SOLV m_0dnf1.01.2?yw:WnJ.4}#i5x86_64cvebugzillai686noarch3finalpackager@almalinux.orgrhsaself1ModerateImportantCopyright 2024 AlmaLinux OSkernel-tools-libs-develcross-headersCopyright 2025 AlmaLinux OSlibperfCopyright 2023 AlmaLinux OS1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_05.14.0-70.17.1.el9_0 22.1.el9_0python3-debugidletest.11-debug idle test1:1.8.0.342.b07-1.el9_025.0.2.0.10-1.el9.alma.10.8-22.el9_61:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.13:10.5.16-2.el9_0Copyright 2022 AlmaLinux OS4.17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.1python3.12-debug idle test1:2.06-27.el9_0.7.alma0.8-15.el920.el9python3-tkinterbind-devel1:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.148.4-2.el9.almalibgs-develxorg-x11-server-develpython3.11 -tkinter12.0.1-11.2.el92.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.74.16.4-101.el9 3.el9_1dotnet-sdk-6.0-source-built-artifactsjava-17-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug21.01.0-21.el9 3.el9_7java-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug3.11.11-2.el9 _6.123-5.el9_72-2.el9_2.125-1.el9_37-1.el9 _4.13569-7.el9 _5.1232.1-4.el9_4.342-1.el9_74.el9_75-2.el9 _5.1239-1.el9 _6.129.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_721.01.0-13.el9 4.el96.0.8-1.el9_013.18-1.el9_520-1.el9_52-1.el9_63-1.el9_7bind-docedk2-aarch64tools-docglibc-nss-develstaticlibsmbclient-develwbclient-develnss_dbhesiodsamba-develunbound-develdotnet-sdk-7.0-source-built-artifacts 8.0-source-built-artifactsLow13.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_43.0.21-37.el940.el9_4Copyright 2026 AlmaLinux OSpython3.12 -tkinterxorg-x11-server-sourcebind-libsjava-11-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug21-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug3.14.0-13.el96.el9python3-ipatests3.9.10-3.el9_0edk2-toolslibtiff-toolspostgresql-docs private-devel server-devel tatic test upgrade-devel9.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6flatpak-develglib2-staticstreamer1-plugins-bad-free-devellibnetapi-develpoppler-cpp-develdevelglib-develqt5-develython3-samba-develqt5-qtbase-staticvarnish-develxorg-x11-server-Xwayland-develedk2-ovmfghostscript -tools-fontsprintingsamba-pidl6.0.108-1.el9_09.0.0-10.2.el9_25.0-7.el9_3.alma.1libvirt-devel ocs1.12.8-1.el99-1.el9_43.el9_4 58.1-3.el94.el9_49.3-2.el9_03.5.3-2.el9_0avahi-compat-howl-devel libdns_sd-develdevelglib-develbind9.18-develfreerdp-devellibnghttp2-develvpx-develwinpr-develua-develwireshark-devel1.3.3-13.el91.5.0-5.el9_5.alma.12.0.90-6.el9_17.el937.4-21.el9_74.0-7.el98.el9:2.11.2-1.el97-1.el9_7.14.1-5.el932:9.16.23-11.el9_2.12 4.el9_3.4 8.el9_4.16 24.el9_5.3 34.el9_7.1 5.el9_18.29-1.el9_5.1 4.el9_6.2 5.el9_7.2glibc-benchtestslibreoffice-sdk-docmysql-develtestsamba-test -libs20230524-3.el9 4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.31.2.12-2.el90.0.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.15.0-7.el9_5.alma.1:1.9.1-12.el9_52.70.1-2.el98.0-1.el96-1.el92.el93:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6 3.el9_75.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 5.1.el9_78.0.30-3.el9_02-1.el9_26-1.el9_341-2.el9_53-1.el9_65.0-7.el9_1dotnet-sdk-9.0-source-built-artifactslibvirt-daemon-plugin-sanlockmariadb-develembedded-develtestingw32-glib2 -static64-glib2 -staticysql-libspostgresql-test-rpm-macros1.3.3-10.el9 _2.143.0-5.el9_2.1 3.1 4.3:2.3.16-11.el9_4.1 7.el923.2.7-1.el93.el9_64.el9_65.el9_75.4.2-4.el9_0.34-2.el9_13.el9LibRaw-develNetworkManager-libnm-develcups-filters-develdevice-mapper-multipath-develovecot-develflac-develontforgelibarchive-develksba-develnbd-develsndfile-develss_nss_idmap-developenexr-develjpeg2-devel toolsprotobuf-compiler devel lite-develrepokey:type:idshadow-utils-subid-develturbojpeg -develzziplib-devel1.20.11-11.el9 7.el9 9.el924.el9 6.el9 8.el9_631.el9_6 2.el9_7:0.9.72-5.el920221207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_5389-ds-base-devel9:20200406-26.el9_2flatpak-session-helperpython3-samba-testxorg-x11-server-Xwaylandbind9.18-docruby-docyajl-devel15.6-1.el9.alma:7.1.8.1-11.el9.alma 2.el9_3.alma4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 8.el9_1.alma2.41-3.el932:9.16.23-1.el9_0.15.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1284.11.1.el9_2 25.1.el9_270.26.1.el9_0 30.1.el9_08.0.44-1.el9_7bind9.18-libsluanghttp20.11.0-7.el93.71-11.el9_4 2.el920.2-6.el91.1-1.el930.0-6.el91.1-65.el98.7-20.el97.el9_0.11.0.31-8.el9 _5.216.2-19.el9_6.12.el93.el9 _3.158.el9_5.12.0-11.el92.1-2.el9_34.el92-3.el94.el9_68.7-11.el9_2.17.el9_43.3-0.el92.9-1.el9_55.1-5.el9_06.el9_16-17.el9_6.29.0-7.el9_2.alma.18.el9_59.el9_64-1.el9:1.42.0-2.el9_48.10-2.el9_5.alma.1 5.el9_53.4.10-4.el9 6.el9 8.el9_7.12.0.15-32.el9_532-5.el9_41.0-22.el95.2-1.el968.4-11.el94.el9_4.16.el9_6.28.el9_7.17.0-11.el9_7.39.4-11.el9_6.16.el9_47-4.el9_7.10201107-6.el9 7.el9_7:4.9-15.el98.el90.3-2.el9_6.13.1.1-2.el9_4.1 5.12.2-2.el93-5.el91.0-9.el9_3.alma.13.17-13.el95.3-4.el95.15.9-10.el9_41.el9_67.el99.el939-16.el94.0-5.el972-2.el96.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.1OpenIPMI-develautotracevahi-gobject -develbluez-libs-develfile-develgcc-plugin-develjq-devellasso-develibfdisk-develinput-develjose-develldb-develmicrohttpd-develrabbitmq-develsmartcols-develtdc++-statictirpc-develudisks2-develv-develmpg123-developencryptoki-develpmix-pmi-develrocps-ng-develtobuf-c-compiler develraptor2-develepokey:type:strspeex-develtexlive-lib-develpm2-tss-develwavpack-develyelp-devel0.42.2-3.el91:0.36.2-8.el92.0.7-6.el9bpftooldovecotflacreeradius-mysql perl ostgresql rest sqlite unixODBCkernel-abi-stablelistscoredebug -core devel-matched modules-extra vel -matchedocheadersmodules-extratools -libslibvirt-client-qemulock-sanlocknginx-mod-develocaml-libnbd -develperfoppler-glib-docython3-perf.12-setuptools-wheelqt5-devel0.99.9-5.el91.0.9-1.el92.0-7.el9_211-32.el9_08.10-2.el9.alma:0.82-6.1.el9_61.20.1-14.el9_2.1.alma.13.2.7b-11.el9_74.04-1.el9_62.0.2-4.el91.0-21.el94.5-8.el9_49.el9_45.2-9.el9_56.1-8.el9_652-32.el9_4.alma.1:1.20.1-22.el9_6.2.alma.13.1.9-2.el9_624.31-5.el94.4.0-10.el92.el9 _4.13.el9_6.25.el9_7.22.el95.el9_17.el98.el9_25.1.8-6.el9_14.0-284.18.1.el9_2 30.1.el9_26.0.109-1.el9_010-1.el9_03-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.100-2.el9_31-1.el9_32-2.el9_33-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_44-1.el9_56-1.el9_67-1.el9_621-1.el9_62.0-18.el9_7.29.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_6aspnetcore-runtime-6.0 targeting-pack-6.0bash-develcc-develsdtarcorosync-vqsimdotnet-apphost-pack-6.0host fxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0xygen-doxywizardlatexfwupd-develgolang-github-cpuguy83-md2manrub2-efi-x64 -cdbootpctools -efi xtra minimaltk3-devel-docsjava-1.8.0-openjdk-demovelheadlesssrc1-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs7-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs25-openjdk-crypto-adapter-fastdebugslowdebugdemo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugmclibarchivefastjson-develguestfs-devel gobject-develinput-utilswebp-toolsua-guestfsmariadb-backupcommonembedded rrmsggssapi-serveroqgraph-enginepamserver-galerautilsingw32-binutilscppgcc -c++libgcc64-binutilscppgcc -c++libgccnetstandard-targeting-pack-2.1ocaml-libguestfs-develperl-JSON-XSYAML-LibYAMLhp-libguestfsqatzip-develrepokey:type:flexarrayuby-libguestfsshim-unsigned-x64x64ystemd-boot-unsignedtransfigzlib-static0.34-19.1.el9_641.2-3.el9_7.11.30-6.el99.4-10.el9_63.0.4-160.el9_07-162.el9_43.el9_54.