SOLV . De0dnf1.01.2Pf(6yłj?b~Zo(c2\+x86_64noarchcvebugzilla2.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7i6863finalpackager@almalinux.orgrhsaselfkernel-abi-stablelists1Moderatekernel-coredebug -core modules-extramodules-extratools -libsdebug-modules-core uki-virtmodules-coreuki-virt2.9.4-6.el9_47-4.el9_7.1kernel-uki-virt-addonsCopyright 2025 AlmaLinux OSImportant4.17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.1Copyright 2024 AlmaLinux OSpython3-libs5.14.0-70.17.1.el9_0 22.1.el9_0Copyright 2023 AlmaLinux OSbpftoolpython3-perf5.14.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_54.16.4-101.el9 3.el9_15.14.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_2427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 6.1.el9_7 8.1.el9_7 41.1.el9_7 5.1.el9_7 7.1.el9_7 9.1.el9_7 5.1.el9_7libcurl-minimal5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_170.26.1.el9_0 30.1.el9_0openssl-libs2.37.4-21.el9_7python31:2.06-114.el9_7.1.alma.127.el9_0.7.alma46.el9_1.3.alma70.el9_3.2.alma.194.el9_5.alma.1252-32.el9_4.alma.155.el9_7.7.alma.1libxml211.5.0-5.el9_5.alma.1:1.48.10-2.el9_5.alma.1 5.el9_54.16.1.3-27.el9_31:2.06-104.el9_6.alma.114.el9_7.alma.177.el9.alma.1250-12.el9_1.1 3Copyright 2026 AlmaLinux OS1.19.1-24.el9_120.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_6Copyright 2022 AlmaLinux OSexpatgnutlskrb5-libspkinitserver -ldaplibkadm5curl-minimalps-libsglibc-gconv-extralibarchivenslsmbclientwbclientpython3-sambasamba-client-libsommon-libslibswinbind-modulesvim-filesystem7.76.1-14.el9_0.5Lowopenssl1.46.5-3.el9grub2-commonefi-aa64-modules x64-modulespc-modules3.25.0-4.el9_7.2libsshpam7.76.1-19.el9 _1.1223.el9 _2.1246.el9 _3.239.el9_4.135.el9_7.3python3-libxml2344-2.el9_71.29.33.1-2.el9_2.alma.13.90.0-6.el9_3vim-minimal1:3.0.1-41.el9_02:8.2.2637-16.el9_0.233.21.0-9.el9_3.alma.1glib2libnetapighttp2samba-dc-libsqlite-libsystemd-containerlibs18.168.6.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4:1.12.20-7.el9_12.12.5.2-1.el9311.2-1.el9_423.1-1.el9_5grub2-efi-x64 -cdbootpctools -efi xtra minimalkrb5-workstationopenssh-clientskeycatserversamba-common8.7p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.18.el9_7.alma.10.8.7-20.el97.el9_0.112:4.4.2-17.b1.el9 8.b1.el93.5.3-2.el9_0avahi-libsc-aresgrub2-ppc64le-moduleslibssh-configua-libsopensc0.8-15.el920.el92.el9_66.2-10.20210508.el9glibc-all-langpackscommonlangpack-aafgrkmnprstyczbemrghboinorxsyncaehrkbmnrhsbvydaeoisbvzelnostufafilorurygadezluvhakeifnersbtuyiadgkstujakabklmnoksuwylbgijnotvzhmagifeghriqjwklniwrstynanbdsehniulnrsoocmrspaplstquzrajouwsahtcdegshnsidklmoqrstvwzltacyegheigklnopirstugknmrzveiwaeloxhyiouewzhuminimal-langpacknscdsamba-common-toolswinbind20230310-135.el9_2.alma.1814-140.el9_340603-143.1.el9_4905-143.3.el9_4iwl100-firmware0-firmware5-firmware35-firmware2000-firmware30-firmware3160-firmware5000-firmware150-firmware6000g2a-firmware b-firmware50-firmware7260-firmwarelibertas-sd8787-firmwarenux-firmware-whencenetronome-firmwaresystemd-rpm-macros1.0.8-10.el9_5:2.5.4-38.el9_7.33.0.1-43.el9_0 7.el9_17-16.el9_225.el9_3 7.el9 8.el9_46.el9_22.2-6.el9_5.15.1-4.el9_77.el9_72.2.10-12.el9_0.235.2-42.el967.el9_7.19.13-10.el9_61.el9_62.el9_64.el9_73.el9_1 2.15.el9_36.el9_4 5.12:4.9-15.el98.el93.9.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_7.125.2.5-8.el9_039-16.el972-2.el9NetworkManager-libnmbinutilsdbus-libsevice-mapper-multipath-libsharfbuzzlibipa_hbacksbapngsss_certmapidmapnss_idmapsimpleifptasn1opencryptoki-libsrepokey:type:idshadow-utils-subidssd-client0.10.4-11.el93.el95.el9_677.el9_73.3.17-13.el9python3-samba-dcrsyncsamba-dcerpcldb-ldap-modulestoolsusersharesystemd-oomdpamresolvedudevcockpit-bridgedocsystempython3-requestssetuptools-wheelurllib315.6-1.el9.alma3.9.10-3.el9_0cockpit-wsdevice-mapper-multipathlesssudo0.23.0-2.el93.el9_34.el9_34.1-3.el9_21.0.9-9.el9_710.0-11.el97.1-5.el9_2.19.1-1.el92.el9_43.3-0.el913.el943.0-5.el9_2.1 3.1 4.36.el9_7.15.1-19.el921.el9_52.el9_55.el9_66.el9_65.el9_06.el9_16-17.el9_6.28-6.el9_4.alma.1:2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.26.2.0-13.el92.10.4-9.el94.9-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_6 7.168.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el9:1.6.37-12.el9_7.128.2.2637-20.el9_1 1.el9 2.el9_6.1 3.el9_7.123.2.2-2.el934.1-6.el9_17.el9_38.el9_69.el9_75.3-4.el95.el9_66.el9_67.el9_79.el9_77.6-12.el9_08.el9_123.el9_3.348.3-10.el9_74.el9_46.el9 _6.24.16.0-8.el9_19.el95.14.0-611.9.1.el9_74.2-4.el9_0.34-2.el9_13.el967.1-10.el9_6bluez-libszip2-libse2fsprogs-libsfile-libsreetypegmpjqlibatomicblkidrotlicapom_erreconffdiskgccryptfortranompiculdbmountndpfsidmapquadmathsmartcolsstdc++tirpcuuidncurses-libsprocps-ngtobuf-cython3-ldbrepokey:type:strpm-build-libslibssign-libstpm2-tssxz-libs1:25.30.13.0-135.el9_2.alma.140.el9_33.1.el9_43.el9_42.24.0-2.el9_5.alma.153.0.0-10.el9_1.12.el9_4.13.el9_6.1NetworkManager-adslbluetoothconfig-serverinitscripts-updownteamuiwifiwanbinutils-goldubblewrapdbus-commontoolshcp-clientommonrelayservergnupg2iputilskernel-cross-headersdebug-devel-matched vel -matchedocheaderstools-libs-develpartxlibsss_autofssudomicrocode_ctlopencryptoki -icsftok swtokperfython3-cryptographylibipa_hbac sss_nss_idmapsss -murmur dconfigrhel-net-naming-sysattrsshadow-utilsim-x64ssd-adcommon -pacdbusipakcmrb5 -commonldapnfs-idmappasskeyolkit-rulesroxytoolswinbind-idmaptarvim-X11commonenhanced0.4.1-7.el9_4.alma.18.el9_58.7-12.el9_1.11.2.11-32.el9_02-1.el92.el98.10-2.el9.alma9.5p2-10.el9_36.17.el9_1.15.8-4.el9_3.alma.1:2.10-5.el93.3-7.el9_2.12.2.10-12.el9_0.33.3-2.el9_05.el9_70210202-11.el9_6.138-5.1.el9_0:1.34-6.el9_19.el9_73.18.0-7.el92.3-18.el920.el9_5.15-3.el9 _7.26.0.1-4.el95.el9_6:2.1.0-18.el94.35.0-6.el9_34-10.git1.el95.1.8-6.el9_12-4.el96.1-6.el990-2.el9_23.el9_34.el9_47.0.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_23.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_44.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_5bashluezsdtarzip2cockpit-ws-selinuxdbus-brokermidecodee2fsprogsxfatprogspat-develfilewupdiptraf-ngldb-toolsibarchive-develcurl-develdnf-plugin-subscription-managerogrotatenanocursesfs-utilssprs-softokn -freeblysinitutilopencryptoki-ccatokssl-develperlpython3-cloud-whatrpmsubscription-manager-rhsmrepokey:type:flexarraypm-plugin-audit selinuxsignshim-unsigned-x64quashfs-toolsubscription-manager-plugin-ostreetpm2-toolsracerouteutil-linux -core userwpa_supplicantxzzlib1.26.5-3.el9_3.15.el9_4.16.el9_7.1:39.31.5.1-135.el9_2.alma.1 40.el9_33.1.el9_43.el9_42.10-7.el9_4.125.1-10.el9_67.el9_29.el96.1-3.el91.2.3-7.el939.31.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_441.28.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4:20240910-1.el9_550211-1.el9_68.24.2.2-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_483.5.1_1-135.el9_2.alma.1 40.el9_3 3.1.el9_43.el9_4ncurses-baseprocps-ng-i18nython3-dnsidnapip-wheeltuned-profiles-cpu-partitioningpatch:ALSA-2022:49405099242495294260031572246028108385470901852883148239826791931784053618459340053936373:02823334567894036267529465123478911414707013212745897887502192332708264550355995722354325479504774125697088385061897145362763838658793566152131254359617798594897057445677478794:0310463456853379081196610244743849398312509304862395306928799032394641033784756638350412770167975833063950113619842364078312494575836367746992853635293492861623635646456775483997748481624466179317253137140145132343049687045416055:00593247757892510136379407585699837114041186199220834475196274633042865060296241304205011999429661700408746116398598807377558742608275819409930205183259936435541255926217537640566086532413423480362779867353193742446977903704395064776742337404903814233364355908030243012526877809786:00672383124457199393610871433504738617913204221272286306640588940664168887596050806023615339046257076673846688259510921repokey:type:relidarrayCriticalrepokey:type:numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatusTT^^##nniihhookkll11jjww22//WWccd||}}d++**qrrq;;jlknnoommjklK KK{{ppjjkknnmmooll# / } |  ffZZ$ $$,,, ) )pp)RR--   >>[[ZZ1177664 4222 6 5 541 3 3YY7 35E E8 8bb8E) ))- ''>>' 0 00> \\*** eebbddff@ @@& &( (%%''())% qq' ) &TT__((aa( __` ``CCEE_ ^ ^FFDD^ PP] ]]UU222 ""!!  ``\ \AABB??ZZ==@@Z \ttrrssuu SS111 }}eess~~uu, ,,[[/ //jj==$$%%]]$$WWDDBBJJ00//YY::,,<<**66aaXX>>--lliiOO. .KKHH9999''MM44JJxx44AA66oo**cc??[[??//22==MMee>>QQ--))``1177__dd    XXGGuu88DDKKTT}}++\\vv88UU33((""!!qq&&22mmNNhhFF;;""kkVVyyLLssZZnngg@@77''  II||GGEE##RR::0 .VV55--TTSS^^CCPP!!..EEAAHHBBNN{{))  II~~CC- ((##;;55RRWW  zzrrpp++PP%%,,bbOOwwUU11&&00LL<<ffSS  00..FF33tt  @@QQ[[[    ''' ]]xxDDD YYY 5 55B BB*** J JJhhB BBCCC   zzIIxxttyyH HG GI wwHGCCC %%3 33vvuutt||]]((__( ++6 6zz||11  1   00+ . .yy  / /rr  qq.  6/{{0 QQPPGG: ::^^\\VV[[&&TT& UUYYZZ444 %%VV% ggXX& &&+++ 7 776 6? ?6553 35 , ,3?,<<< ggaa--- === 99AA9 - -2 2A 2-... ; ;;iippYY-.V/V0V1V2V3V4V5V8V/67890:.;.<.=..>.?.@.A.B.C.D.E.m.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z.[.\.].^._.`.a.1bcdefg20W1W2W3W4W5W8W.W/W3X/Y/:/;/m//?/\/]/B/C/`/a/4h9i9j9k9l9m9n9o9p9q95rUsUtUuUvUwUxUyU679:;>?@ABCDEFHIJKPQRSTUVWXY[^_abcdfghijkmnpqrstuvwxyz|~    !"#% ' ( * + - SSSS2z2|S}S~SS{SS. / 1 2 3 4 5 6 7 8 9 ; = ? A B D E G I J L M N O P Q T U V X Y Z [ \ _ ` a b c e g h i j k l m n p q r s t u v w y z {                                 ! " # $ % & ' ) * + , - . / 0 1 2 3 4 5 8 9 : ; < = > ? @ A B C D E F G H I K \<]<L M N P R S U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i k l m n o p r s t u v w x y z { | } ~                 ### # # N N          ? >      @ NN= .9 9!U"###$'%'8^_\]:;>?Z[PQTUXYRS`aLM@A8"9"&'()i*i+i<,-./012=xtytsttt!t34Z[XY^_\]PQ>?:;`a@ALMRSTU5O6O7O8O9!:!;!PQRSLM\]TU@A`aZ[:;^_XY>?<+=+kDlDiDjD DDpDqDnDoD>=?=@=A=B=C=v=D=E=F=G=H=I=J=K=L=M=N=O=P=Q=R=S=T=U=V=W=X=YgZg[g\g]g^g_g`gGatbtct78d65e<f<g<h<i<j<k<l<m<n<o<pqrcstuvwxLy*z*M{^|^}^N12Od6785~     pEqEkElEiEjE EEnEoE:~;~Z~[~R~S~P~Q~X~Y~\~]~L~M~@~A~~^~_~`~a~T~U~>~?~eeee`eeeeq !"#$%&'(u9u8u)*+,-. / 0 1424Z345)j*j+j\    =     >    @ ?     ]!utuxuyusu>?RSXY:;`aTULM\]^_@AZ[PQLQKQ`78d65 $%"#(!q&';":"9"4586(7(e('&RSLM^_Z[TU\]@AXYPQ`a>?:;iFjF FFlFpFqFkFnFoFLM`aZ[:;^_PQ\]TU@AXYRS>?V>E>P>I>J>K>@>A>D>M>G>B>C>H>R>S>N>O>T>U>W>F>X>L>v>Q>>>?>:?;?>???X?Y?^?_?8?9?P?Q??T?U?:?;?Z?[?L:M:\?]?@?A?`?a????R?S?./12,-0l GjGpGqGGlGiGkGnGoG@AcuvwxstoB(C(D(E(v(F(G(J(K(Q(C(@(A(P(I(M(G(H(I(D(E(J(K(L(M(N(O(B(X(O(L(H(P(V(F(R(S(>(?(Q(T(U(W(N(sztz!zxzyzcb     ~;#:#9#RwSwTwUwVwWwXwYwpHqHiHjHnHoHkHlH HHZ[[[\[56d78!vtvsvxvyvZ@[@R@S@^@_@P@Q@@@A@T@U@X@Y@:@;@<@=@\@]@>@?@L;M;:@;@`@a@@>@?@8@9@]7^7{L)M)@)A)P)K)B)C)D)E)H)I)N)O)P)I)Q)C)J)K)J)H)T)U)W)S)D)E)N)O)F)G)M)G)B)F)L)>)?)v)V)R)Q)X)_X`XaX})*,-+JpIqIIlIkI IjInIoIiI\A]A:A;ATAUAPAQA@AAAXAYAZA[ARASAA?A:A;AL<M<>A?A^A_A8A9AARxSxTxUxVxWxXxYxffff`ffffbRcRdReRfRgRhRiRjRkRlmmmnmo!p!fLjag"hdap\iabaca`eao\lLa m\n\k\B]B:B;BRBSB@BABPBQB8B9BTBUBXBYBB?B`BaB:B;B>B?BBZB[B^B_Bqvrvsvt u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                   56d78nJoJJlJkJiJjJpJqJ J``` UUUcbn]p]a o]ebg#bb`fMibjbdbm]klMhnnmnln//__ _!}"}#}$ % & ' ( \\[\Z\)7*77+7d6785,s-s.sT*U*@*A*V*E*P*I*H*>*?*N*O*Q*C*J*K*B*L*M*F*G*N*O*W*S*L*K*H*I*J*M*F*G*D*R*Q*C*D*E*B*X*P*v*iKjKKlKnKoK KpKqKkK/ 0 1 *23456&  ~   7<8<'<9< : ; < = > ? H+I+P+I+L+K+Q+C+Q+C+P+K+F+G+D+E+J+H+M+G+X+O+N+O+F+R+S+B+D+E+L+M+>+?+B+J+@+A+v+T+U+V+W+N+nLoLiLjLpLqLLlL LkLaaa$,-)*+VVV& xwyw!wtwsw@ABCDEFGHIJKLMNOPQRM) ./05678d> ?     =  @           , &'(WWW0 SfTfUfT4U44<4=4>4?4V4W48494Z4[4`4a4LLMLX4Y4P4Q4:4;4:4;4@4A4>4?4^4_4R4S4\4]4,P+PV5W5LMMM`5a5^5_5>5?58595T5U5:5;5P5Q5@5A5\5]55<5=5>5?5X5Y5:5;5Z5[5R5S55678dUeTeSeMlMkMnMoMiMjM MpMqMRySyTyUyVyWyXyYy6LNMNZ6[6:6;6<6=68696T6U6X6Y6\6]6V6W6^6_6@6A6R6S6>6?6`6a6P6Q6:6;6>6?6XXYXZX[X\X]X^X_X`X: 8w9ww]8^8< &'(> RCSC:C;CCPCQC>C?CC?C`CaCXCYC\C]CZC[C:C;C@CACTCUC8C9C^C_CL>M>a3b3@ pqr? ; > = : < cdC SdTdUd!xtxsxxxyx@?>= F ~ !  $ %   ( #    " & '    q e1f1H +8*88)8g$h$i$j$k$l m K ('&}#n#o#p#q#r#s#t#u#v#w#x#y#z#{#|#}#~########### # # # # ################### #!#"###$#%#&#'#(#)#*#+#, - + * ) PDQD:D;DDRDSD\D]DL?M?@DAD^D_DTDUD:D;DXDYD>D?DZD[D8D9DD?DTEUEXEYEE?EZE[EPEQE:E;E>E?ERESE\E]EL@M@@AGHghxyhi01jk&'UVJKhitu    BCfg$%ab()67VW$%45z{:;yz()2389 !&' bcTUbcijrs,-QRnoXY|}DEpqNOde01 89xy^_z{"#jkvw    FGefST}~PQ>?"#|}TU\]  LMYZ./Z[qrKL{|>?^_vw~lmVW23<=IJ45cd\]@AlmJK`a23XY op]^ !`aOPstMNWX&':;./xyZ[rs./()01RS*+"#$%EFBz{9 >? !deuv<=klfgPQNOwxvwHI,-|}8[\BC~mn  674567  RS  LM,-CDnoFG_`~@Atu*+*+pqDEtu:;HI<=bbbR ]9^9S >F?FRFSFXFYF\F]F@FAFF?F8F9F:F;FPFQFTFUFZF[FF^F_F:F;F\][]Z]Ih,h-h.h/hHh0h1h)W 5678dXzYzTzUzVzWzRzSz>G?G:G;G>G?G:G;G@GAGRGSG8G9GLBMB^G_GH?HH`HaHPHQH^H_HZH[H>H?HRHSHLCMC@HAH\H]HTHUH:H;HI?I8I9I:I;IRISIPIQI>I?I^I_I@IAILDMDIXIYIJ?JPJQJ>J?J:J;JTJUJ:J;J`JaJJ@JAJXJYJ8J9JZJ[JNlN NjNkNnNoNpNqNiNKRLRd `KaKZK[K@KAKKK?K^K_K8K9KTKUK>K?K:K;K:K;KLFMFXKYKMf d6785     ~56!~"~#~XLYL>L?LTLUL@LAL^L_LL?LPLQLx9x8x!ytyxyyysy^M_MM?M\M]MZM[MLHMH>M?MTMUMMidddbdlOa fOg%o_h!edkm_jdp_n_`cdo 8N9N@NAN\N]N^N_NRNSN:N;NLIMITNUN>N?NZN[NXNYNN?N78d65@OAO\O]OROSOO:O;OPOQO>O?O8O9O`OaOO?O^O_OLJMJZO[O:O;OX789:W;<=>?@ABCDEFG0i1i,i-i.i/iIiHi  ~   x{y{s{t{!{d6578sx HZIZJZ845K%L%M%N%O%(| P5Q5} R6S6~ 56d6785lpmpnp  ~   8y9yy>3?3V3W3\3]3>3?3:3;3R3S3T3U3X3Y3@3A3LKMKZ3[3P3Q3<3=3`3a38393:3;33^3_3R7S77LOMO>7?7>7?7\7]7`7a7:7;7T7U7Z7[7:7;7^7_78797<7=7X7Y7P7Q7@7A7V7W7<,=,78;<DEBC9:=>FGAXW?@<8=8@8A8X8Y8Z8[8>8?8T8U888898:8;8P8Q8^8_8>8?8`8a8LPMP:8;8V8W8\8]8R8S8TrUrVrWrXr78d65:X;X8X9XVXWX`XaXRXSX:X;XTXUXX>X?XZX[X>X?XPXQX@XAXXXYXY?Y8Y9Y>Y?YVYWY@YAYPYQYZY[Y`YaY:Y;Y:Y;YXYYY^Y_YYZ?ZZ?Z8Z9Z:Z;Z@ZAZXZYZ`[a[V[W[[:[;[T[U[P[Q[>[?[8[9[@[A[^[_[R[S[:[;[<[=[>[?[Z[[[X[Y[0/.\$]$^$)*+,-J8999^9_9P9Q9LQMQ:9;9>9?9\9]9<9=9X9Y9V9W9>9?9:9;9@9A9`9a9Z9[9T9U9R9S99P\Q\V\W\8\9\:\;\>\?\:\;\@\A\^\_\R\S\`\a\X\Y\Z\[\T\U\<\=\\>\?\!|t|x|y|s|,-+*)_`abcdefghijklmnop, - ) * + :];]:];]@]A]^]_]]>]?]>]?]V]W]X]Y]8]9]Z][]R]S]T]U]P]Q]`]a]<]=]>^?^P^Q^`^a^^^_^X^Y^>^?^R^S^V^W^<^=^:^;^Z^[^^8^9^T^U^@^A^:^;^bc`_a_V_W_Z_[_>_?_>_?_8_9_P_Q_T_U_:_;_R_S_@_A_^___X_Y_<_=__:_;_>`?`:`;`T`U`^`_`<`=`P`Q`:`;`Z`[`X`Y`8`9`@`A``V`W`>`?```a`R`S`78d65ShThUhRaSaTaUaa`aaa:a;a>a?a8a9a:a;aVaWaXaYa^a_aa?a@aAaPaQa:b;b`bab8b9bVbWbb?b@bAbZb[b>b?bRbSbTbUb^b_bPbQbXbYbbnqmqlqVcWcc?c@cAc:c;c^c_c`cac>c?c00( ('&^d_d>d?d:d;d>d?dRdSd@dAdVdWd:?:<:=:8:9:>:?:`:a:R:S:::;:T:U:e:e;e8e9eVeWe>e?eXeYe>e?eZe[eReSeTeUe@eAe^e_ePeQef?fVfWf>f?fXfYf`faf@fAf8f9fZf[f:f;f:f;fTfUfg?gXgYg@gAg>g?gg:g;gVgWgh?hPhQh:h;hh?hZh[h:h;h`hah8h9hhThUhTiUiPiQiViWi>i?i`iaiXiYi:i;i8i9ii?i:i;ii^i_iTjUjRjSj`jaj@jAj^j_j>j?jj8j9jj?jVjWjPjQj:j;jZj[j:{;{V{W{{>{?{R{S{:{;{8{9{X{Y{@{A{Z{[{<{={T{U{`{a{>{?{P{Q{^{_{>?=@ 6 $ % ( ' & 7 0/.+:*::):4 5 8 v$w$$$ $!$ $ $$$~$$$$)$*$'$q$"$#$r$s$$$ $$$t$u$$$$$}$ $o$$$n$x$y$$$$$z${$$$$$$|$}$%$&$$$p$$$+$ $($s}t}x}y}!} R S |9|8|)*+,-:k;k8k9kRkSkkZk[kk?kVkWkXkYk>k?kTkUk(# "!q~$%&'XlYl>l?lZl[l:l;llPlQlVlWl:l;lTlUl@lAlRlSl`lal8l9ll?lVmWm@mAmPmQmXmYm:m;mTmUmm?mm>m?mRmSm^m_m`mam:m;mZm[m78d65V}W}X}Y}T}U}R}S}+;*;;);:;;;>;?;<;=;T;U;P;Q;^;_;LSMS@;A;;R;S;V;W;X;Y;:;;;>;?;Z;[;8;9;\;];`;a;+ * , - )   @    ?         =   > J 8z9zzLTMT><?<R<S<T<U<P<Q<<<=<><?<^<_<X<Y<`<a<@<A<:<;<:<;<Z<[<<8<9<V<W<z{KLfgHIqrXYRSbc@Atu<=XYhiTU@Axypqrs()<=PQmn<=:;:;23BC*+tuBEF45vwyz./NO23op\]~}~JKLM_`]^,->?ijUVBC67de89&'23TUno89RS() cd`a[\bchiOP45efde,-DElm{||}CD^_jk89uvpqMN&'  Z[  IJ>?\]HI67*+$%|}wxQRPQ rsFGFGVWz{@Ajk !NOLM z{~&'*+"#$%WX() |}0167YZst01noklGHvw"#lmxyST~  Z[./01gh  VWvw./$%JK45 ! !`a,->?fg    ^_:;xyab  tu"#  DEd6785= >?@O T|U|X|Y|V|W|R|S|sQ J<-=-stT      ~            ('&345VPWPZP[P^P_PPPQP@PAPRPSPP:P;PTPUP:P;P8P9P`PaP>P?PP?P: ; > = ? < 845{9{8{VQWQQ?Q^Q_Q@QAQ:Q;Q>Q?QXQYQQRQSQ@RAR`RaR:R;R8R9RTRURZR[RR^R_RRRSR>R?R>R?RPRQRS?SVSWS:S;S>S?SST?T`TaT>T?T8T9TZT[TXTYT@TATVTWTRTSTTTUTtuZ[RSmnfg^_deuvbc$%TU"#FG_`z{89>?stxy:;^_67DEpq67  XYRS{|()vwOPMNBC  TU}~./  23  tuno BC2301FG67|}QR xyqrpq*+By   klhiIJwxUV !CDrs$%~XY,-z{./tuij23@Agh 8945no45>?VW01vw`a():;>?WXDE./lm*+~<=&'jk"#NO8945 Z[ab01@APQJK@A !<=]^YZHI()~[\ ,-rs  :;\]|}GHz{NOEF$%yzcd  "#&'fg !&'lm<=HI\]STvwefop*+hiPQxLMde|}bcJKKL`aVWLMjk,-U?UVUWUZU[U8U9U:U;UPUQUU`UaURUSU^U_UTUUU:U;U>U?U@UAU^V_V:V;VRVSVVZV[V8V9VXVYV>V?VVVWV@VAVTVUV:V;VV?V`VaV !! !!!! !!!!~!!! ! !!!bcq%r%UgTgSgl m e f : ; t u 4 5     V W       0 1 S T j k         v w 2 3 w x c d   Y Z x y     N O z {   y z g h   O P H I : ; P Q . / ` a K L 8 9 < = < = ~  n o N O : ; z {   8 9 X Y     P Q     4 5 k l R S T U 8 9 & ' D E   R S 4 5 _ ` f g & ' 6 7 0 1 j k , - p q h i | } t u } ~ ~    x y V W . /   z { H I F G > ?  i j   v w Z [ p q   $ %         | } v w 6 7   $ % E F * + l m { | Z [ > ? \ ] ] ^     * +   & '   T U   m n @ A ~  " # d e   @ A L M   n o . / " # U V \ ] h i       W X C D   , - 0 1     I J ( ) < =   r s > ?   6 7 f g ^ _ M N | }    ! B   d e J K J K   , - $ % B C @ A   * + D E a b    t u s t [ \ F G B C   u v Q R  ! " #     ( ) G H 2 3 2 3   ^ _       x y X Y b c ` a o p q r L M r s b c  ! ( ) >W?WRWSW:W;WW`WaWW?WXWYW^W_W@WAWVWWWPWQW6)7)j uvwlrmrnrPnQnZn[n^n_n:n;nXnYnTnUnn>n?nVnWn@nAnn?n`nan8n9n"$#$:o;oZo[o^o_oXoYoo`oao>o?oVoWo8o9o@oAoPoQo:o;oRoSoToUoo?o#"!M q VpWpTpUpRpSp@pApXpYpPpQp>p?p:p;p:p;p8p9ppZp[p`pap^p_p>p?pq?q^q_qPqQq8q9qVqWq@qAqXqYq>q?q:q;q:q;qZq[qr?rXrYr@rArRrSr>r?rsTsUs8s9s:s;s@sAs>s?ss?sW X _ ` 6 7   n o  ! t u B y O P c d     Q R   e f f g ] ^ l m ~  q r 8 9 X Y   F G     d e I J $ % S T & ' > ? b c D E   j k : ;   , - B C H I { |   . / V W @ A   ( ) E F | }   h i   K L m n       6 7 M N $ %   * + \ ] x y   " # l m x z { 2 3   0 1 ( )   d e : ; $ %   w x  ! L M z { 0 1 F G   N O Y Z C D   > ?   ^ _ > ?   " #   o p z { ~  a b J K P Q D E . / Z [ h i   2 3       f g 0 1 v w & ' J K     g h   u v : ; \ ]   b c   j k x y < = R S , -   P Q 8 9 r s k l v w   U V   [ \ y z @ A s t < =   " # & '   ~  , -      t u   2 3 L M 6 7 T U 4 5   ^ _ 8 9 4 5   N O . / X Y     R S T U G H Z [ V W @ A r s ` a < = p q * + * +  | }  ! 4 5   | }   i j B C   t u } ~   v w     p q ` a H I ( ) n o       TtUtPtQtRtSt8t9tt?t>t?t`tatt:t;tZt[tuvw:u;uu?uXuYu:u;uVuWu8u9uPuQuTuUu^u_uRuSuZu[u>u?u@uAu`uauusssssv:v;vTvUv8v9v:v;v>v?vv?vZv[vRvSvVvWv^v_v`vav@vAv7!8!5!6!d!&'(Zw[wTwUw>w?w^w_ww`waw:w;w@wAw8w9wRwSwVwWw:w;ww?w@? => bc4 5 8 XAYA]A^A[A\AZAAA_A`A :x;xPxQxxRxSxTxUx>x?x>x?x`xax8x9xVxWxZx[x^x_x:x;xy?yyVyWyRySy>y?yTyUy^y_y`yayz?z:z;zVzWz>z?z grub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm grub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmo grub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpml grub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm@ grub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmNshim-x64-15.6-1.el9.alma.x86_64.rpm= grub2-common-2.06-27.el9_0.7.alma.noarch.rpm{Nshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmp grub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmj grub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmk grub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmn grub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmm grub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm? grub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm> grub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm grub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmo grub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpml grub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm@ grub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmNshim-x64-15.6-1.el9.alma.x86_64.rpm= grub2-common-2.06-27.el9_0.7.alma.noarch.rpmf/$[BBBBBBBsecurityModerate: vim security update"Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242Vvim-X11-8.2.2637-16.el9_0.2.x86_64.rpmVvim-common-8.2.2637-16.el9_0.2.x86_64.rpmVvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmTVvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm8Vvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmVvim-X11-8.2.2637-16.el9_0.2.x86_64.rpmVvim-common-8.2.2637-16.el9_0.2.x86_64.rpmVvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmTVvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm8Vvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm_0)eBBBsecurityModerate: expat security update"exhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244^expat-devel-2.2.10-12.el9_0.2.x86_64.rpm# expat-2.2.10-12.el9_0.2.i686.rpm#expat-2.2.10-12.el9_0.2.x86_64.rpm^expat-devel-2.2.10-12.el9_0.2.x86_64.rpm# expat-2.2.10-12.el9_0.2.i686.rpm#expat-2.2.10-12.el9_0.2.x86_64.rpm%1jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update"'] https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249.kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmn.kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm.kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmi.kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmh.kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmm.kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmo.kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmk.kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpml.kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1.bpftool-5.14.0-70.17.1.el9_0.x86_64.rpmj.kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpmw.perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2.python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmn.kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm.kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpmi.kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmh.kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmm.kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmo.kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmk.kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpml.kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm1.bpftool-5.14.0-70.17.1.el9_0.x86_64.rpmj.kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpmw.perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm2.python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm.kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm2UBBBBBsecurityModerate: libarchive security update"rXhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252/libarchive-3.5.3-2.el9_0.x86_64.rpmWbsdtar-3.5.3-2.el9_0.x86_64.rpm/ libarchive-3.5.3-2.el9_0.i686.rpmclibarchive-devel-3.5.3-2.el9_0.x86_64.rpm/libarchive-3.5.3-2.el9_0.x86_64.rpmWbsdtar-3.5.3-2.el9_0.x86_64.rpm/ libarchive-3.5.3-2.el9_0.i686.rpmclibarchive-devel-3.5.3-2.el9_0.x86_64.rpmt3%\BBBBBBBsecurityModerate: vim security update"JRhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942Wvim-common-8.2.2637-16.el9_0.3.x86_64.rpmWvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmTWvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm8Wvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpmWvim-X11-8.2.2637-16.el9_0.3.x86_64.rpmWvim-common-8.2.2637-16.el9_0.3.x86_64.rpmWvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmTWvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm8Wvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpmWvim-X11-8.2.2637-16.el9_0.3.x86_64.rpmU4fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update"qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003/kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmm/kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpmn/kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpmw/perf-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpmj/kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmh/kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmo/kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpml/kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm1/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpmk/kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm2/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpmi/kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmm/kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpmn/kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpmw/perf-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpmj/kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmh/kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmo/kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpml/kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm1/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpmk/kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm2/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpmi/kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmо}5QBBBBBBBBBQsecurityModerate: curl security update" https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157}9 libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm|9 libcurl-7.76.1-14.el9_0.5.i686.rpm|9libcurl-7.76.1-14.el9_0.5.x86_64.rpm}9libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpmd9libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm+9curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm*9curl-7.76.1-14.el9_0.5.x86_64.rpm}9 libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm|9 libcurl-7.76.1-14.el9_0.5.i686.rpm|9libcurl-7.76.1-14.el9_0.5.x86_64.rpm}9libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpmd9libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm+9curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm*9curl-7.76.1-14.el9_0.5.x86_64.rpm6$\BBBBBBB securityModerate: openssl security and bug fix update"&/ https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224Uopenssl-libs-3.0.1-41.el9_0.x86_64.rpmrUopenssl-perl-3.0.1-41.el9_0.x86_64.rpmU openssl-libs-3.0.1-41.el9_0.i686.rpmqUopenssl-devel-3.0.1-41.el9_0.x86_64.rpm;Uopenssl-3.0.1-41.el9_0.x86_64.rpmUopenssl-libs-3.0.1-41.el9_0.x86_64.rpmrUopenssl-perl-3.0.1-41.el9_0.x86_64.rpmU openssl-libs-3.0.1-41.el9_0.i686.rpmqUopenssl-devel-3.0.1-41.el9_0.x86_64.rpm;Uopenssl-3.0.1-41.el9_0.x86_64.rpm7%msecurityModerate: gnupg2 security update"U(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602f#gnupg2-2.3.3-2.el9_0.x86_64.rpmf#gnupg2-2.3.3-2.el9_0.x86_64.rpm'81osecurityModerate: dbus-broker security update"}chttps://access.redhat.com/errata/RHSA-2022:6608RHSA-2022:6608RHSA-2022:6608https://access.redhat.com/security/cve/CVE-2022-31212CVE-2022-31212CVE-2022-31212https://access.redhat.com/security/cve/CVE-2022-31213CVE-2022-31213CVE-2022-31213https://bugzilla.redhat.com/20947182094718https://bugzilla.redhat.com/20947222094722https://errata.almalinux.org/9/ALSA-2022-6608.htmlALSA-2022:6608ALSA-2022:6608Z'dbus-broker-28-5.1.el9_0.x86_64.rpmZ'dbus-broker-28-5.1.el9_0.x86_64.rpm9&rBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update"'`=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610 kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpmkernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1bpftool-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm2python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpmkernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm1bpftool-5.14.0-70.26.1.el9_0.x86_64.rpmkernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm+:'KsecurityImportant: expat security update"'Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838#"expat-2.2.10-12.el9_0.3.x86_64.rpm#"expat-2.2.10-12.el9_0.3.x86_64.rpm;(MBsecurityModerate: gnutls and nettle security, bug fix, and enhancement update"r2https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854$ gnutls-3.7.6-12.el9_0.i686.rpm$gnutls-3.7.6-12.el9_0.x86_64.rpm$ gnutls-3.7.6-12.el9_0.i686.rpm$gnutls-3.7.6-12.el9_0.x86_64.rpm~<PBsecurityImportant: libksba security update"'$Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090,ilibksba-1.5.1-5.el9_0.x86_64.rpm,i libksba-1.5.1-5.el9_0.i686.rpm,ilibksba-1.5.1-5.el9_0.x86_64.rpm,i libksba-1.5.1-5.el9_0.i686.rpm^=TBBBBBsecurityImportant: device-mapper-multipath security update"'}chttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185) device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpmpkpartx-0.8.7-7.el9_0.1.x86_64.rpm)device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpmRdevice-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm) device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpmpkpartx-0.8.7-7.el9_0.1.x86_64.rpm)device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpmRdevice-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpmd>)\BBBsecurityImportant: openssl security update"'`https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288;topenssl-3.0.1-43.el9_0.x86_64.rpmtopenssl-libs-3.0.1-43.el9_0.x86_64.rpmt openssl-libs-3.0.1-43.el9_0.i686.rpm;topenssl-3.0.1-43.el9_0.x86_64.rpmtopenssl-libs-3.0.1-43.el9_0.x86_64.rpmt openssl-libs-3.0.1-43.el9_0.i686.rpmh?*asecurityModerate: zlib security update"sOhttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314zlib-1.2.11-32.el9_0.x86_64.rpmzlib-1.2.11-32.el9_0.x86_64.rpmS@+cBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update"'Bhttps://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1bpftool-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpmkernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm2python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm1bpftool-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpmkernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpmjA,|BBsecurityModerate: python3.9 security update"Enhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323-Opython3-libs-3.9.10-3.el9_0.x86_64.rpmOpython3-3.9.10-3.el9_0.x86_64.rpm-Opython3-libs-3.9.10-3.el9_0.x86_64.rpmOpython3-3.9.10-3.el9_0.x86_64.rpmB-@BsecurityModerate: lua security update"3https://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329 ! lua-libs-5.4.2-4.el9_0.3.i686.rpm !lua-libs-5.4.2-4.el9_0.3.x86_64.rpm ! lua-libs-5.4.2-4.el9_0.3.i686.rpm !lua-libs-5.4.2-4.el9_0.3.x86_64.rpmtC.CBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update"E?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-5.14.0-162.6.1.el9_1.x86_64.rpm1bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpmkernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-core-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-5.14.0-162.6.1.el9_1.x86_64.rpm1bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm2python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpmkernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-core-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm۰QD/\securityModerate: rsync security and bug fix update"Hzhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291>+rsync-3.2.3-18.el9.x86_64.rpm>+rsync-3.2.3-18.el9.x86_64.rpmۨ3E0^BBBBBBBBsecurityLow: curl security update":B8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299}Dlibcurl-minimal-7.76.1-19.el9.x86_64.rpm|Dlibcurl-7.76.1-19.el9.x86_64.rpm|D libcurl-7.76.1-19.el9.i686.rpm}D libcurl-minimal-7.76.1-19.el9.i686.rpm*Dcurl-7.76.1-19.el9.x86_64.rpm+Dcurl-minimal-7.76.1-19.el9.x86_64.rpm}Dlibcurl-minimal-7.76.1-19.el9.x86_64.rpm|Dlibcurl-7.76.1-19.el9.x86_64.rpm|D libcurl-7.76.1-19.el9.i686.rpm}D libcurl-minimal-7.76.1-19.el9.i686.rpm*Dcurl-7.76.1-19.el9.x86_64.rpm+Dcurl-minimal-7.76.1-19.el9.x86_64.rpmދF1hBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update"zmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317[=samba-winbind-4.16.4-101.el9.x86_64.rpmZ=samba-common-tools-4.16.4-101.el9.x86_64.rpm1=libsmbclient-4.16.4-101.el9.x86_64.rpmv=samba-common-4.16.4-101.el9.noarch.rpm7=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm6=samba-libs-4.16.4-101.el9.x86_64.rpm4= samba-client-libs-4.16.4-101.el9.i686.rpm2=libwbclient-4.16.4-101.el9.x86_64.rpm2= libwbclient-4.16.4-101.el9.i686.rpm6= samba-libs-4.16.4-101.el9.i686.rpm5= samba-common-libs-4.16.4-101.el9.i686.rpm4=samba-client-libs-4.16.4-101.el9.x86_64.rpm1= libsmbclient-4.16.4-101.el9.i686.rpm3= python3-samba-4.16.4-101.el9.i686.rpmY=samba-4.16.4-101.el9.x86_64.rpm7= samba-winbind-modules-4.16.4-101.el9.i686.rpm3=python3-samba-4.16.4-101.el9.x86_64.rpm5=samba-common-libs-4.16.4-101.el9.x86_64.rpm[=samba-winbind-4.16.4-101.el9.x86_64.rpmZ=samba-common-tools-4.16.4-101.el9.x86_64.rpm1=libsmbclient-4.16.4-101.el9.x86_64.rpmv=samba-common-4.16.4-101.el9.noarch.rpm7=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm6=samba-libs-4.16.4-101.el9.x86_64.rpm4= samba-client-libs-4.16.4-101.el9.i686.rpm2=libwbclient-4.16.4-101.el9.x86_64.rpm2= libwbclient-4.16.4-101.el9.i686.rpm6= samba-libs-4.16.4-101.el9.i686.rpm5= samba-common-libs-4.16.4-101.el9.i686.rpm4=samba-client-libs-4.16.4-101.el9.x86_64.rpm1= libsmbclient-4.16.4-101.el9.i686.rpm3= python3-samba-4.16.4-101.el9.i686.rpmY=samba-4.16.4-101.el9.x86_64.rpm7= samba-winbind-modules-4.16.4-101.el9.i686.rpm3=python3-samba-4.16.4-101.el9.x86_64.rpm5=samba-common-libs-4.16.4-101.el9.x86_64.rpmދNG DBBBBBBsecurityModerate: libldb security, bug fix, and enhancement update"gLhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318Eg python3-ldb-2.5.2-1.el9.i686.rpm8g libldb-2.5.2-1.el9.i686.rpmbgldb-tools-2.5.2-1.el9.x86_64.rpm8glibldb-2.5.2-1.el9.x86_64.rpmEgpython3-ldb-2.5.2-1.el9.x86_64.rpmEg python3-ldb-2.5.2-1.el9.i686.rpm8g libldb-2.5.2-1.el9.i686.rpmbgldb-tools-2.5.2-1.el9.x86_64.rpm8glibldb-2.5.2-1.el9.x86_64.rpmEgpython3-ldb-2.5.2-1.el9.x86_64.rpmތH2MBsecurityModerate: freetype security update"3Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340)t freetype-2.10.4-9.el9.i686.rpm)tfreetype-2.10.4-9.el9.x86_64.rpm)t freetype-2.10.4-9.el9.i686.rpm)tfreetype-2.10.4-9.el9.x86_64.rpmތ*I3PBBBsecurityModerate: python3.9 security, bug fix, and enhancement update"5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353python3-3.9.14-1.el9.x86_64.rpm- python3-libs-3.9.14-1.el9.i686.rpm-python3-libs-3.9.14-1.el9.x86_64.rpmpython3-3.9.14-1.el9.x86_64.rpm- python3-libs-3.9.14-1.el9.i686.rpm-python3-libs-3.9.14-1.el9.x86_64.rpmތ_J4UBBBBBBBBBsecurityModerate: e2fsprogs security update"7<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361'<e2fsprogs-libs-1.46.5-3.el9.x86_64.rpm><libss-1.46.5-3.el9.x86_64.rpm'< e2fsprogs-libs-1.46.5-3.el9.i686.rpm0< libcom_err-1.46.5-3.el9.i686.rpm0<libcom_err-1.46.5-3.el9.x86_64.rpm>< libss-1.46.5-3.el9.i686.rpm\<e2fsprogs-1.46.5-3.el9.x86_64.rpm'<e2fsprogs-libs-1.46.5-3.el9.x86_64.rpm><libss-1.46.5-3.el9.x86_64.rpm'< e2fsprogs-libs-1.46.5-3.el9.i686.rpm0< libcom_err-1.46.5-3.el9.i686.rpm0<libcom_err-1.46.5-3.el9.x86_64.rpm>< libss-1.46.5-3.el9.i686.rpm\<e2fsprogs-1.46.5-3.el9.x86_64.rpmpK5`BsecurityModerate: harfbuzz security update"suhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384*harfbuzz-2.7.4-8.el9.x86_64.rpm* harfbuzz-2.7.4-8.el9.i686.rpm*harfbuzz-2.7.4-8.el9.x86_64.rpm* harfbuzz-2.7.4-8.el9.i686.rpmލ L*cBBBBBsecurityModerate: dhcp security and enhancement update"h}https://access.redhat.com/errata/RHSA-2022:8385RHSA-2022:8385RHSA-2022:8385https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://bugzilla.redhat.com/20645122064512https://errata.almalinux.org/9/ALSA-2022-8385.htmlALSA-2022:8385ALSA-2022:8385cdhcp-common-4.4.2-17.b1.el9.noarch.rpmedhcp-server-4.4.2-17.b1.el9.x86_64.rpmbdhcp-client-4.4.2-17.b1.el9.x86_64.rpmddhcp-relay-4.4.2-17.b1.el9.x86_64.rpmcdhcp-common-4.4.2-17.b1.el9.noarch.rpmedhcp-server-4.4.2-17.b1.el9.x86_64.rpmbdhcp-client-4.4.2-17.b1.el9.x86_64.rpmddhcp-relay-4.4.2-17.b1.el9.x86_64.rpmM-ksecurityModerate: logrotate security update"eJhttps://access.redhat.com/errata/RHSA-2022:8393RHSA-2022:8393RHSA-2022:8393https://access.redhat.com/security/cve/CVE-2022-1348CVE-2022-1348CVE-2022-1348https://bugzilla.redhat.com/20750742075074https://errata.almalinux.org/9/ALSA-2022-8393.htmlALSA-2022:8393ALSA-2022:8393f*logrotate-3.18.0-7.el9.x86_64.rpmf*logrotate-3.18.0-7.el9.x86_64.rpmKN1nBsecurityModerate: libtirpc security update"/{https://access.redhat.com/errata/RHSA-2022:8400RHSA-2022:8400RHSA-2022:8400https://access.redhat.com/security/cve/CVE-2021-46828CVE-2021-46828CVE-2021-46828https://bugzilla.redhat.com/21093522109352https://errata.almalinux.org/9/ALSA-2022-8400.htmlALSA-2022:8400ALSA-2022:8400@^ libtirpc-1.3.3-0.el9.i686.rpm@^libtirpc-1.3.3-0.el9.x86_64.rpm@^ libtirpc-1.3.3-0.el9.i686.rpm@^libtirpc-1.3.3-0.el9.x86_64.rpmލRO4rsecurityImportant: device-mapper-multipath security update"'*.https://access.redhat.com/errata/RHSA-2022:8453RHSA-2022:8453RHSA-2022:8453https://access.redhat.com/security/cve/CVE-2022-3787CVE-2022-3787CVE-2022-3787https://bugzilla.redhat.com/21389592138959https://errata.almalinux.org/9/ALSA-2022-8453.htmlALSA-2022:8453ALSA-2022:8453Rdevice-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpmRdevice-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm`P6uBBBsecurityImportant: python3.9 security update"'XQhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493- python3-libs-3.9.14-1.el9_1.1.i686.rpmpython3-3.9.14-1.el9_1.1.x86_64.rpm-python3-libs-3.9.14-1.el9_1.1.x86_64.rpm- python3-libs-3.9.14-1.el9_1.1.i686.rpmpython3-3.9.14-1.el9_1.1.x86_64.rpm-python3-libs-3.9.14-1.el9_1.1.x86_64.rpm|Q7zBBBBBBBBBBBBBBBsecurityImportant: