1.el9.alma3.9.10-3.el9_0device-mapper-multipathlessrsyncsudo0.23.0-2.el93.el9_34.el9_34.1-3.el9_21.0.9-9.el9_710.0-11.el97.1-5.el9_2.19.1-1.el92.el9_43.3-0.el913.el943.0-5.el9_2.1 3.1 4.35.1-19.el921.el9_52.el9_55.el9_66.el9_65.el9_06.el9_16-17.el9_6.28-6.el9_4.alma.1:2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.26.2.0-13.el92.10.4-9.el94.9-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_6 7.168.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el9:1.6.37-12.el9_7.18.2.2637-20.el9_1 1.el9 2.el9_6.1 3.el9_73.2.2-2.el934.1-6.el9_17.el9_38.el9_69.el9_75.3-4.el95.el9_66.el9_67.6-12.el9_08.el9_123.el9_3.348.3-4.el9_46.el9 _6.24.16.0-8.el9_19.el95.14.0-611.9.1.el9_74.2-4.el9_0.34-2.el9_13.el967.1-10.el9_6bluez-libszip2-libse2fsprogs-libsfile-libsreetypegmpjqlibatomicblkidrotlicapom_erreconffdiskgccryptfortranompiculdbmountndppngquadmathsmartcolsstdc++tirpcuuidncurses-libsopencryptoki-libsprocps-ngtobuf-cython3-ldbrepokey:type:strpm-build-libslibssign-libstpm2-tssxz-libs1:25.30.13.0-135.el9_2.alma.140.el9_33.1.el9_43.el9_42.24.0-2.el9_5.alma.153.0.0-10.el9_1.12.el9_4.13.el9_6.1NetworkManager-adslbluetoothconfig-serverinitscripts-updownteamuiwifiwanbinutils-goldubblewrapcockpit-bridgedocsystemwsdbus-commontoolshcp-clientommonrelayservergnupg2iputilskernel-cross-headersdebug-devel-matched vel -matchedocheaderstools-libs-develpartxlibsss_autofssudomicrocode_ctlperfython3-cryptographylibipa_hbac sss_nss_idmapsss -murmur dconfigrhel-net-naming-sysattrsshadow-utilsim-x64ssd-adcommon -pacdbusipakcmrb5 -commonldapnfs-idmappasskeyolkit-rulesroxytoolswinbind-idmaptarvim-X11commonenhanced0.4.1-7.el9_4.alma.18.el9_58.7-12.el9_1.11.2.11-32.el9_02-1.el92.el98.10-2.el9.alma9.5p2-10.el9_36.17.el9_1.15.8-4.el9_3.alma.1:2.10-5.el93.3-7.el9_2.12.2.10-12.el9_0.33.3-2.el9_05.el9_70210202-11.el9_6.138-5.1.el9_0:1.34-6.el9_19.el9_73.18.0-7.el92.3-18.el920.el9_5.15-3.el96.0.1-4.el95.el9_6:2.1.0-18.el94.35.0-6.el9_34-10.git1.el95.1.8-6.el9_12-4.el96.1-6.el990-2.el9_23.el9_34.el9_47.0.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_23.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_44.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_5bashluezsdtarzip2dbus-brokermidecodee2fsprogsxfatprogspat-develfilewupdiptraf-ngldb-toolsibarchive-develcurl-develdnf-plugin-subscription-managerogrotatenanocursessprs-softokn -freeblysinitutilopencryptoki -icsftok swtokssl-develperlpython3-cloud-whatrpmsubscription-manager-rhsmrepokey:type:flexarraypm-plugin-audit selinuxsignshim-unsigned-x64quashfs-toolsubscription-manager-plugin-ostreetpm2-toolsracerouteutil-linux -core userwpa_supplicantxzzlib1.26.5-3.el9_3.15.el9_4.16.el9_7.1:39.31.5.1-135.el9_2.alma.1 40.el9_33.1.el9_43.el9_42.10-7.el9_4.125.1-10.el9_67.el9_29.el96.1-3.el91.2.3-7.el939.31.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_441.28.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4:20240910-1.el9_550211-1.el9_68.24.2.2-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_483.5.1_1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4ncurses-baseprocps-ng-i18nython3-dnsidnapip-wheeltuned-profiles-cpu-partitioningpatch:ALSA-2022:49405099242495294260031572246028108385470901852883148239826791931784053618459340053936373:02823334567894036267529465123478911414707013212745897887502192332708264550355995722354325479504774125697088385061897145362763838658793566152131254359617798594897057445677478794:0310463456853379081196610244743849398312509304862395306928799032394641033784756638350412770167975833063950113619842364078312494575836367746992853635293492861623635646456775483997748481624466179317253137140145132343049687045416055:00593247757892510136379407585699837114041186199220834475196274633042865060296241304205011999429661700408746116398598807377558742608275819409930205183259936435541255926217537640566086532413423480362779867353193742446977903704395064776742337404903814233364355908030243012526877809786:006723831244571993936108714335047386179132042212786repokey:type:relidarray numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatusxxyyzzqqBBWWRRQQXXTTUU11SS]]22LL<<GGHttuuH!!  V}}WWV//MONQQRRPPMNO/ /jj/``llffggjjiikkhhff L u t } OO>>   YY;;kk00| ||==NNMM&&,,++) )''' + * *)& ( (LL, (*) ) FF)   0   !!  ! @@ NNKKMMJJ# ##   \\  >>HHJJ QQR RR1133Q P P4422P ??O OO::""" ww$$##!!""DDN N//00--MM,,..M Noommnnppyyy << bbIIXXccZZ" ""?? ]]00PPJJ7755==%%""LLtt--zz//ss))TTKK11  __\\xxBB  $ $>>;;    ,,,,yy@@''==kk''44))bbVV22NN22""%%00@@XX11DD##SS$$**uu  RRWWKK::hh++77>>GGppOOii++HH&&  vvdd%%``AA[[99..  ^^{{IIll??ffwwMMaarrZZ  33**}}<<oo::88EE  --% $II((  GGFFQQ66CC!!8844;;55AAnn<<qq66# ..((EEJJ  ||mmeeccCC  UUBBjjHH$$##??//YYFF##!!99&&gg~~33DDzzz } }} AA^^((( KKK ee$ $$1 11   . ..LL% %%''' x xw wwx__--]]YY^^, ,+ +- \\,+222 **& &&UUTTSSaaAAee  CC ii% %``iiggbb!!hhttoo! rruu  kk  jj__ppmm [[vvssZZllnnqq%aa GGCCDD BB@@::??88 99==>> ;; ddKK==      " "   " PPEE hhgg   $$ff   $  {H|H}H~HHHHHDHrrrr-- - -- - - ------V-------------- -!-"-#-$-%-&-'-(-)-*-+-,---.-/v0v1v2v3v4v}I~IIIIIDI{I|I%.&...V. . .!.".+.,.#.$.. . ........'.(.......... . .).*...-...5-6-7-8-9-:-;-<-=->-?G@GAGBGCGDGEGFG #$%&'()*+-./056789:;<=>@CDFGHIKLMNOPRSUVWXYZ[\]^_acdefghjmnopqtvy{|}~      LFMFNFOFPGIFJFKFQFHFRF            " $ & ' ) * , . / 1 2 3 4 5 6 9 : ; = > ? @ A D E F G H J L M N O P Q R S U V W X Y Z [ \ ^ _ ` d e f g h i j k l m n o p s t u v w x y z { | } ~                                ! " # $ % & ' ( ) * + , - . 0 )<*<1 2 3 5 7 8 : ; < = > ? @ A B C D E F G H I J K L M N P Q R S T U W X Y Z [ \ ] ^ _ STUVWX9Y9Z[\]^_`abcBASdefgCh9i9@jrkvl-m-nGo p q r +{,{){*{{{ { {{'{({{{!{"{%{&{{ {-{.{{{ {{sztzuzvRwRxR!yszs{s|s}s~ss"EgFg@gAgng~~'|(|%|&|+|,|)|*||| | |||-|.| ||||| ||!|"|::::zzz zzz)z*z!z"zz zz-z.z'z(zzz+z,z%z&z z z  83936373m3l3=3>3;3<3 = = ====]================ =!="=#=$=%=&Y'Y(Y)Y*Y+Y,Y-Y,.]/]0]12030405060708090:0;0<0=k>k?kLt@tAtBtCtDtEt1FG2HHIHJH3~}}41KLMNOPQRSTUVWXYZ[\]=4>484946474m4l4;4<4vv'v(vv vvv%v&v)v*vvv vvv+v,v-v.v!v"v v v^W_W`WaWIWbWcWdWefghiejklmnopqrstuj^^^vywyxyyyzy{s|s}s~?vSwSxSA`abc@deZ[ASfgCB^_\]BnhAhEhFh@hw w ww w%w&www-w.w!w"www)w*w+w,w ww'w(www7565E1ihlmqropjkefugnestmmDmJu{t{s{x xxx+x,x'x(x!x"x)x*xx xx%x&xxx-x.x x xxx6575m5l595=5>585;5<5yy-y.y'y(yyy+y,yyy)y*y!y"y yy%y&yyy y y y#>>>>>> >>>>>>>>> >>>!>">$>>%>>]>> > >?? ? ?%?&?+?,??????!?"???'?(?)?*? ??-?.? ? ? ? ?? ?{r|r~rryrzr}rQm676=6>6l6966686;6<6 LuBuCuDuEu@uAuT&&&&]&&&&&&& &&&&&&&&&&&&&&&&&%&&&&&#&&& & & &&!&"&$&&@mAmnmEmFmkw0w/wSNOPVQRWXZU[LYTKM_ _!_"_#_$_%_&_=7>76777;7<78797m7l7'E(E)E1niAi@iEiFi'@(@@ @+@,@@@ @@!@"@%@&@@@ @ @)@*@ @ @  @@-@.@@ @ @@@*+`'' ''''''''''''''''''''!'"'$' '''''''''''' ' ']'#'''%',B-B.Bbvzwzyzzzxz5u=8>8l89888m878;8<868)A*AAA!A"AAA AA%A&A'A(AA A A A-A.A A AAA!! A A+A,AAAA` `!`"`#`$`%`&`bXcX`XaXIX^X_XdX/E0E1E2E3E4E5E6E7E8Ei9V:V;V<=kZ0^S[\XSdO]SVSWSTyYScO`0UoaObO_}l)B*BBBB B BBBBBB!B"B%B&B B B"" B B-B.BBB B BB'B(B+B,B>_?_@_A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] 1;9<9l999896979=9>9m9^J_J`Jra?b?c?sdsesfsgshsWTbPdPUpcPYT[VTTzZ1]T^TXTaP_~`1\u;W:W9WijwkIlImIxnfofpfqrstuz)F(F'Fv&w&{&x&1y\z\{\!("( ((#((((( ( (((((((((((((($( ((((((((((((((((%((](6:7:l:9:;:<:m:=:>:8:|r}r~rx VPZUKLMNTQRYOWXS[++ ++~~ ~ ~ ~ ~))))))))))))))))))))%)))))) )))))) ) ))) ))])!)")#)$));;<;6;7;=;>;l;9;m;8;^K_K`K y{z{v{w{x{c@b@a@ EjFjnjAj@j                   8l {t|t}t1AB^_fg@SC\]Z[de`abc s|t|u|\]aAbAcA  O!O"O!4"44 4 4 4 4#4$444'4(4-4.411%4&4444444 44 4 4+4,44 4)4*444#5$522-5.5+5,5 5 555!5"55555 55)5*55 5 5 5 5%5&555'5(55 51"N!N Nl<9<8<;<<<6<7<m<=<><a a!a"a#a$a%a&a633'6(666 6 666!6"6%6&6)6*6#6$6+6,6 666 6 6 6-6.66666 6 6%J&J'J(J)J*J+J,J-J ``j`*+! s}t}u}hi# C CCCCCC C C C C C C-C.C%C&C)C*C'C(CCC CC!C"CCC+C,C##./% =j>j?j    01(  M!M"MnkAk@kEkFkC b c f g d e \ ] ^ _ ` a B A @ Z [ + dnfqrjkupghiostelme23- x'w'{'v'456789:0 u~t~s~c;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxy|z|x|w|v|DDDDDD D)D*D$$ DD+D,D!D"DDD%D&D D D'D(DDD D D-D.D D D!E"E%E&E E EEEEEE-E.E+E,E EE E E'E(EEEEE E EE E)E*E%%[\ 45RSSTEF56}~78stghef"#PQ56cdABYZVW34qr./uv#$qrabGHFGuv_`mnstUV/0!"kl/067?@klyzOP_`\];<]^%&IJ=>12}~UVNOefEF+,GHop78CDYZWX23 !JK  MNopIJ!")*XY&'{|'(QR>?HI  +,CDKL9:#$MN  gh01MN)* 9:ijOP-.ijTU%&Z[<=*+mnabST-.]^@AQR$%st{|EF'(?@{|uv}~ wxLMOPopqrGHgh_`UVcd  mn12BC  8934DECDijQRyzIJ[\()KL:;WX]^cdWX STefYZyz[\;<,-KLab ABwxwx=>AB  kl`L_L^L7 *+8  F FF F%F&F)F*F FF F F-F.F&& F FFFFFFF!F"F'F(FF+F,FFF)G(G'GFZyZzZ{Z|ZEZ}Z~Zs< 1%b&b!b"b#b$bb b G GGG G GGG GGG GGG''+G,G G G-G.G!G"G%G&GG)G*G'G(GGGc c#c$c%c&c!c"cHH%H&H H HH-H.HHH+H,H'H(H H HH H(( HH)H*H!H"HHH H HHHUUUB YU_Z2^U\dQT{WUVUaQUqbQ]U[ `2cQXUC 9X:X;X    1 'I(I-I.I!I"III)I*I I I I IIIIII III I I+I,I II))I%I&I J J**)J*J+J,JJ J J JJJ J JJJ!J"JJJ-J.JJ JJ%J&JJJ'J(Jl=9=m=7=8=;=<===>=6=6676I -K.K'K(K KKK K K)K*KKKK K K K+K,KKK!K"K K KKKKK++%K&K8mK 1     VPWXQRZUYOSNKLT[M{{ngogpg%L&L L L!L"L LL+L,L L L'L(L)L*L,,LLL LLL-L.LLLL L LLLjaaanlAlElFl@l+M,M M M-M.MMM%M&MM MMM MMMMMM M M)M*M'M(M-- M M!M"MM]VXVVV`3UrZ3[ cR\YV_aR^VdRbRT|WVT NN NN)N*N+N,NN NNN..!N"N N N'N(N%N&N N NNNNNN-N.N N N  1    OO)O*OO OOOOOO O OOO-O.O O O%O&O!O"O O O+O,O//'O(OOO<;     }[~[y[z[{[|[F[E[VPTUYRSNOKLQM[ZWXEnFn@nAnnn1     \] DDDDnnn wa b  c ||1     9Y:Y;YMN[LSYROPQVKZUWXTbbjb 3 3#3$3)3*3 3 3333 3!3"3%3&3 3300'3(333 3 3-3.333333+3,37 7744 7 7 7 7)7*7-7.777!7"7'7(777+7,777 7 7%7&777 77#7$7                 < ;    8 8 88%8&8'8(8 8 8!8"88888888+8,8 8 8-8.85588#8$8)8*88 8!f"f#f$f%f1XXXX#X$X-X.XX XXX!X"XX X X'X(X X XXX XX%X&X X X+X,X7767q &T'T(Tr xuwuyuzuvuY Y!Y"Y Y YYY Y Y#Y$Y YYYY'Y(Y-Y.YYYYY%Y&Y+Y,YY Y Yphohnh#Z$Z'Z(ZZZ+Z,Z!Z"Z-Z.ZZ ZZ Z Z Z ZZZ Z ZZZZZ ZZ%Z&Z-[.[#[$[[[[!["[[[ [ [[[ [[+[,[[ [[[ [ [ [ ['[([%[&[}u|u{u)*+vvwvxvyvzv5t99+9,9996699 9 9)9*9 9 9%9&9#9$9 9 999 99-9.9'9(9!9"99 99\\#\$\\\\\ \ \\\ \\+\,\\ \-\.\%\&\'\(\!\"\ \ \\ \ \noAoEoFo@oywzwxwwwvw,-./0123456789:;<=y}z}v}w}x}]]]] ]]+],]] ] ] ] ]#]$]%]&]]]'](]] ]!]"]]]-].] ] ] ^ ^^^-^.^+^,^%^&^ ^ ^^ ^#^$^ ^ ^^^'^(^^^^!^"^ ^^^^/y0yky-_._#_$_'_(_ _ _ _ _____!_"____ _ __+_,_%_&_ _ ____ ` ```!`"`+`,` ` `````'`(`%`&``` ```#`$` ` `-`.`` `1 Q!Q"Qa a!a"aa-a.aaa a aaaaa#a$a%a&a+a,a a a'a(a a a aaaabb-b.bbb#b$b b bbb b b bb'b(b b bb b!b"b+b,bbb%b&bb;Z:Z9Z#c$c c cccccc'c(c%c&cccc c!c"c c c cccc+c,c-c.c c cij uts+d,d d ddd d dd d dd#d$d d ddd%d&dddd!d"d-d.d'd(ddd):*:#:$:+:,::77 ::%:&:::':(::: : : : ::: : :-:.:: :::!:":eeeee#e$e e e%e&e e e'e(ee e!e"e ee+e,eee e e-e.eee f f#f$f f f%f&f-f.f ffff'f(fffff!f"f f fff+f,ff ff> ? ppDpg g g g%g&g gg g gggg#g$g g g+g,g'g(g-g.ggggg!g"gggx(w({(v( h hhhhh h h+h,hh h#h$h%h&h hh h h'h(hhh-h.hhhh!h"h!i"iii#i$i i i-i.i%i&iiiii i i'i(i iii i i iiii+i,i!j"jj j-j.j jj+j,j j jjjj j j%j&jjj j j#j$jjjjj'j(jss#s$ss s ss sssss%s&s ss's(s s s!s"s-s.s s sss+s,sA f g B @ ^ _ ` a \ ] C b c Z [ d e  qruts }v|v{vx)w){)v)qqDqC D P Q m n V W R S K L ] ^ v w t > o p ? @ q Z a b A B [ \ e f c X < i j ; E F _ ` c d G H g h O M N I J r s T U = k l x Y u @pApEpFpnp jeeevxwxxxyxzxkkkkk kk'k(k k k+k,kkk-k.kkk kk k k#k$k%k&k k k!k"kupihlmoefnegdjkqrst%l&l l l'l(llllll#l$lll!l"l lll l-l.lll l l+l,l l l#m$m mmmm%m&mmm!m"m m mmm m mm m mm m+m,m-m.mmm'm(m1gthtftetdt#e$e%e&e!e"ee ex*w*{*v*;; ; ; ; ;!;";;;+;,;88 ;;;; ;#;$;%;&;;; ; ;';(;;;);*;-;.;x~w~y~z~v~bcCS\]Bfg`a^_de@Z[A/ ccjc99 < << <!<"<<< < < < <+<,<%<&<-<.< <<<<<<'<(<<<<#<$<ghGH34ij>?%& /0kl AB  %&56!" EF=>?@uv  QR:;  abijNOwxABCD]^FG[\{|<=)*KLJK,-*+yzij]^  67"#12st\]OP!";<QR uvUVef01-.()/056cd2312yz9:QRPQMNHIIJST+,gh78]^abBC=>stWX'(YZ  _gh)*LMMNwxqrIJDEZ[_`?@#$GH 78mnMNUVGHKLstwxcdefopqr$%uv`STUVIJ}~&'@AklST}~kl;<89CDTUop9:abOPRSEF !KLVW'({|[\}~ef45WX#$CD{|qrmn_`mn-.yzOP  34YZcdWX+,EF./XY[\ABopYZ1@ f g ` a \ ] Z [ A ^ _ d e B b c C 4 !d"d%d&d#d$dd d\6 5v  @A9 TUZYRKLQ[VPOSNMWXuts#P$P'P(P+P,PPP PPP PPPP!P"PPPPP-P.P P P P P%P&P P P    Dooojddd#Q$Q Q Q-Q.Q!Q"QQQQQQQ'Q(Q Q Q+Q,Q QQQQ Q Q%Q&QQQ Q RR-R.RRRRR!R"R'R(RR+R,RR R R R R RRR R R#R$R%R&RRR S S#S$SSS S SS S S!S"S-S.S'S(S SSSSSSSS+S,S%S&SS S T TTTTTTTT+T,T T T-T.T T TTT'T(T%T&T TT#T$TT T!T"TAB'( :;OP34+,12BC/0STqr!"op,-GHefcd  @AklEFgh+,=>klWX%&ij HIghuvCDXY!"JK{|YZWXABij[\;<UVab}~IJTUabefPQ_XEF>?=>wxFZ[VW8956STDE"#mn[\?@qrKL]^%&yzGH{|AB67 ST45MNUV;<cdLM  #$`]^}~CD-.uv  $%{|kl9:efwxKLij  st78opcdOPUV'(./}~ _`NO mnQR  *+&'OPuvKL()Wyz?@YZ)*IJRSMN[\GHqrFG01YZopst34mnstgh9:  \]MN_`)* !CD23<=abwx56QRE12IJ/0-.QR#$78yz]^ U U%U&U U U#U$U'U(UUUUUUUU-U.UU U+U,U!U"UUU U U UU+V,VVVV VV'V(VVV%V&V V V#V$V VV!V"VVV V VVV V V-V.VZUYRMNVPSOKLQWXT[/x0xkx> ? "P!P P9 : 2 3   A B   T U Q R # $ e f W X i j } ~  ! 7 8 g h W X c d N O C D   D E 0 1 i j & ' E F O P M N   G H Y Z F G 4 5 M N         { | - .         K L ; <     G H g h   % & U V [ \   L M O P   8 9   ! "   s t   _ X     , - 3 4 s t   } ~ 7 8 y z = > 5 6 I J A B J K K L c d E F # $ { | k l G H       ` 6 7 Y Z C D ' ( = > U V q r S T k l c d i j I J C D   e f q r   w x 9 : H I ' (   ) * * + V W U V w x ] ^ s t M N ! " _ ` : ;   K L o p 1 2 O P     R S ; < { | o p " # ) * 5 6 Q R a b \ ] $ %   Y Z y z } ~ k l e f   u v   g h ? @   a b   3 4 + ,   I J P Q m n  [ \ 1 2     S T y z q r     [ \ w x   . / ] ^ W A B @ A ( )     ] ^ B C   m n o p X Y Z [ u v       Q R + , a b _ ` S T E F % & / 0 - . < = > ?   ? @ / 0 m n u v  W WW WWWW-W.W W W'W(WWW!W"WWW W W%W&W+W,W WW#W$WWW\]O BlClDl9[:[;[nn'n(n+n,nnn%n&n!n"nn n n#n$n nn n nnnn n n n-n.nnno p oo'o(o+o,o%o&oo-o.o o o#o$ooo ooooooo o!o"o o o o opioini8nV #p$p!p"pp p pp%p&ppp p pppppppp'p(p-p.p+p,p p p p p=>>>6>7>l>9>;><>m>8>nqAq@qEqFq1q qq q q+q,qqqqq#q$q qq%q&q q qqqqq'q(q q q!q"q-q.qE~F~G~H~I~J~K~L~M~N~O~P~Q~R~S~T~U~V~W~X~Y~ZC[C\Crr!r"rrrrrrrr'r(r+r,r r r-r.r#r$r r r%r&r rrr r r r$ % , -   c d ; < m n A B  F   0 1 e f Z [   k l 2 3 3 4 * + 9 : K L > ?   % & M N   M N ] ^ 1 2   q r  ! s t   / 0   Y Z 7 8   [ \ y z     H I O P { | # $   _ ` u v   I J R S 5 6 Q R   : ; V W Q R ] ^     q r S T w x ) * E F a b o p 9 : E G H   a b } ~ u v Y Z 1 2   q r g h D E m n   G H } ~   a b   & '   W X   N O + ,   [ \ o p e f < = G H K L . /       { | ' ( 5 6 U V   U V k l _ X 3 4 } ~ C D s t   g h e f 4 5 i j B C   ) * \ ] / 0 S T 7 8 E F     y z c d     ? @ 8 9 C D X Y " # Q R ( ) F G   @ A   U V o p s t L M K L y z ] ^ T U ` A B c d       ! "   i j + ,     [ \   { | % & S T O P   ! "   ' ( # $   ? @ - .   = > w x w x W I J m n   g h I J k l 6 7   W X A B J K _ ` C D O P P Q = > - .   u v ; < Y Z M N i j h#c#g#l#j`e`ub[i*z#k*x#y#f* t*u*v*w#s[q#o#n#p*m[r[da NOPSTUABCDEFHIJKLMRWXB3N{BBBsecurityImportant: xz security update,https://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940/ xz-libs-5.2.5-8.el9_0.i686.rpmjxz-5.2.5-8.el9_0.x86_64.rpm/xz-libs-5.2.5-8.el9_0.x86_64.rpm/ xz-libs-5.2.5-8.el9_0.i686.rpmjxz-5.2.5-8.el9_0.x86_64.rpm/xz-libs-5.2.5-8.el9_0.x86_64.rpm @BBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security update,|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099`9shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmlgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmfgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmggrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmjgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmigrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmBgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmAgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmSgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmkgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmhgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmCgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmf9shim-x64-15.6-1.el9.alma.x86_64.rpm@grub2-common-2.06-27.el9_0.7.alma.noarch.rpm`9shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmlgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmfgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmggrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmjgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmigrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmBgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmAgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmSgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmkgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmhgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmCgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmf9shim-x64-15.6-1.el9.alma.x86_64.rpm@grub2-common-2.06-27.el9_0.7.alma.noarch.rpmf(_BBBBBBBsecurityModerate: vim security updateThttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242xHvim-X11-8.2.2637-16.el9_0.2.x86_64.rpmyHvim-common-8.2.2637-16.el9_0.2.x86_64.rpmzHvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmqHvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpmDHvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmxHvim-X11-8.2.2637-16.el9_0.2.x86_64.rpmyHvim-common-8.2.2637-16.el9_0.2.x86_64.rpmzHvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmqHvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpmDHvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm_-iBBB-securityModerate: expat security updateexhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244Brexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmr expat-2.2.10-12.el9_0.2.i686.rpmrexpat-2.2.10-12.el9_0.2.x86_64.rpmBrexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmr expat-2.2.10-12.el9_0.2.i686.rpmrexpat-2.2.10-12.el9_0.2.x86_64.rpm%nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update,] https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249-kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmW-kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm-kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmR-kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmQ-kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmV-kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmX-kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmT-kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmU-kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1-bpftool-5.14.0-70.17.1.el9_0.x86_64.rpmS-kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm]-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2-python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmW-kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm-kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmR-kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmQ-kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmV-kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmX-kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmT-kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmU-kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1-bpftool-5.14.0-70.17.1.el9_0.x86_64.rpmS-kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm]-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2-python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm-kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpmYBBBBB dbus-broker-28-5.1.el9_0.x86_64.rpm> dbus-broker-28-5.1.el9_0.x86_64.rpm*bBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,`=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610 {kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2{python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm{kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1{bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm {kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2{python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm{kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1{bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm{kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm++{securityImportant: expat security update,Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838expat-2.2.10-12.el9_0.3.x86_64.rpmexpat-2.2.10-12.el9_0.3.x86_64.rpm ,}BsecurityModerate: gnutls and nettle security, bug fix, and enhancement updater2https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854z gnutls-3.7.6-12.el9_0.i686.rpmzgnutls-3.7.6-12.el9_0.x86_64.rpmz gnutls-3.7.6-12.el9_0.i686.rpmzgnutls-3.7.6-12.el9_0.x86_64.rpm~!@BsecurityImportant: libksba security update,$Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090Rlibksba-1.5.1-5.el9_0.x86_64.rpmR libksba-1.5.1-5.el9_0.i686.rpmRlibksba-1.5.1-5.el9_0.x86_64.rpmR libksba-1.5.1-5.el9_0.i686.rpm^" DBBBBBsecurityImportant: device-mapper-multipath security update,}chttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185s device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpmYskpartx-0.8.7-7.el9_0.1.x86_64.rpmsdevice-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm;sdevice-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpms device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpmYskpartx-0.8.7-7.el9_0.1.x86_64.rpmsdevice-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm;sdevice-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpmd#-LBBBsecurityImportant: openssl security update,`https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288/gopenssl-3.0.1-43.el9_0.x86_64.rpm}gopenssl-libs-3.0.1-43.el9_0.x86_64.rpm}g openssl-libs-3.0.1-43.el9_0.i686.rpm/gopenssl-3.0.1-43.el9_0.x86_64.rpm}gopenssl-libs-3.0.1-43.el9_0.x86_64.rpm}g openssl-libs-3.0.1-43.el9_0.i686.rpmh$.QsecurityModerate: zlib security updatesOhttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314k~zlib-1.2.11-32.el9_0.x86_64.rpmk~zlib-1.2.11-32.el9_0.x86_64.rpmS%/SBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,Bhttps://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 |kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2|python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1|bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm|kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm |kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2|python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1|bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-5.14.0-70.30.1.el9_0.x86_64.rpm|kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm|kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpmj&0lBBsecurityModerate: python3.9 security updateEnhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:73230:python3-libs-3.9.10-3.el9_0.x86_64.rpm:python3-3.9.10-3.el9_0.x86_64.rpm0:python3-libs-3.9.10-3.el9_0.x86_64.rpm:python3-3.9.10-3.el9_0.x86_64.rpm'1pBsecurityModerate: lua security update3https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329| lua-libs-5.4.2-4.el9_0.3.i686.rpm|lua-libs-5.4.2-4.el9_0.3.x86_64.rpm| lua-libs-5.4.2-4.el9_0.3.i686.rpm|lua-libs-5.4.2-4.el9_0.3.x86_64.rpmt(2sBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateE?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 zkernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-5.14.0-162.6.1.el9_1.x86_64.rpm1zbpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2zpython3-perf-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpmzkernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-core-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm zkernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-5.14.0-162.6.1.el9_1.x86_64.rpm1zbpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2zpython3-perf-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpmzkernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-core-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpmzkernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm۰Q)3LsecurityModerate: rsync security and bug fix updateHzhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291=rsync-3.2.3-18.el9.x86_64.rpm=rsync-3.2.3-18.el9.x86_64.rpmۨ3*4NBBBBBBBBsecurityLow: curl security update.B8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299u3libcurl-minimal-7.76.1-19.el9.x86_64.rpmt3libcurl-7.76.1-19.el9.x86_64.rpmt3 libcurl-7.76.1-19.el9.i686.rpmu3 libcurl-minimal-7.76.1-19.el9.i686.rpm 3curl-7.76.1-19.el9.x86_64.rpm!3curl-minimal-7.76.1-19.el9.x86_64.rpmu3libcurl-minimal-7.76.1-19.el9.x86_64.rpmt3libcurl-7.76.1-19.el9.x86_64.rpmt3 libcurl-7.76.1-19.el9.i686.rpmu3 libcurl-minimal-7.76.1-19.el9.i686.rpm 3curl-7.76.1-19.el9.x86_64.rpm!3curl-minimal-7.76.1-19.el9.x86_64.rpmދ+5XBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement updatezmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317N=samba-winbind-4.16.4-101.el9.x86_64.rpmM=samba-common-tools-4.16.4-101.el9.x86_64.rpm&=libsmbclient-4.16.4-101.el9.x86_64.rpm]=samba-common-4.16.4-101.el9.noarch.rpm,=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm+=samba-libs-4.16.4-101.el9.x86_64.rpm)= samba-client-libs-4.16.4-101.el9.i686.rpm'=libwbclient-4.16.4-101.el9.x86_64.rpm'= libwbclient-4.16.4-101.el9.i686.rpm+= samba-libs-4.16.4-101.el9.i686.rpm*= samba-common-libs-4.16.4-101.el9.i686.rpm)=samba-client-libs-4.16.4-101.el9.x86_64.rpm&= libsmbclient-4.16.4-101.el9.i686.rpm(= python3-samba-4.16.4-101.el9.i686.rpmL=samba-4.16.4-101.el9.x86_64.rpm,= samba-winbind-modules-4.16.4-101.el9.i686.rpm(=python3-samba-4.16.4-101.el9.x86_64.rpm*=samba-common-libs-4.16.4-101.el9.x86_64.rpmN=samba-winbind-4.16.4-101.el9.x86_64.rpmM=samba-common-tools-4.16.4-101.el9.x86_64.rpm&=libsmbclient-4.16.4-101.el9.x86_64.rpm]=samba-common-4.16.4-101.el9.noarch.rpm,=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm+=samba-libs-4.16.4-101.el9.x86_64.rpm)= samba-client-libs-4.16.4-101.el9.i686.rpm'=libwbclient-4.16.4-101.el9.x86_64.rpm'= libwbclient-4.16.4-101.el9.i686.rpm+= samba-libs-4.16.4-101.el9.i686.rpm*= samba-common-libs-4.16.4-101.el9.i686.rpm)=samba-client-libs-4.16.4-101.el9.x86_64.rpm&= libsmbclient-4.16.4-101.el9.i686.rpm(= python3-samba-4.16.4-101.el9.i686.rpmL=samba-4.16.4-101.el9.x86_64.rpm,= samba-winbind-modules-4.16.4-101.el9.i686.rpm(=python3-samba-4.16.4-101.el9.x86_64.rpm*=samba-common-libs-4.16.4-101.el9.x86_64.rpmދN,sudo-1.9.5p2-7.el9_1.1.x86_64.rpm>sudo-1.9.5p2-7.el9_1.1.x86_64.rpmO8=}BBBBBBBBsecurityModerate: curl security update/&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333 4curl-7.76.1-19.el9_1.1.x86_64.rpmu4libcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmt4libcurl-7.76.1-19.el9_1.1.x86_64.rpmt4 libcurl-7.76.1-19.el9_1.1.i686.rpmu4 libcurl-minimal-7.76.1-19.el9_1.1.i686.rpm!4curl-minimal-7.76.1-19.el9_1.1.x86_64.rpm 4curl-7.76.1-19.el9_1.1.x86_64.rpmu4libcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmt4libcurl-7.76.1-19.el9_1.1.x86_64.rpmt4 libcurl-7.76.1-19.el9_1.1.i686.rpmu4 libcurl-minimal-7.76.1-19.el9_1.1.i686.rpm!4curl-minimal-7.76.1-19.el9_1.1.x86_64.rpm9>GBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,D;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 vkernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2vpython3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1vbpftool-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpmvkernel-core-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm vkernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2vpython3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1vbpftool-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpmvkernel-core-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpmvkernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpmf:?`BBBBBBsecurityModerate: dbus security update/^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335HWdbus-1.12.20-7.el9_1.x86_64.rpmWdbus-libs-1.12.20-7.el9_1.x86_64.rpmIWdbus-common-1.12.20-7.el9_1.noarch.rpmJWdbus-tools-1.12.20-7.el9_1.x86_64.rpmW dbus-libs-1.12.20-7.el9_1.i686.rpmHWdbus-1.12.20-7.el9_1.x86_64.rpmWdbus-libs-1.12.20-7.el9_1.x86_64.rpmIWdbus-common-1.12.20-7.el9_1.noarch.rpmJWdbus-tools-1.12.20-7.el9_1.x86_64.rpmW dbus-libs-1.12.20-7.el9_1.i686.rpm};hBBBBBBBBBBBBBBBBsecurityModerate: systemd security update/]Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336 Qsystemd-container-250-12.el9_1.1.x86_64.rpmR systemd-libs-250-12.el9_1.1.i686.rpmRsystemd-libs-250-12.el9_1.1.x86_64.rpmesystemd-rpm-macros-250-12.el9_1.1.noarch.rpm1systemd-oomd-250-12.el9_1.1.x86_64.rpm3systemd-resolved-250-12.el9_1.1.x86_64.rpmQ systemd-container-250-12.el9_1.1.i686.rpmP systemd-250-12.el9_1.1.i686.rpm4systemd-udev-250-12.el9_1.1.x86_64.rpm2systemd-pam-250-12.el9_1.1.x86_64.rpmPsystemd-250-12.el9_1.1.x86_64.rpm Qsystemd-container-250-12.el9_1.1.x86_64.rpmR systemd-libs-250-12.el9_1.1.i686.rpmRsystemd-libs-250-12.el9_1.1.x86_64.rpmesystemd-rpm-macros-250-12.el9_1.1.noarch.rpm1systemd-oomd-250-12.el9_1.1.x86_64.rpm3systemd-resolved-250-12.el9_1.1.x86_64.rpmQ systemd-container-250-12.el9_1.1.i686.rpmP systemd-250-12.el9_1.1.i686.rpm4systemd-udev-250-12.el9_1.1.x86_64.rpm2systemd-pam-250-12.el9_1.1.x86_64.rpmPsystemd-250-12.el9_1.1.x86_64.rpm<zBsecurityModerate: expat security update/.