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_42.2-1.el9_5.34.el9_6.1522.el9_7.15.15.3-1.el99-1.el968.2.2-3.el9_4.15.el9_6apache-commons-beanutilsbcc-docgrub2-commonefi-aa64-modules x64-modulespc-modulespc64le-modulesjava-1.8.0-openjdk-javadoc-ziplibguestfs-man-pages-jaukmicrohttpd-docmingw32-pixmanzlib -static64-pixmanzlib -staticperl-File-Find-RuleModule-ScanDepsython3-wheel -wheel.12-wheel-wheeltexlive-gnu-freefontvirt-v2v-man-pages-jauk2patch:ALBA-2022:8256SA-2022:5099249527695709369486003435218590610763913997007139018531482399586870980032262878139519420782152673178534001582034936433:00771942021030243440626951371068470693703879809092127656248596132640703458987519328299262134235815925661711452340576099158778325776424504869143621445369625396849708113344953838924624266533040369409316982945081844516675621312596785705712328446725357784914:014151262496567466805748951771027475918589397883111121932742418623930910427691750898182258213747698499204836647687992535377944336351225851607175884233306395016197548357895999407783494395056378738362374955676679928355192231334635338392899614663799735646452967757997734686798037117214762374446761780091435908893122867814790231771413394295016854386058275:00593123477422657891436101364889379585837627731140411849612627468343294660296244208785007101894296617406086398597018180708416237742760814951281815214911340958493050205185983892854660111101462240586531094224132342627689363148455259374244491697771079386357820130950954022233075869860090381428333376435581379080114884302330462517877806:01263744591700529392783236114340810786179133920394821277686repokey:type:relidarrayCriticalrepokey:type:numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatus~~yy{{mm||}}vv  xxzz``DD##$$SSYYccZZbb[[~~^^aa||WWXX]]}}``dd__\\{{zzxxvv~~yywwnn{{      wwppqqssvvoouuzztt  xxrryy..00((11'',,--**++((&&))''//]]mmggddee<<\\hhffccbbVP}necbzz||yy~~}}{{  bcTSD--LLKK|GGEEttnnoorrqqssppFFOBBSQQVEEE@@@IIOP00}0  AA!!DD==&&"">>LLMMNNMLNeeeGGGQBBBoohhh         xxKKJJJKAAAnaaahhNNMMFFBBFCCBCUUUZZZ99::;;5533668844HHIIJJ^^QQRRRQwwttqqssuurrpp,,///,111ll  dd JJJmm???cbfff%%@@AADD@EEEDAHH```...~~---===%%WWWbchVVVbbaabaPPPggg```))''&&'&)((***%%%(kkqqhhggjjrreemmoollppffiinnII   IIKKJJTJIKSGGG]]]^^^___FF  F  7722SSSNNNHHH``\\\IIIIIIeTTTuu__>>>MMMCCC$$cccPPPjjiikkOOOYYY[[[+++|??QQQaaiiiLLLKKK@@HH  XXRRXRw mnopwqrstuvwxyz{|}~     y $$$$$$z ##### #{ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMN| cOPQRSTUVWXYZ[\]^_`abcdefghijdkl} mnopqrstuvwxyz{|}~     ~ CCCCC C!C"C#C$C%C&C'C(C)C*C+C,C-C.C/C0C1C2C3C4C5C6C   mnop  stwxyz w}~{|qruv 78889:;8<8=8>8?8@8ABC8D8EFGHI8J8K8L8     Mq       Nv O:        MD      P5   ! " N#$ ) N$* + , - . / 0 1 2 5 N%6 O;7 8 9 : ; < = > ? @ A B C M<D E F G H I K L M O<N Q R S R S T U N&V W X Y Z [ \ ] M=^ _ ` a b c d e f g h i j k S R l `abm N'n o p M>q r s t u v w y z {v`ab| >OO} ~       RS  ef `ab     N(   `ab       !"#$%N)&'()*+,P>P-./0gh1N02SR3S>S4789;<=>?M?@ABCDEFGHIJKLMNOPRSQRSTUVWXM@[\]^_`abdefghefiba`jSRkN*lmnopqrstuQ>QvwxyRSzN+{|}~MAghN,SRb`a fe  P4  SRN-gh>RR Q6!"#$%&'gh(SR)*N.+,f e /RS0hg1N/23456789:;<=>N2@R S Ah!g!BCEFGHIJKLMNOQRSTUh"g"VS R WXYN3Z[\]l"m"^_`rEabMBcdeghijklmnopqrsrFtuwxyzQ9{|MC}rG~ghN4 hg RS   N1h g RSQ7`ba !a`b"#$%&'()*+,-.012Q835789:;<?@ABCDEghFR S GN5HIJKMNT>TOPuiviwLxLyLzL{L|L}L~LLL`L_LbLLLLLaLii^Lx   v# #% $3 4 %J &'x   (   )0:c*+,-./2D3v415 k$ #90:0gNpqlmnoyyzywyxy q q q91:1w4x44444 444444y4z444m4n444o4p444}4~4 4 4[R\RORPRaRbRcRdRSRTRgRhRkRlRQRRRiRjR_R`R-"."%"&"E"F"?"@"C"D"=">"G"H"I"J"5"6")"*"/"0"3"4";"<"#"$"wzxzyzzzvvvvvvvv:: :!:"_#_$_%_&_'_(_)_*_+_,_-_._/_f_e_0_1_ultl2s3s4s5s6s7s8s9s:s;<=>#?#@#A#B#C#XD E F  D=DGD D DH/I/J/K/L/MCNCOCP6Q6R6S6T6U6V6W6X6Y6Z6[6\)])^7_7`7a7b7c7d5e5f5g5UThTiTjTklyvzvwvxvmknkokpkqkrksktkukvkwkxkykkz){)|)#######}#~###dddddd d d d d dddddd& ,[)[+[*[' lUiUmUjU( >>$$$$~$$$$}$$$EEE92:2y5z5}5~5555555m5n5 5 555o5p555w5x5 555555/#0#%#&###$#I#J#)#*#-#.#;#<#5#6#=#>#C#D#G#H#?#@#E#F#3#4#gShSkSlSiSjSQSRSSSTS[S\ScSdSOSPSaSbS_S`S\*]*ooooyrzrwrxr--yszswsxs}%%%%%%~%%%%%;;!; ;44 4!4"4#4ytztwtxt^K_KTKUKZK[KVKWK\K]KXKYKwuxuyuzu 6 6}6~6 666666w6x666666666o6p666m6n6y6z6=$>$/$0$G$H$?$@$I$J$5$6$C$D$3$4$;$<$E$F$-$.$%$&$)$*$#$$$aTbTgThT_T`T[T\TOTPTcTdTSTTTQTRTkTlTiTjTxltlolplslulrlvlwlmlnlqlyll>]$]%]?]&P'P(P)P*P+P,P-P.P/P0P1PUUhUiUjUV7Q7P7X7U7W7S7R7T7Y7Z7[7 <G< <=< <2;3;4;5;6;7;\+]+F E D 8#9#:#wwxwywzw;<qErEyEwEEmEnE=E>EuE?E@EAEBEsEtExECEvEoEpEDE==k= <!<<<EFGO HIP pqnolmJKL93:3M N O P Q R S T U V W ??&&&&&&~&&}&&&saXaYaZa\,],XLYL\L]L^L_LTLULZL[LVLWL>?BC@Aijy.z.@@94:4G= === = =3%4%#%$%E%F%)%*%G%H%;%<%I%J%/%0%?%@%-%.%%%&%=%>%C%D%5%6%7777m7n777}7~777 7 777o7p777w7x7 7777y7z7[U\UkUlUgUhUiUjUQURU_U`UaUbUSUTUcUdUOUPUyFwFxFtF?F@F=F>FDFvFFoFpFmFnFCFAFBFsFuFrFqFwxxxyxzxAA95:5K0L0H0I0J0y/z/96:6BB[\]j^j_j`jajbjcjdjejfjgjhjijjjM N Q R V W S P U O T klmnop'''~'''''}'''qrs-_._3_4_/_0_ > > >=>G>97:7cdaVbVgVhVcVdVOVPViVjV_V`V[V\VkVlVQVRVSVTV-&.&=&>&%&&&/&0&I&J&;&<&3&4&#&$&5&6&?&@&G&H&C&D&)&*&E&F&CC 8 8}8~888o8p88888 88y8z888888888w8x8m8n8t1u1v1w1x1FFF98:8DDoklpnm$O%O?OjViVUVhVyz{Y|@}@~@ijBC@A:$9$8$TNQRWVUOPSMjjjj  mplonk (l(k( \ \\g\\$]$222222***555((((~(((((}((AGBGCG@GsGtGuGrGyGwGG=G>GmGnGDGoGpGxGvGqG?G999<< <!M"M#M$M%M&M'M(M)M*M+M,M-M.M/M0M1M2Mqkpk klnmop39495969798999:9;9<9=9>9?9@9A9B9C9D9E9F9G9H9I9J9K9L9M9N9xHtHvHwH?H@HAHBHoHpHCHyHHmHnHqHrH=H>HDHuHsHt2u2x2w2v2OJPJEE99:9^M_MTMUM\M]MXMYMZM[MVMWMQRSuQFFOKPK9:::A;B;9;:;3;4;7;8;=;>;M;N;E;F;;;<;K;L;5;6;I;J;C;D;?;@;G;H;QWRWiWjWOWPWcWdW[W\W_W`WgWhWkWlWSWTWaWbW3'4'?'@'C'D';'<')'*'#'$'-'.'I'J'='>'%'&'/'0'G'H'E'F'5'6' ++++m+n+++ + +++y+z+w+x+}+~+o+p+++++++++}))))))))))~)GG9;:;OLPL\N]NZN[N^N_NXNYNVNWNTNUND E F TqUqwqxqyqzq$P%P?PZ9[9X9Y9T9U9.9V9W9\9]9^9_9gPwrxryrzrTrUrVWXYZ[\]^_`0~0000}000000TNVRQSPOUWM?S$S%SDEF5a b c 6defn o p q l m TsUsyszswsxsg;h;i;HHOMPMkkkkGGGFEDG? ?=? ? ?_X`XaXbXQXRXOXPXiXjXcXdX[X\XSXTXgXhXkXlXC(D(#($()(*(/(0(E(F(;(<(5(6(-(.(I(J(?(@(%(&(G(H(=(>(3(4(y,z, , ,m,n,,,,,,,,,},~,,,,,o,p,w,x, ,,,,A<B<;<<<K<L<C<D<9<:<7<8<I<J<=<><5<6<3<4<G<H<?<@<M<N<E<F<{zyuSUWhWiWjWabcj:k:l:m!n!o!p!q!r!s!695949293979BXCX@XAXXX>^$^%^?^~A}A|ASRQ\%]%SPWMNOVRUTQ 5!5#55"55tpupvpwpxyzTcUcwcxcyczc)N"N.N-N'N$N*N+N/N0N!N#N1N%N&N(N2N,Ns t {B|B}BhjkjY,\+\)\*\Z @ @ @G@=@BVCV@VAVVV~000ydzdTdUdwdxdONPNIITeUeyezewexeiejeaebehe`e_ece^efeeedege]ex3w3t3u3v3TfUfwfxfyfzfuRllllgO  oklmpnSPOUTNWVRQM}**~*********wgxgTgUgygzg9<:<OOPOSYTYgYhY_Y`YkYlYOYPYQYRYaYbYiYjY[Y\YcYdYI)J)3)4)#)$)?)@)/)0);)<)E)F)5)6)-).)G)H)C)D)=)>)))*)%)&)----}-~-w-x-------m-n---o-p-y-z- - --- --K=L=3=4=;=<===>=?