krb5 security update"')ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637 & krb5-pkinit-1.19.1-24.el9_1.i686.rpm( krb5-server-ldap-1.19.1-24.el9_1.i686.rpm%krb5-libs-1.19.1-24.el9_1.x86_64.rpm'krb5-server-1.19.1-24.el9_1.x86_64.rpm(krb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm)libkadm5-1.19.1-24.el9_1.x86_64.rpm% krb5-libs-1.19.1-24.el9_1.i686.rpmqkrb5-workstation-1.19.1-24.el9_1.x86_64.rpm' krb5-server-1.19.1-24.el9_1.i686.rpm) libkadm5-1.19.1-24.el9_1.i686.rpm&krb5-pkinit-1.19.1-24.el9_1.x86_64.rpm & krb5-pkinit-1.19.1-24.el9_1.i686.rpm( krb5-server-ldap-1.19.1-24.el9_1.i686.rpm%krb5-libs-1.19.1-24.el9_1.x86_64.rpm'krb5-server-1.19.1-24.el9_1.x86_64.rpm(krb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm)libkadm5-1.19.1-24.el9_1.x86_64.rpm% krb5-libs-1.19.1-24.el9_1.i686.rpmqkrb5-workstation-1.19.1-24.el9_1.x86_64.rpm' krb5-server-1.19.1-24.el9_1.i686.rpm) libkadm5-1.19.1-24.el9_1.i686.rpm&krb5-pkinit-1.19.1-24.el9_1.x86_64.rpmR8KsecurityImportant: sudo security update0'https://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282Tsudo-1.9.5p2-7.el9_1.1.x86_64.rpmTsudo-1.9.5p2-7.el9_1.1.x86_64.rpmOS9MBBBBBBBBsecurityModerate: curl security update0&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333*Ecurl-7.76.1-19.el9_1.1.x86_64.rpm}Elibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm|Elibcurl-7.76.1-19.el9_1.1.x86_64.rpm|E libcurl-7.76.1-19.el9_1.1.i686.rpm}E libcurl-minimal-7.76.1-19.el9_1.1.i686.rpm+Ecurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm*Ecurl-7.76.1-19.el9_1.1.x86_64.rpm}Elibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm|Elibcurl-7.76.1-19.el9_1.1.x86_64.rpm|E libcurl-7.76.1-19.el9_1.1.i686.rpm}E libcurl-minimal-7.76.1-19.el9_1.1.i686.rpm+Ecurl-minimal-7.76.1-19.el9_1.1.x86_64.rpmT:WBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'D;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 ~kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2~python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1~bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm~kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm ~kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm2~python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm1~bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm~kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm~kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpmfU;pBBBBBBsecurityModerate: dbus security update0^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335_edbus-1.12.20-7.el9_1.x86_64.rpm(edbus-libs-1.12.20-7.el9_1.x86_64.rpm`edbus-common-1.12.20-7.el9_1.noarch.rpmaedbus-tools-1.12.20-7.el9_1.x86_64.rpm(e dbus-libs-1.12.20-7.el9_1.i686.rpm_edbus-1.12.20-7.el9_1.x86_64.rpm(edbus-libs-1.12.20-7.el9_1.x86_64.rpm`edbus-common-1.12.20-7.el9_1.noarch.rpmaedbus-tools-1.12.20-7.el9_1.x86_64.rpm(e dbus-libs-1.12.20-7.el9_1.i686.rpm}VMBBBsecurityModerate: libxml2 security update0+Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338 libxml2-2.9.13-3.el9_1.i686.rpmlibxml2-2.9.13-3.el9_1.x86_64.rpmPpython3-libxml2-2.9.13-3.el9_1.x86_64.rpm libxml2-2.9.13-3.el9_1.i686.rpmlibxml2-2.9.13-3.el9_1.x86_64.rpmPpython3-libxml2-2.9.13-3.el9_1.x86_64.rpmY?RBsecurityModerate: sqlite security update0q<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339] sqlite-libs-3.34.1-6.el9_1.i686.rpm] sqlite-libs-3.34.1-6.el9_1.x86_64.rpm] sqlite-libs-3.34.1-6.el9_1.i686.rpm] sqlite-libs-3.34.1-6.el9_1.x86_64.rpm~ZUsecurityModerate: bash security update0-}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340U4bash-5.1.8-6.el9_1.x86_64.rpmU4bash-5.1.8-6.el9_1.x86_64.rpm[XBsecurityModerate: libtasn1 security update0*uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:03432libtasn1-4.16.0-8.el9_1.x86_64.rpm2 libtasn1-4.16.0-8.el9_1.i686.rpm2libtasn1-4.16.0-8.el9_1.x86_64.rpm2 libtasn1-4.16.0-8.el9_1.i686.rpmO\[BsecurityImportant: libksba security update0'Jhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626,jlibksba-1.5.1-6.el9_1.x86_64.rpm,j libksba-1.5.1-6.el9_1.i686.rpm,jlibksba-1.5.1-6.el9_1.x86_64.rpm,j libksba-1.5.1-6.el9_1.i686.rpms]2_BBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update0iChttps://access.redhat.com/errata/RHSA-2023:0752RHSA-2023:0752RHSA-2023:0752https://access.redhat.com/security/cve/CVE-2022-2601CVE-2022-2601CVE-2022-2601https://access.redhat.com/security/cve/CVE-2022-3775CVE-2022-3775CVE-2022-3775https://bugzilla.redhat.com/21129752112975https://bugzilla.redhat.com/21388802138880https://errata.almalinux.org/9/ALSA-2023-0752.htmlALSA-2023:0752ALSA-2023:0752 n grub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpmm grub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm= grub2-common-2.06-46.el9_1.3.alma.noarch.rpmo grub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpmp grub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm> grub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm grub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpml grub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm@ grub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm? grub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpmk grub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpmj grub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm n grub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpmm grub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm= grub2-common-2.06-46.el9_1.3.alma.noarch.rpmo grub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpmp grub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm> grub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm grub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpml grub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm@ grub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm? grub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpmk grub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpmj grub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm#^sBBBsecurityModerate: openssl security and bug fix update0,"https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946u openssl-libs-3.0.1-47.el9_1.i686.rpm;uopenssl-3.0.1-47.el9_1.x86_64.rpmuopenssl-libs-3.0.1-47.el9_1.x86_64.rpmu openssl-libs-3.0.1-47.el9_1.i686.rpm;uopenssl-3.0.1-47.el9_1.x86_64.rpmuopenssl-libs-3.0.1-47.el9_1.x86_64.rpmr_xBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'N~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpmkernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-core-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpmkernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm1bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm2python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-core-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm`QsecurityModerate: python-setuptools security update0L^https://access.redhat.com/errata/RHSA-2023:0952RHSA-2023:0952RHSA-2023:0952https://access.redhat.com/security/cve/CVE-2022-40897CVE-2022-40897CVE-2022-40897https://bugzilla.redhat.com/21585592158559https://errata.almalinux.org/9/ALSA-2023-0952.htmlALSA-2023:0952ALSA-2023:0952LQpython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpmKQpython3-setuptools-53.0.0-10.el9_1.1.noarch.rpmLQpython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpmKQpython3-setuptools-53.0.0-10.el9_1.1.noarch.rpmlaTBBBsecurityModerate: python3.9 security update0*9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953python3-3.9.14-1.el9_1.2.x86_64.rpm- python3-libs-3.9.14-1.el9_1.2.i686.rpm-python3-libs-3.9.14-1.el9_1.2.x86_64.rpmpython3-3.9.14-1.el9_1.2.x86_64.rpm- python3-libs-3.9.14-1.el9_1.2.i686.rpm-python3-libs-3.9.14-1.el9_1.2.x86_64.rpmIbYBBBBBBBBBBBBBBBBsecurityModerate: systemd security update0c]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954 `systemd-libs-250-12.el9_1.3.x86_64.rpmEsystemd-resolved-250-12.el9_1.3.x86_64.rpmFsystemd-udev-250-12.el9_1.3.x86_64.rpm^ systemd-250-12.el9_1.3.i686.rpmCsystemd-oomd-250-12.el9_1.3.x86_64.rpm_systemd-container-250-12.el9_1.3.x86_64.rpm^systemd-250-12.el9_1.3.x86_64.rpm` systemd-libs-250-12.el9_1.3.i686.rpm_ systemd-container-250-12.el9_1.3.i686.rpmqsystemd-rpm-macros-250-12.el9_1.3.noarch.rpmDsystemd-pam-250-12.el9_1.3.x86_64.rpm `systemd-libs-250-12.el9_1.3.x86_64.rpmEsystemd-resolved-250-12.el9_1.3.x86_64.rpmFsystemd-udev-250-12.el9_1.3.x86_64.rpm^ systemd-250-12.el9_1.3.i686.rpmCsystemd-oomd-250-12.el9_1.3.x86_64.rpm_systemd-container-250-12.el9_1.3.x86_64.rpm^systemd-250-12.el9_1.3.x86_64.rpm` systemd-libs-250-12.el9_1.3.i686.rpm_ systemd-container-250-12.el9_1.3.i686.rpmqsystemd-rpm-macros-250-12.el9_1.3.noarch.rpmDsystemd-pam-250-12.el9_1.3.x86_64.rpm|ckBsecurityModerate: lua security update0@8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 "lua-libs-5.4.4-2.el9_1.x86_64.rpm " lua-libs-5.4.4-2.el9_1.i686.rpm "lua-libs-5.4.4-2.el9_1.x86_64.rpm " lua-libs-5.4.4-2.el9_1.i686.rpmbdnBsecurityModerate: vim security update0xehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958Tvim-minimal-8.2.2637-20.el9_1.x86_64.rpm8vim-filesystem-8.2.2637-20.el9_1.noarch.rpmTvim-minimal-8.2.2637-20.el9_1.x86_64.rpm8vim-filesystem-8.2.2637-20.el9_1.noarch.rpmAe3qsecurityModerate: tar security update0]https://access.redhat.com/errata/RHSA-2023:0959RHSA-2023:0959RHSA-2023:0959https://access.redhat.com/security/cve/CVE-2022-48303CVE-2022-48303CVE-2022-48303https://bugzilla.redhat.com/21497222149722https://errata.almalinux.org/9/ALSA-2023-0959.htmlALSA-2023:0959ALSA-2023:0959(tar-1.34-6.el9_1.x86_64.rpm(tar-1.34-6.el9_1.x86_64.rpmrftBsecurityModerate: gnutls security and bug fix update0shttps://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141$gnutls-3.7.6-18.el9_1.x86_64.rpm$ gnutls-3.7.6-18.el9_1.i686.rpm$gnutls-3.7.6-18.el9_1.x86_64.rpm$ gnutls-3.7.6-18.el9_1.i686.rpmgwBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 kernel-5.14.0-162.22.2.el9_1.x86_64.rpm1bpftool-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm kernel-5.14.0-162.22.2.el9_1.x86_64.rpm1bpftool-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm2python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpmkernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpmCh PBBBBBBBBsecurityModerate: curl security update0k9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701|Flibcurl-7.76.1-19.el9_1.2.x86_64.rpm|F libcurl-7.76.1-19.el9_1.2.i686.rpm}F libcurl-minimal-7.76.1-19.el9_1.2.i686.rpm*Fcurl-7.76.1-19.el9_1.2.x86_64.rpm}Flibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm+Fcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm|Flibcurl-7.76.1-19.el9_1.2.x86_64.rpm|F libcurl-7.76.1-19.el9_1.2.i686.rpm}F libcurl-minimal-7.76.1-19.el9_1.2.i686.rpm*Fcurl-7.76.1-19.el9_1.2.x86_64.rpm}Flibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm+Fcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm i ZBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'$4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 1bpftool-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-core-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpmkernel-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm 1bpftool-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-core-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm2python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpmkernel-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm j sBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: samba security update0'Xhttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:21277> samba-winbind-modules-4.16.4-103.el9_1.i686.rpm4>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm2>libwbclient-4.16.4-103.el9_1.x86_64.rpmZ>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm7>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm6> samba-libs-4.16.4-103.el9_1.i686.rpm1>libsmbclient-4.16.4-103.el9_1.x86_64.rpm4> samba-client-libs-4.16.4-103.el9_1.i686.rpm3> python3-samba-4.16.4-103.el9_1.i686.rpm5> samba-common-libs-4.16.4-103.el9_1.i686.rpmY>samba-4.16.4-103.el9_1.x86_64.rpm3>python3-samba-4.16.4-103.el9_1.x86_64.rpm6>samba-libs-4.16.4-103.el9_1.x86_64.rpm5>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm2> libwbclient-4.16.4-103.el9_1.i686.rpmv>samba-common-4.16.4-103.el9_1.noarch.rpm1> libsmbclient-4.16.4-103.el9_1.i686.rpm[>samba-winbind-4.16.4-103.el9_1.x86_64.rpm7> samba-winbind-modules-4.16.4-103.el9_1.i686.rpm4>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm2>libwbclient-4.16.4-103.el9_1.x86_64.rpmZ>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm7>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm6> samba-libs-4.16.4-103.el9_1.i686.rpm1>libsmbclient-4.16.4-103.el9_1.x86_64.rpm4> samba-client-libs-4.16.4-103.el9_1.i686.rpm3> python3-samba-4.16.4-103.el9_1.i686.rpm5> samba-common-libs-4.16.4-103.el9_1.i686.rpmY>samba-4.16.4-103.el9_1.x86_64.rpm3>python3-samba-4.16.4-103.el9_1.x86_64.rpm6>samba-libs-4.16.4-103.el9_1.x86_64.rpm5>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm2> libwbclient-4.16.4-103.el9_1.i686.rpmv>samba-common-4.16.4-103.el9_1.noarch.rpm1> libsmbclient-4.16.4-103.el9_1.i686.rpm[>samba-winbind-4.16.4-103.el9_1.x86_64.rpmӿ/k OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'lSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1:bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm1:bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm[l7pBBBBBsecurityModerate: device-mapper-multipath security and bug fix update0?]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459pkpartx-0.8.7-20.el9.x86_64.rpmRdevice-mapper-multipath-0.8.7-20.el9.x86_64.rpm) device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm)device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpmpkpartx-0.8.7-20.el9.x86_64.rpmRdevice-mapper-multipath-0.8.7-20.el9.x86_64.rpm) device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm)device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpmm xBBBBBBBBsecurityLow: curl security update0:"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478|G libcurl-7.76.1-23.el9.i686.rpm*Gcurl-7.76.1-23.el9.x86_64.rpm}G libcurl-minimal-7.76.1-23.el9.i686.rpm|Glibcurl-7.76.1-23.el9.x86_64.rpm}Glibcurl-minimal-7.76.1-23.el9.x86_64.rpm+Gcurl-minimal-7.76.1-23.el9.x86_64.rpm|G libcurl-7.76.1-23.el9.i686.rpm*Gcurl-7.76.1-23.el9.x86_64.rpm}G libcurl-minimal-7.76.1-23.el9.i686.rpm|Glibcurl-7.76.1-23.el9.x86_64.rpm}Glibcurl-minimal-7.76.1-23.el9.x86_64.rpm+Gcurl-minimal-7.76.1-23.el9.x86_64.rpmcnBsecurityModerate: fwupd security and bug fix update0>M https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487`fwupd-1.8.10-2.el9.alma.x86_64.rpm`fwupd-1.8.10-2.el9.alma.x86_64.rpm}o DBBBBBsecurityModerate: dhcp security and enhancement update0 Ahttps://access.redhat.com/errata/RHSA-2023:2502RHSA-2023:2502RHSA-2023:2502https://access.redhat.com/security/cve/CVE-2022-2928CVE-2022-2928CVE-2022-2928https://access.redhat.com/security/cve/CVE-2022-2929CVE-2022-2929CVE-2022-2929https://bugzilla.redhat.com/21320012132001https://bugzilla.redhat.com/21320022132002https://errata.almalinux.org/9/ALSA-2023-2502.htmlALSA-2023:2502ALSA-2023:2502cdhcp-common-4.4.2-18.b1.el9.noarch.rpmbdhcp-client-4.4.2-18.b1.el9.x86_64.rpmddhcp-relay-4.4.2-18.b1.el9.x86_64.rpmedhcp-server-4.4.2-18.b1.el9.x86_64.rpmcdhcp-common-4.4.2-18.b1.el9.noarch.rpmbdhcp-client-4.4.2-18.b1.el9.x86_64.rpmddhcp-relay-4.4.2-18.b1.el9.x86_64.rpmedhcp-server-4.4.2-18.b1.el9.x86_64.rpm pLBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update0:Lhttps://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519\( samba-dc-libs-4.17.5-102.el9.i686.rpmA(samba-tools-4.17.5-102.el9.x86_64.rpmv(samba-common-4.17.5-102.el9.noarch.rpmB(samba-usershares-4.17.5-102.el9.x86_64.rpm2(libwbclient-4.17.5-102.el9.x86_64.rpm1( libsmbclient-4.17.5-102.el9.i686.rpmZ(samba-common-tools-4.17.5-102.el9.x86_64.rpm4(samba-client-libs-4.17.5-102.el9.x86_64.rpm6( samba-libs-4.17.5-102.el9.i686.rpm?(samba-dcerpc-4.17.5-102.el9.x86_64.rpm7(samba-winbind-modules-4.17.5-102.el9.x86_64.rpmZ(libnetapi-4.17.5-102.el9.x86_64.rpm=(python3-samba-dc-4.17.5-102.el9.x86_64.rpm@(samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm1(libsmbclient-4.17.5-102.el9.x86_64.rpm5(samba-common-libs-4.17.5-102.el9.x86_64.rpm2( libwbclient-4.17.5-102.el9.i686.rpm4( samba-client-libs-4.17.5-102.el9.i686.rpmZ( libnetapi-4.17.5-102.el9.i686.rpm7( samba-winbind-modules-4.17.5-102.el9.i686.rpm6(samba-libs-4.17.5-102.el9.x86_64.rpm3( python3-samba-4.17.5-102.el9.i686.rpm[(samba-winbind-4.17.5-102.el9.x86_64.rpm\(samba-dc-libs-4.17.5-102.el9.x86_64.rpmY(samba-4.17.5-102.el9.x86_64.rpm3(python3-samba-4.17.5-102.el9.x86_64.rpm5( samba-common-libs-4.17.5-102.el9.i686.rpm\( samba-dc-libs-4.17.5-102.el9.i686.rpmA(samba-tools-4.17.5-102.el9.x86_64.rpmv(samba-common-4.17.5-102.el9.noarch.rpmB(samba-usershares-4.17.5-102.el9.x86_64.rpm2(libwbclient-4.17.5-102.el9.x86_64.rpm1( libsmbclient-4.17.5-102.el9.i686.rpmZ(samba-common-tools-4.17.5-102.el9.x86_64.rpm4(samba-client-libs-4.17.5-102.el9.x86_64.rpm6( samba-libs-4.17.5-102.el9.i686.rpm?(samba-dcerpc-4.17.5-102.el9.x86_64.rpm7(samba-winbind-modules-4.17.5-102.el9.x86_64.rpmZ(libnetapi-4.17.5-102.el9.x86_64.rpm=(python3-samba-dc-4.17.5-102.el9.x86_64.rpm@(samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm1(libsmbclient-4.17.5-102.el9.x86_64.rpm5(samba-common-libs-4.17.5-102.el9.x86_64.rpm2( libwbclient-4.17.5-102.el9.i686.rpm4( samba-client-libs-4.17.5-102.el9.i686.rpmZ( libnetapi-4.17.5-102.el9.i686.rpm7( samba-winbind-modules-4.17.5-102.el9.i686.rpm6(samba-libs-4.17.5-102.el9.x86_64.rpm3( python3-samba-4.17.5-102.el9.i686.rpm[(samba-winbind-4.17.5-102.el9.x86_64.rpm\(samba-dc-libs-4.17.5-102.el9.x86_64.rpmY(samba-4.17.5-102.el9.x86_64.rpm3(python3-samba-4.17.5-102.el9.x86_64.rpm5( samba-common-libs-4.17.5-102.el9.i686.rpmlqxBBBsecurityLow: openssl security and bug fix update0:Pphttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523zopenssl-libs-3.0.7-6.el9_2.x86_64.rpmz openssl-libs-3.0.7-6.el9_2.i686.rpm;zopenssl-3.0.7-6.el9_2.x86_64.rpmzopenssl-libs-3.0.7-6.el9_2.x86_64.rpmz openssl-libs-3.0.7-6.el9_2.i686.rpm;zopenssl-3.0.7-6.el9_2.x86_64.rpmBr}BsecurityLow: libarchive security update0:@Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532/ libarchive-3.5.3-4.el9.i686.rpm/libarchive-3.5.3-4.el9.x86_64.rpm/ libarchive-3.5.3-4.el9.i686.rpm/libarchive-3.5.3-4.el9.x86_64.rpms@BBBBBBBBBBBBBBBsecurityModerate: krb5 security, bug fix, and enhancement update0Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570 (krb5-server-ldap-1.20.1-8.el9.x86_64.rpm%krb5-libs-1.20.1-8.el9.x86_64.rpm% krb5-libs-1.20.1-8.el9.i686.rpm'krb5-server-1.20.1-8.el9.x86_64.rpmqkrb5-workstation-1.20.1-8.el9.x86_64.rpm) libkadm5-1.20.1-8.el9.i686.rpm&krb5-pkinit-1.20.1-8.el9.x86_64.rpm' krb5-server-1.20.1-8.el9.i686.rpm)libkadm5-1.20.1-8.el9.x86_64.rpm& krb5-pkinit-1.20.1-8.el9.i686.rpm( krb5-server-ldap-1.20.1-8.el9.i686.rpm (krb5-server-ldap-1.20.1-8.el9.x86_64.rpm%krb5-libs-1.20.1-8.el9.x86_64.rpm% krb5-libs-1.20.1-8.el9.i686.rpm'krb5-server-1.20.1-8.el9.x86_64.rpmqkrb5-workstation-1.20.1-8.el9.x86_64.rpm) libkadm5-1.20.1-8.el9.i686.rpm&krb5-pkinit-1.20.1-8.el9.x86_64.rpm' krb5-server-1.20.1-8.el9.i686.rpm)libkadm5-1.20.1-8.el9.x86_64.rpm& krb5-pkinit-1.20.1-8.el9.i686.rpm( krb5-server-ldap-1.20.1-8.el9.i686.rpm-tQBsecurityLow: lua security update0:pRhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582 #lua-libs-5.4.4-3.el9.x86_64.rpm # lua-libs-5.4.4-3.el9.i686.rpm #lua-libs-5.4.4-3.el9.x86_64.rpm # lua-libs-5.4.4-3.el9.i686.rpmnuTBBBBBBsecurityModerate: openssh security update0Bhttps://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645twopenssh-keycat-8.7p1-29.el9_2.x86_64.rpmrwopenssh-8.7p1-29.el9_2.x86_64.rpmswopenssh-clients-8.7p1-29.el9_2.x86_64.rpmuwopenssh-server-8.7p1-29.el9_2.x86_64.rpmtwopenssh-keycat-8.7p1-29.el9_2.x86_64.rpmrwopenssh-8.7p1-29.el9_2.x86_64.rpmswopenssh-clients-8.7p1-29.el9_2.x86_64.rpmuwopenssh-server-8.7p1-29.el9_2.x86_64.rpmIv\BBBBBBBBsecurityModerate: curl security update0J(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650*Hcurl-7.76.1-23.el9_2.1.x86_64.rpm|Hlibcurl-7.76.1-23.el9_2.1.x86_64.rpm+Hcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm}Hlibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm|H libcurl-7.76.1-23.el9_2.1.i686.rpm}H libcurl-minimal-7.76.1-23.el9_2.1.i686.rpm*Hcurl-7.76.1-23.el9_2.1.x86_64.rpm|Hlibcurl-7.76.1-23.el9_2.1.x86_64.rpm+Hcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm}Hlibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm|H libcurl-7.76.1-23.el9_2.1.i686.rpm}H libcurl-minimal-7.76.1-23.el9_2.1.i686.rpmCwfBsecurityImportant: c-ares security update0'rhttps://access.redhat.com/errata/RHSA-2023:3559RHSA-2023:3559RHSA-2023:3559https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3559.htmlALSA-2023:3559ALSA-2023:3559[c-ares-1.17.1-5.el9_2.1.x86_64.rpm[ c-ares-1.17.1-5.el9_2.1.i686.rpm[c-ares-1.17.1-5.el9_2.1.x86_64.rpm[ c-ares-1.17.1-5.el9_2.1.i686.rpm|xiBBBsecurityImportant: python3.9 security update0'q+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595-python3-libs-3.9.16-1.el9_2.1.x86_64.rpm- python3-libs-3.9.16-1.el9_2.1.i686.rpmpython3-3.9.16-1.el9_2.1.x86_64.rpm-python3-libs-3.9.16-1.el9_2.1.x86_64.rpm- python3-libs-3.9.16-1.el9_2.1.i686.rpmpython3-3.9.16-1.el9_2.1.x86_64.rpmuynBBBsecurityModerate: openssl security and bug fix update0V https://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722v openssl-libs-3.0.7-16.el9_2.i686.rpmvopenssl-libs-3.0.7-16.el9_2.x86_64.rpm;vopenssl-3.0.7-16.el9_2.x86_64.rpmv openssl-libs-3.0.7-16.el9_2.i686.rpmvopenssl-libs-3.0.7-16.el9_2.x86_64.rpm;vopenssl-3.0.7-16.el9_2.x86_64.rpmzzsBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix update0'rhttps://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1;bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm!@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm1;bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm@kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm@kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm"@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm_{TsecurityModerate: less security update0Chttps://access.redhat.com/errata/RHSA-2023:3725RHSA-2023:3725RHSA-2023:3725https://access.redhat.com/security/cve/CVE-2022-46663CVE-2022-46663CVE-2022-46663https://bugzilla.redhat.com/21696212169621https://errata.almalinux.org/9/ALSA-2023-3725.htmlALSA-2023:3725ALSA-2023:3725S7less-590-2.el9_2.x86_64.rpmS7less-590-2.el9_2.x86_64.rpm/|WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update0Chttps://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325=)python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpmZ)samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpmZ) libnetapi-4.17.5-103.el9_2.alma.i686.rpm\) samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm7)samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm?)samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm@)samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm4)samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm1) libsmbclient-4.17.5-103.el9_2.alma.i686.rpm2)libwbclient-4.17.5-103.el9_2.alma.x86_64.rpmZ)libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm4) samba-client-libs-4.17.5-103.el9_2.alma.i686.rpmY)samba-4.17.5-103.el9_2.alma.x86_64.rpm3)python3-samba-4.17.5-103.el9_2.alma.x86_64.rpmA)samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm5) samba-common-libs-4.17.5-103.el9_2.alma.i686.rpmB)samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm6) samba-libs-4.17.5-103.el9_2.alma.i686.rpm1)libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm6)samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm2) libwbclient-4.17.5-103.el9_2.alma.i686.rpm[)samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpmv)samba-common-4.17.5-103.el9_2.alma.noarch.rpm7) samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm3) python3-samba-4.17.5-103.el9_2.alma.i686.rpm\)samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm5)samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm=)python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpmZ)samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpmZ) libnetapi-4.17.5-103.el9_2.alma.i686.rpm\) samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm7)samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm?)samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm@)samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm4)samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm1) libsmbclient-4.17.5-103.el9_2.alma.i686.rpm2)libwbclient-4.17.5-103.el9_2.alma.x86_64.rpmZ)libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm4) samba-client-libs-4.17.5-103.el9_2.alma.i686.rpmY)samba-4.17.5-103.el9_2.alma.x86_64.rpm3)python3-samba-4.17.5-103.el9_2.alma.x86_64.rpmA)samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm5) samba-common-libs-4.17.5-103.el9_2.alma.i686.rpmB)samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm6) samba-libs-4.17.5-103.el9_2.alma.i686.rpm1)libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm6)samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm2) libwbclient-4.17.5-103.el9_2.alma.i686.rpm[)samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpmv)samba-common-4.17.5-103.el9_2.alma.noarch.rpm7) samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm3) python3-samba-4.17.5-103.el9_2.alma.i686.rpm\)samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm5)samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm@}CBsecurityModerate: libeconf security update0Khttps://access.redhat.com/errata/RHSA-2023:4347RHSA-2023:4347RHSA-2023:4347https://access.redhat.com/security/cve/CVE-2023-22652CVE-2023-22652CVE-2023-22652https://bugzilla.redhat.com/22124632212463https://errata.almalinux.org/9/ALSA-2023-4347.htmlALSA-2023:4347ALSA-2023:43471Xlibeconf-0.4.1-3.el9_2.x86_64.rpm1X libeconf-0.4.1-3.el9_2.i686.rpm1Xlibeconf-0.4.1-3.el9_2.x86_64.rpm1X libeconf-0.4.1-3.el9_2.i686.rpmT~GBBBsecurityModerate: libxml2 security update0YNhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349 libxml2-2.9.13-3.el9_2.1.i686.rpmPpython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpmlibxml2-2.9.13-3.el9_2.1.x86_64.rpm libxml2-2.9.13-3.el9_2.1.i686.rpmPpython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpmlibxml2-2.9.13-3.el9_2.1.x86_64.rpm securityModerate: python-requests security update0'https://access.redhat.com/errata/RHSA-2023:4350RHSA-2023:4350RHSA-2023:4350https://access.redhat.com/security/cve/CVE-2023-32681CVE-2023-32681CVE-2023-32681https://bugzilla.redhat.com/22094692209469https://errata.almalinux.org/9/ALSA-2023-4350.htmlALSA-2023:4350ALSA-2023:4350Jpython3-requests-2.25.1-7.el9_2.noarch.rpmJpython3-requests-2.25.1-7.el9_2.noarch.rpmJMBBBBBBBBsecurityModerate: curl security update0.~https://access.redhat.com/errata/RHSA-2023:4354RHSA-2023:4354RHSA-2023:4354https://access.redhat.com/security/cve/CVE-2023-28321CVE-2023-28321CVE-2023-28321https://access.redhat.com/security/cve/CVE-2023-28322CVE-2023-28322CVE-2023-28322https://bugzilla.redhat.com/21967862196786https://bugzilla.redhat.com/21967932196793https://errata.almalinux.org/9/ALSA-2023-4354.htmlALSA-2023:4354ALSA-2023:4354*Icurl-7.76.1-23.el9_2.2.x86_64.rpm}I libcurl-minimal-7.76.1-23.el9_2.2.i686.rpm}Ilibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm|I libcurl-7.76.1-23.el9_2.2.i686.rpm+Icurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm|Ilibcurl-7.76.1-23.el9_2.2.x86_64.rpm*Icurl-7.76.1-23.el9_2.2.x86_64.rpm}I libcurl-minimal-7.76.1-23.el9_2.2.i686.rpm}Ilibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm|I libcurl-7.76.1-23.el9_2.2.i686.rpm+Icurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm|Ilibcurl-7.76.1-23.el9_2.2.x86_64.rpmjWBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0',0 https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:43772Apython3-perf-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm!Akernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm1<bpftool-7.0.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm"Akernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm2Apython3-perf-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm!Akernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm1<bpftool-7.0.0-284.25.1.el9_2.x86_64.rpmAkernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm"Akernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpmAkernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm:xBBBBBBsecurityImportant: openssh security update0'\]https://access.redhat.com/errata/RHSA-2023:4412RHSA-2023:4412RHSA-2023:4412https://access.redhat.com/security/cve/CVE-2023-38408CVE-2023-38408CVE-2023-38408https://bugzilla.redhat.com/22241732224173https://errata.almalinux.org/9/ALSA-2023-4412.htmlALSA-2023:4412ALSA-2023:4412txopenssh-keycat-8.7p1-30.el9_2.x86_64.rpmrxopenssh-8.7p1-30.el9_2.x86_64.rpmsxopenssh-clients-8.7p1-30.el9_2.x86_64.rpmuxopenssh-server-8.7p1-30.el9_2.x86_64.rpmtxopenssh-keycat-8.7p1-30.el9_2.x86_64.rpmrxopenssh-8.7p1-30.el9_2.x86_64.rpmsxopenssh-clients-8.7p1-30.el9_2.x86_64.rpmuxopenssh-server-8.7p1-30.el9_2.x86_64.rpm  @BBBBBBsecurityModerate: dbus security update09https://access.redhat.com/errata/RHSA-2023:4569RHSA-2023:4569RHSA-2023:4569https://access.redhat.com/security/cve/CVE-2023-34969CVE-2023-34969CVE-2023-34969https://bugzilla.redhat.com/22131662213166https://errata.almalinux.org/9/ALSA-2023-4569.htmlALSA-2023:4569ALSA-2023:4569afdbus-tools-1.12.20-7.el9_2.1.x86_64.rpm(fdbus-libs-1.12.20-7.el9_2.1.x86_64.rpm`fdbus-common-1.12.20-7.el9_2.1.noarch.rpm_fdbus-1.12.20-7.el9_2.1.x86_64.rpm(f dbus-libs-1.12.20-7.el9_2.1.i686.rpmafdbus-tools-1.12.20-7.el9_2.1.x86_64.rpm(fdbus-libs-1.12.20-7.el9_2.1.x86_64.rpm`fdbus-common-1.12.20-7.el9_2.1.noarch.rpm_fdbus-1.12.20-7.el9_2.1.x86_64.rpm(f dbus-libs-1.12.20-7.el9_2.1.i686.rpmHBBBBBBBBsecurityImportant: subscription-manager security update0'8 https://access.redhat.com/errata/RHSA-2023:4708RHSA-2023:4708RHSA-2023:4708https://access.redhat.com/security/cve/CVE-2023-3899CVE-2023-3899CVE-2023-3899https://bugzilla.redhat.com/22254072225407https://errata.almalinux.org/9/ALSA-2023-4708.htmlALSA-2023:4708ALSA-2023:4708}Rsubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpmeRlibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpmsRpython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm~Rsubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpmuRpython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm}Rsubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpmeRlibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpmsRpython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm~Rsubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpmuRpython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpme!SBsecurityImportant: cups security update0'Chttps://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838,m cups-libs-2.3.3op2-16.el9_2.1.i686.rpm,mcups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm,m cups-libs-2.3.3op2-16.el9_2.1.i686.rpm,mcups-libs-2.3.3op2-16.el9_2.1.x86_64.rpmEVsecurityModerate: dmidecode security update0]https://access.redhat.com/errata/RHSA-2023:5061RHSA-2023:5061RHSA-2023:5061https://access.redhat.com/security/cve/CVE-2023-30630CVE-2023-30630CVE-2023-30630https://bugzilla.redhat.com/21866692186669https://errata.almalinux.org/9/ALSA-2023-5061.htmlALSA-2023:5061ALSA-2023:5061[!dmidecode-3.3-7.el9_2.1.x86_64.rpm[!dmidecode-3.3-7.el9_2.1.x86_64.rpmO*YBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update0e|https://access.redhat.com/errata/RHSA-2023:5068RHSA-2023:5068RHSA-2023:5068https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://bugzilla.redhat.com/22178452217845https://errata.almalinux.org/9/ALSA-2023-5068.htmlALSA-2023:5068ALSA-2023:5068fLiwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpmjaiwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmg"iwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpmhiwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpmdaiwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmp\netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpmiaiwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmbaiwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmcaiwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm`iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpmeaiwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmo\linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpmlLiwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpma iwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpmm\libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpmn\linux-firmware-20230310-135.el9_2.alma.1.noarch.rpmkiwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpmfLiwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpmjaiwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmg"iwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpmhiwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpmdaiwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmp\netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpmiaiwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmbaiwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmcaiwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm`iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpmeaiwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpmo\linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpmlLiwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpma iwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpmm\libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpmn\linux-firmware-20230310-135.el9_2.alma.1.noarch.rpmkiwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpmS"kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0'a_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:50692Bpython3-perf-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm"Bkernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm1=bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm!Bkernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpmBkernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm2Bpython3-perf-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm"Bkernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm1=bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm!Bkernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpmBkernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpmBkernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm  #LBsecurityModerate: libcap security update0@0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071/v libcap-2.48-9.el9_2.i686.rpm/vlibcap-2.48-9.el9_2.x86_64.rpm/v libcap-2.48-9.el9_2.i686.rpm/vlibcap-2.48-9.el9_2.x86_64.rpm $OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: glibc security update0'p https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453Pj glibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm] glibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpmW glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm0 libnsl-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpmY glibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpma glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpmX nscd-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpml glibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpmi glibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm. glibc-gconv-extra-2.34-60.el9_2.7.i686.rpmK glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpmx glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpmo glibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpmc glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm[ glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpme glibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm- glibc-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm` glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm_ glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpmd glibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpmX glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpmu glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpmT glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm} glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm\ glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpmv glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpmq glibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpmm glibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpmh glibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpmk glibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpmy glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm glibc-common-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpms glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpmZ glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpmn glibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpmg glibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm| glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm0 libnsl-2.34-60.el9_2.7.i686.rpm. glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpmT glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm^ glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpmP glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm{ glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm~ glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm- glibc-2.34-60.el9_2.7.i686.rpm glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpmW glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpmz glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpmr glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpmp glibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpmP glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpmb glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpmw glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpmf glibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpmt glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpmPj glibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm] glibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm$ glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpmW glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm0 libnsl-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpmY glibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpma glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpmX nscd-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpml glibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpmi glibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm. glibc-gconv-extra-2.34-60.el9_2.7.i686.rpmK glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm9 glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpmJ glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpmx glibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm4 glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm6 glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpmo glibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm* glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpmc glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm[ glibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm? glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm/ glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm= glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpmM glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpme glibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm> glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm- glibc-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm` glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm_ glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpmd glibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpmX glibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpmu glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpmD glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpmK glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpmT glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm} glibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm\ glibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpmv glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm8 glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpmq glibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm2 glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpmm glibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpmh glibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm" glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpmk glibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpmy glibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm glibc-common-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpms glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpmZ glibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpmn glibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpmg glibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm7 glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm' glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm| glibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpmG glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm: glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm0 libnsl-2.34-60.el9_2.7.i686.rpm. glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpmV glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm- glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpmT glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm^ glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpmP glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm! glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpmE glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpmA glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpmH glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpmB glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpmN glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm{ glibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm) glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpmI glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm~ glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpmC glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm- glibc-2.34-60.el9_2.7.i686.rpm glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm( glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm# glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm; glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm5 glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpmR glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpmW glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpmz glibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpmr glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpmp glibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm+ glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpmP glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm% glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm, glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpmb glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpmO glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpmw glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpmU glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm1 glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm& glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpmL glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm< glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpmf glibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpmS glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm0 glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm. glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpmF glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm3 glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpmt glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm@ glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpmQ glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm& %lBBBsecurityImportant: python3.9 security update0'|https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462-python3-libs-3.9.16-1.el9_2.2.x86_64.rpm- python3-libs-3.9.16-1.el9_2.2.i686.rpmpython3-3.9.16-1.el9_2.2.x86_64.rpm-python3-libs-3.9.16-1.el9_2.2.x86_64.rpm- python3-libs-3.9.16-1.el9_2.2.i686.rpmpython3-3.9.16-1.el9_2.2.x86_64.rpmE &qBBBBBBBBsecurityImportant: curl security update0'}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763+Jcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm}J libcurl-minimal-7.76.1-23.el9_2.4.i686.rpm}Jlibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm|Jlibcurl-7.76.1-23.el9_2.4.x86_64.rpm*Jcurl-7.76.1-23.el9_2.4.x86_64.rpm|J libcurl-7.76.1-23.el9_2.4.i686.rpm+Jcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm}J libcurl-minimal-7.76.1-23.el9_2.4.i686.rpm}Jlibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm|Jlibcurl-7.76.1-23.el9_2.4.x86_64.rpm*Jcurl-7.76.1-23.el9_2.4.x86_64.rpm|J libcurl-7.76.1-23.el9_2.4.i686.rpmg >{BsecurityImportant: nghttp2 security update0'-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838[`libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm[` libnghttp2-1.43.0-5.el9_2.1.i686.rpm[`libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm[` libnghttp2-1.43.0-5.el9_2.1.i686.rpmÙ0BsecurityLow: opensc security update0:A(https://access.redhat.com/errata/RHSA-2023:6587RHSA-2023:6587RHSA-2023:6587https://access.redhat.com/security/cve/CVE-2023-2977CVE-2023-2977CVE-2023-2977https://bugzilla.redhat.com/22110882211088https://errata.almalinux.org/9/ALSA-2023-6587.htmlALSA-2023:6587ALSA-2023:6587 U opensc-0.23.0-2.el9.i686.rpm Uopensc-0.23.0-2.el9.x86_64.rpm U opensc-0.23.0-2.el9.i686.rpm Uopensc-0.23.0-2.el9.x86_64.rpm'CBBBsecurityModerate: binutils security update0iJhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593'binutils-2.35.2-42.el9.x86_64.rpm' binutils-2.35.2-42.el9.i686.rpm]binutils-gold-2.35.2-42.el9.x86_64.rpm'binutils-2.35.2-42.el9.x86_64.rpm' binutils-2.35.2-42.el9.i686.rpm]binutils-gold-2.35.2-42.el9.x86_64.rpm<HBBBBBBBBBBBBBBBsecurityImportant: linux-firmware security, bug fix, and enhancement update0'3 https://access.redhat.com/errata/RHSA-2023:6595RHSA-2023:6595RHSA-2023:6595https://access.redhat.com/security/cve/CVE-2022-27635CVE-2022-27635CVE-2022-27635https://access.redhat.com/security/cve/CVE-2022-36351CVE-2022-36351CVE-2022-36351https://access.redhat.com/security/cve/CVE-2022-38076CVE-2022-38076CVE-2022-38076https://access.redhat.com/security/cve/CVE-2022-40964CVE-2022-40964CVE-2022-40964https://access.redhat.com/security/cve/CVE-2022-46329CVE-2022-46329CVE-2022-46329https://access.redhat.com/security/cve/CVE-2023-20569CVE-2023-20569CVE-2023-20569https://bugzilla.redhat.com/22076252207625https://bugzilla.redhat.com/22389602238960https://bugzilla.redhat.com/22389612238961https://bugzilla.redhat.com/22389622238962https://bugzilla.redhat.com/22389632238963https://bugzilla.redhat.com/22389642238964https://errata.almalinux.org/9/ALSA-2023-6595.htmlALSA-2023:6595ALSA-2023:6595cbiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpmn]linux-firmware-20230814-140.el9_3.noarch.rpmp]netronome-firmware-20230814-140.el9_3.noarch.rpma iwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpmo]linux-firmware-whence-20230814-140.el9_3.noarch.rpmebiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpmg#iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpmbbiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm`iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpmfMiwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpmibiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpmjbiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpmdbiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpmm]libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpmkiwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpmlMiwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpmhiwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpmcbiwl135-firmware-18.168.6.1-140.el9_3.noarch.rpmn]linux-firmware-20230814-140.el9_3.noarch.rpmp]netronome-firmware-20230814-140.el9_3.noarch.rpma iwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpmo]linux-firmware-whence-20230814-140.el9_3.noarch.rpmebiwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpmg#iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpmbbiwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm`iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpmfMiwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpmibiwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpmjbiwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpmdbiwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpmm]libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpmkiwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpmlMiwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpmhiwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpmc(ZBsecurityModerate: cups security and bug fix update0?nhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596,ncups-libs-2.3.3op2-21.el9.x86_64.rpm,n cups-libs-2.3.3op2-21.el9.i686.rpm,ncups-libs-2.3.3op2-21.el9.x86_64.rpm,n cups-libs-2.3.3op2-21.el9.i686.rpm]securityModerate: python-cryptography security update0-fhttps://access.redhat.com/errata/RHSA-2023:6615RHSA-2023:6615RHSA-2023:6615https://access.redhat.com/security/cve/CVE-2023-23931CVE-2023-23931CVE-2023-23931https://bugzilla.redhat.com/21718172171817https://errata.almalinux.org/9/ALSA-2023-6615.htmlALSA-2023:6615ALSA-2023:6615x/python3-cryptography-36.0.1-4.el9.x86_64.rpmx/python3-cryptography-36.0.1-4.el9.x86_64.rpm#`BsecurityModerate: protobuf-c security update0}https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621D_protobuf-c-1.3.3-13.el9.x86_64.rpmD_ protobuf-c-1.3.3-13.el9.i686.rpmD_protobuf-c-1.3.3-13.el9.x86_64.rpmD_ protobuf-c-1.3.3-13.el9.i686.rpm)dBsecurityLow: glib2 security and bug fix update0:ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631Y}glib2-2.68.4-11.el9.x86_64.rpmY} glib2-2.68.4-11.el9.i686.rpmY}glib2-2.68.4-11.el9.x86_64.rpmY} glib2-2.68.4-11.el9.i686.rpm,gBBBsecurityLow: shadow-utils security and bug fix update0:Yhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632 shadow-utils-4.9-8.el9.x86_64.rpm5 shadow-utils-subid-4.9-8.el9.i686.rpm5 shadow-utils-subid-4.9-8.el9.x86_64.rpm shadow-utils-4.9-8.el9.x86_64.rpm5 shadow-utils-subid-4.9-8.el9.i686.rpm5 shadow-utils-subid-4.9-8.el9.x86_64.rpm@*mBsecurityModerate: c-ares security, bug fix, and enhancement update0X https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635\ c-ares-1.19.1-1.el9.i686.rpm\c-ares-1.19.1-1.el9.x86_64.rpm\ c-ares-1.19.1-1.el9.i686.rpm\c-ares-1.19.1-1.el9.x86_64.rpm+pBBsecurityModerate: libssh security update0b{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643B7 libssh-0.10.4-11.el9.i686.rpm7libssh-config-0.10.4-11.el9.noarch.rpmB7libssh-0.10.4-11.el9.x86_64.rpmB7 libssh-0.10.4-11.el9.i686.rpm7libssh-config-0.10.4-11.el9.noarch.rpmB7libssh-0.10.4-11.el9.x86_64.rpmX,tBBBsecurityModerate: python3.9 security update0] https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659- python3-libs-3.9.18-1.el9_3.i686.rpmpython3-3.9.18-1.el9_3.x86_64.rpm-python3-libs-3.9.18-1.el9_3.x86_64.rpm- python3-libs-3.9.18-1.el9_3.i686.rpmpython3-3.9.18-1.el9_3.x86_64.rpm-python3-libs-3.9.18-1.el9_3.x86_64.rpmB-yBsecurityLow: gmp security and enhancement update0:}Uhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661*sgmp-6.2.0-13.el9.x86_64.rpm*s gmp-6.2.0-13.el9.i686.rpm*sgmp-6.2.0-13.el9.x86_64.rpm*s gmp-6.2.0-13.el9.i686.rpmB.|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update0RK https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667Y*samba-4.18.6-100.el9.x86_64.rpmZ*samba-common-tools-4.18.6-100.el9.x86_64.rpm7* samba-winbind-modules-4.18.6-100.el9.i686.rpm4*samba-client-libs-4.18.6-100.el9.x86_64.rpm4* samba-client-libs-4.18.6-100.el9.i686.rpm[*samba-winbind-4.18.6-100.el9.x86_64.rpm5* samba-common-libs-4.18.6-100.el9.i686.rpm1* libsmbclient-4.18.6-100.el9.i686.rpmZ*libnetapi-4.18.6-100.el9.x86_64.rpm1*libsmbclient-4.18.6-100.el9.x86_64.rpm=*python3-samba-dc-4.18.6-100.el9.x86_64.rpm6*samba-libs-4.18.6-100.el9.x86_64.rpm@*samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm3*python3-samba-4.18.6-100.el9.x86_64.rpm2* libwbclient-4.18.6-100.el9.i686.rpm?*samba-dcerpc-4.18.6-100.el9.x86_64.rpm2*libwbclient-4.18.6-100.el9.x86_64.rpm6* samba-libs-4.18.6-100.el9.i686.rpmB*samba-usershares-4.18.6-100.el9.x86_64.rpm7*samba-winbind-modules-4.18.6-100.el9.x86_64.rpm3* python3-samba-4.18.6-100.el9.i686.rpm\*samba-dc-libs-4.18.6-100.el9.x86_64.rpmA*samba-tools-4.18.6-100.el9.x86_64.rpm\* samba-dc-libs-4.18.6-100.el9.i686.rpm5*samba-common-libs-4.18.6-100.el9.x86_64.rpmZ* libnetapi-4.18.6-100.el9.i686.rpmv*samba-common-4.18.6-100.el9.noarch.rpmY*samba-4.18.6-100.el9.x86_64.rpmZ*samba-common-tools-4.18.6-100.el9.x86_64.rpm7* samba-winbind-modules-4.18.6-100.el9.i686.rpm4*samba-client-libs-4.18.6-100.el9.x86_64.rpm4* samba-client-libs-4.18.6-100.el9.i686.rpm[*samba-winbind-4.18.6-100.el9.x86_64.rpm5* samba-common-libs-4.18.6-100.el9.i686.rpm1* libsmbclient-4.18.6-100.el9.i686.rpmZ*libnetapi-4.18.6-100.el9.x86_64.rpm1*libsmbclient-4.18.6-100.el9.x86_64.rpm=*python3-samba-dc-4.18.6-100.el9.x86_64.rpm6*samba-libs-4.18.6-100.el9.x86_64.rpm@*samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm3*python3-samba-4.18.6-100.el9.x86_64.rpm2* libwbclient-4.18.6-100.el9.i686.rpm?*samba-dcerpc-4.18.6-100.el9.x86_64.rpm2*libwbclient-4.18.6-100.el9.x86_64.rpm6* samba-libs-4.18.6-100.el9.i686.rpmB*samba-usershares-4.18.6-100.el9.x86_64.rpm7*samba-winbind-modules-4.18.6-100.el9.x86_64.rpm3* python3-samba-4.18.6-100.el9.i686.rpm\*samba-dc-libs-4.18.6-100.el9.x86_64.rpmA*samba-tools-4.18.6-100.el9.x86_64.rpm\* samba-dc-libs-4.18.6-100.el9.i686.rpm5*samba-common-libs-4.18.6-100.el9.x86_64.rpmZ* libnetapi-4.18.6-100.el9.i686.rpmv*samba-common-4.18.6-100.el9.noarch.rpm8/hBBBBBBBBsecurityModerate: curl security update0q https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679|Klibcurl-7.76.1-26.el9.x86_64.rpm}K libcurl-minimal-7.76.1-26.el9.i686.rpm+Kcurl-minimal-7.76.1-26.el9.x86_64.rpm|K libcurl-7.76.1-26.el9.i686.rpm*Kcurl-7.76.1-26.el9.x86_64.rpm}Klibcurl-minimal-7.76.1-26.el9.x86_64.rpm|Klibcurl-7.76.1-26.el9.x86_64.rpm}K libcurl-minimal-7.76.1-26.el9.i686.rpm+Kcurl-minimal-7.76.1-26.el9.x86_64.rpm|K libcurl-7.76.1-26.el9.i686.rpm*Kcurl-7.76.1-26.el9.x86_64.rpm}Klibcurl-minimal-7.76.1-26.el9.x86_64.rpmY5rBsecurityLow: tpm2-tss security and enhancement update0:Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685J tpm2-tss-3.2.2-2.el9.i686.rpmJ tpm2-tss-3.2.2-2.el9.x86_64.rpmJ tpm2-tss-3.2.2-2.el9.i686.rpmJ tpm2-tss-3.2.2-2.el9.x86_64.rpm 06securityModerate: python-pip security update0`(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694*python3-pip-wheel-21.2.3-7.el9.noarch.rpm*python3-pip-wheel-21.2.3-7.el9.noarch.rpmC1wBBBBsecurityModerate: ncurses security and bug fix update0xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698hncurses-6.2-10.20210508.el9.x86_64.rpmB ncurses-libs-6.2-10.20210508.el9.i686.rpmBncurses-libs-6.2-10.20210508.el9.x86_64.rpm&ncurses-base-6.2-10.20210508.el9.noarch.rpmhncurses-6.2-10.20210508.el9.x86_64.rpmB ncurses-libs-6.2-10.20210508.el9.i686.rpmBncurses-libs-6.2-10.20210508.el9.x86_64.rpm&ncurses-base-6.2-10.20210508.el9.noarch.rpmb2}BBBBBBBBBBBBBBBsecurityModerate: krb5 security and bug fix update09https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699 % krb5-libs-1.21.1-1.el9.i686.rpm) libkadm5-1.21.1-1.el9.i686.rpm& krb5-pkinit-1.21.1-1.el9.i686.rpm( krb5-server-ldap-1.21.1-1.el9.i686.rpm)libkadm5-1.21.1-1.el9.x86_64.rpm'krb5-server-1.21.1-1.el9.x86_64.rpm' krb5-server-1.21.1-1.el9.i686.rpm%krb5-libs-1.21.1-1.el9.x86_64.rpmqkrb5-workstation-1.21.1-1.el9.x86_64.rpm(krb5-server-ldap-1.21.1-1.el9.x86_64.rpm&krb5-pkinit-1.21.1-1.el9.x86_64.rpm % krb5-libs-1.21.1-1.el9.i686.rpm) libkadm5-1.21.1-1.el9.i686.rpm& krb5-pkinit-1.21.1-1.el9.i686.rpm( krb5-server-ldap-1.21.1-1.el9.i686.rpm)libkadm5-1.21.1-1.el9.x86_64.rpm'krb5-server-1.21.1-1.el9.x86_64.rpm' krb5-server-1.21.1-1.el9.i686.rpm%krb5-libs-1.21.1-1.el9.x86_64.rpmqkrb5-workstation-1.21.1-1.el9.x86_64.rpm(krb5-server-ldap-1.21.1-1.el9.x86_64.rpm&krb5-pkinit-1.21.1-1.el9.x86_64.rpmu NBBsecurityLow: procps-ng security and bug fix update0:9Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705C<procps-ng-3.3.17-13.el9.x86_64.rpm'<procps-ng-i18n-3.3.17-13.el9.noarch.rpmC< procps-ng-3.3.17-13.el9.i686.rpmC<procps-ng-3.3.17-13.el9.x86_64.rpm'<procps-ng-i18n-3.3.17-13.el9.noarch.rpmC< procps-ng-3.3.17-13.el9.i686.rpmZ!3SBBBBsecurityModerate: avahi security update0https://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 avahi-libs-0.8-15.el9.i686.rpm avahi-0.8-15.el9.i686.rpm avahi-0.8-15.el9.x86_64.rpm avahi-libs-0.8-15.el9.x86_64.rpm avahi-libs-0.8-15.el9.i686.rpm avahi-0.8-15.el9.i686.rpm avahi-0.8-15.el9.x86_64.rpm avahi-libs-0.8-15.el9.x86_64.rpmh"4YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update0Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744?+samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm4+samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm2+ libwbclient-4.18.6-101.el9_3.alma.1.i686.rpm\+samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm1+ libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpmZ+ libnetapi-4.18.6-101.el9_3.alma.1.i686.rpmB+samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm7+samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm2+libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm4+ samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm6+ samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm5+samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm@+samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm6+samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm3+ python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm1+libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpmA+samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm=+python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm[+samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm\+ samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpmZ+libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpmZ+samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpmv+samba-common-4.18.6-101.el9_3.alma.1.noarch.rpmY+samba-4.18.6-101.el9_3.alma.1.x86_64.rpm7+ samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm3+python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm5+ samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm?+samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm4+samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm2+ libwbclient-4.18.6-101.el9_3.alma.1.i686.rpm\+samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm1+ libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpmZ+ libnetapi-4.18.6-101.el9_3.alma.1.i686.rpmB+samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm7+samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm2+libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm4+ samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm6+ samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm5+samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm@+samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm6+samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm3+ python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm1+libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpmA+samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm=+python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm[+samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm\+ samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpmZ+libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpmZ+samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpmv+samba-common-4.18.6-101.el9_3.alma.1.noarch.rpmY+samba-4.18.6-101.el9_3.alma.1.x86_64.rpm7+ samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm3+python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm5+ samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm0#5EBBBBBBBBsecurityImportant: curl security update0'k}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745+Lcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm|Llibcurl-7.76.1-26.el9_3.2.x86_64.rpm*Lcurl-7.76.1-26.el9_3.2.x86_64.rpm}L libcurl-minimal-7.76.1-26.el9_3.2.i686.rpm|L libcurl-7.76.1-26.el9_3.2.i686.rpm}Llibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm+Lcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm|Llibcurl-7.76.1-26.el9_3.2.x86_64.rpm*Lcurl-7.76.1-26.el9_3.2.x86_64.rpm}L libcurl-minimal-7.76.1-26.el9_3.2.i686.rpm|L libcurl-7.76.1-26.el9_3.2.i686.rpm}Llibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm!$OBsecurityImportant: nghttp2 security update0'h-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746[alibnghttp2-1.43.0-5.el9_3.1.x86_64.rpm[a libnghttp2-1.43.0-5.el9_3.1.i686.rpm[alibnghttp2-1.43.0-5.el9_3.1.x86_64.rpm[a libnghttp2-1.43.0-5.el9_3.1.i686.rpmJ% 6SBBBsecurityModerate: libxml2 security update0https://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747Ppython3-libxml2-2.9.13-5.el9_3.x86_64.rpm libxml2-2.9.13-5.el9_3.i686.rpmlibxml2-2.9.13-5.el9_3.x86_64.rpmPpython3-libxml2-2.9.13-5.el9_3.x86_64.rpm libxml2-2.9.13-5.el9_3.i686.rpmlibxml2-2.9.13-5.el9_3.x86_64.rpmN& XBsecurityModerate: opensc security update0Khttps://access.redhat.com/errata/RHSA-2023:7879RHSA-2023:7879RHSA-2023:7879https://access.redhat.com/security/cve/CVE-2023-40660CVE-2023-40660CVE-2023-40660https://access.redhat.com/security/cve/CVE-2023-40661CVE-2023-40661CVE-2023-40661https://access.redhat.com/security/cve/CVE-2023-4535CVE-2023-4535CVE-2023-4535https://bugzilla.redhat.com/22409122240912https://bugzilla.redhat.com/22409132240913https://bugzilla.redhat.com/22409142240914https://errata.almalinux.org/9/ALSA-2023-7879.htmlALSA-2023:7879ALSA-2023:7879 Vopensc-0.23.0-3.el9_3.x86_64.rpm V opensc-0.23.0-3.el9_3.i686.rpm Vopensc-0.23.0-3.el9_3.x86_64.rpm V opensc-0.23.0-3.el9_3.i686.rpm' 7\BBBsecurityModerate: openssl security update,_Nhttps://access.redhat.com/errata/RHSA-2024:0310RHSA-2024:0310RHSA-2024:0310https://access.redhat.com/security/cve/CVE-2023-5363CVE-2023-5363CVE-2023-5363https://bugzilla.redhat.com/22438392243839https://errata.almalinux.org/9/ALSA-2024-0310.htmlALSA-2024:0310ALSA-2024:0310;wopenssl-3.0.7-25.el9_3.x86_64.rpmw openssl-libs-3.0.7-25.el9_3.i686.rpmwopenssl-libs-3.0.7-25.el9_3.x86_64.rpm;wopenssl-3.0.7-25.el9_3.x86_64.rpmw openssl-libs-3.0.7-25.el9_3.i686.rpmwopenssl-libs-3.0.7-25.el9_3.x86_64.rpm[( 8aBBBBBBBBBBBBBBBBBsecurityModerate: rpm security update,-whttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463 zrpm-sign-4.16.1.3-27.el9_3.x86_64.rpmIrpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpmxrpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpmtpython3-rpm-4.16.1.3-27.el9_3.x86_64.rpmyrpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpmH rpm-libs-4.16.1.3-27.el9_3.i686.rpmG rpm-build-libs-4.16.1.3-27.el9_3.i686.rpmI rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpmwrpm-4.16.1.3-27.el9_3.x86_64.rpmHrpm-libs-4.16.1.3-27.el9_3.x86_64.rpmGrpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm zrpm-sign-4.16.1.3-27.el9_3.x86_64.rpmIrpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpmxrpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpmtpython3-rpm-4.16.1.3-27.el9_3.x86_64.rpmyrpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpmH rpm-libs-4.16.1.3-27.el9_3.i686.rpmG rpm-build-libs-4.16.1.3-27.el9_3.i686.rpmI rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpmwrpm-4.16.1.3-27.el9_3.x86_64.rpmHrpm-libs-4.16.1.3-27.el9_3.x86_64.rpmGrpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm˰2) 54securityModerate: python-urllib3 security update,$https://access.redhat.com/errata/RHSA-2024:0464RHSA-2024:0464RHSA-2024:0464https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22424932242493https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-0464.htmlALSA-2024:0464ALSA-2024:0464Mpython3-urllib3-1.26.5-3.el9_3.1.noarch.rpmMpython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm˭* 9vBsecurityModerate: sqlite security update,;https://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465] sqlite-libs-3.34.1-7.el9_3.i686.rpm]sqlite-libs-3.34.1-7.el9_3.x86_64.rpm] sqlite-libs-3.34.1-7.el9_3.i686.rpm]sqlite-libs-3.34.1-7.el9_3.x86_64.rpm˩6+ :yBBBsecurityModerate: python3.9 security update,Cchttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466-python3-libs-3.9.18-1.el9_3.1.x86_64.rpmpython3-3.9.18-1.el9_3.1.x86_64.rpm- python3-libs-3.9.18-1.el9_3.1.i686.rpm-python3-libs-3.9.18-1.el9_3.1.x86_64.rpmpython3-3.9.18-1.el9_3.1.x86_64.rpm- python3-libs-3.9.18-1.el9_3.1.i686.rpmˤ, ~BBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update,&!https://access.redhat.com/errata/RHSA-2024:0468RHSA-2024:0468RHSA-2024:0468https://access.redhat.com/security/cve/CVE-2023-4001CVE-2023-4001CVE-2023-4001https://bugzilla.redhat.com/22249512224951https://errata.almalinux.org/9/ALSA-2024-0468.htmlALSA-2024:0468ALSA-2024:0468 > grub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm? grub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmk grub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpml grub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm= grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm grub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm@ grub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpmj grub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpmp grub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpmo grub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpmn grub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpmm grub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm > grub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm? grub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpmk grub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpml grub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm= grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm grub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm@ grub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpmj grub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpmp grub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpmo grub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpmn grub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpmm grub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpmΌr- ;RBsecurityModerate: gnutls security update,GGhttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533$ gnutls-3.7.6-23.el9_3.3.i686.rpm$gnutls-3.7.6-23.el9_3.3.x86_64.rpm$ gnutls-3.7.6-23.el9_3.3.i686.rpm$gnutls-3.7.6-23.el9_3.3.x86_64.rpm߲ . |BBBBBBBBBBsecurityModerate: nss security update,:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790oSnss-util-3.90.0-6.el9_3.x86_64.rpmmSnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmj2nspr-4.35.0-6.el9_3.x86_64.rpmnSnss-sysinit-3.90.0-6.el9_3.x86_64.rpmkSnss-3.90.0-6.el9_3.x86_64.rpmlSnss-softokn-3.90.0-6.el9_3.x86_64.rpmoSnss-util-3.90.0-6.el9_3.x86_64.rpmmSnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpmj2nspr-4.35.0-6.el9_3.x86_64.rpmnSnss-sysinit-3.90.0-6.el9_3.x86_64.rpmkSnss-3.90.0-6.el9_3.x86_64.rpmlSnss-softokn-3.90.0-6.el9_3.x86_64.rpm4/  UsecurityModerate: sudo security update,H|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811Tsudo-1.9.5p2-10.el9_3.x86_64.rpmTsudo-1.9.5p2-10.el9_3.x86_64.rpm[0 WBsecurityModerate: opensc security update,Dhttps://access.redhat.com/errata/RHSA-2024:0966RHSA-2024:0966RHSA-2024:0966https://access.redhat.com/security/cve/CVE-2023-5992CVE-2023-5992CVE-2023-5992https://bugzilla.redhat.com/22486852248685https://errata.almalinux.org/9/ALSA-2024-0966.htmlALSA-2024:0966ALSA-2024:0966 W opensc-0.23.0-4.el9_3.i686.rpm Wopensc-0.23.0-4.el9_3.x86_64.rpm W opensc-0.23.0-4.el9_3.i686.rpm Wopensc-0.23.0-4.el9_3.x86_64.rpmE1  [BsecurityImportant: pam:1.5.1 security update,'V[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:10244Cfpam-1.5.1-22.el9_5.x86_64.rpmCf pam-1.5.1-22.el9_5.i686.rpmCfpam-1.5.1-22.el9_5.x86_64.rpmCf pam-1.5.1-22.el9_5.i686.rpmg2  ^BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,1https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:102744kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm%4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm1Lbpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm!4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm%4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm1Lbpftool-7.4.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm!4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm3  AsecurityImportant: tuned security update,'Phttps://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:10384,Ptuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm+Ptuned-2.24.0-2.el9_5.alma.1.noarch.rpm,Ptuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm+Ptuned-2.24.0-2.el9_5.alma.1.noarch.rpm^4  CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,nAhttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939%5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm1Mbpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm!5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm%5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm1Mbpftool-7.4.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm!5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm55 fBBBsecurityModerate: python3.9:3.9.21 security update,/https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983-python3-libs-3.9.21-1.el9_5.x86_64.rpmpython3-3.9.21-1.el9_5.x86_64.rpm- python3-libs-3.9.21-1.el9_5.i686.rpm-python3-libs-3.9.21-1.el9_5.x86_64.rpmpython3-3.9.21-1.el9_5.x86_64.rpm- python3-libs-3.9.21-1.el9_5.i686.rpmE6 kBsecurityModerate: pam security update,M?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:11250Ce pam-1.5.1-21.el9_5.i686.rpmCepam-1.5.1-21.el9_5.x86_64.rpmCe pam-1.5.1-21.el9_5.i686.rpmCepam-1.5.1-21.el9_5.x86_64.rpm7 nBBBBBBBBsecurityModerate: curl security update, @https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129}M libcurl-minimal-7.76.1-26.el9_3.3.i686.rpm}Mlibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm+Mcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm|Mlibcurl-7.76.1-26.el9_3.3.x86_64.rpm|M libcurl-7.76.1-26.el9_3.3.i686.rpm*Mcurl-7.76.1-26.el9_3.3.x86_64.rpm}M libcurl-minimal-7.76.1-26.el9_3.3.i686.rpm}Mlibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm+Mcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm|Mlibcurl-7.76.1-26.el9_3.3.x86_64.rpm|M libcurl-7.76.1-26.el9_3.3.i686.rpm*Mcurl-7.76.1-26.el9_3.3.x86_64.rpm78 xBBBBBBsecurityModerate: openssh security update,L0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130tyopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpmryopenssh-8.7p1-34.el9_3.3.x86_64.rpmsyopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpmuyopenssh-server-8.7p1-34.el9_3.3.x86_64.rpmtyopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpmryopenssh-8.7p1-34.el9_3.3.x86_64.rpmsyopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpmuyopenssh-server-8.7p1-34.el9_3.3.x86_64.rpmR9 @BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&|c$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:114866kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm1Nbpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm%6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm1Nbpftool-7.4.