}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337^ expat-2.4.9-1.el9_1.1.i686.rpm^expat-2.4.9-1.el9_1.1.x86_64.rpm^ expat-2.4.9-1.el9_1.1.i686.rpm^expat-2.4.9-1.el9_1.1.x86_64.rpm=}BBBsecurityModerate: libxml2 security update/+Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338y libxml2-2.9.13-3.el9_1.i686.rpmylibxml2-2.9.13-3.el9_1.x86_64.rpm?ypython3-libxml2-2.9.13-3.el9_1.x86_64.rpmy libxml2-2.9.13-3.el9_1.i686.rpmylibxml2-2.9.13-3.el9_1.x86_64.rpm?ypython3-libxml2-2.9.13-3.el9_1.x86_64.rpm>BBsecurityModerate: sqlite security update/q<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339Os sqlite-libs-3.34.1-6.el9_1.i686.rpmOssqlite-libs-3.34.1-6.el9_1.x86_64.rpmOs sqlite-libs-3.34.1-6.el9_1.i686.rpmOssqlite-libs-3.34.1-6.el9_1.x86_64.rpm~?EsecurityModerate: bash security update/-}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340:bash-5.1.8-6.el9_1.x86_64.rpm:bash-5.1.8-6.el9_1.x86_64.rpm@HBsecurityModerate: libtasn1 security update/*uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343"libtasn1-4.16.0-8.el9_1.x86_64.rpm" libtasn1-4.16.0-8.el9_1.i686.rpm"libtasn1-4.16.0-8.el9_1.x86_64.rpm" libtasn1-4.16.0-8.el9_1.i686.rpmOAKBsecurityImportant: libksba security update/,Jhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626Slibksba-1.5.1-6.el9_1.x86_64.rpmS libksba-1.5.1-6.el9_1.i686.rpmSlibksba-1.5.1-6.el9_1.x86_64.rpmS libksba-1.5.1-6.el9_1.i686.rpmsB"OBBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update/iChttps://access.redhat.com/errata/RHSA-2023:0752RHSA-2023:0752RHSA-2023:0752https://access.redhat.com/security/cve/CVE-2022-2601CVE-2022-2601CVE-2022-2601https://access.redhat.com/security/cve/CVE-2022-3775CVE-2022-3775CVE-2022-3775https://bugzilla.redhat.com/21129752112975https://bugzilla.redhat.com/21388802138880https://errata.almalinux.org/9/ALSA-2023-0752.htmlALSA-2023:0752ALSA-2023:0752 jgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpmigrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm@grub2-common-2.06-46.el9_1.3.alma.noarch.rpmkgrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpmlgrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpmAgrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpmSgrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpmhgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpmCgrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpmBgrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpmggrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpmfgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm jgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpmigrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm@grub2-common-2.06-46.el9_1.3.alma.noarch.rpmkgrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpmlgrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpmAgrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpmSgrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpmhgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpmCgrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpmBgrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpmggrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpmfgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm#CcBBBsecurityModerate: openssl security and bug fix update/,"https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946}h openssl-libs-3.0.1-47.el9_1.i686.rpm/hopenssl-3.0.1-47.el9_1.x86_64.rpm}hopenssl-libs-3.0.1-47.el9_1.x86_64.rpm}h openssl-libs-3.0.1-47.el9_1.i686.rpm/hopenssl-3.0.1-47.el9_1.x86_64.rpm}hopenssl-libs-3.0.1-47.el9_1.x86_64.rpmrDhBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,N~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 wkernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpmwkernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1wbpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2wpython3-perf-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-core-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm wkernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpmwkernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1wbpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2wpython3-perf-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-core-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmwkernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpmEAsecurityModerate: python-setuptools security update/L^https://access.redhat.com/errata/RHSA-2023:0952RHSA-2023:0952RHSA-2023:0952https://access.redhat.com/security/cve/CVE-2022-40897CVE-2022-40897CVE-2022-40897https://bugzilla.redhat.com/21585592158559https://errata.almalinux.org/9/ALSA-2023-0952.htmlALSA-2023:0952ALSA-2023:095275python3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm65python3-setuptools-53.0.0-10.el9_1.1.noarch.rpm75python3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm65python3-setuptools-53.0.0-10.el9_1.1.noarch.rpmlFDBBBsecurityModerate: python3.9 security update/*9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953python3-3.9.14-1.el9_1.2.x86_64.rpm0 python3-libs-3.9.14-1.el9_1.2.i686.rpm0python3-libs-3.9.14-1.el9_1.2.x86_64.rpmpython3-3.9.14-1.el9_1.2.x86_64.rpm0 python3-libs-3.9.14-1.el9_1.2.i686.rpm0python3-libs-3.9.14-1.el9_1.2.x86_64.rpmIGIBBBBBBBBBBBBBBBBsecurityModerate: systemd security update/c]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954 Rsystemd-libs-250-12.el9_1.3.x86_64.rpm3systemd-resolved-250-12.el9_1.3.x86_64.rpm4systemd-udev-250-12.el9_1.3.x86_64.rpmP systemd-250-12.el9_1.3.i686.rpm1systemd-oomd-250-12.el9_1.3.x86_64.rpmQsystemd-container-250-12.el9_1.3.x86_64.rpmPsystemd-250-12.el9_1.3.x86_64.rpmR systemd-libs-250-12.el9_1.3.i686.rpmQ systemd-container-250-12.el9_1.3.i686.rpmesystemd-rpm-macros-250-12.el9_1.3.noarch.rpm2systemd-pam-250-12.el9_1.3.x86_64.rpm Rsystemd-libs-250-12.el9_1.3.x86_64.rpm3systemd-resolved-250-12.el9_1.3.x86_64.rpm4systemd-udev-250-12.el9_1.3.x86_64.rpmP systemd-250-12.el9_1.3.i686.rpm1systemd-oomd-250-12.el9_1.3.x86_64.rpmQsystemd-container-250-12.el9_1.3.x86_64.rpmPsystemd-250-12.el9_1.3.x86_64.rpmR systemd-libs-250-12.el9_1.3.i686.rpmQ systemd-container-250-12.el9_1.3.i686.rpmesystemd-rpm-macros-250-12.el9_1.3.noarch.rpm2systemd-pam-250-12.el9_1.3.x86_64.rpm|H [BsecurityModerate: lua security update/@8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957|lua-libs-5.4.4-2.el9_1.x86_64.rpm| lua-libs-5.4.4-2.el9_1.i686.rpm|lua-libs-5.4.4-2.el9_1.x86_64.rpm| lua-libs-5.4.4-2.el9_1.i686.rpmbI ^BsecurityModerate: vim security update/xehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958qmvim-minimal-8.2.2637-20.el9_1.x86_64.rpmDmvim-filesystem-8.2.2637-20.el9_1.noarch.rpmqmvim-minimal-8.2.2637-20.el9_1.x86_64.rpmDmvim-filesystem-8.2.2637-20.el9_1.noarch.rpmAJ#asecurityModerate: tar security update/]https://access.redhat.com/errata/RHSA-2023:0959RHSA-2023:0959RHSA-2023:0959https://access.redhat.com/security/cve/CVE-2022-48303CVE-2022-48303CVE-2022-48303https://bugzilla.redhat.com/21497222149722https://errata.almalinux.org/9/ALSA-2023-0959.htmlALSA-2023:0959ALSA-2023:0959wtar-1.34-6.el9_1.x86_64.rpmwtar-1.34-6.el9_1.x86_64.rpmrK dBsecurityModerate: gnutls security and bug fix update/shttps://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141{gnutls-3.7.6-18.el9_1.x86_64.rpm{ gnutls-3.7.6-18.el9_1.i686.rpm{gnutls-3.7.6-18.el9_1.x86_64.rpm{ gnutls-3.7.6-18.el9_1.i686.rpmL gBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update/,Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 xkernel-5.14.0-162.22.2.el9_1.x86_64.rpm1xbpftool-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2xpython3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmxkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm xkernel-5.14.0-162.22.2.el9_1.x86_64.rpm1xbpftool-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2xpython3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmxkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmxkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmCM @BBBBBBBBsecurityModerate: curl security update/k9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701t5libcurl-7.76.1-19.el9_1.2.x86_64.rpmt5 libcurl-7.76.1-19.el9_1.2.i686.rpmu5 libcurl-minimal-7.76.1-19.el9_1.2.i686.rpm 5curl-7.76.1-19.el9_1.2.x86_64.rpmu5libcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm!5curl-minimal-7.76.1-19.el9_1.2.x86_64.rpmt5libcurl-7.76.1-19.el9_1.2.x86_64.rpmt5 libcurl-7.76.1-19.el9_1.2.i686.rpmu5 libcurl-minimal-7.76.1-19.el9_1.2.i686.rpm 5curl-7.76.1-19.el9_1.2.x86_64.rpmu5libcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm!5curl-minimal-7.76.1-19.el9_1.2.x86_64.rpm NJBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,$4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 1ybpftool-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-core-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2ypython3-perf-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpmykernel-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm 1ybpftool-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-core-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2ypython3-perf-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpmykernel-5.14.0-162.23.1.el9_1.x86_64.rpmykernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm OcBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: samba security update/,Xhttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127,> samba-winbind-modules-4.16.4-103.el9_1.i686.rpm)>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm'>libwbclient-4.16.4-103.el9_1.x86_64.rpmM>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm,>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm+> samba-libs-4.16.4-103.el9_1.i686.rpm&>libsmbclient-4.16.4-103.el9_1.x86_64.rpm)> samba-client-libs-4.16.4-103.el9_1.i686.rpm(> python3-samba-4.16.4-103.el9_1.i686.rpm*> samba-common-libs-4.16.4-103.el9_1.i686.rpmL>samba-4.16.4-103.el9_1.x86_64.rpm(>python3-samba-4.16.4-103.el9_1.x86_64.rpm+>samba-libs-4.16.4-103.el9_1.x86_64.rpm*>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm'> libwbclient-4.16.4-103.el9_1.i686.rpm]>samba-common-4.16.4-103.el9_1.noarch.rpm&> libsmbclient-4.16.4-103.el9_1.i686.rpmN>samba-winbind-4.16.4-103.el9_1.x86_64.rpm,> samba-winbind-modules-4.16.4-103.el9_1.i686.rpm)>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm'>libwbclient-4.16.4-103.el9_1.x86_64.rpmM>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm,>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm+> samba-libs-4.16.4-103.el9_1.i686.rpm&>libsmbclient-4.16.4-103.el9_1.x86_64.rpm)> samba-client-libs-4.16.4-103.el9_1.i686.rpm(> python3-samba-4.16.4-103.el9_1.i686.rpm*> samba-common-libs-4.16.4-103.el9_1.i686.rpmL>samba-4.16.4-103.el9_1.x86_64.rpm(>python3-samba-4.16.4-103.el9_1.x86_64.rpm+>samba-libs-4.16.4-103.el9_1.x86_64.rpm*>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm'> libwbclient-4.16.4-103.el9_1.i686.rpm]>samba-common-4.16.4-103.el9_1.noarch.rpm&> libsmbclient-4.16.4-103.el9_1.i686.rpmN>samba-winbind-4.16.4-103.el9_1.x86_64.rpmӿ/PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update/,lSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm$?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm#?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm$?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm#?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm[Q'`BBBBBsecurityModerate: device-mapper-multipath security and bug fix update/?]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459Yrkpartx-0.8.7-20.el9.x86_64.rpm;rdevice-mapper-multipath-0.8.7-20.el9.x86_64.rpmr device-mapper-multipath-libs-0.8.7-20.el9.i686.rpmrdevice-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpmYrkpartx-0.8.7-20.el9.x86_64.rpm;rdevice-mapper-multipath-0.8.7-20.el9.x86_64.rpmr device-mapper-multipath-libs-0.8.7-20.el9.i686.rpmrdevice-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpmRhBBBBBBBBsecurityLow: curl security update/."https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478t6 libcurl-7.76.1-23.el9.i686.rpm 6curl-7.76.1-23.el9.x86_64.rpmu6 libcurl-minimal-7.76.1-23.el9.i686.rpmt6libcurl-7.76.1-23.el9.x86_64.rpmu6libcurl-minimal-7.76.1-23.el9.x86_64.rpm!6curl-minimal-7.76.1-23.el9.x86_64.rpmt6 libcurl-7.76.1-23.el9.i686.rpm 6curl-7.76.1-23.el9.x86_64.rpmu6 libcurl-minimal-7.76.1-23.el9.i686.rpmt6libcurl-7.76.1-23.el9.x86_64.rpmu6libcurl-minimal-7.76.1-23.el9.x86_64.rpm!6curl-minimal-7.76.1-23.el9.x86_64.rpmcSrsecurityModerate: fwupd security and bug fix update/>M https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487Dfwupd-1.8.10-2.el9.alma.x86_64.rpmDfwupd-1.8.10-2.el9.alma.x86_64.rpm}T;tBBBBBsecurityModerate: dhcp security and enhancement update/ Ahttps://access.redhat.com/errata/RHSA-2023:2502RHSA-2023:2502RHSA-2023:2502https://access.redhat.com/security/cve/CVE-2022-2928CVE-2022-2928CVE-2022-2928https://access.redhat.com/security/cve/CVE-2022-2929CVE-2022-2929CVE-2022-2929https://bugzilla.redhat.com/21320012132001https://bugzilla.redhat.com/21320022132002https://errata.almalinux.org/9/ALSA-2023-2502.htmlALSA-2023:2502ALSA-2023:2502Ludhcp-common-4.4.2-18.b1.el9.noarch.rpmKudhcp-client-4.4.2-18.b1.el9.x86_64.rpmMudhcp-relay-4.4.2-18.b1.el9.x86_64.rpmNudhcp-server-4.4.2-18.b1.el9.x86_64.rpmLudhcp-common-4.4.2-18.b1.el9.noarch.rpmKudhcp-client-4.4.2-18.b1.el9.x86_64.rpmMudhcp-relay-4.4.2-18.b1.el9.x86_64.rpmNudhcp-server-4.4.2-18.b1.el9.x86_64.rpm U|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update/.Lhttps://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519N& samba-dc-libs-4.17.5-102.el9.i686.rpm/&samba-tools-4.17.5-102.el9.x86_64.rpm]&samba-common-4.17.5-102.el9.noarch.rpm0&samba-usershares-4.17.5-102.el9.x86_64.rpm'&libwbclient-4.17.5-102.el9.x86_64.rpm&& libsmbclient-4.17.5-102.el9.i686.rpmM&samba-common-tools-4.17.5-102.el9.x86_64.rpm)&samba-client-libs-4.17.5-102.el9.x86_64.rpm+& samba-libs-4.17.5-102.el9.i686.rpm-&samba-dcerpc-4.17.5-102.el9.x86_64.rpm,&samba-winbind-modules-4.17.5-102.el9.x86_64.rpmM&libnetapi-4.17.5-102.el9.x86_64.rpm,&python3-samba-dc-4.17.5-102.el9.x86_64.rpm.&samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm&&libsmbclient-4.17.5-102.el9.x86_64.rpm*&samba-common-libs-4.17.5-102.el9.x86_64.rpm'& libwbclient-4.17.5-102.el9.i686.rpm)& samba-client-libs-4.17.5-102.el9.i686.rpmM& libnetapi-4.17.5-102.el9.i686.rpm,& samba-winbind-modules-4.17.5-102.el9.i686.rpm+&samba-libs-4.17.5-102.el9.x86_64.rpm(& python3-samba-4.17.5-102.el9.i686.rpmN&samba-winbind-4.17.5-102.el9.x86_64.rpmN&samba-dc-libs-4.17.5-102.el9.x86_64.rpmL&samba-4.17.5-102.el9.x86_64.rpm(&python3-samba-4.17.5-102.el9.x86_64.rpm*& samba-common-libs-4.17.5-102.el9.i686.rpmN& samba-dc-libs-4.17.5-102.el9.i686.rpm/&samba-tools-4.17.5-102.el9.x86_64.rpm]&samba-common-4.17.5-102.el9.noarch.rpm0&samba-usershares-4.17.5-102.el9.x86_64.rpm'&libwbclient-4.17.5-102.el9.x86_64.rpm&& libsmbclient-4.17.5-102.el9.i686.rpmM&samba-common-tools-4.17.5-102.el9.x86_64.rpm)&samba-client-libs-4.17.5-102.el9.x86_64.rpm+& samba-libs-4.17.5-102.el9.i686.rpm-&samba-dcerpc-4.17.5-102.el9.x86_64.rpm,&samba-winbind-modules-4.17.5-102.el9.x86_64.rpmM&libnetapi-4.17.5-102.el9.x86_64.rpm,&python3-samba-dc-4.17.5-102.el9.x86_64.rpm.&samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm&&libsmbclient-4.17.5-102.el9.x86_64.rpm*&samba-common-libs-4.17.5-102.el9.x86_64.rpm'& libwbclient-4.17.5-102.el9.i686.rpm)& samba-client-libs-4.17.5-102.el9.i686.rpmM& libnetapi-4.17.5-102.el9.i686.rpm,& samba-winbind-modules-4.17.5-102.el9.i686.rpm+&samba-libs-4.17.5-102.el9.x86_64.rpm(& python3-samba-4.17.5-102.el9.i686.rpmN&samba-winbind-4.17.5-102.el9.x86_64.rpmN&samba-dc-libs-4.17.5-102.el9.x86_64.rpmL&samba-4.17.5-102.el9.x86_64.rpm(&python3-samba-4.17.5-102.el9.x86_64.rpm*& samba-common-libs-4.17.5-102.el9.i686.rpmlVhBBBsecurityLow: openssl security and bug fix update/.Pphttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523}mopenssl-libs-3.0.7-6.el9_2.x86_64.rpm}m openssl-libs-3.0.7-6.el9_2.i686.rpm/mopenssl-3.0.7-6.el9_2.x86_64.rpm}mopenssl-libs-3.0.7-6.el9_2.x86_64.rpm}m openssl-libs-3.0.7-6.el9_2.i686.rpm/mopenssl-3.0.7-6.el9_2.x86_64.rpmBWmBsecurityLow: libarchive security update/.@Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532Lw libarchive-3.5.3-4.el9.i686.rpmLwlibarchive-3.5.3-4.el9.x86_64.rpmLw libarchive-3.5.3-4.el9.i686.rpmLwlibarchive-3.5.3-4.el9.x86_64.rpmXpBBBBBBBBBBBBBBBsecurityModerate: krb5 security, bug fix, and enhancement update/Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570 krb5-server-ldap-1.20.1-8.el9.x86_64.rpmkrb5-libs-1.20.1-8.el9.x86_64.rpm krb5-libs-1.20.1-8.el9.i686.rpmkrb5-server-1.20.1-8.el9.x86_64.rpm\krb5-workstation-1.20.1-8.el9.x86_64.rpm libkadm5-1.20.1-8.el9.i686.rpmkrb5-pkinit-1.20.1-8.el9.x86_64.rpm krb5-server-1.20.1-8.el9.i686.rpmlibkadm5-1.20.1-8.el9.x86_64.rpm krb5-pkinit-1.20.1-8.el9.i686.rpm krb5-server-ldap-1.20.1-8.el9.i686.rpm krb5-server-ldap-1.20.1-8.el9.x86_64.rpmkrb5-libs-1.20.1-8.el9.x86_64.rpm krb5-libs-1.20.1-8.el9.i686.rpmkrb5-server-1.20.1-8.el9.x86_64.rpm\krb5-workstation-1.20.1-8.el9.x86_64.rpm libkadm5-1.20.1-8.el9.i686.rpmkrb5-pkinit-1.20.1-8.el9.x86_64.rpm krb5-server-1.20.1-8.el9.i686.rpmlibkadm5-1.20.1-8.el9.x86_64.rpm krb5-pkinit-1.20.1-8.el9.i686.rpm krb5-server-ldap-1.20.1-8.el9.i686.rpm-YABsecurityLow: lua security update/.pRhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582|lua-libs-5.4.4-3.el9.x86_64.rpm| lua-libs-5.4.4-3.el9.i686.rpm|lua-libs-5.4.4-3.el9.x86_64.rpm| lua-libs-5.4.4-3.el9.i686.rpmnZDBBBBBBsecurityModerate: openssh security update/Bhttps://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645o_openssh-keycat-8.7p1-29.el9_2.x86_64.rpmm_openssh-8.7p1-29.el9_2.x86_64.rpmn_openssh-clients-8.7p1-29.el9_2.x86_64.rpmp_openssh-server-8.7p1-29.el9_2.x86_64.rpmo_openssh-keycat-8.7p1-29.el9_2.x86_64.rpmm_openssh-8.7p1-29.el9_2.x86_64.rpmn_openssh-clients-8.7p1-29.el9_2.x86_64.rpmp_openssh-server-8.7p1-29.el9_2.x86_64.rpmI[LBBBBBBBBsecurityModerate: curl security update/J(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650 7curl-7.76.1-23.el9_2.1.x86_64.rpmt7libcurl-7.76.1-23.el9_2.1.x86_64.rpm!7curl-minimal-7.76.1-23.el9_2.1.x86_64.rpmu7libcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmt7 libcurl-7.76.1-23.el9_2.1.i686.rpmu7 libcurl-minimal-7.76.1-23.el9_2.1.i686.rpm 7curl-7.76.1-23.el9_2.1.x86_64.rpmt7libcurl-7.76.1-23.el9_2.1.x86_64.rpm!7curl-minimal-7.76.1-23.el9_2.1.x86_64.rpmu7libcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpmt7 libcurl-7.76.1-23.el9_2.1.i686.rpmu7 libcurl-minimal-7.76.1-23.el9_2.1.i686.rpmC\VBsecurityImportant: c-ares security update/,rhttps://access.redhat.com/errata/RHSA-2023:3559RHSA-2023:3559RHSA-2023:3559https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3559.htmlALSA-2023:3559ALSA-2023:3559yEc-ares-1.17.1-5.el9_2.1.x86_64.rpmyE c-ares-1.17.1-5.el9_2.1.i686.rpmyEc-ares-1.17.1-5.el9_2.1.x86_64.rpmyE c-ares-1.17.1-5.el9_2.1.i686.rpm|]YBBBsecurityImportant: python3.9 security update/,q+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:35950python3-libs-3.9.16-1.el9_2.1.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.1.i686.rpmpython3-3.9.16-1.el9_2.1.x86_64.rpm0python3-libs-3.9.16-1.el9_2.1.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.1.i686.rpmpython3-3.9.16-1.el9_2.1.x86_64.rpmu^^BBBsecurityModerate: openssl security and bug fix update/V https://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722}i openssl-libs-3.0.7-16.el9_2.i686.rpm}iopenssl-libs-3.0.7-16.el9_2.x86_64.rpm/iopenssl-3.0.7-16.el9_2.x86_64.rpm}i openssl-libs-3.0.7-16.el9_2.i686.rpm}iopenssl-libs-3.0.7-16.el9_2.x86_64.rpm/iopenssl-3.0.7-16.el9_2.x86_64.rpmz_cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update/,rhttps://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm#@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1 bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm$@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm#@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1 bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm$@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm_`DsecurityModerate: less security update/Chttps://access.redhat.com/errata/RHSA-2023:3725RHSA-2023:3725RHSA-2023:3725https://access.redhat.com/security/cve/CVE-2022-46663CVE-2022-46663CVE-2022-46663https://bugzilla.redhat.com/21696212169621https://errata.almalinux.org/9/ALSA-2023-3725.htmlALSA-2023:3725ALSA-2023:3725<less-590-2.el9_2.x86_64.rpm<less-590-2.el9_2.x86_64.rpm/aGBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update/Chttps://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325,'python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpmM'samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpmM' libnetapi-4.17.5-103.el9_2.alma.i686.rpmN' samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm,'samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm-'samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm.'samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm)'samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm&' libsmbclient-4.17.5-103.el9_2.alma.i686.rpm''libwbclient-4.17.5-103.el9_2.alma.x86_64.rpmM'libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm)' samba-client-libs-4.17.5-103.el9_2.alma.i686.rpmL'samba-4.17.5-103.el9_2.alma.x86_64.rpm('python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm/'samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm*' samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm0'samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm+' samba-libs-4.17.5-103.el9_2.alma.i686.rpm&'libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm+'samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm'' libwbclient-4.17.5-103.el9_2.alma.i686.rpmN'samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm]'samba-common-4.17.5-103.el9_2.alma.noarch.rpm,' samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm(' python3-samba-4.17.5-103.el9_2.alma.i686.rpmN'samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm*'samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm,'python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpmM'samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpmM' libnetapi-4.17.5-103.el9_2.alma.i686.rpmN' samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm,'samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm-'samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm.'samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm)'samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm&' libsmbclient-4.17.5-103.el9_2.alma.i686.rpm''libwbclient-4.17.5-103.el9_2.alma.x86_64.rpmM'libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm)' samba-client-libs-4.17.5-103.el9_2.alma.i686.rpmL'samba-4.17.5-103.el9_2.alma.x86_64.rpm('python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm/'samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm*' samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm0'samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm+' samba-libs-4.17.5-103.el9_2.alma.i686.rpm&'libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm+'samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm'' libwbclient-4.17.5-103.el9_2.alma.i686.rpmN'samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm]'samba-common-4.17.5-103.el9_2.alma.noarch.rpm,' samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm(' python3-samba-4.17.5-103.el9_2.alma.i686.rpmN'samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm*'samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm@b6sBsecurityModerate: libeconf security update/Khttps://access.redhat.com/errata/RHSA-2023:4347RHSA-2023:4347RHSA-2023:4347https://access.redhat.com/security/cve/CVE-2023-22652CVE-2023-22652CVE-2023-22652https://bugzilla.redhat.com/22124632212463https://errata.almalinux.org/9/ALSA-2023-4347.htmlALSA-2023:4347ALSA-2023:4347Blibeconf-0.4.1-3.el9_2.x86_64.rpmB libeconf-0.4.1-3.el9_2.i686.rpmBlibeconf-0.4.1-3.el9_2.x86_64.rpmB libeconf-0.4.1-3.el9_2.i686.rpmTcwBBBsecurityModerate: libxml2 security update/YNhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349z libxml2-2.9.13-3.el9_2.1.i686.rpm?zpython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpmzlibxml2-2.9.13-3.el9_2.1.x86_64.rpmz libxml2-2.9.13-3.el9_2.1.i686.rpm?zpython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpmzlibxml2-2.9.13-3.el9_2.1.x86_64.rpmd glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpmy glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpmk glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpmb glibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpmX glibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm# glibc-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpmu glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpmW glibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpmh glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpmp glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpmi glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpmv glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpmd glibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm` glibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm[ glibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm^ glibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm{ glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpml glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm glibc-common-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpmf glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpmw glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpma glibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpmr glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpmZ glibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm} glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpmo glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm% libnsl-2.34-60.el9_2.7.i686.rpm$ glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpmn glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpmq glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm# glibc-2.34-60.el9_2.7.i686.rpm glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm| glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpmm glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpme glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpmc glibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpmj glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpmY glibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpmg glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm~ glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpmP] glibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpmP glibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpmJ glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm% libnsl-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpmt glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpmz glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpms glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpmT glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpmK nscd-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm_ glibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm\ glibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpmx glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm$ glibc-gconv-extra-2.34-60.el9_2.7.i686.rpm> glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpmy glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpmk glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpmb glibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpmX glibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm# glibc-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpmu glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpmW glibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpmh glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpmp glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpmi glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpmv glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpmd glibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm` glibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm[ glibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm^ glibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm{ glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpml glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm glibc-common-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpmf glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpmw glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpma glibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpmr glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpmZ glibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm} glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpmo glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm% libnsl-2.34-60.el9_2.7.i686.rpm$ glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpmn glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpmq glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm# glibc-2.34-60.el9_2.7.i686.rpm glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm| glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpmm glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpme glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpmc glibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpmj glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpmY glibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpmg glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm~ glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm&p)\BBBsecurityImportant: python3.9 security update/,|https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:54620python3-libs-3.9.16-1.el9_2.2.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.2.i686.rpmpython3-3.9.16-1.el9_2.2.x86_64.rpm0python3-libs-3.9.16-1.el9_2.2.x86_64.rpm0 python3-libs-3.9.16-1.el9_2.2.i686.rpmpython3-3.9.16-1.el9_2.2.x86_64.rpmEq*aBBBBBBBBsecurityImportant: curl security update/,}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763!9curl-minimal-7.76.1-23.el9_2.4.x86_64.rpmu9 libcurl-minimal-7.76.1-23.el9_2.4.i686.rpmu9libcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmt9libcurl-7.76.1-23.el9_2.4.x86_64.rpm 9curl-7.76.1-23.el9_2.4.x86_64.rpmt9 libcurl-7.76.1-23.el9_2.4.i686.rpm!9curl-minimal-7.76.1-23.el9_2.4.x86_64.rpmu9 libcurl-minimal-7.76.1-23.el9_2.4.i686.rpmu9libcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpmt9libcurl-7.76.1-23.el9_2.4.x86_64.rpm 9curl-7.76.1-23.el9_2.4.x86_64.rpmt9 libcurl-7.76.1-23.el9_2.4.i686.rpmgr.kBsecurityImportant: nghttp2 security update/,-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838zJlibnghttp2-1.43.0-5.el9_2.1.x86_64.rpmzJ libnghttp2-1.43.0-5.el9_2.1.i686.rpmzJlibnghttp2-1.43.0-5.el9_2.1.x86_64.rpmzJ libnghttp2-1.43.0-5.el9_2.1.i686.rpmÙ0s2oBsecurityLow: opensc security update/.A(https://access.redhat.com/errata/RHSA-2023:6587RHSA-2023:6587RHSA-2023:6587https://access.redhat.com/security/cve/CVE-2023-2977CVE-2023-2977CVE-2023-2977https://bugzilla.redhat.com/22110882211088https://errata.almalinux.org/9/ALSA-2023-6587.htmlALSA-2023:6587ALSA-2023:6587}? opensc-0.23.0-2.el9.i686.rpm}?opensc-0.23.0-2.el9.x86_64.rpm}? opensc-0.23.0-2.el9.i686.rpm}?opensc-0.23.0-2.el9.x86_64.rpmt+sBBBsecurityModerate: binutils security update/iJhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593sbinutils-2.35.2-42.el9.x86_64.rpms binutils-2.35.2-42.el9.i686.rpmAsbinutils-gold-2.35.2-42.el9.x86_64.rpmsbinutils-2.35.2-42.el9.x86_64.rpms binutils-2.35.2-42.el9.i686.rpmAsbinutils-gold-2.35.2-42.el9.x86_64.rpm<u xBBBBBBBBBBBBBBBsecurityImportant: linux-firmware security, bug fix, and enhancement update/,3 https://access.redhat.com/errata/RHSA-2023:6595RHSA-2023:6595RHSA-2023:6595https://access.redhat.com/security/cve/CVE-2022-27635CVE-2022-27635CVE-2022-27635https://access.redhat.com/security/cve/CVE-2022-36351CVE-2022-36351CVE-2022-36351https://access.redhat.com/security/cve/CVE-2022-38076CVE-2022-38076CVE-2022-38076https://access.redhat.com/security/cve/CVE-2022-40964CVE-2022-40964CVE-2022-40964https://access.redhat.com/security/cve/CVE-2022-46329CVE-2022-46329CVE-2022-46329https://access.redhat.com/security/cve/CVE-2023-20569CVE-2023-20569CVE-2023-20569https://bugzilla.redhat.com/22076252207625https://bugzilla.redhat.com/22389602238960https://bugzilla.redhat.com/22389612238961https://bugzilla.redhat.com/22389622238962https://bugzilla.redhat.com/22389632238963https://bugzilla.redhat.com/22389642238964https://errata.almalinux.org/9/ALSA-2023-6595.htmlALSA-2023:6595ALSA-2023:6595WTiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpmbPlinux-firmware-20230814-140.el9_3.noarch.rpmdPnetronome-firmware-20230814-140.el9_3.noarch.rpmUpiwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpmcPlinux-firmware-whence-20230814-140.el9_3.noarch.rpmYTiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm[iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpmVTiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpmTziwl100-firmware-39.31.5.1-140.el9_3.noarch.rpmZ1iwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm]Tiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm^Tiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpmXTiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpmaPlibertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm_~iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm`1iwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm\iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpmWTiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpmbPlinux-firmware-20230814-140.el9_3.noarch.rpmdPnetronome-firmware-20230814-140.el9_3.noarch.rpmUpiwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpmcPlinux-firmware-whence-20230814-140.el9_3.noarch.rpmYTiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm[iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpmVTiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpmTziwl100-firmware-39.31.5.1-140.el9_3.noarch.rpmZ1iwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm]Tiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm^Tiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpmXTiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpmaPlibertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm_~iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm`1iwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm\iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpmcv,JBsecurityModerate: cups security and bug fix update/?nhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596"Wcups-libs-2.3.3op2-21.el9.x86_64.rpm"W cups-libs-2.3.3op2-21.el9.i686.rpm"Wcups-libs-2.3.3op2-21.el9.x86_64.rpm"W cups-libs-2.3.3op2-21.el9.i686.rpmwMsecurityModerate: python-cryptography security update/-fhttps://access.redhat.com/errata/RHSA-2023:6615RHSA-2023:6615RHSA-2023:6615https://access.redhat.com/security/cve/CVE-2023-23931CVE-2023-23931CVE-2023-23931https://bugzilla.redhat.com/21718172171817https://errata.almalinux.org/9/ALSA-2023-6615.htmlALSA-2023:6615ALSA-2023:6615^python3-cryptography-36.0.1-4.el9.x86_64.rpm^python3-cryptography-36.0.1-4.el9.x86_64.rpmxPBsecurityModerate: protobuf-c security update/}https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621(Iprotobuf-c-1.3.3-13.el9.x86_64.rpm(I protobuf-c-1.3.3-13.el9.i686.rpm(Iprotobuf-c-1.3.3-13.el9.x86_64.rpm(I protobuf-c-1.3.3-13.el9.i686.rpmy-TBsecurityLow: glib2 security and bug fix update/.ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631Kfglib2-2.68.4-11.el9.x86_64.rpmKf glib2-2.68.4-11.el9.i686.rpmKfglib2-2.68.4-11.el9.x86_64.rpmKf glib2-2.68.4-11.el9.i686.rpmzWBBBsecurityLow: shadow-utils security and bug fix update/.Yhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632eshadow-utils-4.9-8.el9.x86_64.rpm$ shadow-utils-subid-4.9-8.el9.i686.rpm$shadow-utils-subid-4.9-8.el9.x86_64.rpmeshadow-utils-4.9-8.el9.x86_64.rpm$ shadow-utils-subid-4.9-8.el9.i686.rpm$shadow-utils-subid-4.9-8.el9.x86_64.rpm@{.]BsecurityModerate: c-ares security, bug fix, and enhancement update/X https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635yF c-ares-1.19.1-1.el9.i686.rpmyFc-ares-1.19.1-1.el9.x86_64.rpmyF c-ares-1.19.1-1.el9.i686.rpmyFc-ares-1.19.1-1.el9.x86_64.rpm|/`BBsecurityModerate: libssh security update/b{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:66431& libssh-0.10.4-11.el9.i686.rpm{&libssh-config-0.10.4-11.el9.noarch.rpm1&libssh-0.10.4-11.el9.x86_64.rpm1& libssh-0.10.4-11.el9.i686.rpm{&libssh-config-0.10.4-11.el9.noarch.rpm1&libssh-0.10.4-11.el9.x86_64.rpmX}0dBBBsecurityModerate: python3.9 security update/] https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:66590 python3-libs-3.9.18-1.el9_3.i686.rpmpython3-3.9.18-1.el9_3.x86_64.rpm0python3-libs-3.9.18-1.el9_3.x86_64.rpm0 python3-libs-3.9.18-1.el9_3.i686.rpmpython3-3.9.18-1.el9_3.x86_64.rpm0python3-libs-3.9.18-1.el9_3.x86_64.rpmB~1iBsecurityLow: gmp security and enhancement update/.}Uhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661 \gmp-6.2.0-13.el9.x86_64.rpm \ gmp-6.2.0-13.el9.i686.rpm \gmp-6.2.0-13.el9.x86_64.rpm \ gmp-6.2.0-13.el9.i686.rpmB2lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update/RK https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667L(samba-4.18.6-100.el9.x86_64.rpmM(samba-common-tools-4.18.6-100.el9.x86_64.rpm,( samba-winbind-modules-4.18.6-100.el9.i686.rpm)(samba-client-libs-4.18.6-100.el9.x86_64.rpm)( samba-client-libs-4.18.6-100.el9.i686.rpmN(samba-winbind-4.18.6-100.el9.x86_64.rpm*( samba-common-libs-4.18.6-100.el9.i686.rpm&( libsmbclient-4.18.6-100.el9.i686.rpmM(libnetapi-4.18.6-100.el9.x86_64.rpm&(libsmbclient-4.18.6-100.el9.x86_64.rpm,(python3-samba-dc-4.18.6-100.el9.x86_64.rpm+(samba-libs-4.18.6-100.el9.x86_64.rpm.(samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm((python3-samba-4.18.6-100.el9.x86_64.rpm'( libwbclient-4.18.6-100.el9.i686.rpm-(samba-dcerpc-4.18.6-100.el9.x86_64.rpm'(libwbclient-4.18.6-100.el9.x86_64.rpm+( samba-libs-4.18.6-100.el9.i686.rpm0(samba-usershares-4.18.6-100.el9.x86_64.rpm,(samba-winbind-modules-4.18.6-100.el9.x86_64.rpm(( python3-samba-4.18.6-100.el9.i686.rpmN(samba-dc-libs-4.18.6-100.el9.x86_64.rpm/(samba-tools-4.18.6-100.el9.x86_64.rpmN( samba-dc-libs-4.18.6-100.el9.i686.rpm*(samba-common-libs-4.18.6-100.el9.x86_64.rpmM( libnetapi-4.18.6-100.el9.i686.rpm](samba-common-4.18.6-100.el9.noarch.rpmL(samba-4.18.6-100.el9.x86_64.rpmM(samba-common-tools-4.18.6-100.el9.x86_64.rpm,( samba-winbind-modules-4.18.6-100.el9.i686.rpm)(samba-client-libs-4.18.6-100.el9.x86_64.rpm)( samba-client-libs-4.18.6-100.el9.i686.rpmN(samba-winbind-4.18.6-100.el9.x86_64.rpm*( samba-common-libs-4.18.6-100.el9.i686.rpm&( libsmbclient-4.18.6-100.el9.i686.rpmM(libnetapi-4.18.6-100.el9.x86_64.rpm&(libsmbclient-4.18.6-100.el9.x86_64.rpm,(python3-samba-dc-4.18.6-100.el9.x86_64.rpm+(samba-libs-4.18.6-100.el9.x86_64.rpm.(samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm((python3-samba-4.18.6-100.el9.x86_64.rpm'( libwbclient-4.18.6-100.el9.i686.rpm-(samba-dcerpc-4.18.6-100.el9.x86_64.rpm'(libwbclient-4.18.6-100.el9.x86_64.rpm+( samba-libs-4.18.6-100.el9.i686.rpm0(samba-usershares-4.18.6-100.el9.x86_64.rpm,(samba-winbind-modules-4.18.6-100.el9.x86_64.rpm(( python3-samba-4.18.6-100.el9.i686.rpmN(samba-dc-libs-4.18.6-100.el9.x86_64.rpm/(samba-tools-4.18.6-100.el9.x86_64.rpmN( samba-dc-libs-4.18.6-100.el9.i686.rpm*(samba-common-libs-4.18.6-100.el9.x86_64.rpmM( libnetapi-4.18.6-100.el9.i686.rpm](samba-common-4.18.6-100.el9.noarch.rpm83XBBBBBBBBsecurityModerate: curl security update/q https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679t:libcurl-7.76.1-26.el9.x86_64.rpmu: libcurl-minimal-7.76.1-26.el9.i686.rpm!:curl-minimal-7.76.1-26.el9.x86_64.rpmt: libcurl-7.76.1-26.el9.i686.rpm :curl-7.76.1-26.el9.x86_64.rpmu:libcurl-minimal-7.76.1-26.el9.x86_64.rpmt:libcurl-7.76.1-26.el9.x86_64.rpmu: libcurl-minimal-7.76.1-26.el9.i686.rpm!:curl-minimal-7.76.1-26.el9.x86_64.rpmt: libcurl-7.76.1-26.el9.i686.rpm :curl-7.76.1-26.el9.x86_64.rpmu:libcurl-minimal-7.76.1-26.el9.x86_64.rpmY%bBsecurityLow: tpm2-tss security and enhancement update/.Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685.r tpm2-tss-3.2.2-2.el9.i686.rpm.rtpm2-tss-3.2.2-2.el9.x86_64.rpm.r tpm2-tss-3.2.2-2.el9.i686.rpm.rtpm2-tss-3.2.2-2.el9.x86_64.rpm 4&securityModerate: python-pip security update/`(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694xpython3-pip-wheel-21.2.3-7.el9.noarch.rpmxpython3-pip-wheel-21.2.3-7.el9.noarch.rpmC5gBBBBsecurityModerate: ncurses security and bug fix update/xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698Lncurses-6.2-10.20210508.el9.x86_64.rpm% ncurses-libs-6.2-10.20210508.el9.i686.rpm%ncurses-libs-6.2-10.20210508.el9.x86_64.rpm ncurses-base-6.2-10.20210508.el9.noarch.rpmLncurses-6.2-10.20210508.el9.x86_64.rpm% ncurses-libs-6.2-10.20210508.el9.i686.rpm%ncurses-libs-6.2-10.20210508.el9.x86_64.rpm ncurses-base-6.2-10.20210508.el9.noarch.rpmb6mBBBBBBBBBBBBBBBsecurityModerate: krb5 security and bug fix update/9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699  krb5-libs-1.21.1-1.el9.i686.rpm libkadm5-1.21.1-1.el9.i686.rpm krb5-pkinit-1.21.1-1.el9.i686.rpm krb5-server-ldap-1.21.1-1.el9.i686.rpmlibkadm5-1.21.1-1.el9.x86_64.rpmkrb5-server-1.21.1-1.el9.x86_64.rpm krb5-server-1.21.1-1.el9.i686.rpmkrb5-libs-1.21.1-1.el9.x86_64.rpm\krb5-workstation-1.21.1-1.el9.x86_64.rpmkrb5-server-ldap-1.21.1-1.el9.x86_64.rpmkrb5-pkinit-1.21.1-1.el9.x86_64.rpm  krb5-libs-1.21.1-1.el9.i686.rpm libkadm5-1.21.1-1.el9.i686.rpm krb5-pkinit-1.21.1-1.el9.i686.rpm krb5-server-ldap-1.21.1-1.el9.i686.rpmlibkadm5-1.21.1-1.el9.x86_64.rpmkrb5-server-1.21.1-1.el9.x86_64.rpm krb5-server-1.21.1-1.el9.i686.rpmkrb5-libs-1.21.1-1.el9.x86_64.rpm\krb5-workstation-1.21.1-1.el9.x86_64.rpmkrb5-server-ldap-1.21.1-1.el9.x86_64.rpmkrb5-pkinit-1.21.1-1.el9.x86_64.rpmu~BBsecurityLow: procps-ng security and bug fix update/.9Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705'+procps-ng-3.3.17-13.el9.x86_64.rpm +procps-ng-i18n-3.3.17-13.el9.noarch.rpm'+ procps-ng-3.3.17-13.el9.i686.rpm'+procps-ng-3.3.17-13.el9.x86_64.rpm +procps-ng-i18n-3.3.17-13.el9.noarch.rpm'+ procps-ng-3.3.17-13.el9.i686.rpmZ7CBBBBsecurityModerate: avahi security update/https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707x~ avahi-libs-0.8-15.el9.i686.rpmw~ avahi-0.8-15.el9.i686.rpmw~avahi-0.8-15.el9.x86_64.rpmx~avahi-libs-0.8-15.el9.x86_64.rpmx~ avahi-libs-0.8-15.el9.i686.rpmw~ avahi-0.8-15.el9.i686.rpmw~avahi-0.8-15.el9.x86_64.rpmx~avahi-libs-0.8-15.el9.x86_64.rpmh8IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update/Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744-)samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm))samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm') libwbclient-4.18.6-101.el9_3.alma.1.i686.rpmN)samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm&) libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpmM) libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm0)samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm,)samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm')libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm)) samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm+) samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm*)samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm.)samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm+)samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm() python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm&)libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm/)samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm,)python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpmN)samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpmN) samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpmM)libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpmM)samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm])samba-common-4.18.6-101.el9_3.alma.1.noarch.rpmL)samba-4.18.6-101.el9_3.alma.1.x86_64.rpm,) samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm()python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm*) samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm-)samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm))samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm') libwbclient-4.18.6-101.el9_3.alma.1.i686.rpmN)samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm&) libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpmM) libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm0)samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm,)samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm')libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm)) samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm+) samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm*)samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm.)samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm+)samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm() python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm&)libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm/)samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm,)python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpmN)samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpmN) samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpmM)libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpmM)samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm])samba-common-4.18.6-101.el9_3.alma.1.noarch.rpmL)samba-4.18.6-101.el9_3.alma.1.x86_64.rpm,) samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm()python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm*) samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm09uBBBBBBBBsecurityImportant: curl security update/,k}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745!;curl-minimal-7.76.1-26.el9_3.2.x86_64.rpmt;libcurl-7.76.1-26.el9_3.2.x86_64.rpm ;curl-7.76.1-26.el9_3.2.x86_64.rpmu; libcurl-minimal-7.76.1-26.el9_3.2.i686.rpmt; libcurl-7.76.1-26.el9_3.2.i686.rpmu;libcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm!;curl-minimal-7.76.1-26.el9_3.2.x86_64.rpmt;libcurl-7.76.1-26.el9_3.2.x86_64.rpm ;curl-7.76.1-26.el9_3.2.x86_64.rpmu; libcurl-minimal-7.76.1-26.el9_3.2.i686.rpmt; libcurl-7.76.1-26.el9_3.2.i686.rpmu;libcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm! BsecurityImportant: nghttp2 security update/,h-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746zKlibnghttp2-1.43.0-5.el9_3.1.x86_64.rpmzK libnghttp2-1.43.0-5.el9_3.1.i686.rpmzKlibnghttp2-1.43.0-5.el9_3.1.x86_64.rpmzK libnghttp2-1.43.0-5.el9_3.1.i686.rpmJ  :CBBBsecurityModerate: libxml2 security update/https://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747?{python3-libxml2-2.9.13-5.el9_3.x86_64.rpm{ libxml2-2.9.13-5.el9_3.i686.rpm{libxml2-2.9.13-5.el9_3.x86_64.rpm?{python3-libxml2-2.9.13-5.el9_3.x86_64.rpm{ libxml2-2.9.13-5.el9_3.i686.rpm{libxml2-2.9.13-5.el9_3.x86_64.rpmN   HBsecurityModerate: opensc security update/Khttps://access.redhat.com/errata/RHSA-2023:7879RHSA-2023:7879RHSA-2023:7879https://access.redhat.com/security/cve/CVE-2023-40660CVE-2023-40660CVE-2023-40660https://access.redhat.com/security/cve/CVE-2023-40661CVE-2023-40661CVE-2023-40661https://access.redhat.com/security/cve/CVE-2023-4535CVE-2023-4535CVE-2023-4535https://bugzilla.redhat.com/22409122240912https://bugzilla.redhat.com/22409132240913https://bugzilla.redhat.com/22409142240914https://errata.almalinux.org/9/ALSA-2023-7879.htmlALSA-2023:7879ALSA-2023:7879}@opensc-0.23.0-3.el9_3.x86_64.rpm}@ opensc-0.23.0-3.el9_3.i686.rpm}@opensc-0.23.0-3.el9_3.x86_64.rpm}@ opensc-0.23.0-3.el9_3.i686.rpm  ;LBBBsecurityModerate: openssl security update+_Nhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:0310/jopenssl-3.0.7-25.el9_3.x86_64.rpm}j openssl-libs-3.0.7-25.el9_3.i686.rpm}jopenssl-libs-3.0.7-25.el9_3.x86_64.rpm/jopenssl-3.0.7-25.el9_3.x86_64.rpm}j openssl-libs-3.0.7-25.el9_3.i686.rpm}jopenssl-libs-3.0.7-25.el9_3.x86_64.rpm[  iBBBsecurityModerate: python3.9 security update+Cchttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:04660python3-libs-3.9.18-1.el9_3.1.x86_64.rpmpython3-3.9.18-1.el9_3.1.x86_64.rpm0 python3-libs-3.9.18-1.el9_3.1.i686.rpm0python3-libs-3.9.18-1.el9_3.1.x86_64.rpmpython3-3.9.18-1.el9_3.1.x86_64.rpm0 python3-libs-3.9.18-1.el9_3.1.i686.rpmˤ nBBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update+&!https://access.redhat.com/errata/RHSA-2024:0468RHSA-2024:0468RHSA-2024:0468https://access.redhat.com/security/cve/CVE-2023-4001CVE-2023-4001CVE-2023-4001https://bugzilla.redhat.com/22249512224951https://errata.almalinux.org/9/ALSA-2024-0468.htmlALSA-2024:0468ALSA-2024:0468 Agrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmBgrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmggrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpmhgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm@grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpmSgrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpmCgrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpmfgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpmlgrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpmkgrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpmjgrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpmigrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm Agrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmBgrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmggrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpmhgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm@grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpmSgrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpmCgrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpmfgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpmlgrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpmkgrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpmjgrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpmigrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpmΌr ?BBsecurityModerate: gnutls security update+GGhttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533| gnutls-3.7.6-23.el9_3.3.i686.rpm|gnutls-3.7.6-23.el9_3.3.x86_64.rpm| gnutls-3.7.6-23.el9_3.3.i686.rpm|gnutls-3.7.6-23.el9_3.3.x86_64.rpm߲   @BBBBBBBBBBsecurityModerate: nss security update+:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790RFnss-util-3.90.0-6.el9_3.x86_64.rpmPFnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmMnspr-4.35.0-6.el9_3.x86_64.rpmQFnss-sysinit-3.90.0-6.el9_3.x86_64.rpmNFnss-3.90.0-6.el9_3.x86_64.rpmOFnss-softokn-3.90.0-6.el9_3.x86_64.rpmRFnss-util-3.90.0-6.el9_3.x86_64.rpmPFnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmMnspr-4.35.0-6.el9_3.x86_64.rpmQFnss-sysinit-3.90.0-6.el9_3.x86_64.rpmNFnss-3.90.0-6.el9_3.x86_64.rpmOFnss-softokn-3.90.0-6.el9_3.x86_64.rpm4  EsecurityModerate: sudo security update+H|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811>sudo-1.9.5p2-10.el9_3.x86_64.rpm>sudo-1.9.5p2-10.el9_3.x86_64.rpm[  GBsecurityModerate: opensc security update+Dhttps://access.redhat.com/errata/RHSA-2024:0966RHSA-2024:0966RHSA-2024:0966https://access.redhat.com/security/cve/CVE-2023-5992CVE-2023-5992CVE-2023-5992https://bugzilla.redhat.com/22486852248685https://errata.almalinux.org/9/ALSA-2024-0966.htmlALSA-2024:0966ALSA-2024:0966}A opensc-0.23.0-4.el9_3.i686.rpm}Aopensc-0.23.0-4.el9_3.x86_64.rpm}A opensc-0.23.0-4.el9_3.i686.rpm}Aopensc-0.23.0-4.el9_3.x86_64.rpmE KBsecurityImportant: pam:1.5.1 security update+,V[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:102442Opam-1.5.1-22.el9_5.x86_64.rpm2O pam-1.5.1-22.el9_5.i686.rpm2Opam-1.5.1-22.el9_5.x86_64.rpm2O pam-1.5.1-22.el9_5.i686.rpmg NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+1https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:102744kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm!4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm*4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm$4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm11bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm#4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm!4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm*4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm$4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm11bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm#4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm qsecurityImportant: tuned security update+,Phttps://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:103844tuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm4tuned-2.24.0-2.el9_5.alma.1.noarch.rpm4tuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm4tuned-2.24.0-2.el9_5.alma.1.noarch.rpm^ sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+nAhttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939*5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm12bpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm$5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm!5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm#5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm*5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm12bpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm$5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm!5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm#5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm5 VBBBsecurityModerate: python3.9:3.9.21 security update+/https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:109830python3-libs-3.9.21-1.el9_5.x86_64.rpmpython3-3.9.21-1.el9_5.x86_64.rpm0 python3-libs-3.9.21-1.el9_5.i686.rpm0python3-libs-3.9.21-1.el9_5.x86_64.rpmpython3-3.9.21-1.el9_5.x86_64.rpm0 python3-libs-3.9.21-1.el9_5.i686.rpmE [BsecurityModerate: pam security update+M?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:112502N pam-1.5.1-21.el9_5.i686.rpm2Npam-1.5.1-21.el9_5.x86_64.rpm2N pam-1.5.1-21.el9_5.i686.rpm2Npam-1.5.1-21.el9_5.x86_64.rpm ^BBBBBBBBsecurityModerate: curl security update+ @https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129u< libcurl-minimal-7.76.1-26.el9_3.3.i686.rpmu<libcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm!<curl-minimal-7.76.1-26.el9_3.3.x86_64.rpmt<libcurl-7.76.1-26.el9_3.3.x86_64.rpmt< libcurl-7.76.1-26.el9_3.3.i686.rpm <curl-7.76.1-26.el9_3.3.x86_64.rpmu< libcurl-minimal-7.76.1-26.el9_3.3.i686.rpmu<libcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm!<curl-minimal-7.76.1-26.el9_3.3.x86_64.rpmt<libcurl-7.76.1-26.el9_3.3.x86_64.rpmt< libcurl-7.76.1-26.el9_3.3.i686.rpm <curl-7.76.1-26.el9_3.3.x86_64.rpm7 hBBBBBBsecurityModerate: openssh security update+L0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130oaopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpmmaopenssh-8.7p1-34.el9_3.3.x86_64.rpmnaopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpmpaopenssh-server-8.7p1-34.el9_3.3.x86_64.rpmoaopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpmmaopenssh-8.7p1-34.el9_3.3.x86_64.rpmnaopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpmpaopenssh-server-8.7p1-34.el9_3.3.x86_64.rpmR pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%|c$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:114866kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm13bpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm$6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm*6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm#6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm13bpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm$6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm*6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm#6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpmm SBBBBBBBsecurityModerate: opencryptoki security update+_Whttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239&J opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm&Jopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpmUJopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpmTJopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpmSJopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm&J opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm&Jopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpmUJopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpmTJopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpmSJopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpmE  ]BsecurityModerate: expat security update+6Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530`expat-2.5.0-1.el9_3.1.x86_64.rpm` expat-2.5.0-1.el9_3.1.i686.rpm`expat-2.5.0-1.el9_3.1.x86_64.rpm` expat-2.5.0-1.el9_3.1.i686.rpm! "`securityModerate: less security update+x#https://access.redhat.com/errata/RHSA-2024:1692RHSA-2024:1692RHSA-2024:1692https://access.redhat.com/security/cve/CVE-2022-48624CVE-2022-48624CVE-2022-48624https://bugzilla.redhat.com/22650812265081https://errata.almalinux.org/9/ALSA-2024-1692.htmlALSA-2024:1692ALSA-2024:1692<less-590-3.el9_3.x86_64.rpm<less-590-3.el9_3.x86_64.rpm|" cBsecurityModerate: gnutls security update+https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879} gnutls-3.7.6-23.el9_3.4.i686.rpm}gnutls-3.7.6-23.el9_3.4.x86_64.rpm} gnutls-3.7.6-23.el9_3.4.i686.rpm}gnutls-3.7.6-23.el9_3.4.x86_64.rpm# (fsecurityImportant: shim bug fix update+,-Mhttps://access.redhat.com/errata/RHSA-2024:1903RHSA-2024:1903RHSA-2024:1903https://access.redhat.com/security/cve/CVE-2023-40546CVE-2023-40546CVE-2023-40546https://access.redhat.com/security/cve/CVE-2023-40547CVE-2023-40547CVE-2023-40547https://access.redhat.com/security/cve/CVE-2023-40548CVE-2023-40548CVE-2023-40548https://access.redhat.com/security/cve/CVE-2023-40549CVE-2023-40549CVE-2023-40549https://access.redhat.com/security/cve/CVE-2023-40550CVE-2023-40550CVE-2023-40550https://access.redhat.com/security/cve/CVE-2023-40551CVE-2023-40551CVE-2023-40551https://bugzilla.redhat.com/22345892234589https://bugzilla.redhat.com/22417822241782https://bugzilla.redhat.com/22417962241796https://bugzilla.redhat.com/22417972241797https://bugzilla.redhat.com/22599152259915https://bugzilla.redhat.com/22599182259918https://errata.almalinux.org/9/ALSA-2024-1903.htmlALSA-2024:1903ALSA-2024:1903fshim-x64-15.8-4.el9_3.alma.1.x86_64.rpmfshim-x64-15.8-4.el9_3.alma.1.x86_64.rpmx$ iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update+,z%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671Ckernel-5.14.0-427.13.1.el9_4.x86_64.rpm#Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm$Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1#bpftool-7.3.0-427.13.1.el9_4.x86_64.rpmCkernel-5.14.0-427.13.1.el9_4.x86_64.rpm#Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm$Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1#bpftool-7.3.0-427.13.1.el9_4.x86_64.rpm'%  JsecurityModerate: squashfs-tools security update+https://access.redhat.com/errata/RHSA-2024:2396RHSA-2024:2396RHSA-2024:2396https://access.redhat.com/security/cve/CVE-2021-40153CVE-2021-40153CVE-2021-40153https://access.redhat.com/security/cve/CVE-2021-41072CVE-2021-41072CVE-2021-41072https://bugzilla.redhat.com/19986211998621https://bugzilla.redhat.com/20049572004957https://errata.almalinux.org/9/ALSA-2024-2396.htmlALSA-2024:2396ALSA-2024:2396asquashfs-tools-4.4-10.git1.el9.x86_64.rpmasquashfs-tools-4.4-10.git1.el9.x86_64.rpm& MBsecurityModerate: harfbuzz security update+>{https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410jharfbuzz-2.7.4-10.el9.x86_64.rpmj harfbuzz-2.7.4-10.el9.i686.rpmjharfbuzz-2.7.4-10.el9.x86_64.rpmj harfbuzz-2.7.4-10.el9.i686.rpm' PBBBBsecurityModerate: avahi security update+9O https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433xavahi-libs-0.8-20.el9.x86_64.rpmwavahi-0.8-20.el9.x86_64.rpmx avahi-libs-0.8-20.el9.i686.rpmw avahi-0.8-20.el9.i686.rpmxavahi-libs-0.8-20.el9.x86_64.rpmwavahi-0.8-20.el9.x86_64.rpmx avahi-libs-0.8-20.el9.i686.rpmw avahi-0.8-20.el9.i686.rpm( VsecurityModerate: exfatprogs security update+https://access.redhat.com/errata/RHSA-2024:2437RHSA-2024:2437RHSA-2024:2437https://access.redhat.com/security/cve/CVE-2023-45897CVE-2023-45897CVE-2023-45897https://bugzilla.redhat.com/22469762246976https://errata.almalinux.org/9/ALSA-2024-2437.htmlALSA-2024:2437ALSA-2024:2437Aexfatprogs-1.2.2-2.el9.x86_64.rpmAexfatprogs-1.2.2-2.el9.x86_64.rpm) YBsecurityModerate: pam security update+Ohttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:24382Mpam-1.5.1-19.el9.x86_64.rpm2M pam-1.5.1-19.el9.i686.rpm2Mpam-1.5.1-19.el9.x86_64.rpm2M pam-1.5.1-19.el9.i686.rpm * \BBBsecurityLow: openssl and openssl-fips-provider security update+._/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447}k openssl-libs-3.0.7-27.el9.i686.rpm}kopenssl-libs-3.0.7-27.el9.x86_64.rpm/kopenssl-3.0.7-27.el9.x86_64.rpm}k openssl-libs-3.0.7-27.el9.i686.rpm}kopenssl-libs-3.0.7-27.el9.x86_64.rpm/kopenssl-3.0.7-27.el9.x86_64.rpm+ 3aBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update+Thttps://access.redhat.com/errata/RHSA-2024:2456RHSA-2024:2456RHSA-2024:2456https://access.redhat.com/security/cve/CVE-2023-4692CVE-2023-4692CVE-2023-4692https://access.redhat.com/security/cve/CVE-2023-4693CVE-2023-4693CVE-2023-4693https://access.redhat.com/security/cve/CVE-2024-1048CVE-2024-1048CVE-2024-1048https://bugzilla.redhat.com/22366132236613https://bugzilla.redhat.com/22383432238343https://bugzilla.redhat.com/22568272256827https://errata.almalinux.org/9/ALSA-2024-2456.htmlALSA-2024:2456ALSA-2024:2456 C grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpmi grub2-tools-2.06-77.el9.alma.1.x86_64.rpmh grub2-pc-2.06-77.el9.alma.1.x86_64.rpmk grub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpmf grub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpmg grub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpmj grub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpmB grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpmA grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm@ grub2-common-2.06-77.el9.alma.1.noarch.rpml grub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm C grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpmi grub2-tools-2.06-77.el9.alma.1.x86_64.rpmh grub2-pc-2.06-77.el9.alma.1.x86_64.rpmk grub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpmf grub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpmg grub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpmj grub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpmB grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpmA grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm@ grub2-common-2.06-77.el9.alma.1.noarch.rpml grub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpmF, tBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update+bhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 drhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpmQ systemd-container-252-32.el9_4.alma.1.i686.rpm4systemd-udev-252-32.el9_4.alma.1.x86_64.rpm1systemd-oomd-252-32.el9_4.alma.1.x86_64.rpmPsystemd-252-32.el9_4.alma.1.x86_64.rpmR systemd-libs-252-32.el9_4.alma.1.i686.rpmRsystemd-libs-252-32.el9_4.alma.1.x86_64.rpmP systemd-252-32.el9_4.alma.1.i686.rpm2systemd-pam-252-32.el9_4.alma.1.x86_64.rpmQsystemd-container-252-32.el9_4.alma.1.x86_64.rpm3systemd-resolved-252-32.el9_4.alma.1.x86_64.rpmesystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm drhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpmQ systemd-container-252-32.el9_4.alma.1.i686.rpm4systemd-udev-252-32.el9_4.alma.1.x86_64.rpm1systemd-oomd-252-32.el9_4.alma.1.x86_64.rpmPsystemd-252-32.el9_4.alma.1.x86_64.rpmR systemd-libs-252-32.el9_4.alma.1.i686.rpmRsystemd-libs-252-32.el9_4.alma.1.x86_64.rpmP systemd-252-32.el9_4.alma.1.i686.rpm2systemd-pam-252-32.el9_4.alma.1.x86_64.rpmQsystemd-container-252-32.el9_4.alma.1.x86_64.rpm3systemd-resolved-252-32.el9_4.alma.1.x86_64.rpmesystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm-  GsecurityModerate: traceroute security update+chttps://access.redhat.com/errata/RHSA-2024:2483RHSA-2024:2483RHSA-2024:2483https://access.redhat.com/security/cve/CVE-2023-46316CVE-2023-46316CVE-2023-46316https://bugzilla.redhat.com/22463032246303https://errata.almalinux.org/9/ALSA-2024-2483.htmlALSA-2024:2483ALSA-2024:2483etraceroute-2.1.0-18.el9.x86_64.rpmetraceroute-2.1.0-18.el9.x86_64.rpm. JBBsecurityLow: libssh security update+.vhttps://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:25041'libssh-0.10.4-13.el9.x86_64.rpm{'libssh-config-0.10.4-13.el9.noarch.rpm1' libssh-0.10.4-13.el9.i686.rpm1'libssh-0.10.4-13.el9.x86_64.rpm{'libssh-config-0.10.4-13.el9.noarch.rpm1' libssh-0.10.4-13.el9.i686.rpm'/  NBBBsecurityLow: file security update+.~Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512 file-libs-5.39-16.el9.x86_64.rpmCfile-5.39-16.el9.x86_64.rpm  file-libs-5.39-16.el9.i686.rpm file-libs-5.39-16.el9.x86_64.rpmCfile-5.39-16.el9.x86_64.rpm  file-libs-5.39-16.el9.i686.rpm0 SsecurityModerate: wpa_supplicant security update+@bhttps://access.redhat.com/errata/RHSA-2024:2517RHSA-2024:2517RHSA-2024:2517https://access.redhat.com/security/cve/CVE-2023-52160CVE-2023-52160CVE-2023-52160https://bugzilla.redhat.com/22645932264593https://errata.almalinux.org/9/ALSA-2024-2517.htmlALSA-2024:2517ALSA-2024:2517iwpa_supplicant-2.10-5.el9.x86_64.rpmiwpa_supplicant-2.10-5.el9.x86_64.rpm1 !VBsecurityModerate: gnutls security update+"https://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570~gnutls-3.8.3-4.el9_4.x86_64.rpm~ gnutls-3.8.3-4.el9_4.i686.rpm~gnutls-3.8.3-4.el9_4.x86_64.rpm~ gnutls-3.8.3-4.el9_4.i686.rpmA2 "YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: sssd security and bug fix update+3Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571#cpython3-sssdconfig-2.9.4-6.el9_4.noarch.rpmlibipa_hbac-2.9.4-6.el9_4.x86_64.rpm% sssd-client-2.9.4-6.el9_4.i686.rpm`python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmisssd-common-2.9.4-6.el9_4.x86_64.rpmgsssd-2.9.4-6.el9_4.x86_64.rpmbpython3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm!libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpmhsssd-ad-2.9.4-6.el9_4.x86_64.rpmtsssd-proxy-2.9.4-6.el9_4.x86_64.rpmosssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm! libsss_simpleifp-2.9.4-6.el9_4.i686.rpmrsssd-passkey-2.9.4-6.el9_4.x86_64.rpmusssd-tools-2.9.4-6.el9_4.x86_64.rpm libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmksssd-dbus-2.9.4-6.el9_4.x86_64.rpm libipa_hbac-2.9.4-6.el9_4.i686.rpm libsss_certmap-2.9.4-6.el9_4.i686.rpmjsssd-common-pac-2.9.4-6.el9_4.x86_64.rpm_python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpmpsssd-ldap-2.9.4-6.el9_4.x86_64.rpmmsssd-kcm-2.9.4-6.el9_4.x86_64.rpm libsss_idmap-2.9.4-6.el9_4.i686.rpm[libsss_sudo-2.9.4-6.el9_4.x86_64.rpmvsssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpmssssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpmZlibsss_autofs-2.9.4-6.el9_4.x86_64.rpmlsssd-ipa-2.9.4-6.el9_4.x86_64.rpmnsssd-krb5-2.9.4-6.el9_4.x86_64.rpmlibsss_certmap-2.9.4-6.el9_4.x86_64.rpmqsssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm%sssd-client-2.9.4-6.el9_4.x86_64.rpmlibsss_idmap-2.9.4-6.el9_4.x86_64.rpmapython3-sss-2.9.4-6.el9_4.x86_64.rpm  libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#cpython3-sssdconfig-2.9.4-6.el9_4.noarch.rpmlibipa_hbac-2.9.4-6.el9_4.x86_64.rpm% sssd-client-2.9.4-6.el9_4.i686.rpm`python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmisssd-common-2.9.4-6.el9_4.x86_64.rpmgsssd-2.9.4-6.el9_4.x86_64.rpmbpython3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm!libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpmhsssd-ad-2.9.4-6.el9_4.x86_64.rpmtsssd-proxy-2.9.4-6.el9_4.x86_64.rpmosssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm! libsss_simpleifp-2.9.4-6.el9_4.i686.rpmrsssd-passkey-2.9.4-6.el9_4.x86_64.rpmusssd-tools-2.9.4-6.el9_4.x86_64.rpm libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpmksssd-dbus-2.9.4-6.el9_4.x86_64.rpm libipa_hbac-2.9.4-6.el9_4.i686.rpm libsss_certmap-2.9.4-6.el9_4.i686.rpmjsssd-common-pac-2.9.4-6.el9_4.x86_64.rpm_python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpmpsssd-ldap-2.9.4-6.el9_4.x86_64.rpmmsssd-kcm-2.9.4-6.el9_4.x86_64.rpm libsss_idmap-2.9.4-6.el9_4.i686.rpm[libsss_sudo-2.9.4-6.el9_4.x86_64.rpmvsssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpmssssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpmZlibsss_autofs-2.9.4-6.el9_4.x86_64.rpmlsssd-ipa-2.9.4-6.el9_4.x86_64.rpmnsssd-krb5-2.9.4-6.el9_4.x86_64.rpmlibsss_certmap-2.9.4-6.el9_4.x86_64.rpmqsssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm%sssd-client-2.9.4-6.el9_4.x86_64.rpmlibsss_idmap-2.9.4-6.el9_4.x86_64.rpmapython3-sss-2.9.4-6.el9_4.x86_64.rpm  libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#3 #XBBBsecurityModerate: libxml2 security update+{nhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679?|python3-libxml2-2.9.13-6.el9_4.x86_64.rpm|libxml2-2.9.13-6.el9_4.x86_64.rpm| libxml2-2.9.13-6.el9_4.i686.rpm?|python3-libxml2-2.9.13-6.el9_4.x86_64.rpm|libxml2-2.9.13-6.el9_4.x86_64.rpm| libxml2-2.9.13-6.el9_4.i686.rpmk4 $]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+i&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743Dkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1$bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm#Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm$Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1$bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm#Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm$Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmt5 %~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+x https://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890Ekernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm$Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm#Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1%bpftool-7.3.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm$Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm#Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1%bpftool-7.3.0-427.18.1.el9_4.x86_64.rpm"6 &_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: glibc security update+, https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339P glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpmuglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-be-2.34-100.el9_4.2.x86_64.rpmKnscd-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpmwglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpmWglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpmgglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpmfglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpmxglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpmglibc-common-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpmZglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm_glibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpmaglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpmtglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpmbglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpmrglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm#glibc-2.34-100.el9_4.2.x86_64.rpmlglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpmpglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm%libnsl-2.34-100.el9_4.2.x86_64.rpmyglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm|glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpmdglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm~glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpmeglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpmYglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpmqglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm^glibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-br-2.34-100.el9_4.2.x86_64.rpmglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm[glibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpmoglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpmmglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm{glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm\glibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpmJglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm# glibc-2.34-100.el9_4.2.i686.rpmglibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm% libnsl-2.34-100.el9_4.2.i686.rpm$glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpmzglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpmjglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpmkglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpmsglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm$ glibc-gconv-extra-2.34-100.el9_4.2.i686.rpmcglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpmnglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpmhglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm}glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpmiglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpmXglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm`glibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm]glibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpmvglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpmP glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpmuglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-be-2.34-100.el9_4.2.x86_64.rpmKnscd-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpmwglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpmWglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpmgglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpmfglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpmxglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpmglibc-common-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpmZglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm_glibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpmaglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpmtglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpmbglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpmrglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm#glibc-2.34-100.el9_4.2.x86_64.rpmlglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpmpglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm%libnsl-2.34-100.el9_4.2.x86_64.rpmyglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm|glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpmdglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm~glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpmeglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpmYglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpmqglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm^glibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-br-2.34-100.el9_4.2.x86_64.rpmglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm[glibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpmoglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpmmglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm{glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm\glibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpmJglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm# glibc-2.34-100.el9_4.2.i686.rpmglibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm% libnsl-2.34-100.el9_4.2.i686.rpm$glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpmzglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpmjglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpmkglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpmsglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm$ glibc-gconv-extra-2.34-100.el9_4.2.i686.rpmcglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpmnglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpmhglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm}glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpmiglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpmXglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm`glibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm]glibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpmvglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm"7 ?|BsecurityModerate: nghttp2 security update+mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501zL libnghttp2-1.43.0-5.el9_4.3.i686.rpmzLlibnghttp2-1.43.0-5.el9_4.3.x86_64.rpmzL libnghttp2-1.43.0-5.el9_4.3.i686.rpmzLlibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm<8 @securityImportant: less security update+,zhttps://access.redhat.com/errata/RHSA-2024:3513RHSA-2024:3513RHSA-2024:3513https://access.redhat.com/security/cve/CVE-2024-32487CVE-2024-32487CVE-2024-32487https://bugzilla.redhat.com/22749802274980https://errata.almalinux.org/9/ALSA-2024-3513.htmlALSA-2024:3513ALSA-2024:3513<less-590-4.el9_4.x86_64.rpm<less-590-4.el9_4.x86_64.rpmU9 'CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+~bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619Fkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1&bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm"Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm$Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm#Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1&bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm"Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm$Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm#Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmO: (dBsecurityLow: c-ares security update+.`https://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842yG c-ares-1.19.1-2.el9_4.i686.rpmyGc-ares-1.19.1-2.el9_4.x86_64.rpmyG c-ares-1.19.1-2.el9_4.i686.rpmyGc-ares-1.19.1-2.el9_4.x86_64.rpmW; )gBBBBBBsecurityModerate: cockpit security update+bEhttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843FZcockpit-system-311.2-1.el9_4.noarch.rpmGZcockpit-ws-311.2-1.el9_4.x86_64.rpmCZcockpit-311.2-1.el9_4.x86_64.rpmEZcockpit-doc-311.2-1.el9_4.noarch.rpmDZcockpit-bridge-311.2-1.el9_4.x86_64.rpmFZcockpit-system-311.2-1.el9_4.noarch.rpmGZcockpit-ws-311.2-1.el9_4.x86_64.rpmCZcockpit-311.2-1.el9_4.x86_64.rpmEZcockpit-doc-311.2-1.el9_4.noarch.rpmDZcockpit-bridge-311.2-1.el9_4.x86_64.rpmc< 0/securityModerate: python-idna security update+'https://access.redhat.com/errata/RHSA-2024:3846RHSA-2024:3846RHSA-2024:3846https://access.redhat.com/security/cve/CVE-2024-3651CVE-2024-3651CVE-2024-3651https://bugzilla.redhat.com/22747792274779https://errata.almalinux.org/9/ALSA-2024-3846.htmlALSA-2024:3846ALSA-2024:3846spython3-idna-2.10-7.el9_4.1.noarch.rpmspython3-idna-2.10-7.el9_4.1.noarch.rpmO= *qBBBsecurityImportant: python3.9 security update+,+https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:40780python3-libs-3.9.18-3.el9_4.1.x86_64.rpmpython3-3.9.18-3.el9_4.1.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.1.i686.rpm0python3-libs-3.9.18-3.el9_4.1.x86_64.rpmpython3-3.9.18-3.el9_4.1.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.1.i686.rpm> +vBBBBBBsecurityImportant: openssh security update+,@shttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312pbopenssh-server-8.7p1-38.el9_4.1.x86_64.rpmmbopenssh-8.7p1-38.el9_4.1.x86_64.rpmnbopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpmobopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpmpbopenssh-server-8.7p1-38.el9_4.1.x86_64.rpmmbopenssh-8.7p1-38.el9_4.1.x86_64.rpmnbopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpmobopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm? ,~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update+3https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349"Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm#Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm$Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1'bpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm"Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm#Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm$Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1'bpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm{@ -_BBBBBBsecurityModerate: openssh security update+Ahttps://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457ocopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpmncopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpmpcopenssh-server-8.7p1-38.el9_4.4.x86_64.rpmmcopenssh-8.7p1-38.el9_4.4.x86_64.rpmocopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpmncopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpmpcopenssh-server-8.7p1-38.el9_4.4.x86_64.rpmmcopenssh-8.7p1-38.el9_4.4.x86_64.rpmߴA .gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,G$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583Hkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1(bpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm#Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm$Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1(bpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm#Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm$Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm&B  HBsecurityImportant: libndp security update+,a[https://access.redhat.com/errata/RHSA-2024:4636RHSA-2024:4636RHSA-2024:4636https://access.redhat.com/security/cve/CVE-2024-5564CVE-2024-5564CVE-2024-5564https://bugzilla.redhat.com/22841222284122https://errata.almalinux.org/9/ALSA-2024-4636.htmlALSA-2024:4636ALSA-2024:4636U libndp-1.8-6.el9_4.alma.1.i686.rpmUlibndp-1.8-6.el9_4.alma.1.x86_64.rpmU libndp-1.8-6.el9_4.alma.1.i686.rpmUlibndp-1.8-6.el9_4.alma.1.x86_64.rpmC LBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update+<#https://access.redhat.com/errata/RHSA-2024:4774RHSA-2024:4774RHSA-2024:4774https://access.redhat.com/security/cve/CVE-2023-31346CVE-2023-31346CVE-2023-31346https://bugzilla.redhat.com/22504582250458https://errata.almalinux.org/9/ALSA-2024-4774.htmlALSA-2024:4774ALSA-2024:4774YUiwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm_iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpmZ2iwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm^Uiwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm\iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpmdQnetronome-firmware-20240603-143.1.el9_4.noarch.rpmT{iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpmWUiwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpmVUiwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpmaQlibertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpmUqiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpmbQlinux-firmware-20240603-143.1.el9_4.noarch.rpm]Uiwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm[ iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm`2iwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpmcQlinux-firmware-whence-20240603-143.1.el9_4.noarch.rpmXUiwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpmYUiwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm_iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpmZ2iwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm^Uiwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm\iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpmdQnetronome-firmware-20240603-143.1.el9_4.noarch.rpmT{iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpmWUiwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpmVUiwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpmaQlibertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpmUqiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpmbQlinux-firmware-20240603-143.1.el9_4.noarch.rpm]Uiwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm[ iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm`2iwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpmcQlinux-firmware-whence-20240603-143.1.el9_4.noarch.rpmXUiwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpmaD /^BsecurityModerate: cups security update+_ https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776"X cups-libs-2.3.3op2-27.el9_4.i686.rpm"Xcups-libs-2.3.3op2-27.el9_4.x86_64.rpm"X cups-libs-2.3.3op2-27.el9_4.i686.rpm"Xcups-libs-2.3.3op2-27.el9_4.x86_64.rpmZE 0aBBBsecurityLow: python3 security update+.i,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 python3-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.i686.rpm python3-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.3.i686.rpm^F 1fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928Ikernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm$Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm#Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1)bpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm$Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm#Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1)bpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmQG 2GBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,F4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363!Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1*bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm#Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm$Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm!Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1*bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm#Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm$Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm|H 3hBBBBBBBBsecurityModerate: curl security update+z(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529u= libcurl-minimal-7.76.1-29.el9_4.1.i686.rpmt= libcurl-7.76.1-29.el9_4.1.i686.rpmu=libcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm!=curl-minimal-7.76.1-29.el9_4.1.x86_64.rpm =curl-7.76.1-29.el9_4.1.x86_64.rpmt=libcurl-7.76.1-29.el9_4.1.x86_64.rpmu= libcurl-minimal-7.76.1-29.el9_4.1.i686.rpmt= libcurl-7.76.1-29.el9_4.1.i686.rpmu=libcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm!=curl-minimal-7.76.1-29.el9_4.1.x86_64.rpm =curl-7.76.1-29.el9_4.1.x86_64.rpmt=libcurl-7.76.1-29.el9_4.1.x86_64.rpm/I 4rsecurityImportant: python-setuptools security update+,"xhttps://access.redhat.com/errata/RHSA-2024:5534RHSA-2024:5534RHSA-2024:5534https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5534.htmlALSA-2024:5534ALSA-2024:553466python3-setuptools-53.0.0-12.el9_4.1.noarch.rpm76python3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm66python3-setuptools-53.0.0-12.el9_4.1.noarch.rpm76python3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpmlJ 4uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928Kkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm!Kkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm$Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm#Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1+bpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm!Kkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm$Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm#Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1+bpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm*K securityModerate: python-urllib3 security update+2+https://access.redhat.com/errata/RHSA-2024:6162RHSA-2024:6162RHSA-2024:6162https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-6162.htmlALSA-2024:6162ALSA-2024:61628mpython3-urllib3-1.26.5-5.el9_4.1.noarch.rpm8mpython3-urllib3-1.26.5-5.el9_4.1.noarch.rpmܝ7L 5XBBBsecurityModerate: python3.9 security update+]hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:61630 python3-libs-3.9.18-3.el9_4.5.i686.rpm python3-3.9.18-3.el9_4.5.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.5.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.5.i686.rpm python3-3.9.18-3.el9_4.5.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.5.x86_64.rpmM 6]BBBBBBBBBBBBBBBsecurityModerate: krb5 security update+Ehttps://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166  krb5-libs-1.21.1-2.el9_4.i686.rpm\krb5-workstation-1.21.1-2.el9_4.x86_64.rpmkrb5-server-1.21.1-2.el9_4.x86_64.rpm libkadm5-1.21.1-2.el9_4.i686.rpm krb5-server-1.21.1-2.el9_4.i686.rpmkrb5-libs-1.21.1-2.el9_4.x86_64.rpmkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm krb5-pkinit-1.21.1-2.el9_4.i686.rpmlibkadm5-1.21.1-2.el9_4.x86_64.rpmkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm krb5-server-ldap-1.21.1-2.el9_4.i686.rpm  krb5-libs-1.21.1-2.el9_4.i686.rpm\krb5-workstation-1.21.1-2.el9_4.x86_64.rpmkrb5-server-1.21.1-2.el9_4.x86_64.rpm libkadm5-1.21.1-2.el9_4.i686.rpm krb5-server-1.21.1-2.el9_4.i686.rpmkrb5-libs-1.21.1-2.el9_4.x86_64.rpmkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm krb5-pkinit-1.21.1-2.el9_4.i686.rpmlibkadm5-1.21.1-2.el9_4.x86_64.rpmkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm krb5-server-ldap-1.21.1-2.el9_4.i686.rpm N 7nsecurityImportant: bubblewrap and flatpak security update+,KJhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356B{bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpmB{bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm`O 8pBsecurityModerate: glib2 security update+ https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464Kgglib2-2.68.4-14.el9_4.1.x86_64.rpmKg glib2-2.68.4-14.el9_4.1.i686.rpmKgglib2-2.68.4-14.el9_4.1.x86_64.rpmKg glib2-2.68.4-14.el9_4.1.i686.rpm0P 9sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+"l8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567Lkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm"Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpm!Lkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm1,bpftool-7.3.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-5.14.0-427.35.1.el9_4.x86_64.rpm#Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm$Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpmLkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm"Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpm!Lkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm1,bpftool-7.3.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-5.14.0-427.35.1.el9_4.x86_64.rpm#Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm$Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpmLkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpmYQ :TBsecurityModerate: expat security update+;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754a expat-2.5.0-2.el9_4.1.i686.rpmaexpat-2.5.0-2.el9_4.1.x86_64.rpma expat-2.5.0-2.el9_4.1.i686.rpmaexpat-2.5.0-2.el9_4.1.x86_64.rpm1R ;WBBBsecurityModerate: openssl security update+IPhttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783}l openssl-libs-3.0.7-28.el9_4.i686.rpm/lopenssl-3.0.7-28.el9_4.x86_64.rpm}lopenssl-libs-3.0.7-28.el9_4.x86_64.rpm}l openssl-libs-3.0.7-28.el9_4.i686.rpm/lopenssl-3.0.7-28.el9_4.x86_64.rpm}lopenssl-libs-3.0.7-28.el9_4.x86_64.rpmQS <\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update+,+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997Mkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm$Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm#Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1-bpftool-7.3.0-427.37.1.el9_4.x86_64.rpm"Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpmMkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm$Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm#Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1-bpftool-7.3.0-427.37.1.el9_4.x86_64.rpm"Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm T }BBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update+.*https://access.redhat.com/errata/RHSA-2024:7484RHSA-2024:7484RHSA-2024:7484https://access.redhat.com/security/cve/CVE-2023-20584CVE-2023-20584CVE-2023-20584https://access.redhat.com/security/cve/CVE-2023-31356CVE-2023-31356CVE-2023-31356https://bugzilla.redhat.com/23045832304583https://bugzilla.redhat.com/23045932304593https://errata.almalinux.org/9/ALSA-2024-7484.htmlALSA-2024:7484ALSA-2024:7484]Viwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpmXViwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpmVViwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm`3iwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpmUriwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpmZ3iwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm[ iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpmcRlinux-firmware-whence-20240905-143.3.el9_4.noarch.rpm\iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpmYViwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm_iwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpmaRlibertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm^Viwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpmdRnetronome-firmware-20240905-143.3.el9_4.noarch.rpmbRlinux-firmware-20240905-143.3.el9_4.noarch.rpmT|iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpmWViwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm]Viwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpmXViwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpmVViwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm`3iwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpmUriwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpmZ3iwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm[ iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpmcRlinux-firmware-whence-20240905-143.3.el9_4.noarch.rpm\iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpmYViwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm_iwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpmaRlibertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm^Viwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpmdRnetronome-firmware-20240905-143.3.el9_4.noarch.rpmbRlinux-firmware-20240905-143.3.el9_4.noarch.rpmT|iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpmWViwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpmyU =OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+X<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162$Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm#Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm1.bpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm"Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm$Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm#Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm1.bpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm"Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm V >pBBBsecurityModerate: python3.9 security update+\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 python3-3.9.18-3.el9_4.6.