=@=M=N=A=B=5=6=9=:=G=H=E=F=I=J=C=D=7=8=yhzhwhxhThUh~>}>|>?Q$Q%Qmmmm   BWCWWW@WAWVROPSMNQTUW++}+++++++~++TiUiyiziwixi*Q+Q0Q1Q&Q'Q(Q)Q,Q-Q.Q/Q A AGA A=AOPPPTjUjwjxjyjzjZnnnnykzkTkUkwkxk^O_OZO[O\O]OTOUOXOYOVOWOXY^W_\Z[]`V,,,,,,~,,,},,VROPTNMWSQUplnkmo  +++f4e4g4d4TlUlylzlwlxlq"n"o"p"r"s"m"wmxmTmUmymzmLKJ9=:=OQPQ'''QZRZgZhZ[Z\ZiZjZOZPZkZlZ_Z`ZaZbZSZTZcZdZC*D*-*.*)***;*<*I*J*G*H*?*@*5*6*3*4*%*&*/*0*#*$*E*F*=*>*y.z. ..w.x...m.n.............o.p.}.~. . .3>4>9>:>E>F>M>N>=>>>7>8>A>B>C>D>?>@>5>6>;><>K>L>I>J>G>H>wnxnynznTnUnUWQRTNVOPMS~----}-------XY_Z[^W\]`VToUowoxoyozo 7 7 7\&]&$R%R?R>_$_%_?_ 6 666UXhXiXjX@YAYYYBYCYY|Z|[|R|S|P|Q|X|U| |V|W|T|##]_Y^WZ[\`XV]SPWTNVRUQOM!!!...}....~....DDD222-,])]*]+].     SPTNMQROUVWXY\^W][V_Z`~//////////}/ W!W 8 8 8wpxpypzpTpUpqrsytztwtxtTtUt"&#&$&uT"""//y/z/w/x/////////}/~/ //m/n/o/p/ / /////G?H?3?4?;??E?F?5?6???@?9?:?I?J?7?8?C?D?K?L?M?N?A?B?wuxuyuzuTuUu-`.`3`4`/`0`)^*^,^+^?22~2}22222222V R U S P O Q M N W T X!Y!^!W!\!_!Z![!`!]!V!wxTUyz%&'wxyzTUa\b\k\l\S\T\_\`\c\d\O\P\Q\R\g\h\[\\\i\j\111111 1 1m1n11111 111111y1z1}1~1w1x1o1p1;AAMANA,,,yzTUwxF E D TUyzwxyvzvwvxvTvUvTUwxyz[(Z)Z*Z+Z,Z-ZP.3/303132333TUyzwxwxyzTUw x y z T U V;W;Z;[;T;U;.;X;Y;^;_;\;];_"Y"^"W"\"X"V"]"["Z"`"Q R W S P T N O V M U w x y z T U 4/5/6/333333}33~333y z w x T U y z w x T U T U y z w x p"q"n"o"TUyzwxwwxwTwUwywzw7E8EfE9E:Ep!q!l!m!n!o!=B B BGB BwxTUyzuV;<fyzwxTU^:_:.:T:U:\:]:V:W:X:Y:Z:[:wxTUyzOUPU [![yzwxTUc]d]k]l]g]h][]\]_]`]S]T]a]b]O]P]i]j]Q]R]22 2 2w2x2m2n2}2~22222o2p2222222y2z2 2222EBFB?B@B3B4BGBHBCBDB=B>BIBJB9B:B;B.?.yzwxTUwxyzTUn{o{p{q{8%9%:%yzwxTUZ[`\_Y]XVW^~44444444}444TxUxyxzxwxxx X!XORPR`Z[^W\XY]V_QRVSPMNWOTUk[l[[[\[a[b[Q[R[S[T[c[d[O[P[i[j[_[`[g[h[}0~0m0n00000 0 000o0p000 00000000y0z0w0x0C@D@G@H@9@:@;@<@A@B@E@F@?@@@5@6@7@8@K@L@M@N@3@4@=@>@I@J@wyxyyyzyTyUycf^fifjfafbfhf`f_fdfef]fgfff}11111~111111^ W \ ] [ X Y ` V Z _ MNSPUTVROWQ6t7t9t3t8t5t4t2t:tUYjYiYhY77 7 7SRQ@"A"c8_8b8a8`8^8oLc!d!mklpnoTzUzyzzzwzxzB6C6D6!!"!/!0!,!-!'!$!*!+!E!F!#!G!1!H!I!2!.!(!&!J!)!%!nplmokOSPS Y!Yy{z{w{x{T{U{T|U|y|z|w|x|SRQy}z}T}U}w}x}HHHy~z~w~x~T~U~agbgfgegigjghg`gcg^g_gdggg]gOTPT Z!ZwxyzTU\M/srquUTUwxyz 888jZiZUZ 8hZKL4~?}?|?nJ6ihjhhh`hghbh_hahfheh]h^hchdhTUwxyzW}S}R} }V}Q}X}U}P}T}[}Z}Y}/b0b3b4b-b.bTUyzwxX<Y<\<]<V<W<^<_<.<T<U<Z<[<MN=OVPV>TUyzwx3333}3~3m3n33333y3z3 33w3x333 3 333o3p3333:4:E:F:=:>:A:B:M:N:I:J:?:@:5:6:;:<:7:8:G:H:C:D:9:::K:L:_^`^k^l^i^j^c^d^S^T^g^h^Q^R^O^P^a^b^[^\^Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p ---wxyzTUVW\XY`Z[_]^T N O P W S V R U M Q 555~55}555555TUwxyzq6r6s6t6u6v6rK333L7:3:4:5:6:2:TUwxyz?T$T%Thi`iiijici^igibifiei]iai_idiZOUOYO^O\Q4WQUTC[dlO]djOkOXdfdgdhdiOeCcOaO`Obd_CdCVS NOPSTUABCDEFHIJKLMRWXNyZw 8CbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256 https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256 Bqatzip-devel-1.0.9-1.el9.x86_64.rpmBqatzip-devel-1.0.9-1.el9.x86_64.rpm|x FBBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security updateDy|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099 https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099 Eishim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmtLgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmnLgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmoLgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmrLgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmqLgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm`Lgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm_Lgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmbLgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmsLgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmpLgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmaLgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmFishim-x64-15.6-1.el9.alma.x86_64.rpm^Lgrub2-common-2.06-27.el9_0.7.alma.noarch.rpmEishim-unsigned-x64-15.6-1.el9.alma.x86_64.rpmtLgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpmnLgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpmoLgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpmrLgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpmqLgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm`Lgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm_Lgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmbLgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpmsLgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpmpLgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmaLgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmFishim-x64-15.6-1.el9.alma.x86_64.rpm^Lgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm1y #yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix updateDu https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249 ~kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpmwkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpmykernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm{kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmmbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm|kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm}kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpmvkernel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm perf-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpmxkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpmzkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm~kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpmwkernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpmykernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm{kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmmbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm|kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm}kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpmvkernel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm perf-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpmxkernel-core-5.14.0-70.17.1.el9_0.x86_64.rpmzkernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpmz *dBBBBBsecurityModerate: libarchive security updateD Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252 https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252 $libarchive-3.5.3-2.el9_0.x86_64.rpm`$bsdtar-3.5.3-2.el9_0.x86_64.rpmD$libarchive-devel-3.5.3-2.el9_0.i686.rpmD$libarchive-devel-3.5.3-2.el9_0.x86_64.rpm$libarchive-3.5.3-2.el9_0.x86_64.rpm`$bsdtar-3.5.3-2.el9_0.x86_64.rpmD$libarchive-devel-3.5.3-2.el9_0.i686.rpmD$libarchive-devel-3.5.3-2.el9_0.x86_64.rpm { 1kBBBBBsecurityModerate: libinput security updateD b3https://access.redhat.com/errata/RHSA-2022:5257RHSA-2022:5257RHSA-2022:5257 https://access.redhat.com/security/cve/CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/20749522074952https://errata.almalinux.org/9/ALSA-2022-5257.htmlALSA-2022:5257ALSA-2022:5257 ##libinput-1.19.3-2.el9_0.x86_64.rpm$#libinput-utils-1.19.3-2.el9_0.x86_64.rpmS#libinput-devel-1.19.3-2.el9_0.i686.rpmS#libinput-devel-1.19.3-2.el9_0.x86_64.rpm##libinput-1.19.3-2.el9_0.x86_64.rpm$#libinput-utils-1.19.3-2.el9_0.x86_64.rpmS#libinput-devel-1.19.3-2.el9_0.i686.rpmS#libinput-devel-1.19.3-2.el9_0.x86_64.rpm| rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement updateD+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695 java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmYjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmcjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmZjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmbjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm[java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm~java-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm^java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmajava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm|java-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmWjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmXjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm]java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm}java-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm`java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmdjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm_java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm\java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm{java-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmYjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmcjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmZjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmbjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm[java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm~java-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm^java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmajava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm|java-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmWjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmXjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm]java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm}java-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm`java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmdjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm_java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm\java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm{java-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm} aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement updateD@.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709 cjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmzjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpmxjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpmvjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm~java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmyjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmwjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmcjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmzjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpmxjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpmvjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm~java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmyjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmwjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmdjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpmjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm~ 0BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement updateDne https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736 njava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm{java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmwjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmvjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmujava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmzjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmxjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmyjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmnjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm{java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmwjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmvjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmujava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmzjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmxjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmyjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm qBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement updateD SiJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948 https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948 .Cmariadb-pam-10.5.16-2.el9_0.x86_64.rpm0Cmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm(Cmariadb-backup-10.5.16-2.el9_0.x86_64.rpm1Cmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm'Cmariadb-10.5.16-2.el9_0.x86_64.rpm,Cmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm-Cmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm*Cmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm+Cmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm(Cmariadb-test-10.5.16-2.el9_0.x86_64.rpm&Cmariadb-devel-10.5.16-2.el9_0.x86_64.rpm)Cmariadb-common-10.5.16-2.el9_0.x86_64.rpm'Cmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm/Cmariadb-server-10.5.16-2.el9_0.x86_64.rpm.Cmariadb-pam-10.5.16-2.el9_0.x86_64.rpm0Cmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm(Cmariadb-backup-10.5.16-2.el9_0.x86_64.rpm1Cmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm'Cmariadb-10.5.16-2.el9_0.x86_64.rpm,Cmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm-Cmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm*Cmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm+Cmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm(Cmariadb-test-10.5.16-2.el9_0.x86_64.rpm&Cmariadb-devel-10.5.16-2.el9_0.x86_64.rpm)Cmariadb-common-10.5.16-2.el9_0.x86_64.rpm'Cmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm/Cmariadb-server-10.5.16-2.el9_0.x86_64.rpmͯo 8NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateD _ocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm  _libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpmA_php-libguestfs-1.48.4-2.el9.alma.x86_64.rpm!_libguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpmD_ruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm=_ocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm&_lua-guestfs-1.48.4-2.el9.alma.x86_64.rpm"_libguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpmf_libguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpme_libguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm>_ocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpmܵh !OsecurityLow: virt-v2v security, bug fix, and enhancement updateDJLlhttps://access.redhat.com/errata/RHSA-2022:7968RHSA-2022:7968RHSA-2022:7968 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7968.htmlALSA-2022:7968ALSA-2022:7968 ulvirt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpmtlvirt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpmulvirt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpmtlvirt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpmܲ "QBBBBBBBsecurityModerate: protobuf security updateD 8Nhttps://access.redhat.com/errata/RHSA-2022:7970RHSA-2022:7970RHSA-2022:7970 https://access.redhat.com/security/cve/CVE-2021-22570CVE-2021-22570CVE-2021-22570https://bugzilla.redhat.com/20494292049429https://errata.almalinux.org/9/ALSA-2022-7970.htmlALSA-2022:7970ALSA-2022:7970 Lsprotobuf-compiler-3.14.0-13.el9.x86_64.rpmMsprotobuf-devel-3.14.0-13.el9.x86_64.rpmNsprotobuf-lite-devel-3.14.0-13.el9.x86_64.rpmMsprotobuf-devel-3.14.0-13.el9.i686.rpmLsprotobuf-compiler-3.14.0-13.el9.i686.rpmNsprotobuf-lite-devel-3.14.0-13.el9.i686.rpmLsprotobuf-compiler-3.14.0-13.el9.x86_64.rpmMsprotobuf-devel-3.14.0-13.el9.x86_64.rpmNsprotobuf-lite-devel-3.14.0-13.el9.x86_64.rpmMsprotobuf-devel-3.14.0-13.el9.i686.rpmLsprotobuf-compiler-3.14.0-13.el9.i686.rpmNsprotobuf-lite-devel-3.14.0-13.el9.i686.rpmނv #ZBsecurityLow: speex security updateDJ8https://access.redhat.com/errata/RHSA-2022:7979RHSA-2022:7979RHSA-2022:7979 https://access.redhat.com/security/cve/CVE-2020-23903CVE-2020-23903CVE-2020-23903https://bugzilla.redhat.com/20242502024250https://errata.almalinux.org/9/ALSA-2022-7979.htmlALSA-2022:7979ALSA-2022:7979 espeex-devel-1.2.0-11.el9.x86_64.rpmespeex-devel-1.2.0-11.el9.i686.rpmespeex-devel-1.2.0-11.el9.x86_64.rpmespeex-devel-1.2.0-11.el9.i686.rpmރ $]BBBBsecurityLow: libvirt security, bug fix, and enhancement updateDJ>https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003 https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003 #libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm#libvirt-docs-8.5.0-7.el9_1.x86_64.rpm#libvirt-devel-8.5.0-7.el9_1.x86_64.rpm#libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm#libvirt-docs-8.5.0-7.el9_1.x86_64.rpm#libvirt-devel-8.5.0-7.el9_1.x86_64.rpmܩK %#securityModerate: qt5 security and bug fix updateD N9https://access.redhat.com/errata/RHSA-2022:8022RHSA-2022:8022RHSA-2022:8022 https://access.redhat.com/security/cve/CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/20555052055505https://errata.almalinux.org/9/ALSA-2022-8022.htmlALSA-2022:8022ALSA-2022:8022 Xqt5-devel-5.15.3-1.el9.noarch.rpmXqt5-devel-5.15.3-1.el9.noarch.rpmܣP &dBsecurityModerate: unbound security, bug fix, and enhancement updateD 5https://access.redhat.com/errata/RHSA-2022:8062RHSA-2022:8062RHSA-2022:8062 https://access.redhat.com/security/cve/CVE-2022-30698CVE-2022-30698CVE-2022-30698https://access.redhat.com/security/cve/CVE-2022-30699CVE-2022-30699CVE-2022-30699https://bugzilla.redhat.com/21167252116725https://bugzilla.redhat.com/21167292116729https://errata.almalinux.org/9/ALSA-2022-8062.htmlALSA-2022:8062ALSA-2022:8062 G unbound-devel-1.16.2-2.el9.i686.rpmG unbound-devel-1.16.2-2.el9.x86_64.rpmG unbound-devel-1.16.2-2.el9.i686.rpmG unbound-devel-1.16.2-2.el9.x86_64.rpmބ{ (gABBBsecurityModerate: bind security updateD < https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068 https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068 VDbind-libs-9.16.23-5.el9_1.i686.rpm=Dbind-doc-9.16.23-5.el9_1.noarch.rpmQDbind-devel-9.16.23-5.el9_1.x86_64.rpmQDbind-devel-9.16.23-5.el9_1.i686.rpmVDbind-libs-9.16.23-5.el9_1.i686.rpm=Dbind-doc-9.16.23-5.el9_1.noarch.rpmQDbind-devel-9.16.23-5.el9_1.x86_64.rpmQDbind-devel-9.16.23-5.el9_1.i686.rpmކ )lBBBsecurityModerate: flac security updateD Ijhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078 https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078 B/flac-devel-1.3.3-10.el9.i686.rpmB/flac-devel-1.3.3-10.el9.x86_64.rpmo/flac-1.3.3-10.el9.x86_64.rpmB/flac-devel-1.3.3-10.el9.i686.rpmB/flac-devel-1.3.3-10.el9.x86_64.rpmo/flac-1.3.3-10.el9.x86_64.rpmކG *qBsecurityLow: wavpack security updateDJ32https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139 https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139 hCwavpack-devel-5.4.0-5.el9.x86_64.rpmhCwavpack-devel-5.4.0-5.el9.i686.rpmhCwavpack-devel-5.4.0-5.el9.x86_64.rpmhCwavpack-devel-5.4.0-5.el9.i686.rpmއC +tBBBBBBBBBBsecurityModerate: poppler security and bug fix updateD e(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151 https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151 6poppler-qt5-devel-21.01.0-13.el9.x86_64.rpm 6poppler-cpp-devel-21.01.0-13.el9.x86_64.rpm 6poppler-devel-21.01.0-13.el9.i686.rpm6poppler-qt5-devel-21.01.0-13.el9.i686.rpm 6poppler-cpp-devel-21.01.0-13.el9.i686.rpm 6poppler-devel-21.01.0-13.el9.x86_64.rpm 6poppler-glib-devel-21.01.0-13.el9.i686.rpm 6poppler-glib-devel-21.01.0-13.el9.x86_64.rpm6poppler-qt5-devel-21.01.0-13.el9.x86_64.rpm 6poppler-cpp-devel-21.01.0-13.el9.x86_64.rpm 6poppler-devel-21.01.0-13.el9.i686.rpm6poppler-qt5-devel-21.01.0-13.el9.i686.rpm 6poppler-cpp-devel-21.01.0-13.el9.i686.rpm 6poppler-devel-21.01.0-13.el9.x86_64.rpm 6poppler-glib-devel-21.01.0-13.el9.i686.rpm 6poppler-glib-devel-21.01.0-13.el9.x86_64.rpmއc ,@securityModerate: libtiff security updateD @https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194 https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194 x)libtiff-tools-4.4.0-2.el9.x86_64.rpmx)libtiff-tools-4.4.0-2.el9.x86_64.rpm܀Z -BBBBBsecurityLow: openjpeg2 security updateDJMhttps://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207 https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207 K7openjpeg2-tools-2.4.0-7.el9.x86_64.rpmJ7openjpeg2-devel-2.4.0-7.el9.i686.rpmJ7openjpeg2-devel-2.4.0-7.el9.x86_64.rpmK7openjpeg2-tools-2.4.0-7.el9.i686.rpmK7openjpeg2-tools-2.4.0-7.el9.x86_64.rpmJ7openjpeg2-devel-2.4.0-7.el9.i686.rpmJ7openjpeg2-devel-2.4.0-7.el9.x86_64.rpmK7openjpeg2-tools-2.4.0-7.el9.i686.rpmވ` /n[BBsecurityModerate: dovecot security and enhancement updateD hZhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208 https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208 A5dovecot-devel-2.3.16-7.el9.x86_64.rpmA5dovecot-devel-2.3.16-7.el9.i686.rpmn5dovecot-2.3.16-7.el9.i686.rpmA5dovecot-devel-2.3.16-7.el9.x86_64.rpmA5dovecot-devel-2.3.16-7.el9.i686.rpmn5dovecot-2.3.16-7.el9.i686.rpmވo 0LBBsecurityModerate: xorg-x11-server security and bug fix updateD BZhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221 UTxorg-x11-server-source-1.20.11-11.el9.noarch.rpmaTxorg-x11-server-devel-1.20.11-11.el9.x86_64.rpmaTxorg-x11-server-devel-1.20.11-11.el9.i686.rpmUTxorg-x11-server-source-1.20.11-11.el9.noarch.rpmaTxorg-x11-server-devel-1.20.11-11.el9.x86_64.rpmaTxorg-x11-server-devel-1.20.11-11.el9.i686.rpmމ(  1PsecurityModerate: yajl security updateD Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252 https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252 hyajl-devel-2.1.0-21.el9.x86_64.rpmhyajl-devel-2.1.0-21.el9.x86_64.rpm3! 2RBBsecurityModerate: kernel security, bug fix, and enhancement updateD q?