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm%6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpmm: ,cBBBBBBBsecurityModerate: opencryptoki security update,_Whttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:12393X opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm3Xopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpmvXopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpmuXopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpmtXopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm3X opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm3Xopencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpmvXopencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpmuXopencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpmtXopencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpmE; mBsecurityModerate: expat security update,6Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530#wexpat-2.5.0-1.el9_3.1.x86_64.rpm#w expat-2.5.0-1.el9_3.1.i686.rpm#wexpat-2.5.0-1.el9_3.1.x86_64.rpm#w expat-2.5.0-1.el9_3.1.i686.rpm< 2psecurityModerate: less security update,x#https://access.redhat.com/errata/RHSA-2024:1692RHSA-2024:1692RHSA-2024:1692https://access.redhat.com/security/cve/CVE-2022-48624CVE-2022-48624CVE-2022-48624https://bugzilla.redhat.com/22650812265081https://errata.almalinux.org/9/ALSA-2024-1692.htmlALSA-2024:1692ALSA-2024:1692S8less-590-3.el9_3.x86_64.rpmS8less-590-3.el9_3.x86_64.rpm|= sBsecurityModerate: gnutls security update,https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879$ gnutls-3.7.6-23.el9_3.4.i686.rpm$gnutls-3.7.6-23.el9_3.4.x86_64.rpm$ gnutls-3.7.6-23.el9_3.4.i686.rpm$gnutls-3.7.6-23.el9_3.4.x86_64.rpm> 8vsecurityImportant: shim bug fix update,'-Mhttps://access.redhat.com/errata/RHSA-2024:1903RHSA-2024:1903RHSA-2024:1903https://access.redhat.com/security/cve/CVE-2023-40546CVE-2023-40546CVE-2023-40546https://access.redhat.com/security/cve/CVE-2023-40547CVE-2023-40547CVE-2023-40547https://access.redhat.com/security/cve/CVE-2023-40548CVE-2023-40548CVE-2023-40548https://access.redhat.com/security/cve/CVE-2023-40549CVE-2023-40549CVE-2023-40549https://access.redhat.com/security/cve/CVE-2023-40550CVE-2023-40550CVE-2023-40550https://access.redhat.com/security/cve/CVE-2023-40551CVE-2023-40551CVE-2023-40551https://bugzilla.redhat.com/22345892234589https://bugzilla.redhat.com/22417822241782https://bugzilla.redhat.com/22417962241796https://bugzilla.redhat.com/22417972241797https://bugzilla.redhat.com/22599152259915https://bugzilla.redhat.com/22599182259918https://errata.almalinux.org/9/ALSA-2024-1903.htmlALSA-2024:1903ALSA-2024:1903shim-x64-15.8-4.el9_3.alma.1.x86_64.rpmshim-x64-15.8-4.el9_3.alma.1.x86_64.rpmx? yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,'z%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671Ckernel-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1>bpftool-7.3.0-427.13.1.el9_4.x86_64.rpmCkernel-5.14.0-427.13.1.el9_4.x86_64.rpm!Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpmCkernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm"Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpmCkernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm1>bpftool-7.3.0-427.13.1.el9_4.x86_64.rpm'@ ZsecurityModerate: squashfs-tools security update,https://access.redhat.com/errata/RHSA-2024:2396RHSA-2024:2396RHSA-2024:2396https://access.redhat.com/security/cve/CVE-2021-40153CVE-2021-40153CVE-2021-40153https://access.redhat.com/security/cve/CVE-2021-41072CVE-2021-41072CVE-2021-41072https://bugzilla.redhat.com/19986211998621https://bugzilla.redhat.com/20049572004957https://errata.almalinux.org/9/ALSA-2024-2396.htmlALSA-2024:2396ALSA-2024:2396|3squashfs-tools-4.4-10.git1.el9.x86_64.rpm|3squashfs-tools-4.4-10.git1.el9.x86_64.rpmA ]BsecurityModerate: harfbuzz security update,>{https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410*harfbuzz-2.7.4-10.el9.x86_64.rpm* harfbuzz-2.7.4-10.el9.i686.rpm*harfbuzz-2.7.4-10.el9.x86_64.rpm* harfbuzz-2.7.4-10.el9.i686.rpmB `BBBBsecurityModerate: avahi security update,9O https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433 avahi-libs-0.8-20.el9.x86_64.rpm avahi-0.8-20.el9.x86_64.rpm avahi-libs-0.8-20.el9.i686.rpm avahi-0.8-20.el9.i686.rpm avahi-libs-0.8-20.el9.x86_64.rpm avahi-0.8-20.el9.x86_64.rpm avahi-libs-0.8-20.el9.i686.rpm avahi-0.8-20.el9.i686.rpmC (fsecurityModerate: exfatprogs security update,https://access.redhat.com/errata/RHSA-2024:2437RHSA-2024:2437RHSA-2024:2437https://access.redhat.com/security/cve/CVE-2023-45897CVE-2023-45897CVE-2023-45897https://bugzilla.redhat.com/22469762246976https://errata.almalinux.org/9/ALSA-2024-2437.htmlALSA-2024:2437ALSA-2024:2437]exfatprogs-1.2.2-2.el9.x86_64.rpm]exfatprogs-1.2.2-2.el9.x86_64.rpmD iBsecurityModerate: pam security update,Ohttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:2438Cdpam-1.5.1-19.el9.x86_64.rpmCd pam-1.5.1-19.el9.i686.rpmCdpam-1.5.1-19.el9.x86_64.rpmCd pam-1.5.1-19.el9.i686.rpm E lBBBsecurityLow: openssl and openssl-fips-provider security update,:_/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447x openssl-libs-3.0.7-27.el9.i686.rpmxopenssl-libs-3.0.7-27.el9.x86_64.rpm;xopenssl-3.0.7-27.el9.x86_64.rpmx openssl-libs-3.0.7-27.el9.i686.rpmxopenssl-libs-3.0.7-27.el9.x86_64.rpm;xopenssl-3.0.7-27.el9.x86_64.rpmF qBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update,Thttps://access.redhat.com/errata/RHSA-2024:2456RHSA-2024:2456RHSA-2024:2456https://access.redhat.com/security/cve/CVE-2023-4692CVE-2023-4692CVE-2023-4692https://access.redhat.com/security/cve/CVE-2023-4693CVE-2023-4693CVE-2023-4693https://access.redhat.com/security/cve/CVE-2024-1048CVE-2024-1048CVE-2024-1048https://bugzilla.redhat.com/22366132236613https://bugzilla.redhat.com/22383432238343https://bugzilla.redhat.com/22568272256827https://errata.almalinux.org/9/ALSA-2024-2456.htmlALSA-2024:2456ALSA-2024:2456 @grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpmmgrub2-tools-2.06-77.el9.alma.1.x86_64.rpmlgrub2-pc-2.06-77.el9.alma.1.x86_64.rpmogrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpmjgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpmkgrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpmngrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm?grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm>grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm=grub2-common-2.06-77.el9.alma.1.noarch.rpmpgrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm @grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpmmgrub2-tools-2.06-77.el9.alma.1.x86_64.rpmlgrub2-pc-2.06-77.el9.alma.1.x86_64.rpmogrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpmjgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpmkgrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpmngrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm?grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm>grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm=grub2-common-2.06-77.el9.alma.1.noarch.rpmpgrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpmFG DBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update,bhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 ~ rhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm_ systemd-container-252-32.el9_4.alma.1.i686.rpmF systemd-udev-252-32.el9_4.alma.1.x86_64.rpmC systemd-oomd-252-32.el9_4.alma.1.x86_64.rpm^ systemd-252-32.el9_4.alma.1.x86_64.rpm` systemd-libs-252-32.el9_4.alma.1.i686.rpm` systemd-libs-252-32.el9_4.alma.1.x86_64.rpm^ systemd-252-32.el9_4.alma.1.i686.rpmD systemd-pam-252-32.el9_4.alma.1.x86_64.rpm_ systemd-container-252-32.el9_4.alma.1.x86_64.rpmE systemd-resolved-252-32.el9_4.alma.1.x86_64.rpmq systemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm ~ rhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm_ systemd-container-252-32.el9_4.alma.1.i686.rpmF systemd-udev-252-32.el9_4.alma.1.x86_64.rpmC systemd-oomd-252-32.el9_4.alma.1.x86_64.rpm^ systemd-252-32.el9_4.alma.1.x86_64.rpm` systemd-libs-252-32.el9_4.alma.1.i686.rpm` systemd-libs-252-32.el9_4.alma.1.x86_64.rpm^ systemd-252-32.el9_4.alma.1.i686.rpmD systemd-pam-252-32.el9_4.alma.1.x86_64.rpm_ systemd-container-252-32.el9_4.alma.1.x86_64.rpmE systemd-resolved-252-32.el9_4.alma.1.x86_64.rpmq systemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpmH WsecurityModerate: traceroute security update,chttps://access.redhat.com/errata/RHSA-2024:2483RHSA-2024:2483RHSA-2024:2483https://access.redhat.com/security/cve/CVE-2023-46316CVE-2023-46316CVE-2023-46316https://bugzilla.redhat.com/22463032246303https://errata.almalinux.org/9/ALSA-2024-2483.htmlALSA-2024:2483ALSA-2024:24831traceroute-2.1.0-18.el9.x86_64.rpm1traceroute-2.1.0-18.el9.x86_64.rpmI ZBBsecurityLow: libssh security update,:vhttps://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:2504B8libssh-0.10.4-13.el9.x86_64.rpm8libssh-config-0.10.4-13.el9.noarch.rpmB8 libssh-0.10.4-13.el9.i686.rpmB8libssh-0.10.4-13.el9.x86_64.rpm8libssh-config-0.10.4-13.el9.noarch.rpmB8 libssh-0.10.4-13.el9.i686.rpm'J ^BBBsecurityLow: file security update,:~Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512($file-libs-5.39-16.el9.x86_64.rpm_$file-5.39-16.el9.x86_64.rpm($ file-libs-5.39-16.el9.i686.rpm($file-libs-5.39-16.el9.x86_64.rpm_$file-5.39-16.el9.x86_64.rpm($ file-libs-5.39-16.el9.i686.rpmK %csecurityModerate: wpa_supplicant security update,@bhttps://access.redhat.com/errata/RHSA-2024:2517RHSA-2024:2517RHSA-2024:2517https://access.redhat.com/security/cve/CVE-2023-52160CVE-2023-52160CVE-2023-52160https://bugzilla.redhat.com/22645932264593https://errata.almalinux.org/9/ALSA-2024-2517.htmlALSA-2024:2517ALSA-2024:2517 wpa_supplicant-2.10-5.el9.x86_64.rpm wpa_supplicant-2.10-5.el9.x86_64.rpmL fBsecurityModerate: gnutls security update,"https://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570$gnutls-3.8.3-4.el9_4.x86_64.rpm$ gnutls-3.8.3-4.el9_4.i686.rpm$gnutls-3.8.3-4.el9_4.x86_64.rpm$ gnutls-3.8.3-4.el9_4.i686.rpmAM iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: sssd security and bug fix update,3Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571#}#python3-sssdconfig-2.9.4-6.el9_4.noarch.rpm+#libipa_hbac-2.9.4-6.el9_4.x86_64.rpm6# sssd-client-2.9.4-6.el9_4.i686.rpmz#python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm#sssd-common-2.9.4-6.el9_4.x86_64.rpm#sssd-2.9.4-6.el9_4.x86_64.rpm|#python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm1#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm#sssd-ad-2.9.4-6.el9_4.x86_64.rpm#sssd-proxy-2.9.4-6.el9_4.x86_64.rpm #sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm1# libsss_simpleifp-2.9.4-6.el9_4.i686.rpm #sssd-passkey-2.9.4-6.el9_4.x86_64.rpm#sssd-tools-2.9.4-6.el9_4.x86_64.rpm0#libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm#sssd-dbus-2.9.4-6.el9_4.x86_64.rpm+# libipa_hbac-2.9.4-6.el9_4.i686.rpm.# libsss_certmap-2.9.4-6.el9_4.i686.rpm#sssd-common-pac-2.9.4-6.el9_4.x86_64.rpmy#python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm #sssd-ldap-2.9.4-6.el9_4.x86_64.rpm#sssd-kcm-2.9.4-6.el9_4.x86_64.rpm/# libsss_idmap-2.9.4-6.el9_4.i686.rpmr#libsss_sudo-2.9.4-6.el9_4.x86_64.rpm#sssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm #sssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpmq#libsss_autofs-2.9.4-6.el9_4.x86_64.rpm#sssd-ipa-2.9.4-6.el9_4.x86_64.rpm#sssd-krb5-2.9.4-6.el9_4.x86_64.rpm.#libsss_certmap-2.9.4-6.el9_4.x86_64.rpm #sssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm6#sssd-client-2.9.4-6.el9_4.x86_64.rpm/#libsss_idmap-2.9.4-6.el9_4.x86_64.rpm{#python3-sss-2.9.4-6.el9_4.x86_64.rpm0# libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#}#python3-sssdconfig-2.9.4-6.el9_4.noarch.rpm+#libipa_hbac-2.9.4-6.el9_4.x86_64.rpm6# sssd-client-2.9.4-6.el9_4.i686.rpmz#python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm#sssd-common-2.9.4-6.el9_4.x86_64.rpm#sssd-2.9.4-6.el9_4.x86_64.rpm|#python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm1#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm#sssd-ad-2.9.4-6.el9_4.x86_64.rpm#sssd-proxy-2.9.4-6.el9_4.x86_64.rpm #sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm1# libsss_simpleifp-2.9.4-6.el9_4.i686.rpm #sssd-passkey-2.9.4-6.el9_4.x86_64.rpm#sssd-tools-2.9.4-6.el9_4.x86_64.rpm0#libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm#sssd-dbus-2.9.4-6.el9_4.x86_64.rpm+# libipa_hbac-2.9.4-6.el9_4.i686.rpm.# libsss_certmap-2.9.4-6.el9_4.i686.rpm#sssd-common-pac-2.9.4-6.el9_4.x86_64.rpmy#python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm #sssd-ldap-2.9.4-6.el9_4.x86_64.rpm#sssd-kcm-2.9.4-6.el9_4.x86_64.rpm/# libsss_idmap-2.9.4-6.el9_4.i686.rpmr#libsss_sudo-2.9.4-6.el9_4.x86_64.rpm#sssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm #sssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpmq#libsss_autofs-2.9.4-6.el9_4.x86_64.rpm#sssd-ipa-2.9.4-6.el9_4.x86_64.rpm#sssd-krb5-2.9.4-6.el9_4.x86_64.rpm.#libsss_certmap-2.9.4-6.el9_4.x86_64.rpm #sssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm6#sssd-client-2.9.4-6.el9_4.x86_64.rpm/#libsss_idmap-2.9.4-6.el9_4.x86_64.rpm{#python3-sss-2.9.4-6.el9_4.x86_64.rpm0# libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm#N hBBBsecurityModerate: libxml2 security update,{nhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679P python3-libxml2-2.9.13-6.el9_4.x86_64.rpm libxml2-2.9.13-6.el9_4.x86_64.rpm libxml2-2.9.13-6.el9_4.i686.rpmP python3-libxml2-2.9.13-6.el9_4.x86_64.rpm libxml2-2.9.13-6.el9_4.x86_64.rpm libxml2-2.9.13-6.el9_4.i686.rpmkO  mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,i&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743Dkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1?bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpmDkernel-5.14.0-427.16.1.el9_4.x86_64.rpm2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm1?bpftool-7.3.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm!Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm"Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpmDkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpmtP !NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,x https://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890Ekernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1@bpftool-7.3.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm"Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpmEkernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm!Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpmEkernel-5.14.0-427.18.1.el9_4.x86_64.rpm2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm1@bpftool-7.3.0-427.18.1.el9_4.x86_64.rpm"Q "oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: glibc security update,' https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339Pglibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpmbglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-be-2.34-100.el9_4.2.x86_64.rpmXnscd-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpmdglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpmtglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpmsglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm\glibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpmaglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpmXglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpmglibc-common-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpmgglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-am-2.34-100.el9_4.2.x86_64.rpmlglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpmnglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpmoglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-az-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm-glibc-2.34-100.el9_4.2.x86_64.rpmyglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm}glibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpmZglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm0libnsl-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpmqglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpmrglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpmfglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm~glibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm]glibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpmkglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpmcglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpmglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpmhglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm|glibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm[glibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpmWglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpmzglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpmiglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpmWglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm^glibc-langpack-it-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm- glibc-2.34-100.el9_4.2.i686.rpm$glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm0 libnsl-2.34-100.el9_4.2.i686.rpm.glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-an-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpmwglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpmxglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-as-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm`glibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm. glibc-gconv-extra-2.34-100.el9_4.2.i686.rpmpglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm{glibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpmuglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm_glibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpmYglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpmvglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpmeglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpmmglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpmjglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpmbglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-be-2.34-100.el9_4.2.x86_64.rpmXnscd-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpmdglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpmtglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpmsglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm\glibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpmaglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpmXglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm6glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpmglibc-common-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpmgglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-am-2.34-100.el9_4.2.x86_64.rpmlglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpmnglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpmoglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm%glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm9glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpmFglibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-az-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm)glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm-glibc-2.34-100.el9_4.2.x86_64.rpmyglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm}glibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpmZglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpmQglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm0libnsl-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpmqglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm$glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpmrglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpmfglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm~glibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm]glibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm=glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpmkglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm7glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm;glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm"glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm5glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpmcglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm&glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpmglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpmhglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm|glibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm[glibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm3glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm@glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm+glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpmSglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpmVglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpmWglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm0glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpmRglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpmzglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-om-2.34-100.el9_4.2.x86_64.rpmKglibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpmAglibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-af-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpmiglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm!glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpmHglibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm4glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm-glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpmWglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm^glibc-langpack-it-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm(glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm- glibc-2.34-100.el9_4.2.i686.rpm$glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpmDglibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm0 libnsl-2.34-100.el9_4.2.i686.rpm.glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-an-2.34-100.el9_4.2.x86_64.rpmTglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm?glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpmLglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpmIglibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpmwglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpmxglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpmJglibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-as-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpmGglibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpmEglibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm`glibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm. glibc-gconv-extra-2.34-100.el9_4.2.i686.rpmpglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm2glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm1glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpmUglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm#glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpmOglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm{glibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm:glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpmuglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm_glibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpmBglibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm<glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm/glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm8glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpmYglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpmMglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpmNglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpmPglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm,glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpmCglibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm>glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm.glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpmvglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpmeglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpmmglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpmjglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm'glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpmglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm*glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm"R LBsecurityModerate: nghttp2 security update,mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501[b libnghttp2-1.43.0-5.el9_4.3.i686.rpm[blibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm[b libnghttp2-1.43.0-5.el9_4.3.i686.rpm[blibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm<S PsecurityImportant: less security update,'zhttps://access.redhat.com/errata/RHSA-2024:3513RHSA-2024:3513RHSA-2024:3513https://access.redhat.com/security/cve/CVE-2024-32487CVE-2024-32487CVE-2024-32487https://bugzilla.redhat.com/22749802274980https://errata.almalinux.org/9/ALSA-2024-3513.htmlALSA-2024:3513ALSA-2024:3513S9less-590-4.el9_4.x86_64.rpmS9less-590-4.el9_4.x86_64.rpmUT #SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,~bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619Fkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1Abpftool-7.3.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm"Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm1Abpftool-7.3.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm"Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm!Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpmFkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpmFkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpmOU $tBsecurityLow: c-ares security update,:`https://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842] c-ares-1.19.1-2.el9_4.i686.rpm]c-ares-1.19.1-2.el9_4.x86_64.rpm] c-ares-1.19.1-2.el9_4.i686.rpm]c-ares-1.19.1-2.el9_4.x86_64.rpmWV %wBBBBBBsecurityModerate: cockpit security update,bEhttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843Ihcockpit-system-311.2-1.el9_4.noarch.rpmQhcockpit-ws-311.2-1.el9_4.x86_64.rpmPhcockpit-311.2-1.el9_4.x86_64.rpmHhcockpit-doc-311.2-1.el9_4.noarch.rpmGhcockpit-bridge-311.2-1.el9_4.x86_64.rpmIhcockpit-system-311.2-1.el9_4.noarch.rpmQhcockpit-ws-311.2-1.el9_4.x86_64.rpmPhcockpit-311.2-1.el9_4.x86_64.rpmHhcockpit-doc-311.2-1.el9_4.noarch.rpmGhcockpit-bridge-311.2-1.el9_4.x86_64.rpmcW ?securityModerate: python-idna security update,'https://access.redhat.com/errata/RHSA-2024:3846RHSA-2024:3846RHSA-2024:3846https://access.redhat.com/security/cve/CVE-2024-3651CVE-2024-3651CVE-2024-3651https://bugzilla.redhat.com/22747792274779https://errata.almalinux.org/9/ALSA-2024-3846.htmlALSA-2024:3846ALSA-2024:3846)python3-idna-2.10-7.el9_4.1.noarch.rpm)python3-idna-2.10-7.el9_4.1.noarch.rpmOX &ABBBsecurityImportant: python3.9 security update,'+https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078-python3-libs-3.9.18-3.el9_4.1.x86_64.rpmpython3-3.9.18-3.el9_4.1.x86_64.rpm- python3-libs-3.9.18-3.el9_4.1.i686.rpm-python3-libs-3.9.18-3.el9_4.1.x86_64.rpmpython3-3.9.18-3.el9_4.1.x86_64.rpm- python3-libs-3.9.18-3.el9_4.1.i686.rpmY 'FBBBBBBsecurityImportant: openssh security update,'@shttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312uzopenssh-server-8.7p1-38.el9_4.1.x86_64.rpmrzopenssh-8.7p1-38.el9_4.1.x86_64.rpmszopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpmtzopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpmuzopenssh-server-8.7p1-38.el9_4.1.x86_64.rpmrzopenssh-8.7p1-38.el9_4.1.x86_64.rpmszopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpmtzopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpmZ (NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update,3https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm"Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1Bbpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm!Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-5.14.0-427.24.1.el9_4.x86_64.rpm"Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm1Bbpftool-7.3.0-427.24.1.el9_4.x86_64.rpmGkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpmGkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm{[ )oBBBBBBsecurityModerate: openssh security update,Ahttps://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457t{openssh-keycat-8.7p1-38.el9_4.4.x86_64.rpms{openssh-clients-8.7p1-38.el9_4.4.x86_64.rpmu{openssh-server-8.7p1-38.el9_4.4.x86_64.rpmr{openssh-8.7p1-38.el9_4.4.x86_64.rpmt{openssh-keycat-8.7p1-38.el9_4.4.x86_64.rpms{openssh-clients-8.7p1-38.el9_4.4.x86_64.rpmu{openssh-server-8.7p1-38.el9_4.4.x86_64.rpmr{openssh-8.7p1-38.el9_4.4.x86_64.rpmߴ\ *wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'G$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583Hkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1Cbpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpmHkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-5.14.0-427.26.1.el9_4.x86_64.rpm1Cbpftool-7.3.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm!Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpmHkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm"Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm&] XBsecurityImportant: libndp security update,'a[https://access.redhat.com/errata/RHSA-2024:4636RHSA-2024:4636RHSA-2024:4636https://access.redhat.com/security/cve/CVE-2024-5564CVE-2024-5564CVE-2024-5564https://bugzilla.redhat.com/22841222284122https://errata.almalinux.org/9/ALSA-2024-4636.htmlALSA-2024:4636ALSA-2024:4636:l libndp-1.8-6.el9_4.alma.1.i686.rpm:llibndp-1.8-6.el9_4.alma.1.x86_64.rpm:l libndp-1.8-6.el9_4.alma.1.i686.rpm:llibndp-1.8-6.el9_4.alma.1.x86_64.rpm^ -\BBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update,<#https://access.redhat.com/errata/RHSA-2024:4774RHSA-2024:4774RHSA-2024:4774https://access.redhat.com/security/cve/CVE-2023-31346CVE-2023-31346CVE-2023-31346https://bugzilla.redhat.com/22504582250458https://errata.almalinux.org/9/ALSA-2024-4774.htmlALSA-2024:4774ALSA-2024:4774eciwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpmkiwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpmfNiwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpmjciwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpmh iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpmp^netronome-firmware-20240603-143.1.el9_4.noarch.rpm`iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpmcciwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpmbciwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpmm^libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpma iwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpmn^linux-firmware-20240603-143.1.el9_4.noarch.rpmiciwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpmg$iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpmlNiwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpmo^linux-firmware-whence-20240603-143.1.el9_4.noarch.rpmdciwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpmeciwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpmkiwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpmfNiwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpmjciwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpmh iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpmp^netronome-firmware-20240603-143.1.el9_4.noarch.rpm`iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpmcciwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpmbciwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpmm^libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpma iwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpmn^linux-firmware-20240603-143.1.el9_4.noarch.rpmiciwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpmg$iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpmlNiwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpmo^linux-firmware-whence-20240603-143.1.el9_4.noarch.rpmdciwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpma_ +nBsecurityModerate: cups security update,_ https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776,o cups-libs-2.3.3op2-27.el9_4.i686.rpm,ocups-libs-2.3.3op2-27.el9_4.x86_64.rpm,o cups-libs-2.3.3op2-27.el9_4.i686.rpm,ocups-libs-2.3.3op2-27.el9_4.x86_64.rpmZ` ,qBBBsecurityLow: python3 security update,:i,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779python3-3.9.18-3.el9_4.3.x86_64.rpm-python3-libs-3.9.18-3.el9_4.3.x86_64.rpm- python3-libs-3.9.18-3.el9_4.3.i686.rpmpython3-3.9.18-3.el9_4.3.x86_64.rpm-python3-libs-3.9.18-3.el9_4.3.x86_64.rpm- python3-libs-3.9.18-3.el9_4.3.i686.rpm^a -vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928Ikernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1Dbpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm"Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm!Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-core-5.14.0-427.28.1.el9_4.x86_64.rpmIkernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm1Dbpftool-7.3.0-427.28.1.el9_4.x86_64.rpmIkernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpmIkernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpmQb .WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'F4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1Ebpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm!Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1Ebpftool-7.3.0-427.31.1.el9_4.x86_64.rpm2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm!Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpmJkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm"Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmJkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm|c /xBBBBBBBBsecurityModerate: curl security update,z(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529}N libcurl-minimal-7.76.1-29.el9_4.1.i686.rpm|N libcurl-7.76.1-29.el9_4.1.i686.rpm}Nlibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm+Ncurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm*Ncurl-7.76.1-29.el9_4.1.x86_64.rpm|Nlibcurl-7.76.1-29.el9_4.1.x86_64.rpm}N libcurl-minimal-7.76.1-29.el9_4.1.i686.rpm|N libcurl-7.76.1-29.el9_4.1.i686.rpm}Nlibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm+Ncurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm*Ncurl-7.76.1-29.el9_4.1.x86_64.rpm|Nlibcurl-7.76.1-29.el9_4.1.x86_64.rpm/d BsecurityImportant: python-setuptools security update,'"xhttps://access.redhat.com/errata/RHSA-2024:5534RHSA-2024:5534RHSA-2024:5534https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5534.htmlALSA-2024:5534ALSA-2024:5534KRpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpmLRpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpmKRpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpmLRpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpmle 0EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928Kkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpmKkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm!Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1Fbpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpmKkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm"Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpmKkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm!Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm1Fbpftool-7.3.0-427.33.1.el9_4.x86_64.rpmKkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm*f '&securityModerate: python-urllib3 security update,2+https://access.redhat.com/errata/RHSA-2024:6162RHSA-2024:6162RHSA-2024:6162https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-6162.htmlALSA-2024:6162ALSA-2024:6162Mpython3-urllib3-1.26.5-5.el9_4.1.noarch.rpmMpython3-urllib3-1.26.5-5.el9_4.1.noarch.rpmܝ7g 1hBBBsecurityModerate: python3.9 security update,]hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163- python3-libs-3.9.18-3.el9_4.5.i686.rpmpython3-3.9.18-3.el9_4.5.x86_64.rpm-python3-libs-3.9.18-3.el9_4.5.x86_64.rpm- python3-libs-3.9.18-3.el9_4.5.i686.rpmpython3-3.9.18-3.el9_4.5.x86_64.rpm-python3-libs-3.9.18-3.el9_4.5.x86_64.rpmh 2mBBBBBBBBBBBBBBBsecurityModerate: krb5 security update,Ehttps://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166 % krb5-libs-1.21.1-2.el9_4.i686.rpmqkrb5-workstation-1.21.1-2.el9_4.x86_64.rpm'krb5-server-1.21.1-2.el9_4.x86_64.rpm) libkadm5-1.21.1-2.el9_4.i686.rpm' krb5-server-1.21.1-2.el9_4.i686.rpm%krb5-libs-1.21.1-2.el9_4.x86_64.rpm(krb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm& krb5-pkinit-1.21.1-2.el9_4.i686.rpm)libkadm5-1.21.1-2.el9_4.x86_64.rpm&krb5-pkinit-1.21.1-2.el9_4.x86_64.rpm( krb5-server-ldap-1.21.1-2.el9_4.i686.rpm % krb5-libs-1.21.1-2.el9_4.i686.rpmqkrb5-workstation-1.21.1-2.el9_4.x86_64.rpm'krb5-server-1.21.1-2.el9_4.x86_64.rpm) libkadm5-1.21.1-2.el9_4.i686.rpm' krb5-server-1.21.1-2.el9_4.i686.rpm%krb5-libs-1.21.1-2.el9_4.x86_64.rpm(krb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm& krb5-pkinit-1.21.1-2.el9_4.i686.rpm)libkadm5-1.21.1-2.el9_4.x86_64.rpm&krb5-pkinit-1.21.1-2.el9_4.x86_64.rpm( krb5-server-ldap-1.21.1-2.el9_4.i686.rpm i 3~securityImportant: bubblewrap and flatpak security update,'KJhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356^bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm^bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm`j 4@BsecurityModerate: glib2 security update, https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464Y~glib2-2.68.4-14.el9_4.1.x86_64.rpmY~ glib2-2.68.4-14.el9_4.1.i686.rpmY~glib2-2.68.4-14.el9_4.1.x86_64.rpmY~ glib2-2.68.4-14.el9_4.1.i686.rpm0k 5CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,"l8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567Lkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm1Gbpftool-7.3.