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.6.i686.rpm0 python3-libs-3.9.18-3.el9_4.6.x86_64.rpm python3-3.9.18-3.el9_4.6.x86_64.rpm0 python3-libs-3.9.18-3.el9_4.6.i686.rpm0 python3-libs-3.9.18-3.el9_4.6.x86_64.rpmW ?uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+p>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617Okernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm#Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm$Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm!Okernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm1/bpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm#Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm$Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm!Okernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm1/bpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmEX VBBBBBBBBBBBBBBBBBsecurityLow: NetworkManager security update+..jhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 <NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm@NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm:NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm;NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm?NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpmNetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm8NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm9NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm=NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm>NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm <NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm@NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm:NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm;NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm?NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpmNetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm8NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm9NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm=NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm>NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm%Y iBBBBBBsecurityLow: cockpit security update+.2https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325D[cockpit-bridge-323.1-1.el9_5.x86_64.rpmG[cockpit-ws-323.1-1.el9_5.x86_64.rpmC[cockpit-323.1-1.el9_5.x86_64.rpmF[cockpit-system-323.1-1.el9_5.noarch.rpmE[cockpit-doc-323.1-1.el9_5.noarch.rpmD[cockpit-bridge-323.1-1.el9_5.x86_64.rpmG[cockpit-ws-323.1-1.el9_5.x86_64.rpmC[cockpit-323.1-1.el9_5.x86_64.rpmF[cockpit-system-323.1-1.el9_5.noarch.rpmE[cockpit-doc-323.1-1.el9_5.noarch.rpmKZ qBBBBBBBBBBBBBBBsecurityModerate: krb5 security update+J https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331  krb5-libs-1.21.1-3.el9.i686.rpmlibkadm5-1.21.1-3.el9.x86_64.rpm krb5-server-1.21.1-3.el9.i686.rpmkrb5-server-ldap-1.21.1-3.el9.x86_64.rpmkrb5-libs-1.21.1-3.el9.x86_64.rpm krb5-pkinit-1.21.1-3.el9.i686.rpmkrb5-server-1.21.1-3.el9.x86_64.rpm krb5-server-ldap-1.21.1-3.el9.i686.rpmkrb5-pkinit-1.21.1-3.el9.x86_64.rpm libkadm5-1.21.1-3.el9.i686.rpm\krb5-workstation-1.21.1-3.el9.x86_64.rpm  krb5-libs-1.21.1-3.el9.i686.rpmlibkadm5-1.21.1-3.el9.x86_64.rpm krb5-server-1.21.1-3.el9.i686.rpmkrb5-server-ldap-1.21.1-3.el9.x86_64.rpmkrb5-libs-1.21.1-3.el9.x86_64.rpm krb5-pkinit-1.21.1-3.el9.i686.rpmkrb5-server-1.21.1-3.el9.x86_64.rpm krb5-server-ldap-1.21.1-3.el9.i686.rpmkrb5-pkinit-1.21.1-3.el9.x86_64.rpm libkadm5-1.21.1-3.el9.i686.rpm\krb5-workstation-1.21.1-3.el9.x86_64.rpmh[ BBBBsecurityLow: openssl security update+.UL https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333/nopenssl-3.2.2-6.el9_5.x86_64.rpm}nopenssl-libs-3.2.2-6.el9_5.x86_64.rpm}n openssl-libs-3.2.2-6.el9_5.i686.rpm/nopenssl-3.2.2-6.el9_5.x86_64.rpm}nopenssl-libs-3.2.2-6.el9_5.x86_64.rpm}n openssl-libs-3.2.2-6.el9_5.i686.rpme\ GBBBsecurityModerate: python3.9 security update+!khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:93710 python3-libs-3.9.19-8.el9.i686.rpm0 python3-libs-3.9.19-8.el9.x86_64.rpm python3-3.9.19-8.el9.x86_64.rpm0 python3-libs-3.9.19-8.el9.i686.rpm0 python3-libs-3.9.19-8.el9.x86_64.rpm python3-3.9.19-8.el9.x86_64.rpm4]  securityModerate: microcode_ctl security update+ dhttps://access.redhat.com/errata/RHSA-2024:9401RHSA-2024:9401RHSA-2024:9401https://access.redhat.com/security/cve/CVE-2023-22655CVE-2023-22655CVE-2023-22655https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-38575CVE-2023-38575CVE-2023-38575https://access.redhat.com/security/cve/CVE-2023-39368CVE-2023-39368CVE-2023-39368https://access.redhat.com/security/cve/CVE-2023-43490CVE-2023-43490CVE-2023-43490https://access.redhat.com/security/cve/CVE-2023-45733CVE-2023-45733CVE-2023-45733https://access.redhat.com/security/cve/CVE-2023-46103CVE-2023-46103CVE-2023-46103https://bugzilla.redhat.com/22706982270698https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22707012270701https://bugzilla.redhat.com/22707032270703https://bugzilla.redhat.com/22707042270704https://bugzilla.redhat.com/22922962292296https://bugzilla.redhat.com/22923002292300https://errata.almalinux.org/9/ALSA-2024-9401.htmlALSA-2024:9401ALSA-2024:9401\microcode_ctl-20240910-1.el9_5.noarch.rpm\microcode_ctl-20240910-1.el9_5.noarch.rpm3^ NBsecurityModerate: libgcrypt security update+p https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:9404Dlibgcrypt-1.10.0-11.el9.x86_64.rpmD libgcrypt-1.10.0-11.el9.i686.rpmDlibgcrypt-1.10.0-11.el9.x86_64.rpmD libgcrypt-1.10.0-11.el9.i686.rpmH_ QBsecurityLow: vim security update+.zthttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:9405Dnvim-filesystem-8.2.2637-21.el9.noarch.rpmqnvim-minimal-8.2.2637-21.el9.x86_64.rpmDnvim-filesystem-8.2.2637-21.el9.noarch.rpmqnvim-minimal-8.2.2637-21.el9.x86_64.rpma` TBBBsecurityModerate: bluez security update+n+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413bluez-libs-5.72-2.el9.x86_64.rpm;bluez-5.72-2.el9.x86_64.rpm bluez-libs-5.72-2.el9.i686.rpmbluez-libs-5.72-2.el9.x86_64.rpm;bluez-5.72-2.el9.x86_64.rpm bluez-libs-5.72-2.el9.i686.rpmta securityModerate: python-dns security update+qhttps://access.redhat.com/errata/RHSA-2024:9423RHSA-2024:9423RHSA-2024:9423https://access.redhat.com/security/cve/CVE-2023-29483CVE-2023-29483CVE-2023-29483https://bugzilla.redhat.com/22745202274520https://errata.almalinux.org/9/ALSA-2024-9423.htmlALSA-2024:9423ALSA-2024:9423 wpython3-dns-2.6.1-3.el9.noarch.rpm wpython3-dns-2.6.1-3.el9.noarch.rpm0b [securityLow: tpm2-tools security update+. 'https://access.redhat.com/errata/RHSA-2024:9424RHSA-2024:9424RHSA-2024:9424https://access.redhat.com/security/cve/CVE-2024-29038CVE-2024-29038CVE-2024-29038https://access.redhat.com/security/cve/CVE-2024-29039CVE-2024-29039CVE-2024-29039https://bugzilla.redhat.com/22780712278071https://bugzilla.redhat.com/22780752278075https://errata.almalinux.org/9/ALSA-2024-9424.htmlALSA-2024:9424ALSA-2024:9424dtpm2-tools-5.2-4.el9.x86_64.rpmdtpm2-tools-5.2-4.el9.x86_64.rpm5c  ^securityLow: nano security update+.1Ahttps://access.redhat.com/errata/RHSA-2024:9430RHSA-2024:9430RHSA-2024:9430https://access.redhat.com/security/cve/CVE-2024-5742CVE-2024-5742CVE-2024-5742https://bugzilla.redhat.com/22785742278574https://errata.almalinux.org/9/ALSA-2024-9430.htmlALSA-2024:9430ALSA-2024:9430Knano-5.6.1-6.el9.x86_64.rpmKnano-5.6.1-6.el9.x86_64.rpm5d asecurityImportant: bubblewrap and flatpak security update+,rRhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449B|bubblewrap-0.4.1-8.el9_5.x86_64.rpmB|bubblewrap-0.4.1-8.el9_5.x86_64.rpm6e  cBBBsecurityModerate: python3.9 security update+D\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:94680 python3-libs-3.9.19-8.el9_5.1.i686.rpm python3-3.9.19-8.el9_5.1.x86_64.rpm0 python3-libs-3.9.19-8.el9_5.1.x86_64.rpm0 python3-libs-3.9.19-8.el9_5.1.i686.rpm python3-3.9.19-8.el9_5.1.x86_64.rpm0 python3-libs-3.9.19-8.el9_5.1.x86_64.rpmf  hBsecurityLow: cups security update+. )https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470"Y cups-libs-2.3.3op2-31.el9_5.i686.rpm"Ycups-libs-2.3.3op2-31.el9_5.x86_64.rpm"Y cups-libs-2.3.3op2-31.el9_5.i686.rpm"Ycups-libs-2.3.3op2-31.el9_5.x86_64.rpmSg  kBBBBBBBBBBBBBBBsecurityImportant: krb5 security update+,IShttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474  krb5-server-ldap-1.21.1-4.el9_5.i686.rpmkrb5-pkinit-1.21.1-4.el9_5.x86_64.rpmkrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm krb5-server-1.21.1-4.el9_5.i686.rpmkrb5-libs-1.21.1-4.el9_5.x86_64.rpmkrb5-server-1.21.1-4.el9_5.x86_64.rpm krb5-libs-1.21.1-4.el9_5.i686.rpm krb5-pkinit-1.21.1-4.el9_5.i686.rpm libkadm5-1.21.1-4.el9_5.i686.rpm\krb5-workstation-1.21.1-4.el9_5.x86_64.rpmlibkadm5-1.21.1-4.el9_5.x86_64.rpm  krb5-server-ldap-1.21.1-4.el9_5.i686.rpmkrb5-pkinit-1.21.1-4.el9_5.x86_64.rpmkrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm krb5-server-1.21.1-4.el9_5.i686.rpmkrb5-libs-1.21.1-4.el9_5.x86_64.rpmkrb5-server-1.21.1-4.el9_5.x86_64.rpm krb5-libs-1.21.1-4.el9_5.i686.rpm krb5-pkinit-1.21.1-4.el9_5.i686.rpm libkadm5-1.21.1-4.el9_5.i686.rpm\krb5-workstation-1.21.1-4.el9_5.x86_64.rpmlibkadm5-1.21.1-4.el9_5.x86_64.rpmQh  |BsecurityModerate: expat security update+Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541bexpat-2.5.0-3.el9_5.1.x86_64.rpmb expat-2.5.0-3.el9_5.1.i686.rpmbexpat-2.5.0-3.el9_5.1.x86_64.rpmb expat-2.5.0-3.el9_5.1.i686.rpmUi  BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update+c'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:96053kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm*3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm10bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm$3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm#3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm*3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm10bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm$3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm#3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpmFj bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%, https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:00597kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm14bpftool-7.4.0-503.21.1.el9_5.x86_64.rpm"7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm#7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm$7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm*7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm14bpftool-7.4.0-503.21.1.el9_5.x86_64.rpm"7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm#7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm$7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm*7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm>k EsecurityImportant: rsync security update%,8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324=rsync-3.2.3-20.el9_5.1.x86_64.rpm=rsync-3.2.3-20.el9_5.1.x86_64.rpmdl GBBBBBBBBBBBBBBBBBsecurityModerate: Security and bug fixes for NetworkManager%LLhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 @ NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm? NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm= NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm9 NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm: NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm> NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm< NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm; NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm8 NetworkManager-1.48.10-5.el9_5.x86_64.rpm @ NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm? NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm= NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm9 NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm: NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm> NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm< NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm; NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm8 NetworkManager-1.48.10-5.el9_5.x86_64.rpm(m ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%Ehttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578!8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm$8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm"8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm15bpftool-7.4.0-503.22.1.el9_5.x86_64.rpm#8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm*8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm!8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm$8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm"8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm15bpftool-7.4.0-503.22.1.el9_5.x86_64.rpm#8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm*8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpmՕ/n }BBBsecurityModerate: bzip2 security update%]https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925=fbzip2-1.0.8-10.el9_5.x86_64.rpm f bzip2-libs-1.0.8-10.el9_5.i686.rpm fbzip2-libs-1.0.8-10.el9_5.x86_64.rpm=fbzip2-1.0.8-10.el9_5.x86_64.rpm f bzip2-libs-1.0.8-10.el9_5.i686.rpm fbzip2-libs-1.0.8-10.el9_5.x86_64.rpmo BBBBsecurityImportant: python3.9 security update%,ng https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136python3-3.9.21-2.el9_6.1.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.1.i686.rpm0python3-libs-3.9.21-2.el9_6.1.x86_64.rpmpython3-3.9.21-2.el9_6.1.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.1.i686.rpm0python3-libs-3.9.21-2.el9_6.1.x86_64.rpmÓlp GBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,U] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379Xkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm$Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm*Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm#Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm"Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm$Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm*Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm#Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm"Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmÿq (fsecurityModerate: python-setuptools security update%2Jhttps://access.redhat.com/errata/RHSA-2025:10407RHSA-2025:10407RHSA-2025:10407https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-10407.htmlALSA-2025:10407ALSA-2025:1040777python3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm67python3-setuptools-53.0.0-13.el9_6.1.noarch.rpm77python3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm67python3-setuptools-53.0.0-13.el9_6.1.noarch.rpmó`r ,iBsecurityModerate: jq security update%| https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585Tjq-1.6-17.el9_6.2.x86_64.rpmT jq-1.6-17.el9_6.2.i686.rpmTjq-1.6-17.el9_6.2.x86_64.rpmT jq-1.6-17.el9_6.2.i686.rpmþCs mBBBsecurityImportant: libxml2 security update%,Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699ulibxml2-2.9.13-10.el9_6.x86_64.rpm?upython3-libxml2-2.9.13-10.el9_6.x86_64.rpmu libxml2-2.9.13-10.el9_6.i686.rpmulibxml2-2.9.13-10.el9_6.x86_64.rpm?upython3-libxml2-2.9.13-10.el9_6.x86_64.rpmu libxml2-2.9.13-10.el9_6.i686.rpmþ#t rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%Rhttps://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837Ykernel-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm"Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm$Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm*Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm#Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpm!Ykernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm"Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm$Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm*Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm#Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-core-5.14.0-570.26.1.el9_6.x86_64.rpmYkernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpm!Ykernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpmpu QBsecurityModerate: glib2 security update%fhttps://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140Kh glib2-2.68.4-16.el9_6.2.i686.rpmKhglib2-2.68.4-16.el9_6.2.x86_64.rpmKh glib2-2.68.4-16.el9_6.2.i686.rpmKhglib2-2.68.4-16.el9_6.2.x86_64.rpm޽.v TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,jVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411*Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm"Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm!Zkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm$Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm#Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpm*Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm"Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm!Zkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm$Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm#Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpmZkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpmĂVw sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%@https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861[kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm*[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm[kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm$[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-5.14.0-570.30.1.el9_6.x86_64.rpm#[kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm![kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm"[kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm*[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm[kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm$[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-5.14.0-570.30.1.el9_6.x86_64.rpm#[kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm![kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm"[kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm[kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpmį+x RBsecurityImportant: sqlite security update%,N https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992Ousqlite-libs-3.34.1-8.el9_6.x86_64.rpmOu sqlite-libs-3.34.1-8.el9_6.i686.rpmOusqlite-libs-3.34.1-8.el9_6.x86_64.rpmOu sqlite-libs-3.34.1-8.el9_6.i686.rpmĢy UBsecurityModerate: icu security update%Whttps://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083 libicu-67.1-10.el9_6.i686.rpmlibicu-67.1-10.el9_6.x86_64.rpm libicu-67.1-10.el9_6.i686.rpmlibicu-67.1-10.el9_6.x86_64.rpmħGz XBBBsecurityImportant: libxml2 security update%,i!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447v libxml2-2.9.13-11.el9_6.i686.rpmvlibxml2-2.9.13-11.el9_6.x86_64.rpm?vpython3-libxml2-2.9.13-11.el9_6.x86_64.rpmv libxml2-2.9.13-11.el9_6.i686.rpmvlibxml2-2.9.13-11.el9_6.x86_64.rpm?vpython3-libxml2-2.9.13-11.el9_6.x86_64.rpmijy{ securityModerate: python-requests security update% Rhttps://access.redhat.com/errata/RHSA-2025:12519RHSA-2025:12519RHSA-2025:12519https://access.redhat.com/security/cve/CVE-2024-47081CVE-2024-47081CVE-2024-47081https://bugzilla.redhat.com/23712722371272https://errata.almalinux.org/9/ALSA-2025-12519.htmlALSA-2025:12519ALSA-2025:125195tpython3-requests-2.25.1-10.el9_6.noarch.rpm5tpython3-requests-2.25.1-10.el9_6.noarch.rpmf| ^BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,\https://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262$9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm16bpftool-7.4.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm!9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm*9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm"9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm#9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm$9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm16bpftool-7.4.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm!9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm*9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm"9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm#9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm} ABBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,yohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746\kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm*\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm$\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm"\kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm#\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm!\kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm\kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm*\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm$\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm"\kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm#\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm!\kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm\kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm\kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpmҚ~  `BBBsecurityImportant: openssl security update%,hqhttps://access.redhat.com/errata/RHSA-2025:1330RHSA-2025:1330RHSA-2025:1330https://access.redhat.com/security/cve/CVE-2024-12797CVE-2024-12797CVE-2024-12797https://bugzilla.redhat.com/23427572342757https://errata.almalinux.org/9/ALSA-2025-1330.htmlALSA-2025:1330ALSA-2025:1330}o openssl-libs-3.2.2-6.el9_5.1.i686.rpm/oopenssl-3.2.2-6.el9_5.1.x86_64.rpm}oopenssl-libs-3.2.2-6.el9_5.1.x86_64.rpm}o openssl-libs-3.2.2-6.el9_5.1.i686.rpm/oopenssl-3.2.2-6.el9_5.1.x86_64.rpm}oopenssl-libs-3.2.2-6.el9_5.1.x86_64.rpm\ !eBBBsecurityModerate: libxml2 security update%Yhttps://access.redhat.com/errata/RHSA-2025:13428RHSA-2025:13428RHSA-2025:13428https://access.redhat.com/security/cve/CVE-2025-32414CVE-2025-32414CVE-2025-32414https://access.redhat.com/security/cve/CVE-2025-32415CVE-2025-32415CVE-2025-32415https://bugzilla.redhat.com/23581212358121https://bugzilla.redhat.com/23607682360768https://errata.almalinux.org/9/ALSA-2025-13428.htmlALSA-2025:13428ALSA-2025:13428?wpython3-libxml2-2.9.13-12.el9_6.x86_64.rpmwlibxml2-2.9.13-12.el9_6.x86_64.rpmw libxml2-2.9.13-12.el9_6.i686.rpm?wpython3-libxml2-2.9.13-12.el9_6.x86_64.rpmwlibxml2-2.9.13-12.el9_6.x86_64.rpmw libxml2-2.9.13-12.el9_6.i686.rpmԼ> "jBBBBBBBBBBBBBBBBsecurityModerate: gcc security update%nKhttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346  libgomp-11.5.0-5.el9_5.alma.1.i686.rpm" libstdc++-11.5.0-5.el9_5.alma.1.i686.rpmlibgomp-11.5.0-5.el9_5.alma.1.x86_64.rpmlibgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm libgcc-11.5.0-5.el9_5.alma.1.i686.rpm libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm libatomic-11.5.0-5.el9_5.alma.1.i686.rpmlibgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm"libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpmlibatomic-11.5.0-5.el9_5.alma.1.x86_64.rpmlibquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm  libgomp-11.5.0-5.el9_5.alma.1.i686.rpm" libstdc++-11.5.0-5.el9_5.alma.1.i686.rpmlibgomp-11.5.0-5.el9_5.alma.1.x86_64.rpmlibgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm libgcc-11.5.0-5.el9_5.alma.1.i686.rpm libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm libatomic-11.5.0-5.el9_5.alma.1.i686.rpmlibgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm"libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpmlibatomic-11.5.0-5.el9_5.alma.1.x86_64.rpmlibquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm #|BBBsecurityImportant: libxml2 security update%,9~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350?}python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm} libxml2-2.9.13-6.el9_5.1.i686.rpm}libxml2-2.9.13-6.el9_5.1.x86_64.rpm?}python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm} libxml2-2.9.13-6.el9_5.1.i686.rpm}libxml2-2.9.13-6.el9_5.1.x86_64.rpm  $ABBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%7Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm#]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm*]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm$]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm#]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm*]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm$]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm %`BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962"^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm*^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm#^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm$^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm"^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm*^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm#^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm$^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpmŠ  &BsecurityImportant: libarchive security update%,}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130Lylibarchive-3.5.3-6.el9_6.x86_64.rpmLy libarchive-3.5.3-6.el9_6.i686.rpmLylibarchive-3.5.3-6.el9_6.x86_64.rpmLy libarchive-3.5.3-6.el9_6.i686.rpmŗl 'BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%, !https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm*_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm$_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm#_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm*_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm$_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm#_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpmŻv (aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,.https://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm#`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm$`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm*`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm#`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm$`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm*`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm' )@BBBsecurityModerate: python3.9 security update%E;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019python3-3.9.21-2.el9_6.2.