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 vkernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpmvkernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpmvkernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpmvkernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm۰E" 3VBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement updateD tmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317 Nksamba-test-libs-4.16.4-101.el9.x86_64.rpmMksamba-test-4.16.4-101.el9.x86_64.rpmFksamba-devel-4.16.4-101.el9.x86_64.rpmBklibsmbclient-devel-4.16.4-101.el9.x86_64.rpmFksamba-devel-4.16.4-101.el9.i686.rpmCklibwbclient-devel-4.16.4-101.el9.x86_64.rpmBklibsmbclient-devel-4.16.4-101.el9.i686.rpmCklibwbclient-devel-4.16.4-101.el9.i686.rpmksamba-pidl-4.16.4-101.el9.noarch.rpm Nksamba-test-libs-4.16.4-101.el9.x86_64.rpmMksamba-test-4.16.4-101.el9.x86_64.rpmFksamba-devel-4.16.4-101.el9.x86_64.rpmBklibsmbclient-devel-4.16.4-101.el9.x86_64.rpmFksamba-devel-4.16.4-101.el9.i686.rpmCklibwbclient-devel-4.16.4-101.el9.x86_64.rpmBklibsmbclient-devel-4.16.4-101.el9.i686.rpmCklibwbclient-devel-4.16.4-101.el9.i686.rpmksamba-pidl-4.16.4-101.el9.noarch.rpmދr# !dBsecurityModerate: libldb security, bug fix, and enhancement updateD aLhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318 https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318 U)libldb-devel-2.5.2-1.el9.x86_64.rpmU)libldb-devel-2.5.2-1.el9.i686.rpmU)libldb-devel-2.5.2-1.el9.x86_64.rpmU)libldb-devel-2.5.2-1.el9.i686.rpmތ$ 5toFBBBBBBBBBsecurityModerate: python3.9 security, bug fix, and enhancement updateD -5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353 #python3-idle-3.9.14-1.el9.x86_64.rpm#python3-debug-3.9.14-1.el9.x86_64.rpmP#python3-tkinter-3.9.14-1.el9.i686.rpm#python3-test-3.9.14-1.el9.i686.rpm#python3-idle-3.9.14-1.el9.i686.rpm#python3-test-3.9.14-1.el9.x86_64.rpm#python3-debug-3.9.14-1.el9.i686.rpmO#python3-3.9.14-1.el9.i686.rpm#python3-idle-3.9.14-1.el9.x86_64.rpm#python3-debug-3.9.14-1.el9.x86_64.rpmP#python3-tkinter-3.9.14-1.el9.i686.rpm#python3-test-3.9.14-1.el9.i686.rpm#python3-idle-3.9.14-1.el9.i686.rpm#python3-test-3.9.14-1.el9.x86_64.rpm#python3-debug-3.9.14-1.el9.i686.rpmO#python3-3.9.14-1.el9.i686.rpmތ[% #rBsecurityModerate: libtirpc security updateD b{https://access.redhat.com/errata/RHSA-2022:8400RHSA-2022:8400RHSA-2022:8400 https://access.redhat.com/security/cve/CVE-2021-46828CVE-2021-46828CVE-2021-46828https://bugzilla.redhat.com/21093522109352https://errata.almalinux.org/9/ALSA-2022-8400.htmlALSA-2022:8400ALSA-2022:8400 Zlibtirpc-devel-1.3.3-0.el9.i686.rpmZlibtirpc-devel-1.3.3-0.el9.x86_64.rpmZlibtirpc-devel-1.3.3-0.el9.i686.rpmZlibtirpc-devel-1.3.3-0.el9.x86_64.rpmލW& uBBBBBBBBBBBBBBsecurityLow: mingw-gcc security and bug fix updateDJ].https://access.redhat.com/errata/RHSA-2022:8415RHSA-2022:8415RHSA-2022:8415 https://access.redhat.com/security/cve/CVE-2021-46195CVE-2021-46195CVE-2021-46195https://bugzilla.redhat.com/20463002046300https://errata.almalinux.org/9/ALSA-2022-8415.htmlALSA-2022:8415ALSA-2022:8415 9dmingw64-gcc-12.0.1-11.2.el9.x86_64.rpm:dmingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm;dmingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm5dmingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm3dmingw32-cpp-12.0.1-11.2.el9.x86_64.rpm6dmingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm8dmingw64-cpp-12.0.1-11.2.el9.x86_64.rpm4dmingw32-gcc-12.0.1-11.2.el9.x86_64.rpm9dmingw64-gcc-12.0.1-11.2.el9.x86_64.rpm:dmingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm;dmingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm5dmingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm3dmingw32-cpp-12.0.1-11.2.el9.x86_64.rpm6dmingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm8dmingw64-cpp-12.0.1-11.2.el9.x86_64.rpm4dmingw32-gcc-12.0.1-11.2.el9.x86_64.rpmx' FBBsecurityLow: mingw-glib2 security and bug fix updateDJ Yhttps://access.redhat.com/errata/RHSA-2022:8418RHSA-2022:8418RHSA-2022:8418 https://access.redhat.com/security/cve/CVE-2021-28153CVE-2021-28153CVE-2021-28153https://bugzilla.redhat.com/19382911938291https://errata.almalinux.org/9/ALSA-2022-8418.htmlALSA-2022:8418ALSA-2022:8418 ,[mingw64-glib2-static-2.70.1-2.el9.noarch.rpm)[mingw32-glib2-2.70.1-2.el9.noarch.rpm+[mingw64-glib2-2.70.1-2.el9.noarch.rpm*[mingw32-glib2-static-2.70.1-2.el9.noarch.rpm,[mingw64-glib2-static-2.70.1-2.el9.noarch.rpm)[mingw32-glib2-2.70.1-2.el9.noarch.rpm+[mingw64-glib2-2.70.1-2.el9.noarch.rpm*[mingw32-glib2-static-2.70.1-2.el9.noarch.rpm ( KBBsecurityImportant: mingw-zlib security updateDd:https://access.redhat.com/errata/RHSA-2022:8420RHSA-2022:8420RHSA-2022:8420 https://access.redhat.com/security/cve/CVE-2018-25032CVE-2018-25032CVE-2018-25032https://bugzilla.redhat.com/20679452067945https://errata.almalinux.org/9/ALSA-2022-8420.htmlALSA-2022:8420ALSA-2022:8420 lUmingw64-zlib-1.2.12-2.el9.noarch.rpmiUmingw32-zlib-1.2.12-2.el9.noarch.rpmmUmingw64-zlib-static-1.2.12-2.el9.noarch.rpmjUmingw32-zlib-static-1.2.12-2.el9.noarch.rpmlUmingw64-zlib-1.2.12-2.el9.noarch.rpmiUmingw32-zlib-1.2.12-2.el9.noarch.rpmmUmingw64-zlib-static-1.2.12-2.el9.noarch.rpmjUmingw32-zlib-static-1.2.12-2.el9.noarch.rpm@) 6PsecurityModerate: dotnet7.0 security, bug fix, and enhancement updateD Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434 H>dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpmH>dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpmZ* 8wnoBBBBBBBBBsecurityImportant: python3.9 security updateDgQhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493 $python3-debug-3.9.14-1.el9_1.1.i686.rpm$python3-idle-3.9.14-1.el9_1.1.x86_64.rpm$python3-test-3.9.14-1.el9_1.1.x86_64.rpmO$python3-3.9.14-1.el9_1.1.i686.rpmP$python3-tkinter-3.9.14-1.el9_1.1.i686.rpm$python3-idle-3.9.14-1.el9_1.1.i686.rpm$python3-test-3.9.14-1.el9_1.1.i686.rpm$python3-debug-3.9.14-1.el9_1.1.x86_64.rpm$python3-debug-3.9.14-1.el9_1.1.i686.rpm$python3-idle-3.9.14-1.el9_1.1.x86_64.rpm$python3-test-3.9.14-1.el9_1.1.x86_64.rpmO$python3-3.9.14-1.el9_1.1.i686.rpmP$python3-tkinter-3.9.14-1.el9_1.1.i686.rpm$python3-idle-3.9.14-1.el9_1.1.i686.rpm$python3-test-3.9.14-1.el9_1.1.i686.rpm$python3-debug-3.9.14-1.el9_1.1.x86_64.rpm}+ 9]BsecurityImportant: varnish security updateD8Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643 https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643 Evarnish-devel-6.6.2-2.el9_1.1.i686.rpmEvarnish-devel-6.6.2-2.el9_1.1.x86_64.rpmEvarnish-devel-6.6.2-2.el9_1.1.i686.rpmEvarnish-devel-6.6.2-2.el9_1.1.x86_64.rpm, :`securityModerate: .NET 6.0 security, bug fix, and enhancement update `https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077 https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077 m2dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpmm2dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm- ;bBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update nHhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194 