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-5.14.0-427.35.1.el9_4.x86_64.rpm!Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm"Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpmLkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm1Gbpftool-7.3.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-5.14.0-427.35.1.el9_4.x86_64.rpm!Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm"Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpmLkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpmLkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpmYl 6dBsecurityModerate: expat security update,;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754#x expat-2.5.0-2.el9_4.1.i686.rpm#xexpat-2.5.0-2.el9_4.1.x86_64.rpm#x expat-2.5.0-2.el9_4.1.i686.rpm#xexpat-2.5.0-2.el9_4.1.x86_64.rpm1m 7gBBBsecurityModerate: openssl security update,IPhttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783y openssl-libs-3.0.7-28.el9_4.i686.rpm;yopenssl-3.0.7-28.el9_4.x86_64.rpmyopenssl-libs-3.0.7-28.el9_4.x86_64.rpmy openssl-libs-3.0.7-28.el9_4.i686.rpm;yopenssl-3.0.7-28.el9_4.x86_64.rpmyopenssl-libs-3.0.7-28.el9_4.x86_64.rpmQn 8lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update,'+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997Mkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm"Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1Hbpftool-7.3.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpmMkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm"Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm!Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm1Hbpftool-7.3.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpmMkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm o MBBBBBBBBBBBBBBBsecurityModerate: linux-firmware security update,.*https://access.redhat.com/errata/RHSA-2024:7484RHSA-2024:7484RHSA-2024:7484https://access.redhat.com/security/cve/CVE-2023-20584CVE-2023-20584CVE-2023-20584https://access.redhat.com/security/cve/CVE-2023-31356CVE-2023-31356CVE-2023-31356https://bugzilla.redhat.com/23045832304583https://bugzilla.redhat.com/23045932304593https://errata.almalinux.org/9/ALSA-2024-7484.htmlALSA-2024:7484ALSA-2024:7484idiwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpmddiwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpmbdiwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpmlOiwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpma iwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpmfOiwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpmg%iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpmo_linux-firmware-whence-20240905-143.3.el9_4.noarch.rpmh!iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpmediwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpmkiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpmm_libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpmjdiwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpmp_netronome-firmware-20240905-143.3.el9_4.noarch.rpmn_linux-firmware-20240905-143.3.el9_4.noarch.rpm`iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpmcdiwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpmidiwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpmddiwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpmbdiwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpmlOiwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpma iwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpmfOiwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpmg%iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpmo_linux-firmware-whence-20240905-143.3.el9_4.noarch.rpmh!iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpmediwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpmkiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpmm_libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpmjdiwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpmp_netronome-firmware-20240905-143.3.el9_4.noarch.rpmn_linux-firmware-20240905-143.3.el9_4.noarch.rpm`iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpmcdiwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpmyp 9_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,X<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162"Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm1Ibpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm"Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-5.14.0-427.40.1.el9_4.x86_64.rpm!Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm1Ibpftool-7.3.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpmNkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpmNkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm q :@BBBsecurityModerate: python3.9 security update,\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446python3-3.9.18-3.el9_4.6.x86_64.rpm- python3-libs-3.9.18-3.el9_4.6.i686.rpm-python3-libs-3.9.18-3.el9_4.6.x86_64.rpmpython3-3.9.18-3.el9_4.6.x86_64.rpm- python3-libs-3.9.18-3.el9_4.6.i686.rpm-python3-libs-3.9.18-3.el9_4.6.x86_64.rpmr ;EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,p>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617Okernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm!Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm1Jbpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm!Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm"Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm1Jbpftool-7.3.0-427.42.1.el9_4.x86_64.rpmOkernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmOkernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpmEs ABBBBBBBBBBBBBBBsecurityModerate: krb5 security update,J https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331 % krb5-libs-1.21.1-3.el9.i686.rpm)libkadm5-1.21.1-3.el9.x86_64.rpm' krb5-server-1.21.1-3.el9.i686.rpm(krb5-server-ldap-1.21.1-3.el9.x86_64.rpm%krb5-libs-1.21.1-3.el9.x86_64.rpm& krb5-pkinit-1.21.1-3.el9.i686.rpm'krb5-server-1.21.1-3.el9.x86_64.rpm( krb5-server-ldap-1.21.1-3.el9.i686.rpm&krb5-pkinit-1.21.1-3.el9.x86_64.rpm) libkadm5-1.21.1-3.el9.i686.rpmqkrb5-workstation-1.21.1-3.el9.x86_64.rpm % krb5-libs-1.21.1-3.el9.i686.rpm)libkadm5-1.21.1-3.el9.x86_64.rpm' krb5-server-1.21.1-3.el9.i686.rpm(krb5-server-ldap-1.21.1-3.el9.x86_64.rpm%krb5-libs-1.21.1-3.el9.x86_64.rpm& krb5-pkinit-1.21.1-3.el9.i686.rpm'krb5-server-1.21.1-3.el9.x86_64.rpm( krb5-server-ldap-1.21.1-3.el9.i686.rpm&krb5-pkinit-1.21.1-3.el9.x86_64.rpm) libkadm5-1.21.1-3.el9.i686.rpmqkrb5-workstation-1.21.1-3.el9.x86_64.rpmhv ?RBBBsecurityLow: openssl security update,:UL https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333;{openssl-3.2.2-6.el9_5.x86_64.rpm{openssl-libs-3.2.2-6.el9_5.x86_64.rpm{ openssl-libs-3.2.2-6.el9_5.i686.rpm;{openssl-3.2.2-6.el9_5.x86_64.rpm{openssl-libs-3.2.2-6.el9_5.x86_64.rpm{ openssl-libs-3.2.2-6.el9_5.i686.rpmew WBBBsecurityModerate: python3.9 security update,!khttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371- python3-libs-3.9.19-8.el9.i686.rpm-python3-libs-3.9.19-8.el9.x86_64.rpmpython3-3.9.19-8.el9.x86_64.rpm- python3-libs-3.9.19-8.el9.i686.rpm-python3-libs-3.9.19-8.el9.x86_64.rpmpython3-3.9.19-8.el9.x86_64.rpm4x securityModerate: microcode_ctl security update, dhttps://access.redhat.com/errata/RHSA-2024:9401RHSA-2024:9401RHSA-2024:9401https://access.redhat.com/security/cve/CVE-2023-22655CVE-2023-22655CVE-2023-22655https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-38575CVE-2023-38575CVE-2023-38575https://access.redhat.com/security/cve/CVE-2023-39368CVE-2023-39368CVE-2023-39368https://access.redhat.com/security/cve/CVE-2023-43490CVE-2023-43490CVE-2023-43490https://access.redhat.com/security/cve/CVE-2023-45733CVE-2023-45733CVE-2023-45733https://access.redhat.com/security/cve/CVE-2023-46103CVE-2023-46103CVE-2023-46103https://bugzilla.redhat.com/22706982270698https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22707012270701https://bugzilla.redhat.com/22707032270703https://bugzilla.redhat.com/22707042270704https://bugzilla.redhat.com/22922962292296https://bugzilla.redhat.com/22923002292300https://errata.almalinux.org/9/ALSA-2024-9401.htmlALSA-2024:9401ALSA-2024:9401smicrocode_ctl-20240910-1.el9_5.noarch.rpmsmicrocode_ctl-20240910-1.el9_5.noarch.rpm3y ^BsecurityModerate: libgcrypt security update,p https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:94044Zlibgcrypt-1.10.0-11.el9.x86_64.rpm4Z libgcrypt-1.10.0-11.el9.i686.rpm4Zlibgcrypt-1.10.0-11.el9.x86_64.rpm4Z libgcrypt-1.10.0-11.el9.i686.rpmHz aBsecurityLow: vim security update,:zthttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:94058vim-filesystem-8.2.2637-21.el9.noarch.rpmTvim-minimal-8.2.2637-21.el9.x86_64.rpm8vim-filesystem-8.2.2637-21.el9.noarch.rpmTvim-minimal-8.2.2637-21.el9.x86_64.rpma{ dBBBsecurityModerate: bluez security update,n+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413%%bluez-libs-5.72-2.el9.x86_64.rpmV%bluez-5.72-2.el9.x86_64.rpm%% bluez-libs-5.72-2.el9.i686.rpm%%bluez-libs-5.72-2.el9.x86_64.rpmV%bluez-5.72-2.el9.x86_64.rpm%% bluez-libs-5.72-2.el9.i686.rpmt| *)securityModerate: python-dns security update,qhttps://access.redhat.com/errata/RHSA-2024:9423RHSA-2024:9423RHSA-2024:9423https://access.redhat.com/security/cve/CVE-2023-29483CVE-2023-29483CVE-2023-29483https://bugzilla.redhat.com/22745202274520https://errata.almalinux.org/9/ALSA-2024-9423.htmlALSA-2024:9423ALSA-2024:9423(python3-dns-2.6.1-3.el9.noarch.rpm(python3-dns-2.6.1-3.el9.noarch.rpm0} -ksecurityLow: tpm2-tools security update,: 'https://access.redhat.com/errata/RHSA-2024:9424RHSA-2024:9424RHSA-2024:9424https://access.redhat.com/security/cve/CVE-2024-29038CVE-2024-29038CVE-2024-29038https://access.redhat.com/security/cve/CVE-2024-29039CVE-2024-29039CVE-2024-29039https://bugzilla.redhat.com/22780712278071https://bugzilla.redhat.com/22780752278075https://errata.almalinux.org/9/ALSA-2024-9424.htmlALSA-2024:9424ALSA-2024:94245tpm2-tools-5.2-4.el9.x86_64.rpm5tpm2-tools-5.2-4.el9.x86_64.rpm5~ 0nsecurityLow: nano security update,:1Ahttps://access.redhat.com/errata/RHSA-2024:9430RHSA-2024:9430RHSA-2024:9430https://access.redhat.com/security/cve/CVE-2024-5742CVE-2024-5742CVE-2024-5742https://bugzilla.redhat.com/22785742278574https://errata.almalinux.org/9/ALSA-2024-9430.htmlALSA-2024:9430ALSA-2024:9430g6nano-5.6.1-6.el9.x86_64.rpmg6nano-5.6.1-6.el9.x86_64.rpm5 qsecurityImportant: bubblewrap and flatpak security update,'rRhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449^bubblewrap-0.4.1-8.el9_5.x86_64.rpm^bubblewrap-0.4.1-8.el9_5.x86_64.rpm6 sBBBsecurityModerate: python3.9 security update,D\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468- python3-libs-3.9.19-8.el9_5.1.i686.rpmpython3-3.9.19-8.el9_5.1.x86_64.rpm-python3-libs-3.9.19-8.el9_5.1.x86_64.rpm- python3-libs-3.9.19-8.el9_5.1.i686.rpmpython3-3.9.19-8.el9_5.1.x86_64.rpm-python3-libs-3.9.19-8.el9_5.1.x86_64.rpm xBsecurityLow: cups security update,: )https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470,p cups-libs-2.3.3op2-31.el9_5.i686.rpm,pcups-libs-2.3.3op2-31.el9_5.x86_64.rpm,p cups-libs-2.3.3op2-31.el9_5.i686.rpm,pcups-libs-2.3.3op2-31.el9_5.x86_64.rpmS {BBBBBBBBBBBBBBBsecurityImportant: krb5 security update,'IShttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474 ( krb5-server-ldap-1.21.1-4.el9_5.i686.rpm&krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm(krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm' krb5-server-1.21.1-4.el9_5.i686.rpm%krb5-libs-1.21.1-4.el9_5.x86_64.rpm'krb5-server-1.21.1-4.el9_5.x86_64.rpm% krb5-libs-1.21.1-4.el9_5.i686.rpm& krb5-pkinit-1.21.1-4.el9_5.i686.rpm) libkadm5-1.21.1-4.el9_5.i686.rpmqkrb5-workstation-1.21.1-4.el9_5.x86_64.rpm)libkadm5-1.21.1-4.el9_5.x86_64.rpm ( krb5-server-ldap-1.21.1-4.el9_5.i686.rpm&krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm(krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm' krb5-server-1.21.1-4.el9_5.i686.rpm%krb5-libs-1.21.1-4.el9_5.x86_64.rpm'krb5-server-1.21.1-4.el9_5.x86_64.rpm% krb5-libs-1.21.1-4.el9_5.i686.rpm& krb5-pkinit-1.21.1-4.el9_5.i686.rpm) libkadm5-1.21.1-4.el9_5.i686.rpmqkrb5-workstation-1.21.1-4.el9_5.x86_64.rpm)libkadm5-1.21.1-4.el9_5.x86_64.rpmQ LBsecurityModerate: expat security update,Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541#yexpat-2.5.0-3.el9_5.1.x86_64.rpm#y expat-2.5.0-3.el9_5.1.i686.rpm#yexpat-2.5.0-3.el9_5.1.x86_64.rpm#y expat-2.5.0-3.el9_5.1.i686.rpmU  OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update,c'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:96053kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm%3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm1Kbpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm%3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm1Kbpftool-7.4.0-503.14.1.el9_5.x86_64.rpm3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm"3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpmF  rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&' https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:00597kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm1Obpftool-7.4.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm"7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm%7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm1Obpftool-7.4.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm!7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm"7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm%7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm>  UsecurityImportant: rsync security update&'8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324>,rsync-3.2.3-20.el9_5.1.x86_64.rpm>,rsync-3.2.3-20.el9_5.1.x86_64.rpmd  WBBBBBBBBBBBBBBBBBsecurityModerate: Security and bug fixes for NetworkManager&LLhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 \NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm[NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpmYNetworkManager-team-1.48.10-5.el9_5.x86_64.rpmUNetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpmVNetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm&NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpmZNetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm& NetworkManager-libnm-1.48.10-5.el9_5.i686.rpmXNetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpmWNetworkManager-config-server-1.48.10-5.el9_5.noarch.rpmTNetworkManager-1.48.10-5.el9_5.x86_64.rpm \NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm[NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpmYNetworkManager-team-1.48.10-5.el9_5.x86_64.rpmUNetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpmVNetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm&NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpmZNetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm& NetworkManager-libnm-1.48.10-5.el9_5.i686.rpmXNetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpmWNetworkManager-config-server-1.48.10-5.el9_5.noarch.rpmTNetworkManager-1.48.10-5.el9_5.x86_64.rpm(  jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&Ehttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:05788kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm"8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm1Pbpftool-7.4.0-503.22.1.el9_5.x86_64.rpm!8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm%8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm"8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm1Pbpftool-7.4.0-503.22.1.el9_5.x86_64.rpm!8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm%8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-5.14.0-503.22.1.el9_5.x86_64.rpmՕ/  MBBBsecurityModerate: bzip2 security update&]https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925Xrbzip2-1.0.8-10.el9_5.x86_64.rpm&r bzip2-libs-1.0.8-10.el9_5.i686.rpm&rbzip2-libs-1.0.8-10.el9_5.x86_64.rpmXrbzip2-1.0.8-10.el9_5.x86_64.rpm&r bzip2-libs-1.0.8-10.el9_5.i686.rpm&rbzip2-libs-1.0.8-10.el9_5.x86_64.rpm  RBBBsecurityImportant: python3.9 security update&'ng https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136python3-3.9.21-2.el9_6.1.x86_64.rpm- python3-libs-3.9.21-2.el9_6.1.i686.rpm-python3-libs-3.9.21-2.el9_6.1.x86_64.rpmpython3-3.9.21-2.el9_6.1.x86_64.rpm- python3-libs-3.9.21-2.el9_6.1.i686.rpm-python3-libs-3.9.21-2.el9_6.1.x86_64.rpmÓl  WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'U] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379Xkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm"Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm%Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm"Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm%Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-5.14.0-570.25.1.el9_6.x86_64.rpm!Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpmXkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpmÿ  8vsecurityModerate: python-setuptools security update&2Jhttps://access.redhat.com/errata/RHSA-2025:10407RHSA-2025:10407RHSA-2025:10407https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-10407.htmlALSA-2025:10407ALSA-2025:10407LSpython3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpmKSpython3-setuptools-53.0.0-13.el9_6.1.noarch.rpmLSpython3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpmKSpython3-setuptools-53.0.0-13.el9_6.1.noarch.rpmó`   zBBBBBBBBBBBBBBBBsecurityModerate: gcc security update&nKhttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 6 libgomp-11.5.0-5.el9_5.alma.1.i686.rpm? libstdc++-11.5.0-5.el9_5.alma.1.i686.rpm6libgomp-11.5.0-5.el9_5.alma.1.x86_64.rpm5libgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm3 libgcc-11.5.0-5.el9_5.alma.1.i686.rpm5 libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm, libatomic-11.5.0-5.el9_5.alma.1.i686.rpm3libgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm?libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpm,libatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm<libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm< libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm 6 libgomp-11.5.0-5.el9_5.alma.1.i686.rpm? libstdc++-11.5.0-5.el9_5.alma.1.i686.rpm6libgomp-11.5.0-5.el9_5.alma.1.x86_64.rpm5libgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm3 libgcc-11.5.0-5.el9_5.alma.1.i686.rpm5 libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm, libatomic-11.5.0-5.el9_5.alma.1.i686.rpm3libgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm?libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpm,libatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm<libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm< libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm LBBBsecurityImportant: libxml2 security update&'9~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350P python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm libxml2-2.9.13-6.el9_5.1.i686.rpm libxml2-2.9.13-6.el9_5.1.x86_64.rpmP python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm libxml2-2.9.13-6.el9_5.1.i686.rpm libxml2-2.9.13-6.el9_5.1.x86_64.rpm   QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&7Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm%]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm!]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm%]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm"]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm !pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 ^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm%^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm"^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm%^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm!^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm"^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpmŠ  "OBsecurityImportant: libarchive security update&'}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130/libarchive-3.5.3-6.el9_6.x86_64.rpm/ libarchive-3.5.3-6.el9_6.i686.rpm/libarchive-3.5.3-6.el9_6.x86_64.rpm/ libarchive-3.5.3-6.el9_6.i686.rpmŗl  #RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&' !https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm%_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm%_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm"_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm!_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm_kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm_kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpmŻv! $qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'.https://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm%`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm!`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm"`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm%`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm`kernel-5.14.0-570.39.1.el9_6.x86_64.rpm'" %PBBBsecurityModerate: python3.9 security update&E;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019python3-3.9.21-2.el9_6.2.x86_64.rpm- python3-libs-3.9.21-2.el9_6.2.i686.rpm-python3-libs-3.9.21-2.el9_6.2.x86_64.rpmpython3-3.9.21-2.el9_6.2.x86_64.rpm- python3-libs-3.9.21-2.el9_6.2.i686.rpm-python3-libs-3.9.21-2.el9_6.2.x86_64.rpm # &UBsecurityImportant: pam security update&'phttps://access.redhat.com/errata/RHSA-2025:15099RHSA-2025:15099RHSA-2025:15099https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://access.redhat.com/security/cve/CVE-2025-8941CVE-2025-8941CVE-2025-8941https://bugzilla.redhat.com/23725122372512https://bugzilla.redhat.com/23882202388220https://errata.almalinux.org/9/ALSA-2025-15099.htmlALSA-2025:15099ALSA-2025:15099Chpam-1.5.1-26.el9_6.x86_64.rpmCh pam-1.5.1-26.el9_6.i686.rpmChpam-1.5.1-26.el9_6.x86_64.rpmCh pam-1.5.1-26.el9_6.i686.rpm$ 'XBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'pWhttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429akernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm%akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpmakernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm"akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm!akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm%akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpmakernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpmƟ+% (wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'G https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661!bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm%bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm!bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm"bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm%bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpmbkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpmƤU& )VBsecurityImportant: cups security update&'a https://access.redhat.com/errata/RHSA-2025:15700RHSA-2025:15700RHSA-2025:15700https://access.redhat.com/security/cve/CVE-2025-58060CVE-2025-58060CVE-2025-58060https://access.redhat.com/security/cve/CVE-2025-58364CVE-2025-58364CVE-2025-58364https://bugzilla.redhat.com/23925952392595https://bugzilla.redhat.com/23930782393078https://errata.almalinux.org/9/ALSA-2025-15700.htmlALSA-2025:15700ALSA-2025:15700,qcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm,q cups-libs-2.3.3op2-33.el9_6.1.i686.rpm,qcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm,q cups-libs-2.3.3op2-33.el9_6.1.i686.rpmS' *YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&nhttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740%ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm"ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm%ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm"ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm!ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpmckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpmԃP( :xsecurityModerate: python-cryptography security update&nLhttps://access.redhat.com/errata/RHSA-2025:15874RHSA-2025:15874RHSA-2025:15874https://access.redhat.com/security/cve/CVE-2023-49083CVE-2023-49083CVE-2023-49083https://bugzilla.redhat.com/22553312255331https://errata.almalinux.org/9/ALSA-2025-15874.htmlALSA-2025:15874ALSA-2025:15874x0python3-cryptography-36.0.1-5.el9_6.x86_64.rpmx0python3-cryptography-36.0.1-5.el9_6.x86_64.rpmƯ#) +{BsecurityModerate: gnutls security, bug fix, and enhancement update&: https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116$gnutls-3.8.3-6.el9_6.2.x86_64.rpm$ gnutls-3.8.3-6.el9_6.2.i686.rpm$gnutls-3.8.3-6.el9_6.2.x86_64.rpm$ gnutls-3.8.3-6.el9_6.2.i686.rpm * ,~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&K https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398dkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm%dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm!dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm%dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpmdkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpmdkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm"dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpmr+ -]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&Rhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:16592:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm%:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm1Rbpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm2:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm%:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm1Rbpftool-7.4.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm!:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpmJ, .@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&ci https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880ekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm!ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm%ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm!ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm"ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm%ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpmekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpmM- /_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&LFhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377fkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm%fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmfkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm%fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm"fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm!fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-5.14.0-570.51.1.el9_6.x86_64.rpmfkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpmǝU. 0~securityModerate: iputils security update&ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558g&iputils-20210202-11.el9_6.3.x86_64.rpmg&iputils-20210202-11.el9_6.3.x86_64.rpmDz^/ 1@BsecurityModerate: vim security update&yzhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742Tvim-minimal-8.2.2637-22.el9_6.1.x86_64.rpm8vim-filesystem-8.2.2637-22.el9_6.1.noarch.rpmTvim-minimal-8.2.2637-22.el9_6.1.x86_64.rpm8vim-filesystem-8.2.2637-22.el9_6.1.noarch.rpmǹ 0 2CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&sd https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760gkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm%gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpmgkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm%gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm!gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpmgkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm"gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm¿71 3bBBsecurityModerate: libssh security update&W https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:18275B9libssh-0.10.4-15.el9_6.x86_64.rpm9libssh-config-0.10.4-15.el9_6.noarch.rpmB9 libssh-0.10.4-15.el9_6.i686.rpmB9libssh-0.10.4-15.el9_6.x86_64.rpm9libssh-config-0.10.4-15.el9_6.noarch.rpmB9 libssh-0.10.4-15.el9_6.i686.rpm 2 4fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&bhttps://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281hkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm%hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm!hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-5.14.0-570.55.1.el9_6.x86_64.rpm%hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm"hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpmhkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpmhkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpm 3 5EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&whttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409ikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm%ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm%ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm!ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm"ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpmikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpmikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpmȷ 4 6dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&{9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930jkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm"jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm%jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm"jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm%jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm!jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpmjkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpmѴE5 7CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&4Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396{kernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm%{kernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm {kernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-5.14.0-611.5.1.el9_7.x86_64.rpm!{kernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm"{kernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-core-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm%{kernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm {kernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-5.14.0-611.5.1.el9_7.x86_64.rpm!{kernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm"{kernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpm{kernel-core-5.14.0-611.5.1.el9_7.x86_64.rpmF6 4bBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update& Mhttps://access.redhat.com/errata/RHSA-2025:20532RHSA-2025:20532RHSA-2025:20532https://access.redhat.com/security/cve/CVE-2024-45777CVE-2024-45777CVE-2024-45777https://bugzilla.redhat.com/23463432346343https://errata.almalinux.org/9/ALSA-2025-20532.htmlALSA-2025:20532ALSA-2025:20532 >grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpmlgrub2-pc-2.06-114.el9_7.alma.1.x86_64.rpm?grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm=grub2-common-2.06-114.el9_7.alma.1.noarch.rpmkgrub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpmngrub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpmjgrub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpm@grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpmmgrub2-tools-2.06-114.el9_7.alma.1.x86_64.rpmpgrub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpmogrub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm >grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpmlgrub2-pc-2.06-114.el9_7.alma.1.x86_64.rpm?grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm=grub2-common-2.06-114.el9_7.alma.1.noarch.rpmkgrub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpmngrub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpmjgrub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpm@grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpmmgrub2-tools-2.06-114.el9_7.alma.1.x86_64.rpmpgrub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpmogrub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpmR7 :uBBBsecurityLow: shadow-utils security update&:Yhttps://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559 shadow-utils-4.9-15.el9.x86_64.rpm5 shadow-utils-subid-4.9-15.el9.x86_64.rpm5 shadow-utils-subid-4.9-15.el9.i686.rpm shadow-utils-4.9-15.el9.x86_64.rpm5 shadow-utils-subid-4.9-15.el9.x86_64.rpm5 shadow-utils-subid-4.9-15.el9.i686.rpm8 8{BsecurityImportant: sqlite security update&'` https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936]sqlite-libs-3.34.1-9.el9_7.x86_64.rpm] sqlite-libs-3.34.1-9.el9_7.i686.rpm]sqlite-libs-3.34.1-9.el9_7.x86_64.rpm] sqlite-libs-3.34.1-9.el9_7.i686.rpm9 9~BBsecurityModerate: libssh security update&i https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:20943B:libssh-0.10.4-15.el9_7.x86_64.rpm:libssh-config-0.10.4-15.el9_7.noarch.rpmB: libssh-0.10.4-15.el9_7.i686.rpmB:libssh-0.10.4-15.el9_7.x86_64.rpm:libssh-config-0.10.4-15.el9_7.noarch.rpmB: libssh-0.10.4-15.el9_7.i686.rpmC: :BBsecurityModerate: vim security update&tzhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945T vim-minimal-8.2.2637-23.el9_7.x86_64.rpm8 vim-filesystem-8.2.2637-23.el9_7.noarch.rpmT vim-minimal-8.2.2637-23.el9_7.x86_64.rpm8 vim-filesystem-8.2.2637-23.el9_7.noarch.rpmT; ;EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: sssd security update&'n/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954#$sssd-2.9.7-4.el9_7.1.x86_64.rpm $sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpm$sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpm$sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpm$sssd-tools-2.9.7-4.el9_7.1.x86_64.rpm$sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpmy$python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm{$python3-sss-2.9.7-4.el9_7.1.x86_64.rpm6$sssd-client-2.9.7-4.el9_7.1.x86_64.rpm$sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpmz$python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm.$libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpm$sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpm$sssd-common-2.9.7-4.el9_7.1.x86_64.rpm$sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpmr$libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpm}$python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm+$ libipa_hbac-2.9.7-4.el9_7.1.i686.rpm $sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm+$libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm|$python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpm $sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm/$ libsss_idmap-2.9.7-4.el9_7.1.i686.rpm1$libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpm$sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm1$ libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpm $sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpm$sssd-ad-2.9.7-4.el9_7.1.x86_64.rpm $sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm0$libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm6$ sssd-client-2.9.7-4.el9_7.1.i686.rpmq$libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm0$ libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm.$ libsss_certmap-2.9.7-4.el9_7.1.i686.rpm/$libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm#$sssd-2.9.7-4.el9_7.1.x86_64.rpm $sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpm$sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpm$sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpm$sssd-tools-2.9.7-4.el9_7.1.x86_64.rpm$sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpmy$python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm{$python3-sss-2.9.7-4.el9_7.1.x86_64.rpm6$sssd-client-2.9.7-4.el9_7.1.x86_64.rpm$sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpmz$python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm.$libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpm$sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpm$sssd-common-2.9.7-4.el9_7.1.x86_64.rpm$sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpmr$libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpm}$python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm+$ libipa_hbac-2.9.7-4.el9_7.1.i686.rpm $sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm+$libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm|$python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpm $sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm/$ libsss_idmap-2.9.7-4.el9_7.1.i686.rpm1$libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpm$sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm1$ libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpm $sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpm$sssd-ad-2.9.7-4.el9_7.1.x86_64.rpm $sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm0$libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm6$ sssd-client-2.9.7-4.el9_7.1.i686.rpmq$libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm0$ libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm.$ libsss_certmap-2.9.7-4.el9_7.1.i686.rpm/$libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpmɵ<  >LBsecurityImportant: expat security update&'v&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175#| expat-2.5.0-5.el9_7.1.i686.rpm#|expat-2.5.0-5.el9_7.1.x86_64.rpm#| expat-2.5.0-5.el9_7.1.i686.rpm#|expat-2.5.0-5.el9_7.1.x86_64.rpm? ?OBBBsecurityModerate: libxml2 security update&,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376 libxml2-2.9.13-14.el9_7.i686.rpmlibxml2-2.9.13-14.el9_7.x86_64.rpmPpython3-libxml2-2.9.13-14.el9_7.x86_64.rpm libxml2-2.9.13-14.el9_7.i686.rpmlibxml2-2.9.13-14.el9_7.x86_64.rpmPpython3-libxml2-2.9.13-14.el9_7.x86_64.rpm@ TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&H;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405!kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm%kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm!kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm"kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpmkkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm%kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpmkkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpmۅmA sBBBBBBBBBBBBBBBBBsecurityModerate: systemd security update&)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660 ^systemd-252-55.el9_7.7.alma.1.x86_64.rpm`systemd-libs-252-55.el9_7.7.alma.1.x86_64.rpmEsystemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpm^ systemd-252-55.el9_7.7.alma.1.i686.rpm_systemd-container-252-55.el9_7.7.alma.1.x86_64.rpm_ systemd-container-252-55.el9_7.7.alma.1.i686.rpmqsystemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpm` systemd-libs-252-55.el9_7.7.alma.1.i686.rpm~rhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpmCsystemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpmFsystemd-udev-252-55.el9_7.7.alma.1.x86_64.rpmDsystemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm ^systemd-252-55.el9_7.7.alma.1.x86_64.rpm`systemd-libs-252-55.el9_7.7.alma.1.x86_64.rpmEsystemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpm^ systemd-252-55.el9_7.7.alma.1.i686.rpm_systemd-container-252-55.el9_7.7.alma.1.x86_64.rpm_ systemd-container-252-55.el9_7.7.alma.1.i686.rpmqsystemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpm` systemd-libs-252-55.el9_7.7.alma.1.i686.rpm~rhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpmCsystemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpmFsystemd-udev-252-55.el9_7.7.alma.1.x86_64.rpmDsystemd-pam-252-55.el9_7.7.alma.1.x86_64.rpmƗCB FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&,Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865lkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm%lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm!lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpmlkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm%lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm"lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpmlkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpmʊ C eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241%mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm"mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm%mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm!mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm"mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpmmkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm"D DBBBsecurityModerate: python3.9 security update&Lx https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342python3-3.9.25-2.el9_7.x86_64.rpm- python3-libs-3.9.25-2.el9_7.i686.rpm-python3-libs-3.9.25-2.el9_7.x86_64.rpmpython3-3.9.25-2.el9_7.x86_64.rpm- python3-libs-3.9.25-2.el9_7.i686.rpm-python3-libs-3.9.25-2.el9_7.x86_64.rpmʥpE IBBBsecurityModerate: binutils security update&Dhttps://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343]binutils-gold-2.35.2-67.el9_7.1.x86_64.rpm' binutils-2.35.2-67.el9_7.1.i686.rpm'binutils-2.35.2-67.el9_7.1.x86_64.rpm]binutils-gold-2.35.2-67.el9_7.1.x86_64.rpm' binutils-2.35.2-67.el9_7.1.i686.rpm'binutils-2.35.2-67.el9_7.1.x86_64.rpmʥjF NBBBBBBsecurityModerate: openssh security update&_whttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480s}openssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpmu}openssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpmr}openssh-8.7p1-47.el9_7.alma.1.x86_64.rpmt}openssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpms}openssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpmu}openssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpmr}openssh-8.7p1-47.el9_7.alma.1.x86_64.rpmt}openssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpmʡG VBBsecurityModerate: libssh security update&V&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:23483B;libssh-0.10.4-17.el9_7.x86_64.rpm;libssh-config-0.10.4-17.el9_7.noarch.rpmB; libssh-0.10.4-17.el9_7.i686.rpmB;libssh-0.10.4-17.el9_7.x86_64.rpm;libssh-config-0.10.4-17.el9_7.noarch.rpmB; libssh-0.10.4-17.el9_7.i686.rpmʡ H ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'|9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm1Sbpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm%;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm1Sbpftool-7.4.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm%;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpmRI  }BBBsecurityImportant: libxml2 security update&'5Phttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679 libxml2-2.9.13-6.el9_5.2.x86_64.rpmP python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm libxml2-2.9.13-6.el9_5.2.i686.rpm libxml2-2.9.13-6.el9_5.2.x86_64.rpmP python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm libxml2-2.9.13-6.el9_5.2.i686.rpmʏWJ BBBBBBBBBBBBBBBBBBsecurityImportant: grub2 security update&'7https://access.redhat.com/errata/RHSA-2025:2867RHSA-2025:2867RHSA-2025:2867https://access.redhat.com/security/cve/CVE-2025-0624CVE-2025-0624CVE-2025-0624https://bugzilla.redhat.com/23461122346112https://errata.almalinux.org/9/ALSA-2025-2867.htmlALSA-2025:2867ALSA-2025:2867 m grub2-tools-2.06-94.el9_5.alma.1.x86_64.rpm@ grub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpm grub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpmj grub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpm? grub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpml grub2-pc-2.06-94.el9_5.alma.1.x86_64.rpmn grub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpmk grub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpmo grub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm= grub2-common-2.06-94.el9_5.alma.1.noarch.rpmp grub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpm> grub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm m grub2-tools-2.06-94.el9_5.alma.1.x86_64.rpm@ grub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpm grub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpmj grub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpm? grub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpml grub2-pc-2.06-94.el9_5.alma.1.x86_64.rpmn grub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpmk grub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpmo grub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm= grub2-common-2.06-94.el9_5.alma.1.noarch.rpmp grub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpm> grub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpmKK  VBsecurityModerate: expat security update&glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpmxglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpmvglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm- glibc-2.34-125.el9_5.8.alma.1.i686.rpm(glibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpmYglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpmcglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpmhglibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpmlglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpmqglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpm{glibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm. glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpmXnscd-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpmnglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpmmglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpmfglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpmZglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpmeglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm0libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpm~glibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm0 libnsl-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpmaglibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpmXglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpmgglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpm]glibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpmuglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpm}glibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpmzglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpm\glibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpm`glibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpmrglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpmwglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpm|glibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpmtglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpmbglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpmkglibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpmiglibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpm[glibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpmsglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpm_glibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpmyglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpmjglibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpm^glibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpmdglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpmP5glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm5glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpmoglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpmxglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpmKglibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpmvglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm>glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm- glibc-2.34-125.el9_5.8.alma.1.i686.rpm(glibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpmYglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpmAglibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpm(glibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpmcglibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm1glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpmhglibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpmlglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpmqglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpmOglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpm{glibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm. glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpmXnscd-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpmnglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpm)glibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm2glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpmmglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm=glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpmfglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm?glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpmDglibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpmZglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm,glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpmLglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpmeglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm0libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpmRglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpm~glibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm0 libnsl-2.34-125.el9_5.8.alma.1.i686.rpmglibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpmVglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpm'glibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpmIglibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpmaglibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm;glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpmXglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpmgglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpmNglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm7glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpm&glibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpmSglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpmJglibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm4glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpm$glibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpm]glibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpmPglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm-glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpmuglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpm}glibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm+glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpmzglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpm\glibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm.glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpmEglibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpm`glibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpm!glibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpmrglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm0glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpmBglibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpmwglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm3glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpmGglibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpm|glibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpmFglibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpmtglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpm*glibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpmUglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpmHglibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm<glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpmbglibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpm#glibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpmkglibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpmQglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpmiglibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpmCglibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpmMglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpm"glibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpmTglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm:glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm6glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpm[glibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm8glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpmWglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpmsglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm/glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpm_glibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpmyglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm@glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpm%glibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpmglibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpmjglibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpm^glibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpmdglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm9glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpmrN WBBBsecurityModerate: python3.9 security update&r[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977- python3-libs-3.9.21-2.el9.i686.rpmpython3-3.9.21-2.el9.x86_64.rpm-python3-libs-3.9.21-2.el9.x86_64.rpm- python3-libs-3.9.21-2.el9.i686.rpmpython3-3.9.21-2.el9.x86_64.rpm-python3-libs-3.9.21-2.el9.x86_64.rpmÔpO .\BBBBBBBBBBBBBBBBsecurityModerate: grub2 security update&M https://access.redhat.com/errata/RHSA-2025:6990RHSA-2025:6990RHSA-2025:6990https://access.redhat.com/security/cve/CVE-2024-45774CVE-2024-45774CVE-2024-45774https://access.redhat.com/security/cve/CVE-2024-45775CVE-2024-45775CVE-2024-45775https://access.redhat.com/security/cve/CVE-2024-45776CVE-2024-45776CVE-2024-45776https://access.redhat.com/security/cve/CVE-2024-45781CVE-2024-45781CVE-2024-45781https://access.redhat.com/security/cve/CVE-2024-45783CVE-2024-45783CVE-2024-45783https://access.redhat.com/security/cve/CVE-2025-0622CVE-2025-0622CVE-2025-0622https://access.redhat.com/security/cve/CVE-2025-0677CVE-2025-0677CVE-2025-0677https://access.redhat.com/security/cve/CVE-2025-0690CVE-2025-0690CVE-2025-0690https://bugzilla.redhat.com/23374612337461https://bugzilla.redhat.com/23374812337481https://bugzilla.redhat.com/23391822339182https://bugzilla.redhat.com/23458572345857https://bugzilla.redhat.com/23458632345863https://bugzilla.redhat.com/23458652345865https://bugzilla.redhat.com/23461162346116https://bugzilla.redhat.com/23461232346123https://errata.almalinux.org/9/ALSA-2025-6990.htmlALSA-2025:6990ALSA-2025:6990 =grub2-common-2.06-104.el9_6.alma.1.noarch.rpmlgrub2-pc-2.06-104.el9_6.alma.1.x86_64.rpmngrub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpmjgrub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpmpgrub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpm>grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpmkgrub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpmogrub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpm?grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpmmgrub2-tools-2.06-104.el9_6.alma.1.x86_64.rpm@grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm =grub2-common-2.06-104.el9_6.alma.1.noarch.rpmlgrub2-pc-2.06-104.el9_6.alma.1.x86_64.rpmngrub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpmjgrub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpmpgrub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpm>grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpmkgrub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpmogrub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpm?grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpmmgrub2-tools-2.06-104.el9_6.alma.1.x86_64.rpm@grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpmÔ|P oBBBBBBsecurityModerate: openssh security update&mhttps://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993r|openssh-8.7p1-45.el9.x86_64.rpmu|openssh-server-8.7p1-45.el9.x86_64.rpms|openssh-clients-8.7p1-45.el9.x86_64.rpmt|openssh-keycat-8.7p1-45.el9.x86_64.rpmr|openssh-8.7p1-45.el9.x86_64.rpmu|openssh-server-8.7p1-45.el9.x86_64.rpms|openssh-clients-8.7p1-45.el9.x86_64.rpmt|openssh-keycat-8.7p1-45.el9.x86_64.rpm‡|Q 87securityModerate: microcode_ctl security update&mLhttps://access.redhat.com/errata/RHSA-2025:7043RHSA-2025:7043RHSA-2025:7043https://access.redhat.com/security/cve/CVE-2024-28047CVE-2024-28047CVE-2024-28047https://access.redhat.com/security/cve/CVE-2024-31157CVE-2024-31157CVE-2024-31157https://access.redhat.com/security/cve/CVE-2024-39279CVE-2024-39279CVE-2024-39279https://bugzilla.redhat.com/23453632345363https://bugzilla.redhat.com/23453812345381https://bugzilla.redhat.com/23454212345421https://errata.almalinux.org/9/ALSA-2025-7043.htmlALSA-2025:7043ALSA-2025:7043smicrocode_ctl-20250211-1.el9_6.noarch.rpmsmicrocode_ctl-20250211-1.el9_6.noarch.rpmÔR 9securityModerate: python-requests security update&9`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:7049Jpython3-requests-2.25.1-9.el9.noarch.rpmJpython3-requests-2.25.1-9.el9.noarch.rpmÔ"S zsecurityModerate: rsync security update&`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050>-rsync-3.2.5-3.el9.x86_64.rpm>-rsync-3.2.5-3.el9.x86_64.rpmÔ+T >|securityModerate: iptraf-ng security update&yHhttps://access.redhat.com/errata/RHSA-2025:7064RHSA-2025:7064RHSA-2025:7064https://access.redhat.com/security/cve/CVE-2024-52949CVE-2024-52949CVE-2024-52949https://bugzilla.redhat.com/23327022332702https://errata.almalinux.org/9/ALSA-2025-7064.htmlALSA-2025:7064ALSA-2025:7064aiptraf-ng-1.2.2-1.el9.x86_64.rpmaiptraf-ng-1.2.2-1.el9.x86_64.rpmÔEU BBBBBBBBBBBBBBBsecurityModerate: krb5 security update&A{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067 ) libkadm5-1.21.1-6.el9.x86_64.rpm) libkadm5-1.21.1-6.el9.i686.rpm' krb5-server-1.21.1-6.el9.i686.rpm& krb5-pkinit-1.21.1-6.el9.i686.rpm' krb5-server-1.21.1-6.el9.x86_64.rpm& krb5-pkinit-1.21.1-6.el9.x86_64.rpm% krb5-libs-1.21.1-6.el9.i686.rpm% krb5-libs-1.21.1-6.el9.x86_64.rpm( krb5-server-ldap-1.21.1-6.el9.x86_64.rpm( krb5-server-ldap-1.21.1-6.el9.i686.rpmq krb5-workstation-1.21.1-6.el9.x86_64.rpm ) libkadm5-1.21.1-6.el9.x86_64.rpm) libkadm5-1.21.1-6.el9.i686.rpm' krb5-server-1.21.1-6.el9.i686.rpm& krb5-pkinit-1.21.1-6.el9.i686.rpm' krb5-server-1.21.1-6.el9.x86_64.rpm& krb5-pkinit-1.21.1-6.el9.x86_64.rpm% krb5-libs-1.21.1-6.el9.i686.rpm% krb5-libs-1.21.1-6.el9.x86_64.rpm( krb5-server-ldap-1.21.1-6.el9.x86_64.rpm( krb5-server-ldap-1.21.1-6.el9.i686.rpmq krb5-workstation-1.21.1-6.el9.x86_64.rpmÔlV PBsecurityModerate: gnutls security update&glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpmbglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm. glibc-gconv-extra-2.34-168.el9_6.19.i686.rpmNglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpmnglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpmuglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-an-2.34-168.el9_6.19.x86_64.rpmkglibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm.glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpm[glibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-or-2.34-168.el9_6.19.x86_64.rpmqglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpmzglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpmmglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-am-2.34-168.el9_6.19.x86_64.rpmglibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-om-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-be-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpmWglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-az-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpmrglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpm|glibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpmpglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm0libnsl-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpmcglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-se-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpm}glibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpmXnscd-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpmXglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpmxglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm-glibc-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-os-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpm`glibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpmglibc-common-2.34-168.el9_6.19.x86_64.rpmhglibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpmZglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpmlglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpmUglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpmsglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm?glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpm^glibc-langpack-it-2.34-168.el9_6.19.x86_64.rpmNglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpm~glibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm@glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpmyglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpm{glibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpmeglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpmfglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpm\glibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-as-2.34-168.el9_6.19.x86_64.rpmWglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpmiglibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpmdglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpm_glibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpmjglibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpmYglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm9glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-my-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm3glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm0 libnsl-2.34-168.el9_6.19.i686.rpmglibc-langpack-af-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpmvglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm- glibc-2.34-168.el9_6.19.i686.rpm@glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpmtglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpmwglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm2glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpmgglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpmaglibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpm]glibc-langpack-is-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpmoglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm8glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpm)glibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpmUglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpmBglibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpmbglibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm. glibc-gconv-extra-2.34-168.el9_6.19.i686.rpmNglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpmnglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpmuglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpm"glibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-an-2.34-168.el9_6.19.x86_64.rpmkglibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm.glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpm[glibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpm!glibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-or-2.34-168.el9_6.19.x86_64.rpmqglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpmzglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpmmglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpmAglibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-am-2.34-168.el9_6.19.x86_64.rpmglibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm<glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm.glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-om-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-be-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpmJglibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpmWglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpmOglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpm*glibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpm%glibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-az-2.34-168.el9_6.19.x86_64.rpm&glibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm;glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm0glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpmMglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpmCglibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpmTglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpmrglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpm|glibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm>glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpmpglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm0libnsl-2.34-168.el9_6.19.x86_64.rpmEglibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpmKglibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpmcglibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpm'glibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpmIglibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpm#glibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpm$glibc-langpack-se-2.34-168.el9_6.19.x86_64.rpmFglibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpm(glibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm+glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm,glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpmRglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpm}glibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpmPglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm/glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpmSglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpmXnscd-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpmHglibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpmQglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm7glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpmXglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpmVglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm=glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm1glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm-glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpmxglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpmDglibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm-glibc-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-os-2.34-168.el9_6.19.x86_64.rpmLglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpm`glibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpmglibc-common-2.34-168.el9_6.19.x86_64.rpmhglibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm5glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpmglibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpmGglibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm6glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm4glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpmZglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpmlglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm:glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpmŸOa ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&'!ihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm%Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm!Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm%Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm"Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpmUkernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-core-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm!Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpmUkernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpmÔ1b  yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&  https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302Vkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm%Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpmVkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm"Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm%Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm!Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpmVkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpmÙGc !XBBBBBBBBBBBBBBBsecurityModerate: krb5 security update&$https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430 )! libkadm5-1.21.1-8.el9_6.i686.rpm'! krb5-server-1.21.1-8.el9_6.i686.rpm(! krb5-server-ldap-1.21.1-8.el9_6.i686.rpm%! krb5-libs-1.21.1-8.el9_6.i686.rpm(!krb5-server-ldap-1.21.1-8.el9_6.x86_64.rpm%!krb5-libs-1.21.1-8.el9_6.x86_64.rpm&! krb5-pkinit-1.21.1-8.el9_6.i686.rpm'!krb5-server-1.21.1-8.el9_6.x86_64.rpmq!krb5-workstation-1.21.1-8.el9_6.x86_64.rpm)!libkadm5-1.21.1-8.el9_6.x86_64.rpm&!krb5-pkinit-1.21.1-8.el9_6.x86_64.rpm )! libkadm5-1.21.1-8.el9_6.i686.rpm'! krb5-server-1.21.1-8.el9_6.i686.rpm(! krb5-server-ldap-1.21.1-8.el9_6.i686.rpm%! krb5-libs-1.21.1-8.el9_6.i686.rpm(!krb5-server-ldap-1.21.1-8.el9_6.x86_64.rpm%!krb5-libs-1.21.1-8.el9_6.x86_64.rpm&! krb5-pkinit-1.21.1-8.el9_6.i686.rpm'!krb5-server-1.21.1-8.el9_6.x86_64.rpmq!krb5-workstation-1.21.1-8.el9_6.x86_64.rpm)!libkadm5-1.21.1-8.el9_6.x86_64.rpm&!krb5-pkinit-1.21.1-8.el9_6.x86_64.rpmÊNd "iBsecurityModerate: libarchive security update& glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpmN glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpmk glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpmZ glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpm_ glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpmu glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpmr glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm- glibc-2.34-168.el9_6.20.x86_64.rpmW glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpmb glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpmW glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpmx glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm. glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpmw glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm0 libnsl-2.34-168.el9_6.20.i686.rpm4 glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpm{ glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpmj glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpm] glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpmi glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpmN glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpm~ glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm. glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpmd glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpme glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpm` glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpmv glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpmf glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpmq glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpmt glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpmX nscd-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpmX glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpm^ glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpmL glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpm| glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpmn glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpmc glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpmz glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpm\ glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpmg glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpms glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm- glibc-2.34-168.el9_6.20.i686.rpmY glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpmh glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpml glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpma glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpmm glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm0 libnsl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpmp glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpmL glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpm} glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpmy glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpmo glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpm[ glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm glibc-common-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpmP glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpmN glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpmk glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm3 glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpmZ glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpm_ glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpmu glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpmr glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm- glibc-2.34-168.el9_6.20.x86_64.rpmW glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpmb glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm$ glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpmW glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpmx glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm5 glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm. glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpmw glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpmA glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm) glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm0 libnsl-2.34-168.el9_6.20.i686.rpm4 glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpmP glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpm{ glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpmH glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpmE glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpmj glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpm] glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpmi glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpmN glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpm~ glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm. glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpmO glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpmd glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpme glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpmJ glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpmK glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpm` glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm( glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpmv glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm= glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpmf glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm* glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpmq glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm+ glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpmt glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpmX nscd-2.34-168.el9_6.20.x86_64.rpm7 glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm" glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpmX glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpm^ glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpmL glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpm| glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpmC glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpmF glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpmn glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpmU glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpmc glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpmD glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpmV glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpmQ glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpmz glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm/ glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm8 glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm< glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm; glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpm\ glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpmI glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpmg glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpmG glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpms glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpmR glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm' glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm. glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpmT glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm- glibc-2.34-168.el9_6.20.i686.rpmY glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm? glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpmh glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpmM glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpml glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpma glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm2 glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm- glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpmm glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm% glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm0 libnsl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm0 glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpmp glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm9 glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpmL glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpmS glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpm} glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm! glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm# glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpmB glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpmy glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm, glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm: glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm@ glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpmo glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpm[ glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm1 glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm& glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm4 glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm glibc-common-2.34-168.el9_6.20.x86_64.rpm6 glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm> glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpmÊah &NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update& https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm"Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm%Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpmWkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm!Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm"Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm%Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpmWkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpmÓi 'msecurityImportant: sudo security update&' shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978Tsudo-1.9.5p2-10.el9_6.1.x86_64.rpmTsudo-1.9.5p2-10.el9_6.1.x86_64.rpmÐzj 1osecurityModerate: tar security update~bhttps://access.redhat.com/errata/RHSA-2026:0067RHSA-2026:0067RHSA-2026:0067https://access.redhat.com/security/cve/CVE-2025-45582CVE-2025-45582CVE-2025-45582https://bugzilla.redhat.com/23795922379592https://errata.almalinux.org/9/ALSA-2026-0067.htmlALSA-2026:0067ALSA-2026:0067)tar-1.34-9.el9_7.x86_64.rpm)tar-1.34-9.el9_7.x86_64.rpm˘nk (rBsecurityImportant: libpng security update'`https://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238-libpng-1.6.37-12.el9_7.1.x86_64.rpm- libpng-1.6.37-12.el9_7.1.i686.rpm-libpng-1.6.37-12.el9_7.1.x86_64.rpm- libpng-1.6.37-12.el9_7.1.i686.rpmUl )uBsecurityModerate: cups security update}https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312,r cups-libs-2.3.3op2-34.el9_7.2.i686.rpm,rcups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm,r cups-libs-2.3.3op2-34.el9_7.2.i686.rpm,rcups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm˩rm *xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445nkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm%nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpmnkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm%nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm!nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpmnkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm"nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm˩Xn +WsecurityImportant: gnupg2 security update'/bhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719f$gnupg2-2.3.3-5.el9_7.x86_64.rpmf$gnupg2-2.3.3-5.el9_7.x86_64.rpm˧io ,YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update'+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793okernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm%okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpmokernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm%okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm"okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm!okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpmokernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpmp -xBsecurityModerate: glib2 security update<https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936Y glib2-2.68.4-18.el9_7.1.i686.rpmYglib2-2.68.4-18.el9_7.1.x86_64.rpmY glib2-2.68.4-18.el9_7.1.i686.rpmYglib2-2.68.4-18.el9_7.1.x86_64.rpmdq <;securityImportant: python-urllib3 security update'Y7https://access.redhat.com/errata/RHSA-2026:1087RHSA-2026:1087RHSA-2026:1087https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1087.htmlALSA-2026:1087ALSA-2026:1087M python3-urllib3-1.26.5-6.el9_7.1.noarch.rpmM python3-urllib3-1.26.5-6.el9_7.1.noarch.rpm r .}BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update'https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143%pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm%pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm!pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm"pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpmpkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpmpkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm;s /\BBBBBBBBsecurityModerate: curl security update-Ahttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350*Ocurl-7.76.1-35.el9_7.3.x86_64.rpm|Olibcurl-7.76.1-35.el9_7.3.x86_64.rpm}O libcurl-minimal-7.76.1-35.el9_7.3.i686.rpm+Ocurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm|O libcurl-7.76.1-35.el9_7.3.i686.rpm}Olibcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm*Ocurl-7.76.1-35.el9_7.3.x86_64.rpm|Olibcurl-7.76.1-35.el9_7.3.x86_64.rpm}O libcurl-minimal-7.76.1-35.el9_7.3.i686.rpm+Ocurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm|O libcurl-7.76.1-35.el9_7.3.i686.rpm}Olibcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm t 0fBBBsecurityImportant: openssl security update'nLhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473~ openssl-libs-3.5.1-7.el9_7.i686.rpm~openssl-libs-3.5.1-7.el9_7.x86_64.rpm;~openssl-3.5.1-7.el9_7.x86_64.rpm~ openssl-libs-3.5.1-7.el9_7.i686.rpm~openssl-libs-3.5.1-7.el9_7.x86_64.rpm;~openssl-3.5.1-7.el9_7.x86_64.rpm̂u 1kBBBsecurityModerate: python3.9 security update:bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 python3-3.9.25-3.el9_7.x86_64.rpm- python3-libs-3.9.25-3.el9_7.x86_64.rpm- python3-libs-3.9.25-3.el9_7.i686.rpm python3-3.9.25-3.el9_7.x86_64.rpm- python3-libs-3.9.25-3.el9_7.x86_64.rpm- python3-libs-3.9.25-3.el9_7.i686.rpmrv 2pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateDhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617qkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm"qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm%qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm"qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm%qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm!qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpmqkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpm̖Lw 3OBBBBBBBBBBBBBBBBBBBsecurityModerate: util-linux security update`https://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 util-linux-user-2.37.4-21.el9_7.x86_64.rpmutil-linux-core-2.37.4-21.el9_7.x86_64.rpm=libsmartcols-2.37.4-21.el9_7.x86_64.rpm= libsmartcols-2.37.4-21.el9_7.i686.rpm9libmount-2.37.4-21.el9_7.x86_64.rpmAlibuuid-2.37.4-21.el9_7.x86_64.rpmutil-linux-2.37.4-21.el9_7.x86_64.rpm9 libmount-2.37.4-21.el9_7.i686.rpm- libblkid-2.37.4-21.el9_7.i686.rpm2 libfdisk-2.37.4-21.el9_7.i686.rpmA libuuid-2.37.4-21.el9_7.i686.rpm2libfdisk-2.37.4-21.el9_7.x86_64.rpm-libblkid-2.37.4-21.el9_7.x86_64.rpm util-linux-user-2.37.4-21.el9_7.x86_64.rpmutil-linux-core-2.37.4-21.el9_7.x86_64.rpm=libsmartcols-2.37.4-21.el9_7.x86_64.rpm= libsmartcols-2.37.4-21.el9_7.i686.rpm9libmount-2.37.4-21.el9_7.x86_64.rpmAlibuuid-2.37.4-21.el9_7.x86_64.rpmutil-linux-2.37.4-21.el9_7.x86_64.rpm9 libmount-2.37.4-21.el9_7.i686.rpm- libblkid-2.37.4-21.el9_7.i686.rpm2 libfdisk-2.37.4-21.el9_7.i686.rpmA libuuid-2.37.4-21.el9_7.i686.rpm2libfdisk-2.37.4-21.el9_7.x86_64.rpm-libblkid-2.37.4-21.el9_7.x86_64.rpm̫Ix 4dBsecurityImportant: brotli security update'|https://access.redhat.com/errata/RHSA-2026:2042RHSA-2026:2042RHSA-2026:2042https://access.redhat.com/security/cve/CVE-2025-6176CVE-2025-6176CVE-2025-6176https://bugzilla.redhat.com/24087622408762https://errata.almalinux.org/9/ALSA-2026-2042.htmlALSA-2026:2042ALSA-2026:2042.Ylibbrotli-1.0.9-9.el9_7.x86_64.rpm.Y libbrotli-1.0.9-9.el9_7.i686.rpm.Ylibbrotli-1.0.9-9.el9_7.x86_64.rpm.Y libbrotli-1.0.9-9.el9_7.i686.rpm̒4y 5gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateu"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212"rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm!rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpmrkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm%rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm"rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm!rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpmrkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm%rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpmrkernel-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm̶/z 6FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatehttps://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722skernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpmskernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm"skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm%skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm!skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpmskernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm"skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm%skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm!skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-core-5.14.0-611.34.1.el9_7.x86_64.rpmskernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpm:{ 7eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: glibc security update'|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786Pz glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpmj glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm- glibc-2.34-231.el9_7.10.i686.rpmW glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpms glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpmo glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpmd glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpmY glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpml glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpmf glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpmW glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpmi glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpmk glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpmX glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpmt glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpm{ glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpma glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpm} glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm- glibc-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpm\ glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpmL glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpmr glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpm~ glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpmq glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpmm glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm0 libnsl-2.34-231.el9_7.10.i686.rpm/ glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpmh glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpmb glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpmL glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpmc glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm glibc-common-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpmZ glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpmx glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm. glibc-gconv-extra-2.34-231.el9_7.10.i686.rpmg glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpmw glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpmp glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpm^ glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpmX nscd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpm] glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm. glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpmu glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpmy glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpm| glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpm[ glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpme glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpmv glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm0 libnsl-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpm` glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpm_ glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpmn glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpmPz glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpmj glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm- glibc-2.34-231.el9_7.10.i686.rpmW glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpmT glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpms glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpmo glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpmd glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpmY glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpml glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm9 glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpmf glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpmW glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpmi glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpmk glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpmX glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpmt glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpm{ glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpma glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpmV glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpm} glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm- glibc-2.34-231.el9_7.10.x86_64.rpm7 glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm( glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm, glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpm\ glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpmR glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpmL glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm+ glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpmD glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm< glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm$ glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpmG glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpmr glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpm~ glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm? glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpmq glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm1 glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm% glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpmM glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm; glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpmm glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpmJ glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm0 libnsl-2.34-231.el9_7.10.i686.rpm/ glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpmP glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpmh glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm5 glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpmb glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpmL glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpmc glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpmQ glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm glibc-common-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpmZ glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm@ glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpmE glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpmx glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm. glibc-gconv-extra-2.34-231.el9_7.10.i686.rpmg glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpmw glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpmp glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm& glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm0 glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpmH glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpm^ glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpmX nscd-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpm] glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm8 glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm3 glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm. glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpmu glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpmB glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm! glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm" glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpmK glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpmy glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm) glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpmF glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpmU glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpm| glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm4 glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpmA glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm# glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm* glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpmC glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpm[ glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpme glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpmv glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm0 libnsl-2.34-231.el9_7.10.x86_64.rpm' glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm6 glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpmN glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpm` glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpmO glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm2 glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpm_ glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpmS glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm: glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm= glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm. glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm> glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpmn glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm/ glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpmI glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm- glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpmׄD| 8BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update#whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066tkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-5.14.0-611.35.1.el9_7.x86_64.rpm"tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm!tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm%tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpmtkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-5.14.0-611.35.1.el9_7.x86_64.rpm"tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm!tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm%tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpmtkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpmtkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm̀-} 9aBsecurityImportant: libpng security update'6https://access.redhat.com/errata/RHSA-2026:3405RHSA-2026:3405RHSA-2026:3405https://access.redhat.com/security/cve/CVE-2026-22695CVE-2026-22695CVE-2026-22695https://access.redhat.com/security/cve/CVE-2026-22801CVE-2026-22801CVE-2026-22801https://access.redhat.com/security/cve/CVE-2026-25646CVE-2026-25646CVE-2026-25646https://bugzilla.redhat.com/24288242428824https://bugzilla.redhat.com/24288252428825https://bugzilla.redhat.com/24385422438542https://errata.almalinux.org/9/ALSA-2026-3405.htmlALSA-2026:3405ALSA-2026:3405-libpng-1.6.37-12.el9_7.2.x86_64.rpm- libpng-1.6.37-12.el9_7.2.i686.rpm-libpng-1.6.37-12.el9_7.2.x86_64.rpm- libpng-1.6.37-12.el9_7.2.i686.rpm͖~ :dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatePZhttps://access.redhat.com/errata/RHSA-2026:3488RHSA-2026:3488RHSA-2026:3488https://access.redhat.com/security/cve/CVE-2025-40168CVE-2025-40168CVE-2025-40168https://access.redhat.com/security/cve/CVE-2025-71085CVE-2025-71085CVE-2025-71085https://access.redhat.com/security/cve/CVE-2026-23097CVE-2026-23097CVE-2026-23097https://bugzilla.redhat.com/24144822414482https://bugzilla.redhat.com/24290262429026https://bugzilla.redhat.com/24368022436802https://errata.almalinux.org/9/ALSA-2026-3488.htmlALSA-2026:3488ALSA-2026:3488ukernel-debug-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-5.14.0-611.36.1.el9_7.x86_64.rpm!ukernel-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm%ukernel-uki-virt-addons-5.14.0-611.36.1.el9_7.x86_64.rpm"ukernel-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-libs-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-abi-stablelists-5.14.0-611.36.1.el9_7.noarch.rpmukernel-debug-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-5.14.0-611.36.1.el9_7.x86_64.rpm!ukernel-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm%ukernel-uki-virt-addons-5.14.0-611.36.1.el9_7.x86_64.rpm"ukernel-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-tools-libs-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-debug-core-5.14.0-611.36.1.el9_7.x86_64.rpmukernel-abi-stablelists-5.14.0-611.36.1.el9_7.noarch.rpm͠[ ;CBBBsecurityModerate: nfs-utils security update*@https://access.redhat.com/errata/RHSA-2026:3940RHSA-2026:3940RHSA-2026:3940https://access.redhat.com/security/cve/CVE-2025-12801CVE-2025-12801CVE-2025-12801https://bugzilla.redhat.com/24130812413081https://errata.almalinux.org/9/ALSA-2026-3940.htmlALSA-2026:3940ALSA-2026:3940;s libnfsidmap-2.5.4-38.el9_7.3.i686.rpm;slibnfsidmap-2.5.4-38.el9_7.3.x86_64.rpmisnfs-utils-2.5.4-38.el9_7.3.x86_64.rpm;s libnfsidmap-2.5.4-38.el9_7.3.i686.rpm;slibnfsidmap-2.5.4-38.el9_7.3.x86_64.rpmisnfs-utils-2.5.4-38.el9_7.3.x86_64.rpmϲ! lBsecurityModerate: gnutls security update[Thttps://access.redhat.com/errata/RHSA-2026:4188RHSA-2026:4188RHSA-2026:4188https://access.redhat.com/security/cve/CVE-2025-14831CVE-2025-14831CVE-2025-14831https://access.redhat.com/security/cve/CVE-2025-9820CVE-2025-9820CVE-2025-9820https://bugzilla.redhat.com/23925282392528https://bugzilla.redhat.com/24231772423177https://errata.almalinux.org/9/ALSA-2026-4188.htmlALSA-2026:4188ALSA-2026:4188$ gnutls-3.8.3-10.el9_7.i686.rpm$gnutls-3.8.3-10.el9_7.x86_64.rpm$ gnutls-3.8.3-10.el9_7.i686.rpm$gnutls-3.8.3-10.el9_7.x86_64.rpmϮ5 ?oBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update/https://access.redhat.com/errata/RHSA-2026:4759RHSA-2026:4759RHSA-2026:4759https://access.redhat.com/security/cve/CVE-2025-39818CVE-2025-39818CVE-2025-39818https://access.redhat.com/security/cve/CVE-2025-68800CVE-2025-68800CVE-2025-68800https://bugzilla.redhat.com/23957972395797https://bugzilla.redhat.com/24290652429065https://errata.almalinux.org/9/ALSA-2026-4759.htmlALSA-2026:4759ALSA-2026:4759wkernel-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-modules-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-libs-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-abi-stablelists-5.14.0-611.41.1.el9_7.noarch.rpmwkernel-debug-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-5.14.0-611.41.1.el9_7.x86_64.rpm"wkernel-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-5.14.0-611.41.1.el9_7.x86_64.rpm%wkernel-uki-virt-addons-5.14.0-611.41.1.el9_7.x86_64.rpm!wkernel-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-modules-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-libs-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-abi-stablelists-5.14.0-611.41.1.el9_7.noarch.rpmwkernel-debug-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-5.14.0-611.41.1.el9_7.x86_64.rpm"wkernel-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-5.14.0-611.41.1.el9_7.x86_64.rpm%wkernel-uki-virt-addons-5.14.0-611.41.1.el9_7.x86_64.rpm!wkernel-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-tools-5.14.0-611.41.1.el9_7.x86_64.rpmwkernel-debug-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpmt !NBBBBBBBBBBBBBBBBBsecurityModerate: grub2 security update3Ehttps://access.redhat.com/errata/RHSA-2026:4760RHSA-2026:4760RHSA-2026:4760https://access.redhat.com/security/cve/CVE-2025-61662CVE-2025-61662CVE-2025-61662https://bugzilla.redhat.com/24146832414683https://errata.almalinux.org/9/ALSA-2026-4760.htmlALSA-2026:4760ALSA-2026:4760 ogrub2-tools-extra-2.06-114.el9_7.1.alma.1.x86_64.rpm@grub2-pc-modules-2.06-114.el9_7.1.alma.1.noarch.rpm?grub2-efi-x64-modules-2.06-114.el9_7.1.alma.1.noarch.rpmpgrub2-tools-minimal-2.06-114.el9_7.1.alma.1.x86_64.rpmkgrub2-efi-x64-cdboot-2.06-114.el9_7.1.alma.1.x86_64.rpmngrub2-tools-efi-2.06-114.el9_7.1.alma.1.x86_64.rpmlgrub2-pc-2.06-114.el9_7.1.alma.1.x86_64.rpm=grub2-common-2.06-114.el9_7.1.alma.1.noarch.rpm>grub2-efi-aa64-modules-2.06-114.el9_7.1.alma.1.noarch.rpmjgrub2-efi-x64-2.06-114.el9_7.1.alma.1.x86_64.rpmmgrub2-tools-2.06-114.el9_7.1.alma.1.x86_64.rpmgrub2-ppc64le-modules-2.06-114.el9_7.1.alma.1.noarch.rpm ogrub2-tools-extra-2.06-114.el9_7.1.alma.1.x86_64.rpm@grub2-pc-modules-2.06-114.el9_7.1.alma.1.noarch.rpm?grub2-efi-x64-modules-2.06-114.el9_7.1.alma.1.noarch.rpmpgrub2-tools-minimal-2.06-114.el9_7.1.alma.1.x86_64.rpmkgrub2-efi-x64-cdboot-2.06-114.el9_7.1.alma.1.x86_64.rpmngrub2-tools-efi-2.06-114.el9_7.1.alma.1.x86_64.rpmlgrub2-pc-2.06-114.el9_7.1.alma.1.x86_64.rpm=grub2-common-2.06-114.el9_7.1.alma.1.noarch.rpm>grub2-efi-aa64-modules-2.06-114.el9_7.1.alma.1.noarch.rpmjgrub2-efi-x64-2.06-114.el9_7.1.alma.1.x86_64.rpmmgrub2-tools-2.06-114.el9_7.1.alma.1.x86_64.rpmgrub2-ppc64le-modules-2.06-114.el9_7.1.alma.1.noarch.rpm{ bBsecurityImportant: libarchive security update'xhttps://access.redhat.com/errata/RHSA-2026:5080RHSA-2026:5080RHSA-2026:5080https://access.redhat.com/security/cve/CVE-2026-4111CVE-2026-4111CVE-2026-4111https://bugzilla.redhat.com/24464532446453https://errata.almalinux.org/9/ALSA-2026-5080.htmlALSA-2026:5080ALSA-2026:5080/libarchive-3.5.3-7.el9_7.x86_64.rpm/ libarchive-3.5.3-7.el9_7.i686.rpm/libarchive-3.5.3-7.el9_7.x86_64.rpm/ libarchive-3.5.3-7.el9_7.i686.rpm eBsecurityModerate: vim security updateyxhttps://access.redhat.com/errata/RHSA-2026:5602RHSA-2026:5602RHSA-2026:5602https://access.redhat.com/security/cve/CVE-2026-25749CVE-2026-25749CVE-2026-25749https://bugzilla.redhat.com/24378432437843https://errata.almalinux.org/9/ALSA-2026-5602.htmlALSA-2026:5602ALSA-2026:5602T vim-minimal-8.2.2637-23.el9_7.1.x86_64.rpm8 vim-filesystem-8.2.2637-23.el9_7.1.noarch.rpmT vim-minimal-8.2.2637-23.el9_7.1.x86_64.rpm8 vim-filesystem-8.2.2637-23.el9_7.1.noarch.rpmΔ 3hBBBBBBBBBsecurityModerate: opencryptoki security updateq[https://access.redhat.com/errata/RHSA-2026:5603RHSA-2026:5603RHSA-2026:5603https://access.redhat.com/security/cve/CVE-2026-23893CVE-2026-23893CVE-2026-23893https://bugzilla.redhat.com/24319092431909https://errata.almalinux.org/9/ALSA-2026-5603.htmlALSA-2026:5603ALSA-2026:56033A opencryptoki-libs-3.25.0-4.el9_7.2.i686.rpmuAopencryptoki-icsftok-3.25.0-4.el9_7.2.x86_64.rpmvAopencryptoki-swtok-3.25.0-4.el9_7.2.x86_64.rpm3Aopencryptoki-libs-3.25.0-4.el9_7.2.x86_64.rpmpAopencryptoki-ccatok-3.25.0-4.el9_7.2.x86_64.rpmtAopencryptoki-3.25.0-4.el9_7.2.x86_64.rpm3A opencryptoki-libs-3.25.0-4.el9_7.2.i686.rpmuAopencryptoki-icsftok-3.25.0-4.el9_7.2.x86_64.rpmvAopencryptoki-swtok-3.25.0-4.el9_7.2.x86_64.rpm3Aopencryptoki-libs-3.25.0-4.el9_7.2.x86_64.rpmpAopencryptoki-ccatok-3.25.0-4.el9_7.2.x86_64.rpmtAopencryptoki-3.25.0-4.el9_7.2.x86_64.rpmΔK tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateL<https://access.redhat.com/errata/RHSA-2026:6153RHSA-2026:6153RHSA-2026:6153https://access.redhat.com/security/cve/CVE-2025-38180CVE-2025-38180CVE-2025-38180https://access.redhat.com/security/cve/CVE-2025-40096CVE-2025-40096CVE-2025-40096https://access.redhat.com/security/cve/CVE-2026-23144CVE-2026-23144CVE-2026-23144https://access.redhat.com/security/cve/CVE-2026-23171CVE-2026-23171CVE-2026-23171https://access.redhat.com/security/cve/CVE-2026-23191CVE-2026-23191CVE-2026-23191https://access.redhat.com/security/cve/CVE-2026-23193CVE-2026-23193CVE-2026-23193https://access.redhat.com/security/cve/CVE-2026-23204CVE-2026-23204CVE-2026-23204https://access.redhat.com/security/cve/CVE-2026-23209CVE-2026-23209CVE-2026-23209https://bugzilla.redhat.com/23763762376376https://bugzilla.redhat.com/24073332407333https://bugzilla.redhat.com/24398722439872https://bugzilla.redhat.com/24398862439886https://bugzilla.redhat.com/24398872439887https://bugzilla.redhat.com/24399002439900https://bugzilla.redhat.com/24399312439931https://bugzilla.redhat.com/24399472439947https://errata.almalinux.org/9/ALSA-2026-6153.htmlALSA-2026:6153ALSA-2026:6153!xkernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpmxkernel-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm"xkernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm%xkernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpm!xkernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpmxkernel-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm"xkernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm%xkernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpmxkernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpmθM  SsecurityModerate: rsync security updateBhttps://access.redhat.com/errata/RHSA-2026:6390RHSA-2026:6390RHSA-2026:6390https://access.redhat.com/security/cve/CVE-2025-10158CVE-2025-10158CVE-2025-10158https://bugzilla.redhat.com/24156372415637https://errata.almalinux.org/9/ALSA-2026-6390.htmlALSA-2026:6390ALSA-2026:6390>.rsync-3.2.5-3.el9_7.2.x86_64.rpm>.rsync-3.2.5-3.el9_7.2.x86_64.rpmθ>  UBBBBBBsecurityImportant: openssh security update'J https://access.redhat.com/errata/RHSA-2026:6462RHSA-2026:6462RHSA-2026:6462https://access.redhat.com/security/cve/CVE-2026-3497CVE-2026-3497CVE-2026-3497https://bugzilla.redhat.com/24470852447085https://errata.almalinux.org/9/ALSA-2026-6462.htmlALSA-2026:6462ALSA-2026:6462t~openssh-keycat-8.7p1-48.el9_7.alma.1.x86_64.rpms~openssh-clients-8.7p1-48.el9_7.alma.1.x86_64.rpmu~openssh-server-8.7p1-48.el9_7.alma.1.x86_64.rpmr~openssh-8.7p1-48.el9_7.alma.1.x86_64.rpmt~openssh-keycat-8.7p1-48.el9_7.alma.1.x86_64.rpms~openssh-clients-8.7p1-48.el9_7.alma.1.x86_64.rpmu~openssh-server-8.7p1-48.el9_7.alma.1.x86_64.rpmr~openssh-8.7p1-48.el9_7.alma.1.x86_64.rpm5  ]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateV https://access.redhat.com/errata/RHSA-2026:6570RHSA-2026:6570RHSA-2026:6570https://access.redhat.com/security/cve/CVE-2025-38109CVE-2025-38109CVE-2025-38109https://access.redhat.com/security/cve/CVE-2026-23111CVE-2026-23111CVE-2026-23111https://access.redhat.com/security/cve/CVE-2026-23210CVE-2026-23210CVE-2026-23210https://access.redhat.com/security/cve/CVE-2026-23231CVE-2026-23231CVE-2026-23231https://bugzilla.redhat.com/23761012376101https://bugzilla.redhat.com/24396872439687https://bugzilla.redhat.com/24398952439895https://bugzilla.redhat.com/24443762444376https://errata.almalinux.org/9/ALSA-2026-6570.htmlALSA-2026:6570ALSA-2026:6570ykernel-tools-5.14.0-611.47.1.el9_7.x86_64.rpm