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.2.i686.rpm0python3-libs-3.9.21-2.el9_6.2.x86_64.rpmpython3-3.9.21-2.el9_6.2.x86_64.rpm0 python3-libs-3.9.21-2.el9_6.2.i686.rpm0python3-libs-3.9.21-2.el9_6.2.x86_64.rpm  *EBsecurityImportant: pam security update%,phttps://access.redhat.com/errata/RHSA-2025:15099RHSA-2025:15099RHSA-2025:15099https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://access.redhat.com/security/cve/CVE-2025-8941CVE-2025-8941CVE-2025-8941https://bugzilla.redhat.com/23725122372512https://bugzilla.redhat.com/23882202388220https://errata.almalinux.org/9/ALSA-2025-15099.htmlALSA-2025:15099ALSA-2025:150992Qpam-1.5.1-26.el9_6.x86_64.rpm2Q pam-1.5.1-26.el9_6.i686.rpm2Qpam-1.5.1-26.el9_6.x86_64.rpm2Q pam-1.5.1-26.el9_6.i686.rpm  +HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,pWhttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429akernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm$akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm#akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm*akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm$akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm#akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm*akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmƟ+  ,gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,G https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661#bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm$bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm*bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpm!bkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm#bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm$bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm*bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpm!bkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpmƤU  -FBsecurityImportant: cups security update%,a https://access.redhat.com/errata/RHSA-2025:15700RHSA-2025:15700RHSA-2025:15700https://access.redhat.com/security/cve/CVE-2025-58060CVE-2025-58060CVE-2025-58060https://access.redhat.com/security/cve/CVE-2025-58364CVE-2025-58364CVE-2025-58364https://bugzilla.redhat.com/23925952392595https://bugzilla.redhat.com/23930782393078https://errata.almalinux.org/9/ALSA-2025-15700.htmlALSA-2025:15700ALSA-2025:15700"Zcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm"Z cups-libs-2.3.3op2-33.el9_6.1.i686.rpm"Zcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm"Z cups-libs-2.3.3op2-33.el9_6.1.i686.rpmS  .IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%nhttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740*ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm$ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm#ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm"ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm*ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm$ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm#ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm"ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmԃP  *hsecurityModerate: python-cryptography security update%nLhttps://access.redhat.com/errata/RHSA-2025:15874RHSA-2025:15874RHSA-2025:15874https://access.redhat.com/security/cve/CVE-2023-49083CVE-2023-49083CVE-2023-49083https://bugzilla.redhat.com/22553312255331https://errata.almalinux.org/9/ALSA-2025-15874.htmlALSA-2025:15874ALSA-2025:15874^python3-cryptography-36.0.1-5.el9_6.x86_64.rpm^python3-cryptography-36.0.1-5.el9_6.x86_64.rpmƯ# /kBsecurityModerate: gnutls security, bug fix, and enhancement update%: https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116gnutls-3.8.3-6.el9_6.2.x86_64.rpm gnutls-3.8.3-6.el9_6.2.i686.rpmgnutls-3.8.3-6.el9_6.2.x86_64.rpm gnutls-3.8.3-6.el9_6.2.i686.rpm  0nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%K https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398dkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm#dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm*dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm$dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm#dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm*dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm$dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmr 1MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%Rhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:16592:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm*:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm17bpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm#:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm$:kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm2:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm*:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm17bpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm#:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm$:kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpmJ 2pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%ci https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880ekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm#ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm$ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm*ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm!ekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm#ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm$ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm*ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm!ekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmM 3OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%LFhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377fkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm*fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm$fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm#fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmfkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm*fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm$fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm#fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmǝU 4nsecurityModerate: iputils security update%ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558P iputils-20210202-11.el9_6.3.x86_64.rpmP iputils-20210202-11.el9_6.3.x86_64.rpmDz^ 5pBsecurityModerate: vim security update%yzhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742qpvim-minimal-8.2.2637-22.el9_6.1.x86_64.rpmDpvim-filesystem-8.2.2637-22.el9_6.1.noarch.rpmqpvim-minimal-8.2.2637-22.el9_6.1.x86_64.rpmDpvim-filesystem-8.2.2637-22.el9_6.1.noarch.rpmǹ  6sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%sd https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760gkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm*gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm#gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm$gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm*gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm#gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm$gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm¿7 7RBBsecurityModerate: libssh security update%W https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:182751(libssh-0.10.4-15.el9_6.x86_64.rpm{(libssh-config-0.10.4-15.el9_6.noarch.rpm1( libssh-0.10.4-15.el9_6.i686.rpm1(libssh-0.10.4-15.el9_6.x86_64.rpm{(libssh-config-0.10.4-15.el9_6.noarch.rpm1( libssh-0.10.4-15.el9_6.i686.rpm  8VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%bhttps://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281hkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm#hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm*hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm$hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm#hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm*hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm$hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpm  9uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%whttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409ikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm*ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm#ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm$ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm*ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm#ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm$ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmȷ  :TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%{9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930jkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm"jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm$jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm*jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm#jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm"jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm$jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm*jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm#jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmѴE ;sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%4Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396skernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm*skernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm"skernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-5.14.0-611.5.1.el9_7.x86_64.rpm#skernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm$skernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm!skernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm*skernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm"skernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-5.14.0-611.5.1.el9_7.x86_64.rpm#skernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm$skernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm!skernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.5.1.el9_7.x86_64.rpmF $RBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update% Mhttps://access.redhat.com/errata/RHSA-2025:20532RHSA-2025:20532RHSA-2025:20532https://access.redhat.com/security/cve/CVE-2024-45777CVE-2024-45777CVE-2024-45777https://bugzilla.redhat.com/23463432346343https://errata.almalinux.org/9/ALSA-2025-20532.htmlALSA-2025:20532ALSA-2025:20532 A grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpmh grub2-pc-2.06-114.el9_7.alma.1.x86_64.rpmB grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm@ grub2-common-2.06-114.el9_7.alma.1.noarch.rpmg grub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpmj grub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpmf grub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpmC grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpmi grub2-tools-2.06-114.el9_7.alma.1.x86_64.rpml grub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpmk grub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm A grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpmh grub2-pc-2.06-114.el9_7.alma.1.x86_64.rpmB grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm@ grub2-common-2.06-114.el9_7.alma.1.noarch.rpmg grub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpmj grub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpmf grub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpmC grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpmi grub2-tools-2.06-114.el9_7.alma.1.x86_64.rpml grub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpmk grub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpmR *eBBBsecurityLow: shadow-utils security update%.Yhttps://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559eshadow-utils-4.9-15.el9.x86_64.rpm$shadow-utils-subid-4.9-15.el9.x86_64.rpm$ shadow-utils-subid-4.9-15.el9.i686.rpmeshadow-utils-4.9-15.el9.x86_64.rpm$shadow-utils-subid-4.9-15.el9.x86_64.rpm$ shadow-utils-subid-4.9-15.el9.i686.rpm rBsecurityModerate: vim security update%tzhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945qqvim-minimal-8.2.2637-23.el9_7.x86_64.rpmDqvim-filesystem-8.2.2637-23.el9_7.noarch.rpmqqvim-minimal-8.2.2637-23.el9_7.x86_64.rpmDqvim-filesystem-8.2.2637-23.el9_7.noarch.rpmT  ?uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: sssd security update%,n/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954#g sssd-2.9.7-4.el9_7.1.x86_64.rpmr sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpml sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpmk sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpmu sssd-tools-2.9.7-4.el9_7.1.x86_64.rpmt sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpm_ python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpma python3-sss-2.9.7-4.el9_7.1.x86_64.rpm% sssd-client-2.9.7-4.el9_7.1.x86_64.rpmn sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpm` python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpmm sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpmi sssd-common-2.9.7-4.el9_7.1.x86_64.rpmj sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm[ libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpmc python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm libipa_hbac-2.9.7-4.el9_7.1.i686.rpms sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpmb python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpmp sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm libsss_idmap-2.9.7-4.el9_7.1.i686.rpm! libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpmv sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm! libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpmo sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpmh sssd-ad-2.9.7-4.el9_7.1.x86_64.rpmq sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm% sssd-client-2.9.7-4.el9_7.1.i686.rpmZ libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm libsss_certmap-2.9.7-4.el9_7.1.i686.rpm libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm#g sssd-2.9.7-4.el9_7.1.x86_64.rpmr sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpml sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpmk sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpmu sssd-tools-2.9.7-4.el9_7.1.x86_64.rpmt sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpm_ python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpma python3-sss-2.9.7-4.el9_7.1.x86_64.rpm% sssd-client-2.9.7-4.el9_7.1.x86_64.rpmn sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpm` python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpmm sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpmi sssd-common-2.9.7-4.el9_7.1.x86_64.rpmj sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm[ libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpmc python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm libipa_hbac-2.9.7-4.el9_7.1.i686.rpms sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpmb python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpmp sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm libsss_idmap-2.9.7-4.el9_7.1.i686.rpm! libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpmv sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm! libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpmo sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpmh sssd-ad-2.9.7-4.el9_7.1.x86_64.rpmq sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm% sssd-client-2.9.7-4.el9_7.1.i686.rpmZ libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm libsss_certmap-2.9.7-4.el9_7.1.i686.rpm libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpmɵ! tBBBsecurityModerate: openssl security update%Zhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255}popenssl-libs-3.5.1-4.el9_7.x86_64.rpm/popenssl-3.5.1-4.el9_7.x86_64.rpm}p openssl-libs-3.5.1-4.el9_7.i686.rpm}popenssl-libs-3.5.1-4.el9_7.x86_64.rpm/popenssl-3.5.1-4.el9_7.x86_64.rpm}p openssl-libs-3.5.1-4.el9_7.i686.rpmɵs" yBsecurityModerate: kernel security update%whttps://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpmkernel-5.14.0-611.9.1.el9_7.x86_64.rpmkernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpmkernel-5.14.0-611.9.1.el9_7.x86_64.rpmɵ=# |BsecurityImportant: expat security update%,v&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175e expat-2.5.0-5.el9_7.1.i686.rpmeexpat-2.5.0-5.el9_7.1.x86_64.rpme expat-2.5.0-5.el9_7.1.i686.rpmeexpat-2.5.0-5.el9_7.1.x86_64.rpm$ BBBsecurityModerate: libxml2 security update%,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376x libxml2-2.9.13-14.el9_7.i686.rpmxlibxml2-2.9.13-14.el9_7.x86_64.rpm?xpython3-libxml2-2.9.13-14.el9_7.x86_64.rpmx libxml2-2.9.13-14.el9_7.i686.rpmxlibxml2-2.9.13-14.el9_7.x86_64.rpm?xpython3-libxml2-2.9.13-14.el9_7.x86_64.rpm% DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%H;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405#kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm$kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm!kkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm*kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm#kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm$kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm!kkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm*kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpmۅm& cBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update%)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660 Psystemd-252-55.el9_7.7.alma.1.x86_64.rpmRsystemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm3systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpmP systemd-252-55.el9_7.7.alma.1.i686.rpmQsystemd-container-252-55.el9_7.7.alma.1.x86_64.rpmQ systemd-container-252-55.el9_7.7.alma.1.i686.rpmesystemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpmR systemd-libs-252-55.el9_7.7.alma.1.i686.rpmdrhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm1systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm4systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm2systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm Psystemd-252-55.el9_7.7.alma.1.x86_64.rpmRsystemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm3systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpmP systemd-252-55.el9_7.7.alma.1.i686.rpmQsystemd-container-252-55.el9_7.7.alma.1.x86_64.rpmQ systemd-container-252-55.el9_7.7.alma.1.i686.rpmesystemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpmR systemd-libs-252-55.el9_7.7.alma.1.i686.rpmdrhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm1systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm4systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm2systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpmƗC' vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%,Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865lkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm#lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm*lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm$lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm#lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm*lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm$lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmʊ ( UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241*mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm#mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm$mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm"mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm*mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm#mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm$mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm"mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm") tBBBsecurityModerate: python3.9 security update%Lx https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342python3-3.9.25-2.el9_7.x86_64.rpm0 python3-libs-3.9.25-2.el9_7.i686.rpm0python3-libs-3.9.25-2.el9_7.x86_64.rpmpython3-3.9.25-2.el9_7.x86_64.rpm0 python3-libs-3.9.25-2.el9_7.i686.rpm0python3-libs-3.9.25-2.el9_7.x86_64.rpmʥp*  yBBBsecurityModerate: binutils security update%Dhttps://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343Atbinutils-gold-2.35.2-67.el9_7.1.x86_64.rpmt binutils-2.35.2-67.el9_7.1.i686.rpmtbinutils-2.35.2-67.el9_7.1.x86_64.rpmAtbinutils-gold-2.35.2-67.el9_7.1.x86_64.rpmt binutils-2.35.2-67.el9_7.1.i686.rpmtbinutils-2.35.2-67.el9_7.1.x86_64.rpmʥj+  ~BBBBBBsecurityModerate: openssh security update%_whttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480neopenssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpmpeopenssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpmmeopenssh-8.7p1-47.el9_7.alma.1.x86_64.rpmoeopenssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpmneopenssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpmpeopenssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpmmeopenssh-8.7p1-47.el9_7.alma.1.x86_64.rpmoeopenssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpmʡ,  FBBsecurityModerate: libssh security update%V&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:234831*libssh-0.10.4-17.el9_7.x86_64.rpm{*libssh-config-0.10.4-17.el9_7.noarch.rpm1* libssh-0.10.4-17.el9_7.i686.rpm1*libssh-0.10.4-17.el9_7.x86_64.rpm{*libssh-config-0.10.4-17.el9_7.noarch.rpm1* libssh-0.10.4-17.el9_7.i686.rpmʡ -  JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,|9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm18bpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm*;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm#;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm$;kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm18bpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm*;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm#;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm$;kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpmR.  mBBBsecurityImportant: libxml2 security update%,5Phttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679~libxml2-2.9.13-6.el9_5.2.x86_64.rpm?~python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm~ libxml2-2.9.13-6.el9_5.2.i686.rpm~libxml2-2.9.13-6.el9_5.2.x86_64.rpm?~python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm~ libxml2-2.9.13-6.el9_5.2.i686.rpmʏW/ rBBBBBBBBBBBBBBBBBsecurityImportant: grub2 security update%,7https://access.redhat.com/errata/RHSA-2025:2867RHSA-2025:2867RHSA-2025:2867https://access.redhat.com/security/cve/CVE-2025-0624CVE-2025-0624CVE-2025-0624https://bugzilla.redhat.com/23461122346112https://errata.almalinux.org/9/ALSA-2025-2867.htmlALSA-2025:2867ALSA-2025:2867 igrub2-tools-2.06-94.el9_5.alma.1.x86_64.rpmCgrub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpmSgrub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpmfgrub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpmBgrub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpmhgrub2-pc-2.06-94.el9_5.alma.1.x86_64.rpmjgrub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpmggrub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpmkgrub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm@grub2-common-2.06-94.el9_5.alma.1.noarch.rpmlgrub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpmAgrub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm igrub2-tools-2.06-94.el9_5.alma.1.x86_64.rpmCgrub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpmSgrub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpmfgrub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpmBgrub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpmhgrub2-pc-2.06-94.el9_5.alma.1.x86_64.rpmjgrub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpmggrub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpmkgrub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm@grub2-common-2.06-94.el9_5.alma.1.noarch.rpmlgrub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpmAgrub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpmK0 FBsecurityModerate: expat security update%glibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpmbglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpmwglibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-2.34-125.el9_5.8.alma.1.x86_64.rpmrglibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpmkglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpmvglibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpmsglibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpmxglibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpmiglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm# glibc-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpmtglibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm[glibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpm_glibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpmdglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpmnglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm$ glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpmKnscd-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpmaglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpmcglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpm`glibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpmYglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpmuglibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpmXglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm%libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm{glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpmqglibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm% libnsl-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpmZglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpmyglibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpmhglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpmmglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpmeglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpmjglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpmoglibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm|glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm}glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpmgglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm^glibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm\glibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpmfglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpmzglibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpmlglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm~glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm]glibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpmP(glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpmbglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpmwglibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-2.34-125.el9_5.8.alma.1.x86_64.rpmrglibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpmkglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpmvglibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpmsglibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpmxglibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpmiglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm# glibc-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpmtglibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm[glibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpm_glibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpmdglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpmnglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm$ glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpmKnscd-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpmaglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpmcglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpm`glibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpmYglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpmuglibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpmXglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm%libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm{glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpmqglibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm% libnsl-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpmZglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpmyglibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpmhglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpmmglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpmeglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpmjglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpmoglibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm|glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm}glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpmgglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm^glibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm\glibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpmfglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpmzglibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpmlglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm~glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm]glibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpmr3 GBBBsecurityModerate: python3.9 security update%r[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:69770 python3-libs-3.9.21-2.el9.i686.rpmpython3-3.9.21-2.el9.x86_64.rpm0python3-libs-3.9.21-2.el9.x86_64.rpm0 python3-libs-3.9.21-2.el9.i686.rpmpython3-3.9.21-2.el9.x86_64.rpm0python3-libs-3.9.21-2.el9.x86_64.rpmÔp4 LBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update%M https://access.redhat.com/errata/RHSA-2025:6990RHSA-2025:6990RHSA-2025:6990https://access.redhat.com/security/cve/CVE-2024-45774CVE-2024-45774CVE-2024-45774https://access.redhat.com/security/cve/CVE-2024-45775CVE-2024-45775CVE-2024-45775https://access.redhat.com/security/cve/CVE-2024-45776CVE-2024-45776CVE-2024-45776https://access.redhat.com/security/cve/CVE-2024-45781CVE-2024-45781CVE-2024-45781https://access.redhat.com/security/cve/CVE-2024-45783CVE-2024-45783CVE-2024-45783https://access.redhat.com/security/cve/CVE-2025-0622CVE-2025-0622CVE-2025-0622https://access.redhat.com/security/cve/CVE-2025-0677CVE-2025-0677CVE-2025-0677https://access.redhat.com/security/cve/CVE-2025-0690CVE-2025-0690CVE-2025-0690https://bugzilla.redhat.com/23374612337461https://bugzilla.redhat.com/23374812337481https://bugzilla.redhat.com/23391822339182https://bugzilla.redhat.com/23458572345857https://bugzilla.redhat.com/23458632345863https://bugzilla.redhat.com/23458652345865https://bugzilla.redhat.com/23461162346116https://bugzilla.redhat.com/23461232346123https://errata.almalinux.org/9/ALSA-2025-6990.htmlALSA-2025:6990ALSA-2025:6990 @ grub2-common-2.06-104.el9_6.alma.1.noarch.rpmh grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpmj grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpmf grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpml grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpmA grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpmg grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpmk grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpmB grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpmi grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpmC grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm @ grub2-common-2.06-104.el9_6.alma.1.noarch.rpmh grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpmj grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpmf grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpml grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpmA grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpmg grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpmk grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpmB grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpmi grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpmC grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpmÔ|5 _BBBBBBsecurityModerate: openssh security update%mhttps://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993mdopenssh-8.7p1-45.el9.x86_64.rpmpdopenssh-server-8.7p1-45.el9.x86_64.rpmndopenssh-clients-8.7p1-45.el9.x86_64.rpmodopenssh-keycat-8.7p1-45.el9.x86_64.rpmmdopenssh-8.7p1-45.el9.x86_64.rpmpdopenssh-server-8.7p1-45.el9.x86_64.rpmndopenssh-clients-8.7p1-45.el9.x86_64.rpmodopenssh-keycat-8.7p1-45.el9.x86_64.rpm‡|6 ('securityModerate: microcode_ctl security update%mLhttps://access.redhat.com/errata/RHSA-2025:7043RHSA-2025:7043RHSA-2025:7043https://access.redhat.com/security/cve/CVE-2024-28047CVE-2024-28047CVE-2024-28047https://access.redhat.com/security/cve/CVE-2024-31157CVE-2024-31157CVE-2024-31157https://access.redhat.com/security/cve/CVE-2024-39279CVE-2024-39279CVE-2024-39279https://bugzilla.redhat.com/23453632345363https://bugzilla.redhat.com/23453812345381https://bugzilla.redhat.com/23454212345421https://errata.almalinux.org/9/ALSA-2025-7043.htmlALSA-2025:7043ALSA-2025:7043\microcode_ctl-20250211-1.el9_6.noarch.rpm\microcode_ctl-20250211-1.el9_6.noarch.rpmÔ7 )securityModerate: python-requests security update%9`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:70495vpython3-requests-2.25.1-9.el9.noarch.rpm5vpython3-requests-2.25.1-9.el9.noarch.rpmÔ"8 jsecurityModerate: rsync security update%`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050=rsync-3.2.5-3.el9.x86_64.rpm=rsync-3.2.5-3.el9.x86_64.rpmÔ+9 .lsecurityModerate: iptraf-ng security update%yHhttps://access.redhat.com/errata/RHSA-2025:7064RHSA-2025:7064RHSA-2025:7064https://access.redhat.com/security/cve/CVE-2024-52949CVE-2024-52949CVE-2024-52949https://bugzilla.redhat.com/23327022332702https://errata.almalinux.org/9/ALSA-2025-7064.htmlALSA-2025:7064ALSA-2025:7064Eiptraf-ng-1.2.2-1.el9.x86_64.rpmEiptraf-ng-1.2.2-1.el9.x86_64.rpmÔE: oBBBBBBBBBBBBBBBsecurityModerate: krb5 security update%A{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067 libkadm5-1.21.1-6.el9.x86_64.rpm libkadm5-1.21.1-6.el9.i686.rpm krb5-server-1.21.1-6.el9.i686.rpm krb5-pkinit-1.21.1-6.el9.i686.rpmkrb5-server-1.21.1-6.el9.x86_64.rpmkrb5-pkinit-1.21.1-6.el9.x86_64.rpm krb5-libs-1.21.1-6.el9.i686.rpmkrb5-libs-1.21.1-6.el9.x86_64.rpmkrb5-server-ldap-1.21.1-6.el9.x86_64.rpm krb5-server-ldap-1.21.1-6.el9.i686.rpm\krb5-workstation-1.21.1-6.el9.x86_64.rpm libkadm5-1.21.1-6.el9.x86_64.rpm libkadm5-1.21.1-6.el9.i686.rpm krb5-server-1.21.1-6.el9.i686.rpm krb5-pkinit-1.21.1-6.el9.i686.rpmkrb5-server-1.21.1-6.el9.x86_64.rpmkrb5-pkinit-1.21.1-6.el9.x86_64.rpm krb5-libs-1.21.1-6.el9.i686.rpmkrb5-libs-1.21.1-6.el9.x86_64.rpmkrb5-server-ldap-1.21.1-6.el9.x86_64.rpm krb5-server-ldap-1.21.1-6.el9.i686.rpm\krb5-workstation-1.21.1-6.el9.x86_64.rpmÔl; @BsecurityModerate: gnutls security update% eBBBBsecurityModerate: avahi security update%(*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437x avahi-libs-0.8-22.el9_6.i686.rpmwavahi-0.8-22.el9_6.x86_64.rpmxavahi-libs-0.8-22.el9_6.x86_64.rpmw avahi-0.8-22.el9_6.i686.rpmx avahi-libs-0.8-22.el9_6.i686.rpmwavahi-0.8-22.el9_6.x86_64.rpmxavahi-libs-0.8-22.el9_6.x86_64.rpmw avahi-0.8-22.el9_6.i686.rpmu? kBsecurityLow: vim security update%.Rphttps://access.redhat.com/errata/RHSA-2025:7440RHSA-2025:7440RHSA-2025:7440https://access.redhat.com/security/cve/CVE-2023-4752CVE-2023-4752CVE-2023-4752https://bugzilla.redhat.com/22373112237311https://errata.almalinux.org/9/ALSA-2025-7440.htmlALSA-2025:7440ALSA-2025:7440Dovim-filesystem-8.2.2637-22.el9_6.noarch.rpmqovim-minimal-8.2.2637-22.el9_6.x86_64.rpmDovim-filesystem-8.2.2637-22.el9_6.noarch.rpmqovim-minimal-8.2.2637-22.el9_6.x86_64.rpm^@ nBsecurityModerate: expat security update%Blhttps://access.redhat.com/errata/RHSA-2025:7444RHSA-2025:7444RHSA-2025:7444https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-7444.htmlALSA-2025:7444ALSA-2025:7444d expat-2.5.0-5.el9_6.i686.rpmdexpat-2.5.0-5.el9_6.x86_64.rpmd expat-2.5.0-5.el9_6.i686.rpmdexpat-2.5.0-5.el9_6.x86_64.rpmUA qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,.9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903*Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpm!Qkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm$Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm"Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm#Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpmQkernel-5.14.0-570.17.1.el9_6.x86_64.rpm*Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpm!Qkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm$Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm"Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm#Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpmQkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpmQkernel-5.14.0-570.17.1.el9_6.x86_64.rpmeB PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%g https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142Rkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm$Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpmRkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm"Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm!Rkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm*Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm#Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm$Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpmRkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm"Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm!Rkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm*Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpmRkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm#Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpmܣ}C  oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%tWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333"Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm*Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm#Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpm!Skernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm$Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-5.14.0-570.19.1.el9_6.x86_64.rpm"Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm*Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm#Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpm!Skernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm$Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-core-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpmSkernel-5.14.0-570.19.1.el9_6.x86_64.rpmÔ]D !NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,Khttps://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643!Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm#Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpmTkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm"Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm$Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm*Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm!Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm#Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpmTkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm"Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm$Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm*Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-5.14.0-570.21.1.el9_6.x86_64.rpmTkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm«nE "mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update%SNhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655Pglibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm{glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpmfglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-it-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpmqglibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpmlglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpmnglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpmXglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpmYglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm~glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm\glibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpmWglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpmxglibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm]glibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpmsglibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpmyglibc-langpack-my-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm% libnsl-2.34-168.el9_6.19.i686.rpmglibc-langpack-af-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpmrglibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpmiglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm# glibc-2.34-168.el9_6.19.i686.rpm3glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpmgglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpmjglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpmuglibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpmZglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-is-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpmbglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpmUglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm$ glibc-gconv-extra-2.34-168.el9_6.19.i686.rpmAglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpmaglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpmhglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm^glibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm$glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpmtglibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpmNglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-or-2.34-168.el9_6.19.x86_64.rpmdglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpmmglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpm`glibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-am-2.34-168.el9_6.19.x86_64.rpmglibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpmvglibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-om-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-be-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpmzglibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpmJglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-az-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpmeglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpmoglibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm}glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpmcglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm%libnsl-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpmpglibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpmKnscd-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm|glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpmwglibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpmkglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm#glibc-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-os-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpmglibc-common-2.34-168.el9_6.19.x86_64.rpm[glibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpm_glibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm{glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpmfglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-it-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpmqglibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpmlglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpmnglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpmXglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpmYglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm~glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm\glibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpmWglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpmxglibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm]glibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpmsglibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpmyglibc-langpack-my-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm% libnsl-2.34-168.el9_6.19.i686.rpmglibc-langpack-af-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpmrglibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpmiglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm# glibc-2.34-168.el9_6.19.i686.rpm3glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpmgglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpmjglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpmuglibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpmZglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-is-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpmbglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpmUglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm$ glibc-gconv-extra-2.34-168.el9_6.19.i686.rpmAglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpmaglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpmhglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm^glibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm$glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpmtglibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpmNglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-or-2.34-168.el9_6.19.x86_64.rpmdglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpmmglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpm`glibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-am-2.34-168.el9_6.19.x86_64.rpmglibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpmvglibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-om-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-be-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpmzglibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpmJglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-az-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpmeglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpmoglibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm}glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpmcglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm%libnsl-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpmpglibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpmKnscd-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm|glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpmwglibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpmkglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm#glibc-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-os-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpmglibc-common-2.34-168.el9_6.19.x86_64.rpm[glibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpm_glibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpmŸOF #JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update%,!ihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080!Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm*Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm$Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm#Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpm!Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm*Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm$Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm#Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpmÔ1G $iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update%  https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302Vkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm$Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm*Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm#Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm$Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm*Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm#Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmÙGH %HBBBBBBBBBBBBBBBsecurityModerate: krb5 security update%$https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430  libkadm5-1.21.1-8.el9_6.i686.rpm krb5-server-1.21.1-8.el9_6.i686.rpm krb5-server-ldap-1.21.1-8.el9_6.i686.rpm krb5-libs-1.21.1-8.el9_6.i686.rpmkrb5-server-ldap-1.21.1-8.el9_6.x86_64.rpmkrb5-libs-1.21.1-8.el9_6.x86_64.rpm krb5-pkinit-1.21.1-8.el9_6.i686.rpmkrb5-server-1.21.1-8.el9_6.x86_64.rpm\krb5-workstation-1.21.1-8.el9_6.x86_64.rpmlibkadm5-1.21.1-8.el9_6.x86_64.rpmkrb5-pkinit-1.21.1-8.el9_6.x86_64.rpm  libkadm5-1.21.1-8.el9_6.i686.rpm krb5-server-1.21.1-8.el9_6.i686.rpm krb5-server-ldap-1.21.1-8.el9_6.i686.rpm krb5-libs-1.21.1-8.el9_6.i686.rpmkrb5-server-ldap-1.21.1-8.el9_6.x86_64.rpmkrb5-libs-1.21.1-8.el9_6.x86_64.rpm krb5-pkinit-1.21.1-8.el9_6.i686.rpmkrb5-server-1.21.1-8.el9_6.x86_64.rpm\krb5-workstation-1.21.1-8.el9_6.x86_64.rpmlibkadm5-1.21.1-8.el9_6.x86_64.rpmkrb5-pkinit-1.21.1-8.el9_6.x86_64.rpmÊNI &YBsecurityModerate: libarchive security update% glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm^ glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpms glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm| glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpmh glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpme glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm# glibc-2.34-168.el9_6.20.x86_64.rpmJ glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpmk glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpmv glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm$ glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpmj glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm% libnsl-2.34-168.el9_6.20.i686.rpm' glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpmn glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpmr glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm] glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm\ glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpmq glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm$ glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpmW glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm{ glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpmX glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpmu glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpmz glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpmi glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpmY glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpmd glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpmg glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpmt glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpmK nscd-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm} glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpmo glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpma glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpmw glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpmm glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpmZ glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpmf glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm# glibc-2.34-168.el9_6.20.i686.rpmL glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm[ glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpm_ glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpm` glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm% libnsl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpmc glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpmy glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpmp glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm~ glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpmx glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpml glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpmb glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpmN glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm glibc-common-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpmP glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm^ glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpms glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm| glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpmh glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpme glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm# glibc-2.34-168.el9_6.20.x86_64.rpmJ glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpmk glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpmv glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm$ glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpmj glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm% libnsl-2.34-168.el9_6.20.i686.rpm' glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpmn glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpmr glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm] glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm\ glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpmq glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm$ glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpmW glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm{ glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpmX glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpmu glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpmz glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpmi glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpmY glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpmd glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpmg glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpmt glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpmK nscd-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm} glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpmo glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpma glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpmw glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpmm glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpmZ glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpmf glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm# glibc-2.34-168.el9_6.20.i686.rpmL glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm[ glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpm_ glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpm` glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm% libnsl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpmc glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpmy glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpmp glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm~ glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpmx glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpml glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpmb glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpmN glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm glibc-common-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpmÊaM *~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update% https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880"Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm#Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm$Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm*Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm"Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm#Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm$Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm*Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpmÓN +]securityImportant: sudo security update%, shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978>sudo-1.9.5p2-10.el9_6.1.x86_64.rpm>sudo-1.9.5p2-10.el9_6.1.x86_64.rpmÐzO !_securityModerate: tar security update^~bhttps://access.redhat.com/errata/RHSA-2026:0067RHSA-2026:0067RHSA-2026:0067https://access.redhat.com/security/cve/CVE-2025-45582CVE-2025-45582CVE-2025-45582https://bugzilla.redhat.com/23795922379592https://errata.almalinux.org/9/ALSA-2026-0067.htmlALSA-2026:0067ALSA-2026:0067wtar-1.34-9.el9_7.x86_64.rpmwtar-1.34-9.el9_7.x86_64.rpm˘nP ,bBsecurityImportant: libpng security update^,`https://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238llibpng-1.6.37-12.el9_7.1.x86_64.rpml libpng-1.6.37-12.el9_7.1.i686.rpmllibpng-1.6.37-12.el9_7.1.x86_64.rpml libpng-1.6.37-12.el9_7.1.i686.rpmUQ -eBsecurityModerate: cups security update^}https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312"[ cups-libs-2.3.3op2-34.el9_7.2.i686.rpm"[cups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm"[ cups-libs-2.3.3op2-34.el9_7.2.i686.rpm"[cups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm˩rR .hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update^0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445nkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm*nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm#nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm$nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm*nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm#nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm$nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm˩XS /GsecurityImportant: gnupg2 security update^,/bhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719O gnupg2-2.3.3-5.el9_7.x86_64.rpmO gnupg2-2.3.3-5.el9_7.x86_64.rpm˧iT 0IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update^,+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793okernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm*okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm$okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm#okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm*okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm$okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm#okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmU 1hBsecurityModerate: glib2 security update^<https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936Ki glib2-2.68.4-18.el9_7.1.i686.rpmKiglib2-2.68.4-18.el9_7.1.x86_64.rpmKi glib2-2.68.4-18.el9_7.1.i686.rpmKiglib2-2.68.4-18.el9_7.1.x86_64.rpmdV ,+securityImportant: python-urllib3 security update^,Y7https://access.redhat.com/errata/RHSA-2026:1087RHSA-2026:1087RHSA-2026:1087https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1087.htmlALSA-2026:1087ALSA-2026:10878npython3-urllib3-1.26.5-6.el9_7.1.noarch.rpm8npython3-urllib3-1.26.5-6.el9_7.1.noarch.rpm W 2mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update^,https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143*pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm#pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm$pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm*pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm#pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm$pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm;X 3LBBBBBBBBsecurityModerate: curl security update^-Ahttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350 >curl-7.76.1-35.el9_7.3.x86_64.rpmt>libcurl-7.76.1-35.el9_7.3.x86_64.rpmu> libcurl-minimal-7.76.1-35.el9_7.3.i686.rpm!>curl-minimal-7.76.1-35.el9_7.3.x86_64.rpmt> libcurl-7.76.1-35.el9_7.3.i686.rpmu>libcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm >curl-7.76.1-35.el9_7.3.x86_64.rpmt>libcurl-7.76.1-35.el9_7.3.x86_64.rpmu> libcurl-minimal-7.76.1-35.el9_7.3.i686.rpm!>curl-minimal-7.76.1-35.el9_7.3.x86_64.rpmt> libcurl-7.76.1-35.el9_7.3.i686.rpmu>libcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm Y 4VBBBsecurityImportant: openssl security update^,nLhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473}q openssl-libs-3.5.1-7.el9_7.i686.rpm}qopenssl-libs-3.5.1-7.el9_7.x86_64.rpm/qopenssl-3.5.1-7.el9_7.x86_64.rpm}q openssl-libs-3.5.1-7.el9_7.i686.rpm}qopenssl-libs-3.5.1-7.el9_7.x86_64.rpm/qopenssl-3.5.1-7.el9_7.x86_64.rpm̂Z 5[BBBsecurityModerate: python3.9 security update^:bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478python3-3.9.25-3.el9_7.x86_64.rpm0python3-libs-3.9.25-3.el9_7.x86_64.rpm0 python3-libs-3.9.25-3.el9_7.i686.rpmpython3-3.9.25-3.el9_7.x86_64.rpm0python3-libs-3.9.25-3.el9_7.x86_64.rpm0 python3-libs-3.9.25-3.el9_7.i686.rpmr[ 6`BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update^Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617qkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm"qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm$qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm*qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm#qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm"qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm$qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm*qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm#qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpm̖L\ 7BBBBBBBBBBBBBBBBBBBsecurityModerate: util-linux security update^`https://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 h~util-linux-user-2.37.4-21.el9_7.x86_64.rpmg~util-linux-core-2.37.4-21.el9_7.x86_64.rpm ~libsmartcols-2.37.4-21.el9_7.x86_64.rpm ~ libsmartcols-2.37.4-21.el9_7.i686.rpm~libmount-2.37.4-21.el9_7.x86_64.rpm$~libuuid-2.37.4-21.el9_7.x86_64.rpmf~util-linux-2.37.4-21.el9_7.x86_64.rpm~ libmount-2.37.4-21.el9_7.i686.rpm~ libblkid-2.37.4-21.el9_7.i686.rpm~ libfdisk-2.37.4-21.el9_7.i686.rpm$~ libuuid-2.37.4-21.el9_7.i686.rpm~libfdisk-2.37.4-21.el9_7.x86_64.rpm~libblkid-2.37.4-21.el9_7.x86_64.rpm h~util-linux-user-2.37.4-21.el9_7.x86_64.rpmg~util-linux-core-2.37.4-21.el9_7.x86_64.rpm ~libsmartcols-2.37.4-21.el9_7.x86_64.rpm ~ libsmartcols-2.37.4-21.el9_7.i686.rpm~libmount-2.37.4-21.el9_7.x86_64.rpm$~libuuid-2.37.4-21.el9_7.x86_64.rpmf~util-linux-2.37.4-21.el9_7.x86_64.rpm~ libmount-2.37.4-21.el9_7.i686.rpm~ libblkid-2.37.4-21.el9_7.i686.rpm~ libfdisk-2.37.4-21.el9_7.i686.rpm$~ libuuid-2.37.4-21.el9_7.i686.rpm~libfdisk-2.37.4-21.el9_7.x86_64.rpm~libblkid-2.37.4-21.el9_7.x86_64.rpm̫I] 8TBsecurityImportant: brotli security update^,|https://access.redhat.com/errata/RHSA-2026:2042RHSA-2026:2042RHSA-2026:2042https://access.redhat.com/security/cve/CVE-2025-6176CVE-2025-6176CVE-2025-6176https://bugzilla.redhat.com/24087622408762https://errata.almalinux.org/9/ALSA-2026-2042.htmlALSA-2026:2042ALSA-2026:2042Clibbrotli-1.0.9-9.el9_7.x86_64.rpmC libbrotli-1.0.9-9.el9_7.i686.rpmClibbrotli-1.0.9-9.el9_7.x86_64.rpmC libbrotli-1.0.9-9.el9_7.i686.rpm̒4^ 9WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update^u"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212$rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm#rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpmrkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpm!rkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm*rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-5.14.0-611.30.1.el9_7.x86_64.rpm"rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm$rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm#rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpmrkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpm!rkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm*rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-5.14.0-611.30.1.el9_7.x86_64.rpm"rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm̶/_ :vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update^|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786Pm glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpmz glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm] glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm# glibc-2.34-231.el9_7.10.i686.rpmJ glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpmf glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm} glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpmb glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm| glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpmW glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpmL glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpm_ glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpmY glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpmJ glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm\ glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm^ glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpmg glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpmt glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpmn glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpmp glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm# glibc-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpmy glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpme glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpmq glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpmd glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpm` glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm{ glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpmw glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpmx glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm% libnsl-2.34-231.el9_7.10.i686.rpm" glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm[ glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpms glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm glibc-common-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpmk glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm$ glibc-gconv-extra-2.34-231.el9_7.10.i686.rpmZ glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpmj glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm~ glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpmc glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpmK nscd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm$ glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpmh glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpml glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpmu glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpmo glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpmv glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpmX glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpmi glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm% libnsl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpmr glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpma glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpmPm glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpmz glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm] glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm# glibc-2.34-231.el9_7.10.i686.rpmJ glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpmf glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm} glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpmb glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm| glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpmW glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpmL glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpm_ glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpmY glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpmJ glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm\ glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm^ glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpmg glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpmt glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpmn glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpmp glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm# glibc-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpmy glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpme glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpmq glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpmd glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpm` glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm{ glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpmw glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpmx glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm% libnsl-2.34-231.el9_7.10.i686.rpm" glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm[ glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpms glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm glibc-common-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpmk glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm$ glibc-gconv-extra-2.34-231.el9_7.10.i686.rpmZ glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpmj glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm~ glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpmc glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpmK nscd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm$ glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpmh glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpml glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpmu glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpmo glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpmv glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpmX glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpmi glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm% libnsl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpmr glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpma glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpmׄDVmXZ Utils is an integrated collection of user-space filempressu@ities bas9the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl[ datai. TW?provide highÔioYkeepingde%time short. SecuWy Fix(es): * gzip: arbitrary--w%e vulneraby (CVE-2022-1271) For morota_aboutsgissue(sincludimgt,CVSS scG cknowledgments,j/r relin@n,ftoR pagm lis,R&encEs.egrub2 pu6sj ver82?GrUnifiTBoot Loadz(GRUB)ƪlynfigu3lecustomizb:l:wީ>dular}chpcturesuppbvarieSkernel 'sym uteVMhardwavi. mshimrtIJrfirst-stUEFIthatOndlo7trufull3unenviron: IBflowޢ_net_recv_ip4_ets28733)HCrafPNG yscalnmay leadDZ-of-nds sheap^1-3695]SRQd7huffma)Vg6gJPEhc>hbN,7ZOȤwhensp HTTPId/n4M[_lockXBrs non-iDe*dQb-r-freӳcmd_k()B=: Bovޢ6cYH7ViVi IMed)updgyim  vi editorv]Use.F<Powr OffsetvW0554@H-hOocts?943?y42024+621+&-ro'9'usf{utf_ptr2char51SExpatG C.bJB?XML docueC0ta,exhaDzv9typeM531= =copyStf:wC23Linux!,anyopeJ BC: Sma8[b siz[TCP sourcgen^o  k012){r diQ _evf_ƤTHprivTe^Y7YaU/asub$lrt966tomIP ESP tsco 76K Bug`make SHA512_ .sCRYPTO_USER4- (BZ#20726SR-IOVc an*> 50% d3483fix rrupiauyby dm-- 98218+ SCcli$-s6 peeloffns [al(_-9]<404#n|finasymmec ascsi_i l 049%tcw_/sched/cls_api0H&Power9 - LPAR:ShaGcm9 se[Hash]w48zH& up+nrun ss- `hadFIPSPd1c Inam4>338Jfs2=g sUmeghtK730| i/oiatoruo :Kwork;disgZ4.18.0-372.9.1.el8.x86_64)[825A( esn't3SSATA5974G/ tre@post migL  ^10{Oopr ltx  IRIP8de_attr__labg !sl18lBUG:% &t#xnlE fs4ton ;loorlps : Kaccebada,P g: 11 [#1]kc+tuNntL (P10/ ibmvnic/ )30OS^vmOUmap\e') Enh ^'Bommu/vt-d: , DMAR_UNITS_SUPPORTED U5326 ~%  dowf_from #r ouatocR Z=, F:DAP8{:lDialti322;Un5 miFs575-KRB7mtv98 O=SSL kim; <ogLaye:)T(TLS) aella)-ng-pureypt phy-Z: c hA scCj+29 CSigne[re nahpVOCSP_NOCHECKSo3oOPENH_LH_flus brhLD47D18GAESBa0me s>P g qa*Cy,n n}omgnutlsFFDHE8032q"Z3DES+549ptsI 1cara/t|N 5508]mU>ECDSA 5 licitkF eZ#s_ -gpip256k1>[ber X19/X448S6ConvX8p -onSl_? FKAT88jRkeys on9193+q&YOZhK7[wsu]sqi5[IBMR HW$T] POWER10e0s5\y[o view]R-R*78*DH t g*5856*EC*7*S+8+AND,9,zero ,61,HKDF5mit"1838bPacy 1 (GnuPGl GPGK&r ighl na lian PGP7S/MIME*ndx gpgS ofnt sts l?34@ dbus-brok@$ bu TbyWD-Bus'. It*imD ١iD$%l$Pa$orűzuexcljvete~ #YnAr/ekJ"entegfKWkaS Ex~s$l_$12]nS#p$DyXgQz aC. nft_s$eJ1?Y' RdS_йy_e0y z &R/mlx5numbf c{XLT q-227O8,x t+edQunw-Ye-nex7p-ob.- G5n$)4unl d MSR_ : WR0x199amazot4.32x tn941X86/pXS/UVS> UV5 )773+ l{:2sync s\softblk_mq_G_ch_ 9.0z]13&NVMe/dero+v%vonic,nic^77Adnvmeaj- 7~ (/tcp9tn#uses(_to_rq()_)l(ue)69ImhbY&929x 9/ppc64hIn\- & "C_ pe "=alscpu.d2171  */ d+w y~AMX flaamx_~8, bf16) H826: DmU!4!avf"194 i40e"9)7$#!sdoContfxmlN/406|  .X #s u , RD N O|  fit e0o xInNx -or!KMC++, PK, Pike,f . kRSH NUPG+$*E0䪈fo|have+p"a r *v :(3.7.6),;8) 3{ouj,_pkcs7_y.Q509QA] ["@u-r lP258xAKK5-CBCmg{>3/:(*2<2r10)KSBp/P c[Kasbaho%X."MS! i0yQ. R1th_s$9Gk */rK exG7 51 1-q &ath%w,t; ;P$!`21̔wuthbypas! d<nn'R's;ans t3l 19p :_Em 060B>VMLN78C zma[8 +$)Z^) 31l * J84 r6eld43 U)P8:rQ ?N# h/25" (dTDKgPTRACE_SEIZEW3O!SDCCOMP059 #%%T14/G2Dp+(mt7921e%56&v~-lle{#U0Matroxx aMscr vVGAz*put Di120nee1oa waL "ea#C DRBGfa5;y; ix| wdog%' .#30&734s! [sw/30:0]O7 5.16"BadQp}( qemu-kvm pfn:68a74600?,6f=E%s2M 6s>879Vh-t 2)9nNlo% hpilo* HPE RL3 Gen&ARMy.[(4 pretI0 aG./es3s,F k [eg yl0ynam.6dl. 3!K'BH4llCpi=O oI&windKu} -:7PyLong_F76dgvy `9oa#0-=plua> Lua! Vm+-wet+x >Len Lwlsontdp ,-u1kua:inG_msde.c; unxro3ra* ) $>30# -Ba,acker) vor MminoG 'sy9 3651 ]_*}nd N+@-smb20_ry_i NULL 01h'*id9nd__kicbdu.b[6{swiotlbt1H"\_F5_DEVICE?--?3rsidoq@N6%$'-g:UMi10:spcm_hw_iM0 0)%w46o8/[Bk10urywbF00 drmma=,+K/,.@! T2goDF 6._sfa_>> 63`s&-@pE!3dinD&e n-upM-/4 ka SBDRN\ 3Ni]lGaDlTST5Ta$C)_DRPW_*po~0toN c!cho\021+~:+tBl A@J Sp)pC[$[i35.s&H^3816, 9900nBranT C$uZ  b)Lcedj r$5_uR&8*hrn$zOsly> a a8. S.γǤoist/oU$1Rinq] Y95: holM umi ol v t9n pc8~}:<8H IPv63 D517'<7SambLn4-I AS4M 0BH*(SMB[8C(A(rn>SIF7vPC-/lw ; ne ,~ ZC.6d%s,>6.4)V+4G2:@w?s?E1$2742@$lMd-"m#!%-'API/n*$/'TDB k4(2.5.2 AD  u + add.0!}F#,-quaF5.onDWgF4Ъ-%$a [ sW[redi7u glyph0ff4W]U"sfOB _NB4L.>Seiviol a FNT_S _RH5HtHTBOG=4%3.9.],I24| %)'O/4@!X2azse 1A15GD^X 3z;/http/.Gc&(1">O e2fsG2a7afo5/=, (7 = @]gz 2,3: O/[Q13:;>MfBuzzo+n,ihRbRYORh4Uhape-f%.c7 MADHH5 c~PC(DHCPY2X ~ D0n MGto gei wNctjKa.ika br c'dhV: {g@ISC K9 Dt'hdm s. 5NSowB -chisoDe1220A}ogro*usb"rYlobyiiuaH^9/Fmod=n i &: u-W*;B tirpchk&SunDZ'sS3-ipd5 3I-a)Z=F\ 7 e6- :}lot754682Az,8R_()7 )B' 7<%/&`AZf "# Pho42C"PoFos P auth&c#e0[^乍ylEby ea0natn-" !;8dB!eLNL= <=tocGmahel'ncrrs"#Pd ib$4Le*KDCAkrb5+ i- ACvh4t38fesud4H/? 1sD o@F 2X&t iGsrN$Zu<.iut]4+gasgrsT hot,+RunA;,3-2&-X1c"POSTPUT|*j2221U2E:9 )&1{k~*,U!Fa" X88179_beAwUSB eK .V64Vi91KGPbILB Zï]9_ 13ï\ '0M,S"3=gX X3I9ò2{ un1lAU?smt_n/30KY=f-HvhN\MiN2<|3%2<58HN-OZglt7t"lyt5EMC8st~NDU0d33i@N/@=9)"w-WARNIN==b6 PI/3440PY1/xQmm/:.c:a_haYcr_f+0x3f/0x50f458 2v4:l9 of4X_>Y4_3ikg)&or$ i61|/pz'+th{Rdysfg `.*"-EINVALJ9S69DEl4:_'i@?1m5RHerc12.J9U*4Jl+P?monj!6}4^ER-Ybio/ee4015P aq-\<"DummyiP ar/t%4 M2.8SQ8eoz7Re's]calef0z?*]Z397;0faKS{in 4egs2t-t gofng%5AMdCLIENT:?z`l#H^ "no:"̪mp18\528Az0 :=)I-v:ECI_5MA@MEMORYme%VMe ~S5]0S z}bam:Himes?eploynUp qg\e led + s16#TT- O @760^Bsidg Eil>7)DV!-Bus is a system for sending messages between applications. It9used both:theI-wideB bfservice, and asper-uslogin-s,Z4facility. Secur Fix(es): * dW:-daem;crashwhreceiv wiincortly ned parent8eskbrackets (CVE-2022-42010)zan)y@varray lengnsi|ntelem typep1p`__marshal_byteswap` doesn't procv fdsdł"eign" ann) u2) Fm3 detailbout殐issue(s),lu: impact,CVSS scG cknowledgs o/rlainmf,feWoRgm l<,R&ences:.Tckvn man-rLinux,8tiblEuSysV7LSBitriptv4ggrvehallem0pabieu{sopRDav tart`7ofs on-demæ#of ekeeps tԢ)eâ. cgroupddiupportnapshotcWrCorqtmnrsIunauto poi1 borBns onalpy-ba}rol Mcalso worksdrop-iplacrYysvj/:p overrun_tilpan() funQ3821PEx.C.rytC3680sxml2{develop<oolboxzWHJvario^ndardu: eflowUPARSE_HUGEw0303)Adictpupe cyclesM4SQLiteCthW(ta 3ine. A largebs&ȡ&92Ned%leteA!torHlesk filZ^API(v#*TvenieMxi linktenjoew GrUnBoot Loadz(GRUB)highfiguraǢ5cusY izb:l: moduAchOb# eke '2 su VMhX wa: B\ _f _1_glyphg Yleadowrxpo#bypas[ 260dHlyedVsW\V_punisequ7OvSSL{h ki <s Lay:)!c(;)tocola%ll-?geneI-pureuyptographyko? : r:brH& QttdJRSA De:  Idou&c8\PEM__bio_exD450Dc-GfolCBIO_new_NDEF@3-85@in_ e d2i_PKCS7M6MNULLB\a D(picmyE7EX.400S.uDG N L8ՒduԤF J42 BugHMAC[s ljeb s < 112 trad,xFIPSue Z#214I,na mum1- PBKDF2Xstun,um) almeypTCP5nahf p8ɭ8SHAKEdigesp-OAEP>g10gSSVPLag 5a psizh ,ٙ2 UaI 79.31dm5o-224,38512P56es YDRBGsЙ 5-167ުáQ欘hv9e^2048_ EVPEY_ uw5179.1 N\[0912] - 6or:93:itene routi::n giFlonP bmca7 loca.so.4 (3.9mHche um need3pd6584 * O oca!,yop{ng_ EPl2(mJ_sdu2 net/bluetoU/'.c 56gs% do_pB_dvecskip_spa 4378QŹQ__nfs42_ssc_fs/n4c ComoDD  ~9~NetNvul1ftbyJ )py_vla 1[7 Qi2c-tiv 287W 9.0: LTP T+ 8 ak14 ShirdapiFPl8280+|3308d1  NMI watchdog's LPM5FMDSERVERF::dp1*&K oa$127Rqla2xxVMe-FC: WARNING: CPU: 0 PID: 124072xs/scsi/=_c:70S_ɹne_tn+0x25/0x30 [#]X Reon: Kn Lvo T4+cAH40 USB-Ck V327Sc r U+al2).79E4, Nx_Gzip: not cdecrI yšun(ur7blpa D. (FW10/ DL MSFT, MANAET PG-9: race."CQ:n_ipWRfixb50zvPCIW  Vi-MSIB459BÕVMploy# FgsR~F93'' {5woZim3#Kbs390x gL881.RH3syncWupam v6.0K61341CEEphf#'i?ORIPI:ns_q_unef8]p416 :Ц2535py3 $tup"sa co"g en sPBXbu t&" at7^NNp:*d(ReDoS`_i!x.pL$089G 7t% ac! b^ -ore g3gupe#'Il ex,yl dynamJdl.#f t0q #XC8$9o/ w޴O}7#via fVIDNAo85064#C& k eV&-dump1 re/fs.su64xd{ fa a l9%5 %ua ua"V-we V >e LuaYfrt d#,%-a7kua|s ndd&Es;1,94<1_umldo.cSa H?fwld357Vi"Vi IM0ednj d vi o$vim:$5ret#qu}XCheGC({702k'GNU tarfsaveK pai"in~vOfro!zj:$VC_he¹g! yt8O) !nut 53"Gnu%J  i^gormsp\ch&,D"s-chD1l(Y a4+3 CCMgkb,miLfs93j5)* accmdl [q]: E izYle s1elf ir;0cC2vov qun_ _&#!ALSA: pcrMo:rwsem ! s n4tl_4 <v UA 6uBsoftTupTCr-to- a26/P9- zfc+\mi Bs nMust6t!278&1} _v2_eU7eO3" /ers#pu1 fys skSaIusr o쵠37%dd%Q i^x_-rtbug:] &circR u(&n->_%->&p-> wai860CS .s _@bal!3 di_ }+1!/k@) ]'*#k K+1gpioD8set IhR/* E59  orvs'swiotlb $ infidenL`7>E((IBM ] FEATbEQETHgn e.'l6%l_ SPRAMX: I nf%DO85cV:+1ydDF5 0DHTTP, FeLDAP }:0{ 239& ]FUSEA -prppedrobu7,xY pth)m()_`)Sambn#-s3cP7N!Me>B= (SMB +aCAn2Fl S-(CIFI+$ j PC-Dmachm#u,]ZP?C4/M(-MD5k!Log16 dakb3  2UG[##($_C)$4289-ul| rnULPT,4" TDyjlGecubeyondcon( AnchZ1/34[p c.,F,PUT_VSCREE FO tlz@% OOB//*Z3365 M !tty_sA146 F,d-kvm_mmu_-pcgvaF78 ~ p| _-1`/1>=W88nV: IBPB 9O 1Svr"y11G%:m%"_ C+/D Dxfrm&be_ s×/n0I o%Wib_nh_mI! ipv4/!stic34Ȩhu lYo_R mm/'2> {6_re/o<5 s-3 _af;'P optK KIG{/Nű(cv_aclLP(6* 0Q_ptSgup.c+usokeuy\2X]~8v8raGal'is$Y|+l2tpE o: _i όdgigmiY_mc_]y xo,i 2-qG 6 IMA,15usb_8~_~_xm2/&* 2JnI:-ndro>T/KBX4374Hn&mn _r gm ^VM_PFNMAP /s (oB91¢flush5 :misI 7KnV_PMPTEDm{oMt8vl dfg8<1__n0 416**f to on_vmareG270]ss_(wirel/1 72"B9 Cj_([^&beaco)n P2P-P:HĢ/ n-r47 trc !Cj H*9HrawRp_pf@ 399q_g6D290G!07hostn/7it/=sq3-119{Tce63Q A$@s:Ҥjc%TiE lBE, se.RAes AedZ R-"atC*;%t; ;()&! =͔:AJ$ J/C/shmsym`F11951\I1Ycha+ixok]-P, 5LQUCa-ggeb!x>nJ n35P>fwR  Je&aTNB QNfirm`n: ad>)ce(KDC)7krb5 (1.20.10163b[8 aFR S4U2PV0-x*4= //95 _/C H BL FHbfZ?UNIXm'he0necLi!D h:=WS n$( _B()'J3O13-cF; dp7-7-arb aHh\s DNSomUi) ss Volkav~H-a UDP MF~3206F %rlT.ae JnD43^KP-kB$l&c 6{_r6[[$ xu~u_gvGZynXZpo _ /\I#\Aifasil  o<a5aCY8@B;F?I[IV -0-AES-XTS 64xV ARMY12_/$ 4WW42onc{Na>@9586W yeXordX RXi4i@L G@o JZn6IVSsl\NVCd /I?sa?-9z@```_lgCl!+fip(F_Ffs_$ XB eZ ( +?M@VE) o)9Y o()DHX ,r3v^&rFEC__O0(R__"rgLe_+ pairwio=uc-4 rZLDHTOgalwayZ^llb=2Ab;pkcs5 j}>B11Bb>GEMBD&,W V>=itciǥP4q/_'jt>sm as5dP%x9>d > 7re[i&7[_= CIPHERSbAH9,396r[ Z _YA_cD{WPVDH@EIC2e4FC[5.n]pFWb4m /1 <6* 23.K2n~zed qVj0$5k'rFS-H15H[ "gi:6_sl_)_xfIN9NH8o_+gI52y8 % qAQlA=- (Dg=768RPL-P IOTG/ S :Dc85ag:to-R*kPTl'!172jBUGiwlmvmfi0Q"hF676bC 9yqck.G9m/7a0a36f2fd6wa54afhc8Ae9b [99FixQl0unHe}rekvmc1Y t1”blk nvme/047aESl7Ohifar+esr&7y3l J2 h s`70[F]: t& Ri颲:1778eM\Qeo$ nlock bef4turnom)_treeOnnܥ904x86_64, kdump 2^nelromGpanicg"kvm-08-gwt25.hv2"_10614)The "l'" utilitya textleowsthatsembl"m", bull# us movewardstfMasks!. Sido]nokad8ireFputEtartup, isos quickn(dinaryedit. SecurFix(es): m: crd dataTnulw -R" ANSI escape sasSơ(mCVE-2022-46663) F0ailbout5s=(s), -ludt imp+,CVs cknowledg$s,o/r{D3,f㤩Cgm lis,R&c:.Samba5kpen-sourcleAServiMEB(SMB) toco+CaAInttlHymLIFS;, which PC-pb1machinsbpt%ou-s\MB20ckeignieDcwhen$= d"0set3-3347 1otrushiptweeGis 5s5 mai:aily23600)LibeCf7flexHiguralibrors!mankey=2/. Is snippetsdift roriesibuildsfKBit:ck-baseXr ovin_Q()7/get>t.cx22652hxml2dloplbox=vi»XMLkndu: NULLnr ma1upCojxTy4848 IHasho mptyMcysn't* `i946I python- s`pa deaedake HTTP 9easy et: Uni2d\leakProxy-Au)riz4hr2681 {s9e1}] vow aRG ss , FeLDAP}Z DN$ dc m y³$ImfpC fica[ V 32 VPOST--PUT6Ro |3 !,!anyds E: ipvlan: %-of--ndsT Uu(eaW kb->cbvG )Ocls_erS[l_ _gen_opt5P5788QKVM: /mmu: e N_f_faE N 58Nu B po Cdo_prlit:/P0[YS:v2 T mgcblL <199<O SSH a supLa ,, UNIXsvlar e  bo!cli_^ ssh:motbdx*m-agMPKCS#11840D-BuZsenm^sX appld:I-wBO urvasp-logi,4acdW:-dae:XP ure4a c=dri^{bled49 subscrip- rgrams u# U4yBos;oetR p5ɷ: de yaJ ofb.k.RHSM1 ftOaly\ 9 ! in!UP!p*rp pI( throu-Get-Ydmt Pl 64 Ith w BIOExt/Firm7D0(EFI),Xp4o?/DMI.isstypinyt}ufr,namzsenl^, gZtag,(ɰpns;-bo% a9x? 63_f $ $ AicNehwmd: Cross-P'L'405934VfoYhay up r yt mt:(5.14.0) UAFnf>s 0kup_globGggy 0hbl dnonymEs0Xb3nt7nf_o;Hina ca hjNFT_MSG_NEWRULEx61x/sKJwpon(b ploits 8c cf_cinA f776nf7ie reipipapo_j4004 \_newrul d]a  BA_<_CHAIN_ID\Űy1y3īݶibyid1248O"-aYbyte)er_e4001Vse/rMSRsS3 s*Q163&bypass`d eSa Q110g[6 9.3 BU5"[SPR][EMFHF] ACPI:1w5up+ 802[D"TM!!j"WD19TBSSwi'VGA/DVI-CngsjrtmuH MBibwok)uein "3_adja_p1*21 AWS ARMgs+DMichif2s3!.xadat SEV-SNP |!>LU# u ne b)blkush_m562 'rq-x ".\70hf)bz2069//ral;(reg-suit )aarch (s[pid]/w )'d392eE(FEAT] ,**_pn<HWP IO *s3,l7Y- New MB,AMP* C~ Maya}+aod)X896XZMDRA - Uk Ge  Add5 -+1#r'w"4 IX.1t er 6)[a15 Mie !&Ovk#__dupG 2603>Meo y p!#ct E 6 gp C(/ʬ%;),Am%m)ڢi s (nscd)y mip,Ho Withseqc  l$):%ld.*aovge*li910QS$ HUgQddrno-aK527Kpi uPr806Baih_i@ P[$pre3, vobj1-znQmlup*u*clTex Q ,yY1l% dyic, ng. |?yllC.Aw W%: TLSMke0217&ch%a&p*SOCKS5pxyq85Sci jnu8Xnghttp2 , 0T pP" 2 (/2_/{C, web?vul3 tdDDoS1_(RapLResL448#C sus. marF3Tf%.M3Bcryptph34z$iI< uthCcmaԢI7igitad E+aW$7Q4 kcs] rdos__* rc_ 970Ad(Gm s:Ҥjߤ%Ti;leF7 R NomWkedb;tGUa cL]of)qZma0( inK0 'ar, , gf, , nmanTaLf,z.pm 2lin]  /l)_bfd_t_geymbol[_))2:>r:;.ac4rol2soe(R) PROS?Wi)WiFi+276;A\40964\,meisma63<ʾ9vR/in]31]2RD;A.Pre3{";v056H807 ' n2# =dAcC*./!@/@./3424o4m6x o?~*C "6ty'PyCA'I  i Cibv6|:via2 l2393BeA-'C% Goo>!QBy[:c(9=_' _me38468<G%29>?4s26teC ] -GNOMEs?kFyn #g<0cms @,#: GVaGaf$-e t*\"i'&=9 Wg_vX'swa(t4&ime n9Y  )26ide- Dm E''[Y6AK7(--#Mn zword[(,X4Tuser|g+2p oun:ºE1" ylZ'd(1)QY46B* c-ar@fFaeKchJsDN DDN ) .4re@Lv{API.6 /(1.1#)A#103! 32%_sq ()+misy?K(^90 aBaUnd2in _ )3112D)Ficp;0KnJ#fIDsQ&Q oToo.CARES_RANDOM_FIT/R*) mpiF\ :|=I, >( 0 to.=^<)m re~Hpalg2hmG,6/166Z8:i}in_T_ 28Q!}z!43.9 (.187: 1PKKy65cE07$5*=$ gR?GNU Mr"& arbit p aes,sC};ff# o )H4l0 BORCs1-4^7=AӎR4@s,(4:.6<1x 1isRox:R@aN;-va/m!ze`9E6<]>qosnR0/Ki(v~syEby eBn ~n-}chI4S6s/Jin une$0orm"tPsV weeachֻahelfa`hip 1y} # buceD(KDCIrb5: Den^8Od'un}B 60`hPdou=' TGS8 c3997AlLQa "TR #wpP,XZ ,GgL nVt[,TFOvm?,F!pwdx:sAH4>s5D®K =shed DW198= jsmbd }4to& xiNC@QQoof96)3k6 uJt5 d-onn[ b]?9R"rpcH" g!d Uslee)76T4D hz)'[cS@lkl vX 5~ANTMK{#B- (envideW 2'GrUnifiTBo>Lo(GRUB)Ʋ3lyfigurablcumizb:l:@aprchcturSbekern '%%,`uVMhardwavic: bypass workX'fea` 001 nutl!NU TsLayhI(GnuTLSgCEcryptphHalgorm]ocol6SSL, RD : tis-0SA-PSK au nt$598K+fixz+:4-0553:reefjeT d7ibutruJ67FNet/kSi"(NS k . sa pelopmc-enndij a @nsvulneMin?aL"Tk?6135sudota1ut ows  to= FusersQpermisy,ex te privgomms,oXC ^ purpo hav]oga BugREncH(8487: SdoT escape'rol in0reutpS6SmN42465NT Cu ,Reg St V|sOpenSC/ ismG cws.Tfocuse" n Boper zirq, ТI#d/tal Zszj=k c PKCS#1.dM92 luggA4MO (PAM)aAuplpoAIne oi @hV H.  *m: ImEpHost e IS in(_acc L oACzB 1096  P Linux!,yo K] pf: runn@kw41009)IUSB:ia mos7840: crashhWumeF2244Fcxl/\--fret-of- ercoshutn_50226tu  %s U*x1lectMro )x: `scpt_``}-jarbit,sTd 2336)si5sanz*`>_K` meJ/ cre()`7p7)<net/smcil# rmb_d2 uSMC-Dndump26615block alizteg-zero befwriitmMai385ii u ur_- __fault()V499VT: &tx > O5018O, do &eUn_"ctx hb669l: avoidtundSq$c_pkt_len_̩[ UFO\9nfty~:Ӳf!lSkb_=}51k qVirtuai vironw(v ) 83~=quotthK 9287)[ vd}IPv6ӡFuxe 1168v tLQrh W T004\c: 2 h[X 3 ssp;HTTP, FeLDAP}2 ~j8 exploa mixcflaw321SH ]"a numbe L? UNIXs rIt7 %bo4Tsh(4 trat BineP@P(BPP)87*nTjr via vmehP51$ 3c Btow21 null-ptr-deբ__ eZu2739@ AdPF_PROG_TYPE_CGROUP_SKB:hG6l3LINK_CREATEi64ivaBvrrin# afe 0 fs 4D ttr_s. ed  7͢_ube_m i_k"_Ĭ7675sdiv  ;988 arm64: ysO movrokenR (D"ral) eV5NxfrBone-*inNO11SCOUAFp_soH25HISHisHnKVM&SIgnnCR3[4:0] $-8IX t s lkexhaO2-0480NULL2--8966221527546 257 8414l\!kN2_|8r!b/#J c459a _!sK*"_ 604|GC'.0 ,unix_6*eg( ic()o31hO\ zp9Wroup(),&l067)ev '_s!u9u3F C|6y A Dtn,40Nird,;572K;dou}8#_cLnvb9W84HCI: glob )syncd86Sb"1e!pUARTSETgTOIGua$tty_ioct*3fH745y89912IP_CMD_ADDSWAPU /k"f&__w![586Csmb:c9 OOB/mb2h8+5mm/s1Vinan ->u V8$Cc&teav#_pe1dic28F[ ?A258V]dge:#/in - "_h _fh)_fW2hƯ78]/:DETH_P_1588 dP ^î0Pi: f _cd& l,ooo g6CIFS jDeM0I,V$CoE*Vyfr:%_ ed_*d&9u66a wet &! 3LR#X2g j@sG4֔txx2u՚ lxswp ru0l_tc#F cD3Ki2c801mp@-on r 7/mc,pucvfsU,-W unNd?<*y.GdestiR1b1<]&DFa"$ymb6)`Q1076gHarfBD-e &To$iFMhRbR:;O(n^2) g#! conE9.:Avahi DNS??0vB/ M *t#Z2CCT?iT/It B/atddd/an7`H~ -ab?|le= HC2RK,/no,I$peo tot0O٣ fi harE~ A k"Q<S~sM"(:&g"d"-",h$aT -G9 '-E"y "f1AES-SIV&z /a 'D;i=-emptyocien+9 9~Exd  ntO;DH H+s2y:4 OqHN1#!Ga Xly n'9.42ore*!bvN9. ;8ÎPOLY1305 MACsI- PRPC[9i")p|P23;'V -N=&P--8g,ab,b (pseWJ-)#*10$Q$caes/ntfs%unMce 692]N \8AY F-H Mn :š70/V7LSB A C?sXgrODK?p, RD-Bus?r,泌s, o&;39#b/keepsA:fe:2=lin316<l s^! >30wpa> d y80_]3mglruI-u1>e2\RcacheB92B[EMR] [TBOOT OS] SUT ld1gonSps9.2 TOS O>CPU -16 ^BUSYɄ6$F t - NMIv+E30Eg0:6f:00.^PTP getCL l[fm/I*7dhunbinZx/O664$1 /V[ "13@Zl 34^ ;inEĻsm7S0R0.91penXt^m+NsglaUd 4F /<p),AmR7%mXi:J (nscH#p9$otWo$seqv0 l ")_;Licgs 2z}Or2-CN-1 9Se<F335PGMuOin) YY2marmB0'lVrLZ1Zascs N03 K#n-[g4TngDv$ HypkKpV (X/2(%{Cyp8ONTINUATION N9sPSP18 4 K](U1 K S8r+ K KOSXf2487' ipv6r{= S7 Ufs:F >9in_br_ e_0 S89 #c-aOdefi|hn.___seDJIRA:Alma1-2894BUG: untfe faultaddrcf16bf752f593ff8 [aTlT9.4.z]k35672k[HPE & ]quQ mergg icnsl patfix6220x9]/ 4\/_de.c:51!\68: DPLL-ݡ71)CNB95schedpda(TCtm v6.y764.IPv6: SR: bemXS69TRFE] BOt sswapuo U825#IDs,uwsp 5Ogfun^8  d.ۈ595ީ]autoc VFbetTx MDD nt9083MC»REGRESSION] N bos: brok'z10+ sockets495ybnx2x*1 sh PCI qe,s | k432  aff0P 409' TIPC m=mb$ =ilb688 e7is/c_dsaf_ c ;array @ f /ge_srFby_l 548ā cw hclgevfnd_mbx_msgV9v memlap whenlecharbuf,Y2-4862j ca"j1939:! MadlchY#_s_rw 3mm/vmsfu+ akeup_k\d[w g zon? dex 7ns Us%bi,eBPTP WQ xmitb on ckocs pulMm' pÐ85B f_t usel  <ze"Sa| 7avmw fAd tag cW435e;injcriptehavior) tcpc9 _Q__zrcp_twsk_uniqu.90 ( _hmm.c: src_pfnc \854Ir8169bIu RracTxRa`r givcfr#8841^ytxy iWuf. /s2isdhv3+ octe0x2: aoff-by-r7y sHpaO95blk-cdK io 1 663z  Libndp (C NetworkManPr)Eat vi_ , er$a 4bDisP alsoDlUi dp n&NDPYl:9[r< ngfield5564t _ firmwa| 8e B$. rT  eoRi'g spTm sb*iize3-31346Comm (ino (CUPS)- Yp*lay( c: CdM*nbitchW 0140777~2$ 4dpkres,4032'b k ull Ari) l.c ogictBz{eZgn[524P 4w ngM= IW 5_1try_b: f m U 7J bp acd7 _ r_ cel_a c3 dm:6{umf ho YsuspendK88ip ;ip6_y_mp ify8USquNfs nis&vd uh8^98^nf  >s } { sepa^rs[(sO3UicmpSNULL|-_build_b!58 bbigeirq;NAPI ~s0Rsto.shut_nĚ8 scsimfdfc_l _ptp_ up8Ghc_ o Īrx_kp],`X5`pRel} baef$_l _þ 24]MovPIV'@unregistto#n uph5*9o$-xgbaunde I7e: bXer"lifeŒdE0/ph6mipleaws6808, 706599e?:R2awifiԄ97Ą52451ä78¤4493794122r6igc!5Admaee/idxd,182,R7419036,"5ǂe!6sw#eep$4<5!91ŭp׺/x86*6\i40M602Ÿrtr0/2 push hg-239 l-t sc,enh xd ib~i=%5v+ 7^N;pa/ .H #d_/{,n\6345(f*f _rb;(skip  v/ gcz6581I;t_li:"figuI I%elgegd6vfio/pcL ehINTxs p 1 ._bridV  %/**so!xo*p.^%^rmut< }gcq_ͫab >e25e% -#__nexpr_lu!t7$c;b19bSc:i(pe\H6H:rm cas3epa,mtackj415j+l svf!Aa 3xA~ diL"r  gR*ba$h#onl7l y4ecnOcoc'OX]I96v aLAGJ)deYyY*_vf00  eTmP:s>CcS ZseeR RDRANDCoCo V8J%=tlbLF&;Nv;SiufFPdoas_ikspli 7pt_aS\Gn-of-b.sopsê8map_Hc7in&_'Oxusb-storaealaud:CG\AlaO,86ms$=Ÿ9Vc-EnSpied6 N ŗ5+xhHt EDѲ=%DO-=$[ Bi'_]ETIahF7lai-as-LCP but aaOCe" V{#>Ln0t<_4_}BD/MSIDmsi0p@(67x6" WARNgx.{_mop000.pr6gN ro% JƕRe t 4;2Is10o6 isB>or-mF  ":v c=<'KXK_oha vpFX0XfcEfi: d?(% vma ql is P' ) hDl%&(>P/pf,M; P v _I*]v% ~$ V"0KSe * gpioTw~ w_2Ieda:Y4YW"f;i fPalA & -eCL; Jr<$cppc_WJ2_&, wx&iJHgLC274C-L b[Bechr/4cQcy3orKUp()T)á75.6ec IGZ:n-_(r}bC4w6HJc0h,r ?WX(F 9 5 im(bl"N0rU cil,ah Yfig,p6 l2$ tartript)pcmJ Aur ] q: unau rizHIDnPn s asP rokjarbitcomms v 86Z: AoT AVRCP IGpIVv df Arrs IndemEhV! 7vp ookQrt/vt51596tOBEXD-of-,rI `4`aLavrcprse_ma_d2z2ze3{89{m_mQribute_s4n0nsy2(44431^0`t29F-dnss8|at sNDNS3definZer symbol c&taJu)yP,chd,@d op=  &dhshtubQsol948G tpm2-ps5(set "+zTruP; M(TP2.0susMsp 9:qugo und'y5_check)Q4Q03Zpcrl value not WPeTCGNU nano smalfdlext E: runnp`ch`K own`̢2e2 ;ZreplH-rgyU#o^6a r -k-A5742B@Bubrw (/usr/bin/b %engun%derEworks,uivin n 7R 2fpak  ssboxpnt= (--)c4247d5"V:cDosa vD tr_"le  h !s\623[ CUNIXS(CUPS]@a p*lay,Isimila~ pecupFppd:  kredPPDvKerberosnet e\c. yourE? elimtn-_ np*8dsm/Jun.Z ]o,eaH helpxx <rdty,"#)Xce (KDC) rediugc3(RExpQsyXML docu 6>eN: DoSC_ResCPr 060B Tu !  l|txp:g almeldd dumpå(422mSieufuRequiri al_inve_ ]6824]mptcp|7 uaf__tiU _d JsyncF58)&p| /auxsAUX0<q71RDMA/bnxt_reGaE+  up L( -2 PBLM0?!mlxsw:'rum_ipip_me$kee6 eIPv6r4 d52uc> ?ubcain&_rcv_ _adju5312rdy b.e .y*hronY R$lHrro.9 .Yoi aRbecatonly[ifin hadwhol. lsomirror LKdfo㱓UZtd S%Cont7157NzMr8 1>s,^mp{ oep :.v! avaY ^ spUEK,rel0,bbroadb(WWAN)APPPoE, TVPN g etd t+H mHfoRoutm KtBin are5drea[aAl2-9.5.z] (JIRA:X-730iUerWstoinu#sieipv4.'e-%ڂ1Zydo@\-rqsg7g3661  H%opD GipuM^8ff؊68 h /dcDon' pK()eqsk_queu n}(= j15 arm64/sve^ih* cCPU tehaSt)i40Rfr({nAl'ntex,#zip2Caly',-qua #> Jbodalc'pde4(hEYh'#:DxT(hd-il19900)!T! '*sQ b ep=0S5-#PBy)O*Qoymk(o1di. O 718kEdb}v_5P.i#EAwLeGt8~lhm#S51K&) W/zgets1 'J 6Oc :keRCUAtigmp6_ ()|2175'OovlUAF9_dey_,nvZmovdput+_upd887d&atmiaf[!H!ɬ200udfsR-o' in*_f_X2-4982vmx3al&a izin'_pS1_xd37799p#PTra:b,in+*=,%7,Ijqltwenflex6Q-l!JSONEY =likdF" . You:/sl,,p,ns sctuOQs{#!Zsawk, gw#DF/Rf $ -jq:ha-ig# e&+Wjv.c:jvp_a._2333hOASazNo,j-Xq_fuzz_"Sjqt_vfm!8#xml2 dhop "a5" {: He$(z)<D*(97/WTyYfuL6L IO3BuildQN,OLbtB1ok6{4) x86/:/< -p NUMA 99GL.=s b<k mteM C [-GNOME%loopD,n l; ,unդ-V  xg:1i__msoY525}E$$dN9Z9$Ų:"9O.<mii_nw re<+6Z/m :b(eo  P 457/% ya11 SQL2(7n ((ba0. Aqubt&92N<ed%A!a sk.!APIB*v ǫesp N aga\"enjo&powerJEn 14admsth<"fgx)D ql5 T3s i 96"rnL|34Uni%GICUQEr ull-fb7!{icu: SRBR5::Tag 52T&mslUAF x&"atrrup.APtJ 62"Wrequ1 -; H.(rcials*9URL-708* SkiCIfry8gUHVS_UNDEFINEDӡ9~C +'p y 44eZ2/ G:l-ish-hi y[$tp_&_.ver928+_Ycclb)5 W[8Ee{'"uoF`6.-53;x{1bDqn'_drve2/e'/vmw_vI:foici_host_do_m!eB_278 pPneas Q qGi 7890 tiZ R%_a _e6ne]80\0]^ ztap{_ _*1+7nO8*SSL ki=>o s L;:(:)T.+m(TL:t~l ` jthPPy o FC7250(keLcH ,n'trt*S_%9T iV {MB241! ;b;SmaIDCFillN^Tn6Ngccq [ mp rC, C++, J/, F+, Oz!CAda 95 H30i jUn@?O<~ > tar(HTM9s3t!OMj$3,hod0-2No:O XIyt%N}g 04 [ K :\if_h -_pi7P# 12k#&?G2W'bpf,6_ _skb_pkt_18=;'dR!'$G cxIl32895U tlb[8MY<V)(sp,+pufEqgYS1D rtw88[''C"to:"R Y cQ3]]_N flushz5Ai2c/WwaC @PH3$tTl! f!/c<"sorIL473 arv]e p 6$sev@a7KsLT",s7ioISO 9660 CD-R im. L #{ybsdt7)(*,=_Rws CYY񤄦poH )Sskt* 9? R>at_9_Y_^Sk?6&K ..U59%D5ҢFpioU>Zo o>583 dYIapHbR?@ =  HDelay putR6c->imldޢH55B( Qgdata types and dynamicing. Python supports interfac.to many system callClibraries, as well.vouindow_;s. Security Fix(es): * p-cryptography: NULL-derefnce when loadWPKCS7 certificat(CVE-2023-49083) For more detaibout the sissue(s),clu] impact CVSS scG cknowledgmento/r reldFformation, R pagmCs,Rs:. Tgnutpw8rovide4GNU Trans Layic(GnuTLShy,?ichle oalgo9hmhtocols6SSL, RD : Vulnerabilnn tool p:rs~5-32990)NSCT extensiJ89JName SANT_I8I po< T_$_figure_common_cipdsuite()\6395BugQoEnhaP(3dBZ#235962+`F1)\E2l53125)PKdwc3: gadg^checkat evKudonot*ce bufGv7810jdo_c;ge_(ܩuse "n unmoed/lours s]8498]s390/sclp:<$CB;es>9694)mmig: fn8D"orrppdN724^*fil f_sntrcrashiremovaltuninitiaٺϡ2yc72cmbli*Y-afv-fre cifs_oplock_breakQ527Qctline ze\ongsosT%_rcvK71hlAzero-ordsd{rx_8io_/futeluure_waitcle up lyef¢-y8)/keyslab-<-of-b)d3_task_fmIp4-50301KVM: x86/hy2-v: Skip aica^ ddSsPV B flus835_w : ath12DecrD TID+RX pefragtJerr%E761EiputFbas fowaworkI Go:x govnlowf4896&Vim (Vi IMed)odhz ver*Pvi eds vimh gpa| raF.K5 6),i-*' HID:L ardeC32ton(g~s n0 bib 55T pol Fwemi-unrrfD614DALSAv -ao  UAC3 cHbsescripÜ975ID qiv -6e EBUSY l 37Vsshba=SSHL. It caee d{. serv lr B:  sf l* nfsd`n't ignU^rFrnedesvc_c_regr2firmwaDarm_scpE _9yab gn!9h\fŦd2w 08 unrpc ysY zale71K?ƣWK6fiFf*d #_dpa 81 cfg80211P e:p iQ_# a_v ult`49csiO pfc / rdcdreiv]1)ipv6rMAC #isrbjant-tim:70UAF/GPFgnil~mdt_)trol36%x#4+( l via ex@vsoAMDHcr 4-3635^4U0vjapAdd7di\ IBPB m g4_* : )pot% C$pxra0)'283,so qimd-dMshameykWC,WB&4668wSqucsanrsymbolk~zeF74 vbeenw icelo f()&]kŤtd"in-MMIO"$@72 rx]>aĢso}sI/O c4-6iG we r heduley{06Mm_pcdd H_cl _(I?in /1e d 2posix-c'dspec64n_)_s=m 1~V>cau_#!M29o/rwsSNOWAITvO_DIREu#write[305a6 4Pir%/vKdc_queuEG11VMX: Bu0Il PT_ulzgu1/ho mH)hiCONFIG_BROKENj3xePX3t]YsafejulvvetI6Advis4 s2 sRDMA/rxe"sqp n reqG2&bafErq@lPttags 7 easei Q/ o8icu_Ĝ16NafdoZ? d skin_iG6603k-cgrou+R @cg_unE_onH7nfivmoc# R)_(_a T6Tbpf. chg/FhRCUavLj1939_se_newMkb2  xX4XU pX C  l$di\ =%pa &_ +elj- p*+iowqkill2bef:ƾ70 rtcH____ wasz$- fulZr'73jput '@%gM&is 5 deO \8*ig/" invT gb__ul233pvu B?4zed5`p_vsfkd3689mp?ximumshtableC INT_MAXZ164!2Hkd,(bulk Nai=s u!a D, bfq'wakq_splvR3zLK0B~gr@  M zswap:synchrze\c "@ CPU\tQlugc9caLWD  ics Ud-wpE/P Um#m ap9cpfifo_ _en 8 etȱjt$$==TU| incKBo 6powe /xH$Jicp aO4:NAPIom d 3iuc99papr>{ ss'0'd_353v |MimaJ!@N60 l/dVdi3+byL DIMD \s1b œ26a1ra#_m uî4/x%bmap >BOe1D G m-UEFIL e Bo) T2c 8X ta-ar$ ep->rdl%#8J h)=Ll.=In&:^ap-$aenp-thgh ,l4NFSL# 4_shut#/n_ bFSea p/A !pm72p_:_r6Y44BluetotrtK+inup  79brcm cT r)cWwlnhy_iqc}! ms_nd80&ûbc@},_z(_bo_naC7 .W=mlx5PicODP &Ɵdrm/xe/PTP Uk495hidmaQ_\by{ jrtw8 1c.l_hw_s le/ 7X`mt76925gl n,vi 798`I%'x FhOPPi x]ert void$ fu,ıadtin&_[_Tto_vi acl_/ aBmLogc(Co]  E:gred?vrf:Aul3ml_l3_oWf te beuEAM_OPTION_TYPE_STRING &]0xhw2 wp2pZ3ūvxlO _vni  uoff,17c6ip6_ads6ASoCOF[ thda-daiDAI18/®?LG @T'?b8 ýX l.[.weightways<+-L80lun%_buddyj. 4颎pm_p_bw_* bX( ;a61iwmvaOd 'tp'@( ac"1upSTA8 Exy 2 ify \v6i/kv vcpu7 81xsj IsVofeld_&54OZspso H. $c ]!ra a vh%VL8^ "xe_0up+0x12c/70 [rd]" ua:DR6QeLye|._ru*loSf*_ lypy SQEs at z}W!6soft|L r0_u_ j64k_90ibmv0l& sen!o VIOSOA4N"n:_h i&_med_)%d 8D +holz3m!8hE-iCc nulf_imsg_ ǶtcAdT"'a'#!? r?-dstX6ds < r]M t:, las6 U7mm/;8i S; f."o LRUH 5pIX6, :op+6TfpFfp!rl1 8Mt_mNgeneopt)Bf onƨ20oa @hea * 8 c disp 3  +14j5$ke_k&C$(B$xim LSM Sc3 & Y&A=]jsp&֤n\ 'X ,WAlma&R NoedW'grub2V'pPC224GrUni daGRUB)Yh n@n 5cum٢b:l:'r e ". EbREetyo .f,"`E,&uVhP/L K1!:-5/gbxg l HeOOB W.457h C8)D-8; 1gI* QUNIXwFsP,G9ana&us{nd . 9::*|gn_WL/etc/low.2 ldǺ romi4!433ASQL 6C 6{ 6(b`e/)'A l~et&92#ed%eA!to6, ]*iskPEis 9$4niN ofiq6Q(enjo wflexiL -kadm[sthp44sag S4 sqli"CTiI*sH988k=S:Si&Daemi SSSD)Y$ 6d'PO tEW*ori7nuthent!sisOI2XEgLScNSS# !P&g@ A[MC)/ PAM.0tPwar< iJ-E!#-8 f[t b' vs] Kerb!3w| $legsAD-joi3 115COpenWPNki;=d$S2sP(:0QQ a f6-Bu--purO2eQyQ o&RFC 3 KEKawra}9255'6}*slub,5kK+|e,_ {|ADs QXMLcu XeK w^Z3U rigr mV/(sq1 b+³937Vxml2dlopbox?4f|W xslۢ1 ife =6a1&Dyn9FJ rfin"/.c&'[%, P)_l X0\*#i BnOC7A9 "BfOm,!1e1000eDh&_eepZJ&"N,c,u$C9OCl&t/sk(sk)->fa@_rs(? 9R)*MGMT7s~+%s?$i=$u/vt-disKV ty %icoh l^%40058X%prxamQԤ.6P40pd  rhad-vr V7LSB !>J a ggOD7# @R]uO=RD-Bus actE= X99Bd5dM :I3D>kK4_w92F 9ic_p_G_noš)N0]:>o<DExSyM*m98mUAFs61 I7S>$Sn@fE[l0IEx.};A!:!"_n;sen__:s9l2I'pRe SECqD "^F8[h9KA$s?7i V&5?$glc1g(/POS0Yp),Am*%m)ۢi YOL (nsc*uy=(nm W-fqL@ Da!c#_ ?:oaCgE'siF5|v%URLfedV0ub8"qdom H93 8r/jpegX8JPEGL C8KGs/RAMi<=fP#P5P(]9Zf96afs/:K@ OOB write in the heap (CVE-2024-45781) * grub2: fs/hfs+: refcount can be decremented twiceF3Fcommand/gpg: Use-after-freIue to hooks not]ing ]ov\on module unloadg5-0622fUFS: Iger =rflow may leadebasXut-of-bdswhen hlsymr77rrXshQ90) ForrYtails ab8secu5y issue(s),clud impact, a CVSS scG cknowledgsn/rlainformation,R pagm lis,R&ences:. Addi al CAges:֤nc'Xise,WejAlmaLinuxR Not/MfromΑ OpenSSH is protocol.lsupporbyBnumbf z, UNIXthtctx e 216 M : q" A: Avoi;Xrl@ 8007ZtpTkvc()nt/acpi H5Hrtpcf85063:x pPCF$ NVMEMZ69Znvme-tcpUme,yru],_,_Sv_pdu\]iscsi_ibft: UBS hifA1arn._r_show_nicf9vahic ; = S Di'Mul st# ^ZfigurTN7 i9& P ~Mdd/a~ -aapplz{ lug \e S nd,v nw, ewzpeoplAc0prr< fih LnP a:W-AOrPUict> a IDj52616Vim (Vi IM d)dz dsvi ed jvi)u2in< $_l_get_exp4/vp3-4752oExpat}C docuW eN: 3Re^SECnDhF817gv4:IepWbiunQdu756hdm-flagu_bI byt<ea d6bppdd eckskbn'__txmuY377i8s#plHMWa$gmaxh$w4)Us  F2%_sext_s0oni 2-3424q  RCU g_Q _y" 7+gs  ownhiu__udp_ 5v :c'derlydes A0Axsk xp_crey__agn_u5 XgennggH2054Isdotdot_ r8Hw : 12#W#in"_dx_h_Vcap_n@b943g c- ie /)OSIX p),Am%m)ۢin!-cacheemRnsc dmp#| Wi"qż"n/+ ly : c uidc K dl_(*inO$arxLD_LIBRARY_PATHN4802)Uet)bnxv efOb-xdp-!c1(Blue!OL2CAP,slab-ERi2 W_cmd]a dir a qcfgN11:cwiphy_&efrcS7ŲUUAF,in( >mdu( purpo-7hav^o -inE r PEC 63246{ 2 save#>n r'! cp: Tu450A58a VaL* m PorH$% G. NG)  pG3?N3Q 3@B850188o'i ng__#os B6629qCZPA'&inS(CUPS |pp*lV03 ,A t'denJ cupsd.'%om69x Aun 8-A843*P$HID:to` Emt_*up$39+,#au'h _d _X4|mm/Q-f(dVM_BUG_ONGE(PKPoisoS())funpktp:)-NULL derunkpis n' 0P acy Gu 4PG=GP,=enddigU,&T&s, )ia+FPG:S/MIME :I,losdVarbit9D 1H6897cdrm/xM((a-fG?r870`lerB0dvH_s< "main0_7 vmwgfxhFe / der9aga@ SVGA_CMD_MAX_DATASIZE?7#usbhwc1FrI=c?b eonwrj+_CL_tClA 828o}ep)2-ha`ma>osd_ma-\5*G 0>; 1SteC]PF-GNOME?!'2,n  g^4} y 7Nig_es\!e5_i13601!HurlR3:Unne#:mprH#". Uchaus{o64a SAPI70lysIly |H]71]=l[GmbgD ET foZHTTP >4Hs®660!446g~YSi$CEerSt&zU' 1rG9:E34#7 vm_7_ioctl"uyOC$ 3ьo2S#48 p4:2_?$&4OĬO W' MGMT s"É9u/-atlafra)[RXl  30(hc&3F8vVAi32a5cZ[ : or d/6W$upgCIeLDAP dA Cxo0>cWie#908UL!ki8D=Hs;E(:)UEREa ll-A 0r7nEyD .ss6?vXtOughyd PKCS#12#111 qBnDn>xd )}CMS ;:546τk0l&8dQUICo8o m-: V`+ dgst` sil? n o9Qw -a5[WG1.3s?eH ~6619~oIOCv(160a6 {$e$B@ -d OCBon/-- 9 ?8pi/pZmal^21%^%S%`=pon0Y0"6ub< X5f7Ul"c*: Quad L~xml.dom.["d  U-:/ qptc e\y;385aASoC" U@cr_rt56409qui/]yW40WJ: r>` $in&_"_4s_9Aoy[25O JXuxGet"d, %aal/OH=gss-fnkH|H; %6 >: H"pw$mv256-B&U4B~ lTJ ic lo^ sz8ab3o+FaDcoWZ77R, Hm1P2r,u5J) Jl>asiblyIilLmebdsL#6p..def bf>nN. 0Scvy-sb: FP5p#+lG vs#ne5BdVt() ac@irqc1B/gv2 W8%9RDMA/H"KACO: p6_xmit83=88(>(Fn_9N<ˇ0* Ɖ = |+v_@;/ 7.Å27 ALSA(oi 8H='Al2cBLd9#ue_oW3t$5"memg ,/gA6-hrPWX-u ?ryV|-OwQ S WRDE_REUSEyAPPENDre3+ed8+1``+