ykernel-debug-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-abi-stablelists-5.14.0-611.47.1.el9_7.noarch.rpm%ykernel-uki-virt-addons-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-tools-libs-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-5.14.0-611.47.1.el9_7.x86_64.rpm!ykernel-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-5.14.0-611.47.1.el9_7.x86_64.rpm"ykernel-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-tools-5.14.0-611.47.1.el9_7.x86_64.rpm ykernel-debug-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-abi-stablelists-5.14.0-611.47.1.el9_7.noarch.rpm%ykernel-uki-virt-addons-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-tools-libs-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-5.14.0-611.47.1.el9_7.x86_64.rpm!ykernel-modules-core-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-debug-5.14.0-611.47.1.el9_7.x86_64.rpm"ykernel-uki-virt-5.14.0-611.47.1.el9_7.x86_64.rpmykernel-modules-extra-5.14.0-611.47.1.el9_7.x86_64.rpm  |BBBsecurityImportant: python3.9 security update'hYhttps://access.redhat.com/errata/RHSA-2026:6766RHSA-2026:6766RHSA-2026:6766https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6766.htmlALSA-2026:6766ALSA-2026:6766-" python3-libs-3.9.25-3.el9_7.2.i686.rpm-"python3-libs-3.9.25-3.el9_7.2.x86_64.rpm"python3-3.9.25-3.el9_7.2.x86_64.rpm-" python3-libs-3.9.25-3.el9_7.2.i686.rpm-"python3-libs-3.9.25-3.el9_7.2.x86_64.rpm"python3-3.9.25-3.el9_7.2.x86_64.rpm  ABBBBBBBsecurityCritical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injectionAhttps://access.redhat.com/errata/RHSA-2026:7384RHSA-2026:7384RHSA-2026:7384https://access.redhat.com/security/cve/CVE-2026-4631CVE-2026-4631CVE-2026-4631https://errata.almalinux.org/9/ALSA-2026-7384.htmlALSA-2026:7384ALSA-2026:7384GQcockpit-bridge-344-2.el9_7.noarch.rpmIQcockpit-system-344-2.el9_7.noarch.rpmQQcockpit-ws-344-2.el9_7.x86_64.rpmPQcockpit-344-2.el9_7.x86_64.rpmYQcockpit-ws-selinux-344-2.el9_7.x86_64.rpmHQcockpit-doc-344-2.el9_7.noarch.rpmGQcockpit-bridge-344-2.el9_7.noarch.rpmIQcockpit-system-344-2.el9_7.noarch.rpmQQcockpit-ws-344-2.el9_7.x86_64.rpmPQcockpit-344-2.el9_7.x86_64.rpmYQcockpit-ws-selinux-344-2.el9_7.x86_64.rpmHQcockpit-doc-344-2.el9_7.noarch.rpmz  JBsecurityImportant: nghttp2 security update'H.https://access.redhat.com/errata/RHSA-2026:7668RHSA-2026:7668RHSA-2026:7668https://access.redhat.com/security/cve/CVE-2026-27135CVE-2026-27135CVE-2026-27135https://bugzilla.redhat.com/24487542448754https://errata.almalinux.org/9/ALSA-2026-7668.htmlALSA-2026:7668ALSA-2026:7668[clibnghttp2-1.43.0-6.el9_7.1.x86_64.rpm[c libnghttp2-1.43.0-6.el9_7.1.i686.rpm[clibnghttp2-1.43.0-6.el9_7.1.x86_64.rpm[c libnghttp2-1.43.0-6.el9_7.1.i686.rpmj NBsecurityImportant: vim security update'vGhttps://access.redhat.com/errata/RHSA-2026:8259RHSA-2026:8259RHSA-2026:8259https://access.redhat.com/security/cve/CVE-2026-28417CVE-2026-28417CVE-2026-28417https://access.redhat.com/security/cve/CVE-2026-28421CVE-2026-28421CVE-2026-28421https://access.redhat.com/security/cve/CVE-2026-33412CVE-2026-33412CVE-2026-33412https://bugzilla.redhat.com/24434552443455https://bugzilla.redhat.com/24434742443474https://bugzilla.redhat.com/24509072450907https://errata.almalinux.org/9/ALSA-2026-8259.htmlALSA-2026:8259ALSA-2026:8259T vim-minimal-8.2.2637-23.el9_7.2.x86_64.rpm8 vim-filesystem-8.2.2637-23.el9_7.2.noarch.rpmT vim-minimal-8.2.2637-23.el9_7.2.x86_64.rpm8 vim-filesystem-8.2.2637-23.el9_7.2.noarch.rpmw  QBsecurityImportant: libarchive security update'=thttps://access.redhat.com/errata/RHSA-2026:8510RHSA-2026:8510RHSA-2026:8510https://access.redhat.com/security/cve/CVE-2026-4424CVE-2026-4424CVE-2026-4424https://access.redhat.com/security/cve/CVE-2026-5121CVE-2026-5121CVE-2026-5121https://bugzilla.redhat.com/24490062449006https://bugzilla.redhat.com/24529452452945https://errata.almalinux.org/9/ALSA-2026-8510.htmlALSA-2026:8510ALSA-2026:8510/ libarchive-3.5.3-9.el9_7.i686.rpm/libarchive-3.5.3-9.el9_7.x86_64.rpm/ libarchive-3.5.3-9.el9_7.i686.rpm/libarchive-3.5.3-9.el9_7.x86_64.rpmψ  TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update'1ahttps://access.redhat.com/errata/RHSA-2026:8921RHSA-2026:8921RHSA-2026:8921https://access.redhat.com/security/cve/CVE-2025-39766CVE-2025-39766CVE-2025-39766https://access.redhat.com/security/cve/CVE-2025-68741CVE-2025-68741CVE-2025-68741https://bugzilla.redhat.com/23946482394648https://bugzilla.redhat.com/24250462425046https://errata.almalinux.org/9/ALSA-2026-8921.htmlALSA-2026:8921ALSA-2026:8921"zkernel-uki-virt-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-modules-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-core-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-abi-stablelists-5.14.0-611.49.1.el9_7.noarch.rpm zkernel-debug-uki-virt-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-modules-extra-5.14.0-611.49.1.el9_7.x86_64.rpm%zkernel-uki-virt-addons-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-tools-libs-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-modules-core-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-tools-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-modules-extra-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-core-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-modules-5.14.0-611.49.1.el9_7.x86_64.rpm!zkernel-modules-core-5.14.0-611.49.1.el9_7.x86_64.rpm"zkernel-uki-virt-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-modules-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-core-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-abi-stablelists-5.14.0-611.49.1.el9_7.noarch.rpm zkernel-debug-uki-virt-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-modules-extra-5.14.0-611.49.1.el9_7.x86_64.rpm%zkernel-uki-virt-addons-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-tools-libs-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-modules-core-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-tools-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-modules-extra-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-core-5.14.0-611.49.1.el9_7.x86_64.rpmzkernel-debug-modules-5.14.0-611.49.1.el9_7.x86_64.rpm!zkernel-modules-core-5.14.0-611.49.1.el9_7.x86_64.rpmϢ5VmXZ Utils is an integrated collection of user-space filempressu@ities bas9the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl[ datai. TW?provide highÔioYkeepingde%time short. SecuWy Fix(es): * gzip: arbitrary--w%e vulneraby (CVE-2022-1271) For morota_aboutsgissue(sincludimgt,CVSS scG cknowledgments,j/r relin@n,ftoR pagm lis,R&encEs.egrub2 pu6sj ver82?GrUnifiTBoot Loadz(GRUB)ƪlynfigu3lecustomizb:l:wީ>dular}chpcturesuppbvarieSkernel 'sym uteVMhardwavi. mshimrtIJrfirst-stUEFIthatOndlo7trufull3unenviron: IBflowޢ_net_recv_ip4_ets28733)HCrafPNG yscalnmay leadDZ-of-nds sheap^1-3695]SRQd7huffma)Vg6gJPEhc>hbN,7ZOȤwhensp HTTPId/n4M[_lockXBrs non-iDe*dQb-r-freӳcmd_k()B=: Bovޢ6cYH7ViVi IMed)updgyim  vi editorv]Use.F<Powr OffsetvW0554@H-hOocts?943?y42024+621+&-ro'9'usf{utf_ptr2char51SExpatG C.bJB?XML docueC0ta,exhaDzv9typeM531= =copyStf:wC23Linux!,anyopeJ BC: Sma8[b siz[TCP sourcgen^o  k012){r diQ _evf_ƤTHprivTe^Y7YaU/asub$lrt966tomIP ESP tsco 76K Bug`make SHA512_ .sCRYPTO_USER4- (BZ#20726SR-IOVc an*> 50% d3483fix rrupiauyby dm-- 98218+ SCcli$-s6 peeloffns [al(_-9]<404#n|finasymmec ascsi_i l 049%tcw_/sched/cls_api0H&Power9 - LPAR:ShaGcm9 se[Hash]w48zH& up+nrun ss- `hadFIPSPd1c Inam4>338Jfs2=g sUmeghtK730| i/oiatoruo :Kwork;disgZ4.18.0-372.9.1.el8.x86_64)[825A( esn't3SSATA5974G/ tre@post migL  ^10{Oopr ltx  IRIP8de_attr__labg !sl18lBUG:% &t#xnlE fs4ton ;loorlps : Kaccebada,P g: 11 [#1]kc+tuNntL (P10/ ibmvnic/ )30OS^vmOUmap\e') Enh ^'Bommu/vt-d: , DMAR_UNITS_SUPPORTED U5326 ~%  dowf_from #r ouatocR Z=, F:DAP8{:lDialti322;Un5 miFs575-KRB7mtv98 O=SSL kim; <ogLaye:)T(TLS) aella)-ng-pureypt phy-Z: c hA scCj+29 CSigne[re nahpVOCSP_NOCHECKSo3oOPENH_LH_flus brhLD47D18GAESBa0me s>P g qa*Cy,n n}omgnutlsFFDHE8032q"Z3DES+549ptsI 1cara/t|N 5508]mU>ECDSA 5 licitkF eZ#s_ -gpip256k1>[ber X19/X448S6ConvX8p -onSl_? FKAT88jRkeys on9193+q&YOZhK7[wsu]sqi5[IBMR HW$T] POWER10e0s5\y[o view]R-R*78*DH t g*5856*EC*7*S+8+AND,9,zero ,61,HKDF5mit"1838bPacy 1 (GnuPGl GPGK&r ighl na lian PGP7S/MIME*ndx gpgS ofnt sts l?34@ dbus-brok@$ bu TbyWD-Bus'. It*imD ١iD$%l$Pa$orűzuexcljvete~ #YnAr/ekJ"entegfKWkaS Ex~s$l_$12]nS#p$DyXgQz aC. nft_s$eJ1?Y' RdS_йy_e0y z &R/mlx5numbf c{XLT q-227O8,x t+edQunw-Ye-nex7p-ob.- G5n$)4unl d MSR_ : WR0x199amazot4.32x tn941X86/pXS/UVS> UV5 )773+ l{:2sync s\softblk_mq_G_ch_ 9.0z]13&NVMe/dero+v%vonic,nic^77Adnvmeaj- 7~ (/tcp9tn#uses(_to_rq()_)l(ue)69ImhbY&929x 9/ppc64hIn\- & "C_ pe "=alscpu.d2171  */ d+w y~AMX flaamx_~8, bf16) H826: DmU!4!avf"194 i40e"9)7$#!sdoContfxmlN/406|  .X #s u , RD N O|  fit e0o xInNx -or!KMC++, PK, Pike,f . kRSH NUPG+$*E0䪈fo|have+p"a r *v :(3.7.6),;8) 3{ouj,_pkcs7_y.Q509QA] ["@u-r lP258xAKK5-CBCmg{>3/:(*2<2r10)KSBp/P c[Kasbaho%X."MS! i0yQ. R1th_s$9Gk */rK exG7 51 1-q &ath%w,t; ;P$!`21̔wuthbypas! d<nn'R's;ans t3l 19p :_Em 060B>VMLN78C zma[8 +$)Z^) 31l * J84 r6eld43 U)P8:rQ ?N# h/25" (dTDKgPTRACE_SEIZEW3O!SDCCOMP059 #%%T14/G2Dp+(mt7921e%56&v~-lle{#U0Matroxx aMscr vVGAz*put Di120nee1oa waL "ea#C DRBGfa5;y; ix| wdog%' .#30&734s! [sw/30:0]O7 5.16"BadQp}( qemu-kvm pfn:68a74600?,6f=E%s2M 6s>879Vh-t 2)9nNlo% hpilo* HPE RL3 Gen&ARMy.[(4 pretI0 aG./es3s,F k [eg yl0ynam.6dl. 3!K'BH4llCpi=O oI&windKu} -:7PyLong_F76dgvy `9oa#0-=plua> Lua! Vm+-wet+x >Len Lwlsontdp ,-u1kua:inG_msde.c; unxro3ra* ) $>30# -Ba,acker) vor MminoG 'sy9 3651 ]_*}nd N+@-smb20_ry_i NULL 01h'*id9nd__kicbdu.b[6{swiotlbt1H"\_F5_DEVICE?--?3rsidoq@N6%$'-g:UMi10:spcm_hw_iM0 0)%w46o8/[Bk10urywbF00 drmma=,+K/,.@! T2goDF 6._sfa_>> 63`s&-@pE!3dinD&e n-upM-/4 ka SBDRN\ 3Ni]lGaDlTST5Ta$C)_DRPW_*po~0toN c!cho\021+~:+tBl A@J Sp)pC[$[i35.s&H^3816, 9900nBranT C$uZ  b)Lcedj r$5_uR&8*hrn$zOsly> a a8. S.γǤoist/oU$1Rinq] Y95: holM umi ol v t9n pc8~}:<8H IPv63 D517'<7SambLn4-I AS4M 0BH*(SMB[8C(A(rn>SIF7vPC-/lw ; ne ,~ ZC.6d%s,>6.4)V+4G2:@w?s?E1$2742@$lMd-"m#!%-'API/n*$/'TDB k4(2.5.2 AD  u + add.0!}F#,-quaF5.onDWgF4Ъ-%$a [ sW[redi7u glyph0ff4W]U"sfOB _NB4L.>Seiviol a FNT_S _RH5HtHTBOG=4%3.9.],I24| %)'O/4@!X2azse 1A15GD^X 3z;/http/.Gc&(1">O e2fsG2a7afo5/=, (7 = @]gz 2,3: O/[Q13:;>MfBuzzo+n,ihRbRYORh4Uhape-f%.c7 MADHH5 c~PC(DHCPY2X ~ D0n MGto gei wNctjKa.ika br c'dhV: {g@ISC K9 Dt'hdm s. 5NSowB -chisoDe1220A}ogro*usb"rYlobyiiuaH^9/Fmod=n i &: u-W*;B tirpchk&SunDZ'sS3-ipd5 3I-a)Z=F\ 7 e6- :}lot754682Az,8R_()7 )B' 7<%/&`AZf "# Pho42C"PoFos P auth&c#e0[^乍ylEby ea0natn-" !;8dB!eLNL= <=tocGmahel'ncrrs"#Pd ib$4Le*KDCAkrb5+ i- ACvh4t38fesud4H/? 1sD o@F 2X&t iGsrN$Zu<.iut]4+gasgrsT hot,+RunA;,3-2&-X1c"POSTPUT|*j2221U2E:9 )&1{k~*,U!Fa" X88179_beAwUSB eK .V64Vi91KGPbILB Zï]9_ 13ï\ '0M,S"3=gX X3I9ò2{ un1lAU?smt_n/30KY=f-HvhN\MiN2<|3%2<58HN-OZglt7t"lyt5EMC8st~NDU0d33i@N/@=9)"w-WARNIN==b6 PI/3440PY1/xQmm/:.c:a_haYcr_f+0x3f/0x50f458 2v4:l9 of4X_>Y4_3ikg)&or$ i61|/pz'+th{Rdysfg `.*"-EINVALJ9S69DEl4:_'i@?1m5RHerc12.J9U*4Jl+P?monj!6}4^ER-Ybio/ee4015P aq-\<"DummyiP ar/t%4 M2.8SQ8eoz7Re's]calef0z?*]Z397;0faKS{in 4egs2t-t gofng%5AMdCLIENT:?z`l#H^ "no:"̪mp18\528Az0 :=)I-v:ECI_5MA@MEMORYme%VMe ~S5]0S z}bam:Himes?eploynUp qg\e led + s16#TT- O @760^Bsidg Eil>7)DV!-Bus is a system for sending messages between applications. It9used both:theI-wideB bfservice, and asper-uslogin-s,Z4facility. Secur Fix(es): * dW:-daem;crashwhreceiv wiincortly ned parent8eskbrackets (CVE-2022-42010)zan)y@varray lengnsi|ntelem typep1p`__marshal_byteswap` doesn't procv fdsdł"eign" ann) u2) Fm3 detailbout殐issue(s),lu: impact,CVSS scG cknowledgs o/rlainmf,feWoRgm l<,R&ences:.Tckvn man-rLinux,8tiblEuSysV7LSBitriptv4ggrvehallem0pabieu{sopRDav tart`7ofs on-demæ#of ekeeps tԢ)eâ. cgroupddiupportnapshotcWrCorqtmnrsIunauto poi1 borBns onalpy-ba}rol Mcalso worksdrop-iplacrYysvj/:p overrun_tilpan() funQ3821PEx.C.rytC3680sxml2{develop<oolboxzWHJvario^ndardu: eflowUPARSE_HUGEw0303)Adictpupe cyclesM4SQLiteCthW(ta 3ine. A largebs&ȡ&92Ned%leteA!torHlesk filZ^API(v#*TvenieMxi linktenjoew GrUnBoot Loadz(GRUB)highfiguraǢ5cusY izb:l: moduAchOb# eke '2 su VMhX wa: B\ _f _1_glyphg Yleadowrxpo#bypas[ 260dHlyedVsW\V_punisequ7OvSSL{h ki <s Lay:)!c(;)tocola%ll-?geneI-pureuyptographyko? : r:brH& QttdJRSA De:  Idou&c8\PEM__bio_exD450Dc-GfolCBIO_new_NDEF@3-85@in_ e d2i_PKCS7M6MNULLB\a D(picmyE7EX.400S.uDG N L8ՒduԤF J42 BugHMAC[s ljeb s < 112 trad,xFIPSue Z#214I,na mum1- PBKDF2Xstun,um) almeypTCP5nahf p8ɭ8SHAKEdigesp-OAEP>g10gSSVPLag 5a psizh ,ٙ2 UaI 79.31dm5o-224,38512P56es YDRBGsЙ 5-167ުáQ欘hv9e^2048_ EVPEY_ uw5179.1 N\[0912] - 6or:93:itene routi::n giFlonP bmca7 loca.so.4 (3.9mHche um need3pd6584 * O oca!,yop{ng_ EPl2(mJ_sdu2 net/bluetoU/'.c 56gs% do_pB_dvecskip_spa 4378QŹQ__nfs42_ssc_fs/n4c ComoDD  ~9~NetNvul1ftbyJ )py_vla 1[7 Qi2c-tiv 287W 9.0: LTP T+ 8 ak14 ShirdapiFPl8280+|3308d1  NMI watchdog's LPM5FMDSERVERF::dp1*&K oa$127Rqla2xxVMe-FC: WARNING: CPU: 0 PID: 124072xs/scsi/=_c:70S_ɹne_tn+0x25/0x30 [#]X Reon: Kn Lvo T4+cAH40 USB-Ck V327Sc r U+al2).79E4, Nx_Gzip: not cdecrI yšun(ur7blpa D. (FW10/ DL MSFT, MANAET PG-9: race."CQ:n_ipWRfixb50zvPCIW  Vi-MSIB459BÕVMploy# FgsR~F93'' {5woZim3#Kbs390x gL881.RH3syncWupam v6.0K61341CEEphf#'i?ORIPI:ns_q_unef8]p416 :Ц2535py3 $tup"sa co"g en sPBXbu t&" at7^NNp:*d(ReDoS`_i!x.pL$089G 7t% ac! b^ -ore g3gupe#'Il ex,yl dynamJdl.#f t0q #XC8$9o/ w޴O}7#via fVIDNAo85064#C& k eV&-dump1 re/fs.su64xd{ fa a l9%5 %ua ua"V-we V >e LuaYfrt d#,%-a7kua|s ndd&Es;1,94<1_umldo.cSa H?fwld357Vi"Vi IM0ednj d vi o$vim:$5ret#qu}XCheGC({702k'GNU tarfsaveK pai"in~vOfro!zj:$VC_he¹g! yt8O) !nut 53"Gnu%J  i^gormsp\ch&,D"s-chD1l(Y a4+3 CCMgkb,miLfs93j5)* accmdl [q]: E izYle s1elf ir;0cC2vov qun_ _&#!ALSA: pcrMo:rwsem ! s n4tl_4 <v UA 6uBsoftTupTCr-to- a26/P9- zfc+\mi Bs nMust6t!278&1} _v2_eU7eO3" /ers#pu1 fys skSaIusr o쵠37%dd%Q i^x_-rtbug:] &circR u(&n->_%->&p-> wai860CS .s _@bal!3 di_ }+1!/k@) ]'*#k K+1gpioD8set IhR/* E59  orvs'swiotlb $ infidenL`7>E((IBM ] FEATbEQETHgn e.'l6%l_ SPRAMX: I nf%DO85cV:+1ydDF5 0DHTTP, FeLDAP }:0{ 239& ]FUSEA -prppedrobu7,xY pth)m()_`)Sambn#-s3cP7N!Me>B= (SMB +aCAn2Fl S-(CIFI+$ j PC-Dmachm#u,]ZP?C4/M(-MD5k!Log16 dakb3  2UG[##($_C)$4289-ul| rnULPT,4" TDyjlGecubeyondcon( AnchZ1/34[p c.,F,PUT_VSCREE FO tlz@% OOB//*Z3365 M !tty_sA146 F,d-kvm_mmu_-pcgvaF78 ~ p| _-1`/1>=W88nV: IBPB 9O 1Svr"y11G%:m%"_ C+/D Dxfrm&be_ s×/n0I o%Wib_nh_mI! ipv4/!stic34Ȩhu lYo_R mm/'2> {6_re/o<5 s-3 _af;'P optK KIG{/Nű(cv_aclLP(6* 0Q_ptSgup.c+usokeuy\2X]~8v8raGal'is$Y|+l2tpE o: _i όdgigmiY_mc_]y xo,i 2-qG 6 IMA,15usb_8~_~_xm2/&* 2JnI:-ndro>T/KBX4374Hn&mn _r gm ^VM_PFNMAP /s (oB91¢flush5 :misI 7KnV_PMPTEDm{oMt8vl dfg8<1__n0 416**f to on_vmareG270]ss_(wirel/1 72"B9 Cj_([^&beaco)n P2P-P:HĢ/ n-r47 trc !Cj H*9HrawRp_pf@ 399q_g6D290G!07hostn/7it/=sq3-119{Tce63Q A$@s:Ҥjc%TiE lBE, se.RAes AedZ R-"atC*;%t; ;()&! =͔:AJ$ J/C/shmsym`F11951\I1Ycha+ixok]-P, 5LQUCa-ggeb!x>nJ n35P>fwR  Je&aTNB QNfirm`n: ad>)ce(KDC)7krb5 (1.20.10163b[8 aFR S4U2PV0-x*4= //95 _/C H BL FHbfZ?UNIXm'he0necLi!D h:=WS n$( _B()'J3O13-cF; dp7-7-arb aHh\s DNSomUi) ss Volkav~H-a UDP MF~3206F %rlT.ae JnD43^KP-kB$l&c 6{_r6[[$ xu~u_gvGZynXZpo _ /\I#\Aifasil  o<a5aCY8@B;F?I[IV -0-AES-XTS 64xV ARMY12_/$ 4WW42onc{Na>@9586W yeXordX RXi4i@L G@o JZn6IVSsl\NVCd /I?sa?-9z@```_lgCl!+fip(F_Ffs_$ XB eZ ( +?M@VE) o)9Y o()DHX ,r3v^&rFEC__O0(R__"rgLe_+ pairwio=uc-4 rZLDHTOgalwayZ^llb=2Ab;pkcs5 j}>B11Bb>GEMBD&,W V>=itciǥP4q/_'jt>sm as5dP%x9>d > 7re[i&7[_= CIPHERSbAH9,396r[ Z _YA_cD{WPVDH@EIC2e4FC[5.n]pFWb4m /1 <6* 23.K2n~zed qVj0$5k'rFS-H15H[ "gi:6_sl_)_xfIN9NH8o_+gI52y8 % qAQlA=- (Dg=768RPL-P IOTG/ S :Dc85ag:to-R*kPTl'!172jBUGiwlmvmfi0Q"hF676bC 9yqck.G9m/7a0a36f2fd6wa54afhc8Ae9b [99FixQl0unHe}rekvmc1Y t1”blk nvme/047aESl7Ohifar+esr&7y3l J2 h s`70[F]: t& Ri颲:1778eM\Qeo$ nlock bef4turnom)_treeOnnܥ904x86_64, kdump 2^nelromGpanicg"kvm-08-gwt25.hv2"_10614)The "l'" utilitya textleowsthatsembl"m", bull# us movewardstfMasks!. Sido]nokad8ireFputEtartup, isos quickn(dinaryedit. SecurFix(es): m: crd dataTnulw -R" ANSI escape sasSơ(mCVE-2022-46663) F0ailbout5s=(s), -ludt imp+,CVs cknowledg$s,o/r{D3,f㤩Cgm lis,R&c:.Samba5kpen-sourcleAServiMEB(SMB) toco+CaAInttlHymLIFS;, which PC-pb1machinsbpt%ou-s\MB20ckeignieDcwhen$= d"0set3-3347 1otrushiptweeGis 5s5 mai:aily23600)LibeCf7flexHiguralibrors!mankey=2/. Is snippetsdift roriesibuildsfKBit:ck-baseXr ovin_Q()7/get>t.cx22652hxml2dloplbox=vi»XMLkndu: NULLnr ma1upCojxTy4848 IHasho mptyMcysn't* `i946I python- s`pa deaedake HTTP 9easy et: Uni2d\leakProxy-Au)riz4hr2681 {s9e1}] vow aRG ss , FeLDAP}Z DN$ dc m y³$ImfpC fica[ V 32 VPOST--PUT6Ro |3 !,!anyds E: ipvlan: %-of--ndsT Uu(eaW kb->cbvG )Ocls_erS[l_ _gen_opt5P5788QKVM: /mmu: e N_f_faE N 58Nu B po Cdo_prlit:/P0[YS:v2 T mgcblL <199<O SSH a supLa ,, UNIXsvlar e  bo!cli_^ ssh:motbdx*m-agMPKCS#11840D-BuZsenm^sX appld:I-wBO urvasp-logi,4acdW:-dae:XP ure4a c=dri^{bled49 subscrip- rgrams u# U4yBos;oetR p5ɷ: de yaJ ofb.k.RHSM1 ftOaly\ 9 ! in!UP!p*rp pI( throu-Get-Ydmt Pl 64 Ith w BIOExt/Firm7D0(EFI),Xp4o?/DMI.isstypinyt}ufr,namzsenl^, gZtag,(ɰpns;-bo% a9x? 63_f $ $ AicNehwmd: Cross-P'L'405934VfoYhay up r yt mt:(5.14.0) UAFnf>s 0kup_globGggy 0hbl dnonymEs0Xb3nt7nf_o;Hina ca hjNFT_MSG_NEWRULEx61x/sKJwpon(b ploits 8c cf_cinA f776nf7ie reipipapo_j4004 \_newrul d]a  BA_<_CHAIN_ID\Űy1y3īݶibyid1248O"-aYbyte)er_e4001Vse/rMSRsS3 s*Q163&bypass`d eSa Q110g[6 9.3 BU5"[SPR][EMFHF] ACPI:1w5up+ 802[D"TM!!j"WD19TBSSwi'VGA/DVI-CngsjrtmuH MBibwok)uein "3_adja_p1*21 AWS ARMgs+DMichif2s3!.xadat SEV-SNP |!>LU# u ne b)blkush_m562 'rq-x ".\70hf)bz2069//ral;(reg-suit )aarch (s[pid]/w )'d392eE(FEAT] ,**_pn<HWP IO *s3,l7Y- New MB,AMP* C~ Maya}+aod)X896XZMDRA - Uk Ge  Add5 -+1#r'w"4 IX.1t er 6)[a15 Mie !&Ovk#__dupG 2603>Meo y p!#ct E 6 gp C(/ʬ%;),Am%m)ڢi s (nscd)y mip,Ho Withseqc  l$):%ld.*aovge*li910QS$ HUgQddrno-aK527Kpi uPr806Baih_i@ P[$pre3, vobj1-znQmlup*u*clTex Q ,yY1l% dyic, ng. |?yllC.Aw W%: TLSMke0217&ch%a&p*SOCKS5pxyq85Sci jnu8Xnghttp2 , 0T pP" 2 (/2_/{C, web?vul3 tdDDoS1_(RapLResL448#C sus. marF3Tf%.M3Bcryptph34z$iI< uthCcmaԢI7igitad E+aW$7Q4 kcs] rdos__* rc_ 970Ad(Gm s:Ҥjߤ%Ti;leF7 R NomWkedb;tGUa cL]of)qZma0( inK0 'ar, , gf, , nmanTaLf,z.pm 2lin]  /l)_bfd_t_geymbol[_))2:>r:;.ac4rol2soe(R) PROS?Wi)WiFi+276;A\40964\,meisma63<ʾ9vR/in]31]2RD;A.Pre3{";v056H807 ' n2# =dAcC*./!@/@./3424o4m6x o?~*C "6ty'PyCA'I  i Cibv6|:via2 l2393BeA-'C% Goo>!QBy[:c(9=_' _me38468<G%29>?4s26teC ] -GNOMEs?kFyn #g<0cms @,#: GVaGaf$-e t*\"i'&=9 Wg_vX'swa(t4&ime n9Y  )26ide- Dm E''[Y6AK7(--#Mn zword[(,X4Tuser|g+2p oun:ºE1" ylZ'd(1)QY46B* c-ar@fFaeKchJsDN DDN ) .4re@Lv{API.6 /(1.1#)A#103! 32%_sq ()+misy?K(^90 aBaUnd2in _ )3112D)Ficp;0KnJ#fIDsQ&Q oToo.CARES_RANDOM_FIT/R*) mpiF\ :|=I, >( 0 to.=^<)m re~Hpalg2hmG,6/166Z8:i}in_T_ 28Q!}z!43.9 (.187: 1PKKy65cE07$5*=$ gR?GNU Mr"& arbit p aes,sC};ff# o )H4l0 BORCs1-4^7=AӎR4@s,(4:.6<1x 1isRox:R@aN;-va/m!ze`9E6<]>qosnR0/Ki(v~syEby eBn ~n-}chI4S6s/Jin une$0orm"tPsV weeachֻahelfa`hip 1y} # buceD(KDCIrb5: Den^8Od'un}B 60`hPdou=' TGS8 c3997AlLQa "TR #wpP,XZ ,GgL nVt[,TFOvm?,F!pwdx:sAH4>s5D®K =shed DW198= jsmbd }4to& xiNC@QQoof96)3k6 uJt5 d-onn[ b]?9R"rpcH" g!d Uslee)76T4D hz)'[cS@lkl vX 5~ANTMK{#B- (envideW 2'GrUnifiTBo>Lo(GRUB)Ʋ3lyfigurablcumizb:l:@aprchcturSbekern '%%,`uVMhardwavic: bypass workX'fea` 001 nutl!NU TsLayhI(GnuTLSgCEcryptphHalgorm]ocol6SSL, RD : tis-0SA-PSK au nt$598K+fixz+:4-0553:reefjeT d7ibutruJ67FNet/kSi"(NS k . sa pelopmc-enndij a @nsvulneMin?aL"Tk?6135sudota1ut ows  to= FusersQpermisy,ex te privgomms,oXC ^ purpo hav]oga BugREncH(8487: SdoT escape'rol in0reutpS6SmN42465NT Cu ,Reg St V|sOpenSC/ ismG cws.Tfocuse" n Boper zirq, ТI#d/tal Zszj=k c PKCS#1.dM92 luggA4MO (PAM)aAuplpoAIne oi @hV H.  *m: ImEpHost e IS in(_acc L oACzB 1096  P Linux!,yo K] pf: runn@kw41009)IUSB:ia mos7840: crashhWumeF2244Fcxl/\--fret-of- ercoshutn_50226tu  %s U*x1lectMro )x: `scpt_``}-jarbit,sTd 2336)si5sanz*`>_K` meJ/ cre()`7p7)<net/smcil# rmb_d2 uSMC-Dndump26615block alizteg-zero befwriitmMai385ii u ur_- __fault()V499VT: &tx > O5018O, do &eUn_"ctx hb669l: avoidtundSq$c_pkt_len_̩[ UFO\9nfty~:Ӳf!lSkb_=}51k qVirtuai vironw(v ) 83~=quotthK 9287)[ vd}IPv6ӡFuxe 1168v tLQrh W T004\c: 2 h[X 3 ssp;HTTP, FeLDAP}2 ~j8 exploa mixcflaw321SH ]"a numbe L? UNIXs rIt7 %bo4Tsh(4 trat BineP@P(BPP)87*nTjr via vmehP51$ 3c Btow21 null-ptr-deբ__ eZu2739@ AdPF_PROG_TYPE_CGROUP_SKB:hG6l3LINK_CREATEi64ivaBvrrin# afe 0 fs 4D ttr_s. ed  7͢_ube_m i_k"_Ĭ7675sdiv  ;988 arm64: ysO movrokenR (D"ral) eV5NxfrBone-*inNO11SCOUAFp_soH25HISHisHnKVM&SIgnnCR3[4:0] $-8IX t s lkexhaO2-0480NULL2--8966221527546 257 8414l\!kN2_|8r!b/#J c459a _!sK*"_ 604|GC'.0 ,unix_6*eg( ic()o31hO\ zp9Wroup(),&l067)ev '_s!u9u3F C|6y A Dtn,40Nird,;572K;dou}8#_cLnvb9W84HCI: glob )syncd86Sb"1e!pUARTSETgTOIGua$tty_ioct*3fH745y89912IP_CMD_ADDSWAPU /k"f&__w![586Csmb:c9 OOB/mb2h8+5mm/s1Vinan ->u V8$Cc&teav#_pe1dic28F[ ?A258V]dge:#/in - "_h _fh)_fW2hƯ78]/:DETH_P_1588 dP ^î0Pi: f _cd& l,ooo g6CIFS jDeM0I,V$CoE*Vyfr:%_ ed_*d&9u66a wet &! 3LR#X2g j@sG4֔txx2u՚ lxswp ru0l_tc#F cD3Ki2c801mp@-on r 7/mc,pucvfsU,-W unNd?<*y.GdestiR1b1<]&DFa"$ymb6)`Q1076gHarfBD-e &To$iFMhRbR:;O(n^2) g#! conE9.:Avahi DNS??0vB/ M *t#Z2CCT?iT/It B/atddd/an7`H~ -ab?|le= HC2RK,/no,I$peo tot0O٣ fi harE~ A k"Q<S~sM"(:&g"d"-",h$aT -G9 '-E"y "f1AES-SIV&z /a 'D;i=-emptyocien+9 9~Exd  ntO;DH H+s2y:4 OqHN1#!Ga Xly n'9.42ore*!bvN9. ;8ÎPOLY1305 MACsI- PRPC[9i")p|P23;'V -N=&P--8g,ab,b (pseWJ-)#*10$Q$caes/ntfs%unMce 692]N \8AY F-H Mn :š70/V7LSB A C?sXgrODK?p, RD-Bus?r,泌s, o&;39#b/keepsA:fe:2=lin316<l s^! >30wpa> d y80_]3mglruI-u1>e2\RcacheB92B[EMR] [TBOOT OS] SUT ld1gonSps9.2 TOS O>CPU -16 ^BUSYɄ6$F t - NMIv+E30Eg0:6f:00.^PTP getCL l[fm/I*7dhunbinZx/O664$1 /V[ "13@Zl 34^ ;inEĻsm7S0R0.91penXt^m+NsglaUd 4F /<p),AmR7%mXi:J (nscH#p9$otWo$seqv0 l ")_;Licgs 2z}Or2-CN-1 9Se<F335PGMuOin) YY2marmB0'lVrLZ1Zascs N03 K#n-[g4TngDv$ HypkKpV (X/2(%{Cyp8ONTINUATION N9sPSP18 4 K](U1 K S8r+ K KOSXf2487' ipv6r{= S7 Ufs:F >9in_br_ e_0 S89 #c-aOdefi|hn.___seDJIRA:Alma1-2894BUG: untfe faultaddrcf16bf752f593ff8 [aTlT9.4.z]k35672k[HPE & ]quQ mergg icnsl patfix6220x9]/ 4\/_de.c:51!\68: DPLL-ݡ71)CNB95schedpda(TCtm v6.y764.IPv6: SR: bemXS69TRFE] BOt sswapuo U825#IDs,uwsp 5Ogfun^8  d.ۈ595ީ]autoc VFbetTx MDD nt9083MC»REGRESSION] N bos: brok'z10+ sockets495ybnx2x*1 sh PCI qe,s | k432  aff0P 409' TIPC m=mb$ =ilb688 e7is/c_dsaf_ c ;array @ f /ge_srFby_l 548ā cw hclgevfnd_mbx_msgV9v memlap whenlecharbuf,Y2-4862j ca"j1939:! MadlchY#_s_rw 3mm/vmsfu+ akeup_k\d[w g zon? dex 7ns Us%bi,eBPTP WQ xmitb on ckocs pulMm' pÐ85B f_t usel  <ze"Sa| 7avmw fAd tag cW435e;injcriptehavior) tcpc9 _Q__zrcp_twsk_uniqu.90 ( _hmm.c: src_pfnc \854Ir8169bIu RracTxRa`r givcfr#8841^ytxy iWuf. /s2isdhv3+ octe0x2: aoff-by-r7y sHpaO95blk-cdK io 1 663z  Libndp (C NetworkManPr)Eat vi_ , er$a 4bDisP alsoDlUi dp n&NDPYl:9[r< ngfield5564t _ firmwa| 8e B$. rT  eoRi'g spTm sb*iize3-31346Comm (ino (CUPS)- Yp*lay( c: CdM*nbitchW 0140777~2$ 4dpkres,4032'b k ull Ari) l.c ogictBz{eZgn[524P 4w ngM= IW 5_1try_b: f m U 7J bp acd7 _ r_ cel_a c3 dm:6{umf ho YsuspendK88ip ;ip6_y_mp ify8USquNfs nis&vd uh8^98^nf  >s } { sepa^rs[(sO3UicmpSNULL|-_build_b!58 bbigeirq;NAPI ~s0Rsto.shut_nĚ8 scsimfdfc_l _ptp_ up8Ghc_ o Īrx_kp],`X5`pRel} baef$_l _þ 24]MovPIV'@unregistto#n uph5*9o$-xgbaunde I7e: bXer"lifeŒdE0/ph6mipleaws6808, 706599e?:R2awifiԄ97Ą52451ä78¤4493794122r6igc!5Admaee/idxd,182,R7419036,"5ǂe!6sw#eep$4<5!91ŭp׺/x86*6\i40M602Ÿrtr0/2 push hg-239 l-t sc,enh xd ib~i=%5v+ 7^N;pa/ .H #d_/{,n\6345(f*f _rb;(skip  v/ gcz6581I;t_li:"figuI I%elgegd6vfio/pcL ehINTxs p 1 ._bridV  %/**so!xo*p.^%^rmut< }gcq_ͫab >e25e% -#__nexpr_lu!t7$c;b19bSc:i(pe\H6H:rm cas3epa,mtackj415j+l svf!Aa 3xA~ diL"r  gR*ba$h#onl7l y4ecnOcoc'OX]I96v aLAGJ)deYyY*_vf00  eTmP:s>CcS ZseeR RDRANDCoCo V8J%=tlbLF&;Nv;SiufFPdoas_ikspli 7pt_aS\Gn-of-b.sopsê8map_Hc7in&_'Oxusb-storaealaud:CG\AlaO,86ms$=Ÿ9Vc-EnSpied6 N ŗ5+xhHt EDѲ=%DO-=$[ Bi'_]ETIahF7lai-as-LCP but aaOCe" V{#>Ln0t<_4_}BD/MSIDmsi0p@(67x6" WARNgx.{_mop000.pr6gN ro% JƕRe t 4;2Is10o6 isB>or-mF  ":v c=<'KXK_oha vpFX0XfcEfi: d?(% vma ql is P' ) hDl%&(>P/pf,M; P v _I*]v% ~$ V"0KSe * gpioTw~ w_2Ieda:Y4YW"f;i fPalA & -eCL; Jr<$cppc_WJ2_&, wx&iJHgLC274C-L b[Bechr/4cQcy3orKUp()T)á75.6ec IGZ:n-_(r}bC4w6HJc0h,r ?WX(F 9 5 im(bl"N0rU cil,ah Yfig,p6 l2$ tartript)pcmJ Aur ] q: unau rizHIDnPn s asP rokjarbitcomms v 86Z: AoT AVRCP IGpIVv df Arrs IndemEhV! 7vp ookQrt/vt51596tOBEXD-of-,rI `4`aLavrcprse_ma_d2z2ze3{89{m_mQribute_s4n0nsy2(44431^0`t29F-dnss8|at sNDNS3definZer symbol c&taJu)yP,chd,@d op=  &dhshtubQsol948G tpm2-ps5(set "+zTruP; M(TP2.0susMsp 9:qugo und'y5_check)Q4Q03Zpcrl value not WPeTCGNU nano smalfdlext E: runnp`ch`K own`̢2e2 ;ZreplH-rgyU#o^6a r -k-A5742B@Bubrw (/usr/bin/b %engun%derEworks,uivin n 7R 2fpak  ssboxpnt= (--)c4247d5"V:cDosa vD tr_"le  h !s\623[ CUNIXS(CUPS]@a p*lay,Isimila~ pecupFppd:  kredPPDvKerberosnet e\c. yourE? elimtn-_ np*8dsm/Jun.Z ]o,eaH helpxx <rdty,"#)Xce (KDC) rediugc3(RExpQsyXML docu 6>eN: DoSC_ResCPr 060B Tu !  l|txp:g almeldd dumpå(422mSieufuRequiri al_inve_ ]6824]mptcp|7 uaf__tiU _d JsyncF58)&p| /auxsAUX0<q71RDMA/bnxt_reGaE+  up L( -2 PBLM0?!mlxsw:'rum_ipip_me$kee6 eIPv6r4 d52uc> ?ubcain&_rcv_ _adju5312rdy b.e .y*hronY R$lHrro.9 .Yoi aRbecatonly[ifin hadwhol. lsomirror LKdfo㱓UZtd S%Cont7157NzMr8 1>s,^mp{ oep :.v! avaY ^ spUEK,rel0,bbroadb(WWAN)APPPoE, TVPN g etd t+H mHfoRoutm KtBin are5drea[aAl2-9.5.z] (JIRA:X-730iUerWstoinu#sieipv4.'e-%ڂ1Zydo@\-rqsg7g3661  H%opD GipuM^8ff؊68 h /dcDon' pK()eqsk_queu n}(= j15 arm64/sve^ih* cCPU tehaSt)i40Rfr({nAl'ntex,#zip2Caly',-qua #> Jbodalc'pde4(hEYh'#:DxT(hd-il19900)!T! '*sQ b ep=0S5-#PBy)O*Qoymk(o1di. O 718kEdb}v_5P.i#EAwLeGt8~lhm#S51K&) W/zgets1 'J 6Oc :keRCUAtigmp6_ ()|2175'OovlUAF9_dey_,nvZmovdput+_upd887d&atmiaf[!H!ɬ200udfsR-o' in*_f_X2-4982vmx3al&a izin'_pS1_xd37799p#PTra:b,in+*=,%7,Ijqltwenflex6Q-l!JSONEY =likdF" . You:/sl,,p,ns sctuOQs{#!Zsawk, gw#DF/Rf $ -jq:ha-ig# e&+Wjv.c:jvp_a._2333hOASazNo,j-Xq_fuzz_"Sjqt_vfm!8#xml2 dhop "a5" {: He$(z)<D*(97/WTyYfuL6L IO3BuildQN,OLbtB1ok6{4) x86/:/< -p NUMA 99GL.=s b<k mteM C [-GNOME%loopD,n l; ,unդ-V  xg:1i__msoY525}E$$dN9Z9$Ų:"9O.<mii_nw re<+6Z/m :b(eo  P 457/% ya11 SQL2(7n ((ba0. Aqubt&92N<ed%A!a sk.!APIB*v ǫesp N aga\"enjo&powerJEn 14admsth<"fgx)D ql5 T3s i 96"rnL|34Uni%GICUQEr ull-fb7!{icu: SRBR5::Tag 52T&mslUAF x&"atrrup.APtJ 62"Wrequ1 -; H.(rcials*9URL-708* SkiCIfry8gUHVS_UNDEFINEDӡ9~C +'p y 44eZ2/ G:l-ish-hi y[$tp_&_.ver928+_Ycclb)5 W[8Ee{'"uoF`6.-53;x{1bDqn'_drve2/e'/vmw_vI:foici_host_do_m!eB_278 pPneas Q qGi 7890 tiZ R%_a _e6ne]80\0]^ ztap{_ _*1+7nO8*SSL ki=>o s L;:(:)T.+m(TL:t~l ` jthPPy o FC7250(keLcH ,n'trt*S_%9T iV {MB241! ;b;SmaIDCFillN^Tn6Ngccq [ mp rC, C++, J/, F+, Oz!CAda 95 H30i jUn@?O<~ > tar(HTM9s3t!OMj$3,hod0-2No:O XIyt%N}g 04 [ K :\if_h -_pi7P# 12k#&?G2W'bpf,6_ _skb_pkt_18=;'dR!'$G cxIl32895U tlb[8MY<V)(sp,+pufEqgYS1D rtw88[''C"to:"R Y cQ3]]_N flushz5Ai2c/WwaC @PH3$tTl! f!/c<"sorIL473 arv]e p 6$sev@a7KsLT",s7ioISO 9660 CD-R im. L #{ybsdt7)(*,=_Rws CYY񤄦poH )Sskt* 9? R>at_9_Y_^Sk?6&K ..U59%D5ҢFpioU>Zo o>583 dYIapHbR?@ =  HDelay putR6c->imldޢH55B( Qgdata types and dynamicing. Python supports interfac.to many system callClibraries, as well.vouindow_;s. Security Fix(es): * p-cryptography: NULL-derefnce when loadWPKCS7 certificat(CVE-2023-49083) For more detaibout the sissue(s),clu] impact CVSS scG cknowledgmento/r reldFformation, R pagmCs,Rs:. Tgnutpw8rovide4GNU Trans Layic(GnuTLShy,?ichle oalgo9hmhtocols6SSL, RD : Vulnerabilnn tool p:rs~5-32990)NSCT extensiJ89JName SANT_I8I po< T_$_figure_common_cipdsuite()\6395BugQoEnhaP(3dBZ#235962+`F1)\E2l53125)PKdwc3: gadg^checkat evKudonot*ce bufGv7810jdo_c;ge_(ܩuse "n unmoed/lours s]8498]s390/sclp:<$CB;es>9694)mmig: fn8D"orrppdN724^*fil f_sntrcrashiremovaltuninitiaٺϡ2yc72cmbli*Y-afv-fre cifs_oplock_breakQ527Qctline ze\ongsosT%_rcvK71hlAzero-ordsd{rx_8io_/futeluure_waitcle up lyef¢-y8)/keyslab-<-of-b)d3_task_fmIp4-50301KVM: x86/hy2-v: Skip aica^ ddSsPV B flus835_w : ath12DecrD TID+RX pefragtJerr%E761EiputFbas fowaworkI Go:x govnlowf4896&Vim (Vi IMed)odhz ver*Pvi eds vimh gpa| raF.K5 6),i-*' HID:L ardeC32ton(g~s n0 bib 55T pol Fwemi-unrrfD614DALSAv -ao  UAC3 cHbsescripÜ975ID qiv -6e EBUSY l 37Vsshba=SSHL. It caee d{. serv lr B:  sf l* nfsd`n't ignU^rFrnedesvc_c_regr2firmwaDarm_scpE _9yab gn!9h\fŦd2w 08 unrpc ysY zale71K?ƣWK6fiFf*d #_dpa 81 cfg80211P e:p iQ_# a_v ult`49csiO pfc / rdcdreiv]1)ipv6rMAC #isrbjant-tim:70UAF/GPFgnil~mdt_)trol36%x#4+( l via ex@vsoAMDHcr 4-3635^4U0vjapAdd7di\ IBPB m g4_* : )pot% C$pxra0)'283,so qimd-dMshameykWC,WB&4668wSqucsanrsymbolk~zeF74 vbeenw icelo f()&]kŤtd"in-MMIO"$@72 rx]>aĢso}sI/O c4-6iG we r heduley{06Mm_pcdd H_cl _(I?in /1e d 2posix-c'dspec64n_)_s=m 1~V>cau_#!M29o/rwsSNOWAITvO_DIREu#write[305a6 4Pir%/vKdc_queuEG11VMX: Bu0Il PT_ulzgu1/ho mH)hiCONFIG_BROKENj3xePX3t]YsafejulvvetI6Advis4 s2 sRDMA/rxe"sqp n reqG2&bafErq@lPttags 7 easei Q/ o8icu_Ĝ16NafdoZ? d skin_iG6603k-cgrou+R @cg_unE_onH7nfivmoc# R)_(_a T6Tbpf. chg/FhRCUavLj1939_se_newMkb2  xX4XU pX C  l$di\ =%pa &_ +elj- p*+iowqkill2bef:ƾ70 rtcH____ wasz$- fulZr'73jput '@%gM&is 5 deO \8*ig/" invT gb__ul233pvu B?4zed5`p_vsfkd3689mp?ximumshtableC INT_MAXZ164!2Hkd,(bulk Nai=s u!a D, bfq'wakq_splvR3zLK0B~gr@  M zswap:synchrze\c "@ CPU\tQlugc9caLWD  ics Ud-wpE/P Um#m ap9cpfifo_ _en 8 etȱjt$$==TU| incKBo 6powe /xH$Jicp aO4:NAPIom d 3iuc99papr>{ ss'0'd_353v |MimaJ!@N60 l/dVdi3+byL DIMD \s1b œ26a1ra#_m uî4/x%bmap >BOe1D G m-UEFIL e Bo) T2c 8X ta-ar$ ep->rdl%#8J h)=Ll.=In&:^ap-$aenp-thgh ,l4NFSL# 4_shut#/n_ bFSea p/A !pm72p_:_r6Y44BluetotrtK+inup  79brcm cT r)cWwlnhy_iqc}! ms_nd80&ûbc@},_z(_bo_naC7 .W=mlx5PicODP &Ɵdrm/xe/PTP Uk495hidmaQ_\by{ jrtw8 1c.l_hw_s le/ 7X`mt76925gl n,vi 798`I%'x FhOPPi x]ert void$ fu,ıadtin&_[_Tto_vi acl_/ aBmLogc(Co]  E:gred?vrf:Aul3ml_l3_oWf te beuEAM_OPTION_TYPE_STRING &]0xhw2 wp2pZ3ūvxlO _vni  uoff,17c6ip6_ads6ASoCOF[ thda-daiDAI18/®?LG @T'?b8 ýX l.[.weightways<+-L80lun%_buddyj. 4颎pm_p_bw_* bX( ;a61iwmvaOd 'tp'@( ac"1upSTA8 Exy 2 ify \v6i/kv vcpu7 81xsj IsVofeld_&54OZspso H. $c ]!ra a vh%VL8^ "xe_0up+0x12c/70 [rd]" ua:DR6QeLye|._ru*loSf*_ lypy SQEs at z}W!6soft|L r0_u_ j64k_90ibmv0l& sen!o VIOSOA4N"n:_h i&_med_)%d 8D +holz3m!8hE-iCc nulf_imsg_ ǶtcAdT"'a'#!? r?-dstX6ds < r]M t:, las6 U7mm/;8i S; f."o LRUH 5pIX6, :op+6TfpFfp!rl1 8Mt_mNgeneopt)Bf onƨ20oa @hea * 8 c disp 3  +14j5$ke_k&C$(B$xim LSM Sc3 & Y&A=]jsp&֤n\ 'X ,WAlma&R NoedW'grub2V'pPC224GrUni daGRUB)Yh n@n 5cum٢b:l:'r e ". EbREetyo .f,"`E,&uVhP/L K1!:-5/gbxg l HeOOB W.457h C8)D-8; 1gI* QUNIXwFsP,G9ana&us{nd . 9::*|gn_WL/etc/low.2 ldǺ romi4!433ASQL 6C 6{ 6(b`e/)'A l~et&92#ed%eA!to6, ]*iskPEis 9$4niN ofiq6Q(enjo wflexiL -kadm[sthp44sag S4 sqli"CTiI*sH988k=S:Si&Daemi SSSD)Y$ 6d'PO tEW*ori7nuthent!sisOI2XEgLScNSS# !P&g@ A[MC)/ PAM.0tPwar< iJ-E!#-8 f[t b' vs] Kerb!3w| $legsAD-joi3 115COpenWPNki;=d$S2sP(:0QQ a f6-Bu--purO2eQyQ o&RFC 3 KEKawra}9255'6}*slub,5kK+|e,_ {|ADs QXMLcu XeK w^Z3U rigr mV/(sq1 b+³937Vxml2dlopbox?4f|W xslۢ1 ife =6a1&Dyn9FJ rfin"/.c&'[%, P)_l X0\*#i BnOC7A9 "BfOm,!1e1000eDh&_eepZJ&"N,c,u$C9OCl&t/sk(sk)->fa@_rs(? 9R)*MGMT7s~+%s?$i=$u/vt-disKV ty %icoh l^%40058X%prxamQԤ.6P40pd  rhad-vr V7LSB !>J a ggOD7# @R]uO=RD-Bus actE= X99Bd5dM :I3D>kK4_w92F 9ic_p_G_noš)N0]:>o<DExSyM*m98mUAFs61 I7S>$Sn@fE[l0IEx.};A!:!"_n;sen__:s9l2I'pRe SECqD "^F8[h9KA$s?7i V&5?$glc1g(/POS0Yp),Am*%m)ۢi YOL (nsc*uy=(nm W-fqL@ Da!c#_ ?:oaCgE'siF5|v%URLfedV0ub8"qdom H93 8r/jpegX8JPEGL C8KGs/RAMi<=fP#P5P(]9Zf96afs/:KE OOB write in the heap (CVE-2024-45781) * grub2: fs/hfs+: refcount can be decremented twiceF3Fcommand/gpg: Use-after-freIue to hooks not]ing ]ov\on module unloadg5-0622fUFS: Iger =rflow may leadebasXut-of-bdswhen hlsymr77rrXshQ90) ForrYtails ab8secu5y issue(s),clud impact, a CVSS scG cknowledgsn/rlainformation,R pagm lis,R&ences:. Addi al CAges:֤nc'Xise,WejAlmaLinuxR Not/MfromΑ OpenSSH is protocol.lsupporbyBnumbf z, UNIXthtctx e 216 M : q" A: Avoi;Xrl@ 8007ZtpTkvc()nt/acpi H5Hrtpcf85063:x pPCF$ NVMEMZ69Znvme-tcpUme,yru],_,_Sv_pdu\]iscsi_ibft: UBS hifA1arn._r_show_nicf9vahic ; = S Di'Mul st# ^ZfigurTN7 i9& P ~Mdd/a~ -aapplz{ lug \e S nd,v nw, ewzpeoplAc0prr< fih LnP a:W-AOrPUict> a IDj52616Vim (Vi IM d)dz dsvi ed jvi)u2in< $_l_get_exp4/vp3-4752oExpat}C docuW eN: 3Re^SECnDhF817gv4:IepWbiunQdu756hdm-flagu_bI byt<ea d6bppdd eckskbn'__txmuY377i8s#plHMWa$gmaxh$w4)Us  F2%_sext_s0oni 2-3424q  RCU g_Q _y" 7+gs  ownhiu__udp_ 5v :c'derlydes A0Axsk xp_crey__agn_u5 XgennggH2054Isdotdot_ r8Hw : 12#W#in"_dx_h_Vcap_n@b943g c- ie /)OSIX p),Am%m)ۢin!-cacheemRnsc dmp#| Wi"qż"n/+ ly : c uidc K dl_(*inO$arxLD_LIBRARY_PATHN4802)Uet)bnxv efOb-xdp-!c1(Blue!OL2CAP,slab-ERi2 W_cmd]a dir a qcfgN11:cwiphy_&efrcS7ŲUUAF,in( >mdu( purpo-7hav^o -inE r PEC 63246{ 2 save#>n r'! cp: Tu450A58a VaL* m PorH$% G. NG)  pG3?N3Q 3@B850188o'i ng__#os B6629qCZPA'&inS(CUPS |pp*lV03 ,A t'denJ cupsd.'%om69x Aun 8-A843*P$HID:to` Emt_*up$39+,#au'h _d _X4|mm/Q-f(dVM_BUG_ONGE(PKPoisoS())funpktp:)-NULL derunkpis n' 0P acy Gu 4PG=GP,=enddigU,&T&s, )ia+FPG:S/MIME :I,losdVarbit9D 1H6897cdrm/xM((a-fG?r870`lerB0dvH_s< "main0_7 vmwgfxhFe / der9aga@ SVGA_CMD_MAX_DATASIZE?7#usbhwc1FrI=c?b eonwrj+_CL_tClA 828o}ep)2-ha`ma>osd_ma-\5*G 0>; 1SteC]PF-GNOME?!'2,n  g^4} y 7Nig_es\!e5_i13601!HurlR3:Unne#:mprH#". Uchaus{o64a SAPI70lysIly |H]71]=l[GmbgD ET foZHTTP >4Hs®660!446g~YSi$CEerSt&zU' 1rG9:E34#7 vm_7_ioctl"uyOC$ 3ьo2S#48 p4:2_?$&4OĬO W' MGMT s"É9u/-atlafra)[RXl  30(hc&3F8vVAi32a5cZ[ : or d/6W$upgCIeLDAP dA Cxo0>cWie#908UL!ki8D=Hs;E(:)UEREa ll-A 0r7nEyD .ss6?vXtOughyd PKCS#12#111 qBnDn>xd )}CMS ;:546τk0l&8dQUICo8o m-: V`+ dgst` sil? n o9Qw -a5[WG1.3s?eH ~6619~oIOCv(160a6 {$e$B@ -d OCBon/-- 9 ?8pi/pZmal^21%^%S%`=pon0Y0"6ub< X5f7Ul"c*: Quad L~xml.dom.["d  U-:/ qptc e\y;385aASoC" U@cr_rt56409qui/]yW40WJ: r>` $in&_"_4s_9Aoy[25O JXuxGet"d, %aal/OH=gss-fnkH|H; %6 >: H"pw$mv256-B&U4B~ lTJ ic lo^ sz8ab3o+FaDcoWZ77R, Hm1P2r,u5J) Jl>asiblyIilLmebdsL#6p..def bf>nN. 0Scvy-sb: FP5p#+lG vs#ne5BdVt() ac@irqc1B/gv2 W8%9RDMA/H"KACO: p6_xmit83=88(>(Fn_9N<ˇ0* Ɖ = |+v_@;/ 7.Å27 ALSA(oi 8H='Al2cBLd9#ue_oW3(ttb_hw_qJ U%_6mwCK33032smWm__pne*>c_n#I06 fb&C B ,[30ӗ *wfont#yphNFSv4/pNr/ _INO_LAYOUTCOMMITqnBmark_.}_Geid_g6svcr0( rc_ cpy 'K81X*tX%Xxve799$9'memg$C3~ APW\-7u CryV1Owh*WWRDE_REUSEyAPPEND"reJ/ edO/1wd*$_p  b]yc<#in_w$2/KD$AexFAT! a 3820]D7iin,d)8$ƀDe{ 88-i8sh_„6|8!8W) x%i6-25w)Z K_`V_cg qmc_cl rfx_c505@pV]a O1hEr^cpsUk?b710OT aad>hulb+io5gY30KUY -XG a DF| : )$e(s Ys2~ pǢwtha f[Z ?sssealso contain the mount.nfs, u and show programs. Security Fix(es): * 9-utils: rpc.;d hMivilege escalation (CVE-2025-12801) Forre de8aboutLsissue(s),fcluding impact CVSS scG cknowledgmento/r reeform,ftoR pagm lis,R&ences:. Tkernel pw8sxLinux!, ofyopersypm~K:Y io_-ngol|< disclosu0deni7service via use-after-free38106)Ïmacvlan: fix possible UAF?_ward_source()R6-230Pyth^isd(;pre4, a'vrbj2-orienR{mȩ(guq, whichemoduleclassexcepy very high levdynamic data typedl. supportsfaթm HlClibraJs well.vouindows cp: IMAP!mmein#pusYroll0$sR536PPOP3*P7Pem head"PdueunquonewlineM699gnutvide4GNU TransM Layi(GnuTLSh@ymple crypt phalgo9hmwhtocols6sSSL, RD i: St-basBufOvlow&_pkcs11_token_initFun'9820)^: DVSVve 3sumpKrcertificۤ x1483*DHID: l-thc-hid:6,orr aetI2Cgav"9818"lxsw: spMrum_mrbfwhepdmultst rҩtat68800Wrub2Vs2@GrUnoot(GRUB)lyFfigura5customizb:l:waachit . (beT (file,Zpu9VNh   (!: Mi>uny[r gettextmayad 61662DZfveT q'nceTrsev<l fTtd7Ktar,ioISO 9660 CD-ROM3. uunotybsdtx; c,=rip bT -񤄦pop: ktopKr gR Ani/LoDRAR5rB_d_ >- 411Vim (Vi ed) ;zimvi editor vim: VArbitodeU2 {'help'uv,u 574 n= kiGD.11qPKCS#API, jGIBM CNcs,u4764ϡ5 '-s/ 8\}G58e CoPoªfirm.d) Je@MAccel MFC 49on1S pLD Ex2:0863* 7E=z)AP AlsĔB K3VKsb" a soft ) thatbetO7 i  Sl/Daem sgenui ۬ki: PE:EDSymfk FoP8935a: U; A; F; vulbATMb+  0 drm/sched p1ntUdou in'_'_job_add_v_de-d'ie 4009% e!( kyDAMON,fsgsetu@=yc144s5q ins n] aus. asha~71~scsAJ  : id intNc_s_us__c1Kherrocoi XkT209Tnetcu3 kb_s__caUulQALSA:3 ya PCM triggerXrsyncW en s2copy*hronize- sfX ycro3work.}.o fbeܤonlyeo ƤqAfad;whol)s $amiool K: ROybdsra=negat x10158AOjSSH k Oby$umbu:, UNIXsimi ItnetP bo clI_ ~ssh:?GSS 9#"6dcN34976($J5'^ECVF vun% K e Nnf_tinvee* ckqJri2raMdiuVSIbuild.1 ' ch""C-/webbrowp.Hs' fLURLj451Cockpit admls~/"%a0 1R oh CR log indiagnosre(, SEk tr 7#o cU * : wBbeexplic hIlhes;6>[ = znghttp2cz Hypg{sP  (HTTP/2) n C :malФd M 71359OS Iirw plugi841!d+0" swaoa21aglobfC`3341cp +-of-\GJ442{x E#u51T'ZqMakeZke_e&eO re n NET_XMIT_CNp6%_ltH976qla2xxxU#p/0 p>6874