p5java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmq5java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmv5java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmu5java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmo5java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmn5java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmz5java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmy5java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm{5java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmx5java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmw5java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmt5java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpms5java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmr5java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmp5java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmq5java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmv5java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmu5java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmo5java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmn5java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmz5java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmy5java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm{5java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmx5java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmw5java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmt5java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpms5java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmr5java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm. <~BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update 6lhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202 [#java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmc#java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmY#java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm\#java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmZ#java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmb#java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmW#java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpma#java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmX#java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm`#java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm_#java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm]#java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmd#java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm^#java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm[#java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmc#java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmY#java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm\#java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmZ#java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmb#java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmW#java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpma#java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmX#java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm`#java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm_#java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm]#java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmd#java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm^#java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm/ =ZBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update "xhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210 https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210 Sjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm~Sjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Sjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm~Sjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmSjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm0 >nsecurityModerate: libtiff security update {https://access.redhat.com/errata/RHSA-2023:0302RHSA-2023:0302RHSA-2023:0302 https://access.redhat.com/security/cve/CVE-2022-2056CVE-2022-2056CVE-2022-2056https://access.redhat.com/security/cve/CVE-2022-2057CVE-2022-2057CVE-2022-2057https://access.redhat.com/security/cve/CVE-2022-2058CVE-2022-2058CVE-2022-2058https://access.redhat.com/security/cve/CVE-2022-2519CVE-2022-2519CVE-2022-2519https://access.redhat.com/security/cve/CVE-2022-2520CVE-2022-2520CVE-2022-2520https://access.redhat.com/security/cve/CVE-2022-2521CVE-2022-2521CVE-2022-2521https://access.redhat.com/security/cve/CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/21032222103222https://bugzilla.redhat.com/21227892122789https://bugzilla.redhat.com/21227922122792https://bugzilla.redhat.com/21227992122799https://bugzilla.redhat.com/21344322134432https://errata.almalinux.org/9/ALSA-2023-0302.htmlALSA-2023:0302ALSA-2023:0302 x*libtiff-tools-4.4.0-5.el9_1.x86_64.rpmx*libtiff-tools-4.4.0-5.el9_1.x86_64.rpmK1 ?pBBsecurityModerate: libreoffice security update z https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304 https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304 Iolibreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpmJolibreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpmIolibreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpmJolibreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpmY2 tBBsecurityImportant: kernel security and bug fix update;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 rkernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpmrkernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpmrkernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpmrkernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpmM3 %xsecurityModerate: bash security update J}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340 https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340 ^-bash-devel-5.1.8-6.el9_1.x86_64.rpm^-bash-devel-5.1.8-6.el9_1.x86_64.rpm4 &zBsecurityImportant: libksba security updateGJhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626 https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626 Elibksba-devel-1.5.1-6.el9_1.i686.rpmElibksba-devel-1.5.1-6.el9_1.x86_64.rpmElibksba-devel-1.5.1-6.el9_1.i686.rpmElibksba-devel-1.5.1-6.el9_1.x86_64.rpmx5 }BBsecurityImportant: kernel security and bug fix update~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 skernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpmskernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpmskernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpmskernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm6 Bf[BBBBBBBBBsecurityModerate: python3.9 security update 9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953 %python3-idle-3.9.14-1.el9_1.2.i686.rpm%python3-idle-3.9.14-1.el9_1.2.x86_64.rpmP%python3-tkinter-3.9.14-1.el9_1.2.i686.rpm%python3-debug-3.9.14-1.el9_1.2.x86_64.rpm%python3-test-3.9.14-1.el9_1.2.x86_64.rpmO%python3-3.9.14-1.el9_1.2.i686.rpm%python3-debug-3.9.14-1.el9_1.2.i686.rpm%python3-test-3.9.14-1.el9_1.2.i686.rpm%python3-idle-3.9.14-1.el9_1.2.i686.rpm%python3-idle-3.9.14-1.el9_1.2.x86_64.rpmP%python3-tkinter-3.9.14-1.el9_1.2.i686.rpm%python3-debug-3.9.14-1.el9_1.2.x86_64.rpm%python3-test-3.9.14-1.el9_1.2.x86_64.rpmO%python3-3.9.14-1.el9_1.2.i686.rpm%python3-debug-3.9.14-1.el9_1.2.i686.rpm%python3-test-3.9.14-1.el9_1.2.i686.rpmE7 DIBBsecurityModerate: lua security update H8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 0;lua-devel-5.4.4-2.el9_1.i686.rpm0;lua-devel-5.4.4-2.el9_1.x86_64.rpm};lua-5.4.4-2.el9_1.i686.rpm0;lua-devel-5.4.4-2.el9_1.i686.rpm0;lua-devel-5.4.4-2.el9_1.x86_64.rpm};lua-5.4.4-2.el9_1.i686.rpmZ8 PBBBBsecurityModerate: libjpeg-turbo security update .https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068 https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068 Q4turbojpeg-2.0.90-6.el9_1.x86_64.rpmR4turbojpeg-devel-2.0.90-6.el9_1.x86_64.rpmR4turbojpeg-devel-2.0.90-6.el9_1.i686.rpmQ4turbojpeg-2.0.90-6.el9_1.i686.rpmQ4turbojpeg-2.0.90-6.el9_1.x86_64.rpmR4turbojpeg-devel-2.0.90-6.el9_1.x86_64.rpmR4turbojpeg-devel-2.0.90-6.el9_1.i686.rpmQ4turbojpeg-2.0.90-6.el9_1.i686.rpm9 VBBsecurityImportant: kernel security, bug fix, and enhancement update.Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 tkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpmtkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpmtkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpmtkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm8: ZBBBBBBBBBBsecurityModerate: postgresql security update jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693 https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693 {Kpostgresql-server-devel-13.10-1.el9_1.x86_64.rpmzKpostgresql-private-devel-13.10-1.el9_1.x86_64.rpm~Kpostgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm|Kpostgresql-static-13.10-1.el9_1.x86_64.rpm}Kpostgresql-test-13.10-1.el9_1.x86_64.rpmyKpostgresql-docs-13.10-1.el9_1.x86_64.rpm{Kpostgresql-server-devel-13.10-1.el9_1.x86_64.rpmzKpostgresql-private-devel-13.10-1.el9_1.x86_64.rpm~Kpostgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm|Kpostgresql-static-13.10-1.el9_1.x86_64.rpm}Kpostgresql-test-13.10-1.el9_1.x86_64.rpmyKpostgresql-docs-13.10-1.el9_1.x86_64.rpm; fBBsecurityImportant: kernel security and bug fix updateq4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 ukernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpmukernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpmukernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpmukernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm< jBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update%https://access.redhat.com/errata/RHSA-2023:1879RHSA-2023:1879RHSA-2023:1879 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1879.htmlALSA-2023:1879ALSA-2023:1879 z6java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq6java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt6java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmv6java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo6java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmw6java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmx6java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr6java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmy6java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpms6java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm{6java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmu6java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn6java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp6java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmz6java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq6java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt6java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmv6java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo6java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmw6java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmx6java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr6java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmy6java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpms6java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm{6java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmu6java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn6java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp6java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm= FBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updateA2https://access.redhat.com/errata/RHSA-2023:1880RHSA-2023:1880RHSA-2023:1880 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1880.htmlALSA-2023:1880ALSA-2023:1880 X$java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm[$java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm_$java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm]$java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm\$java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpma$java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm`$java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm^$java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmW$java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmd$java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmb$java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmc$java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmZ$java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmY$java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmX$java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm[$java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm_$java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm]$java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm\$java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpma$java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm`$java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm^$java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmW$java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmd$java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmb$java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmc$java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmZ$java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpmY$java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpmw> bBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix updatesThttps://access.redhat.com/errata/RHSA-2023:1909RHSA-2023:1909RHSA-2023:1909 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1909.htmlALSA-2023:1909ALSA-2023:1909 Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm~Tjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm~Tjava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmTjava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpmƷI? vBBBBBBBBBBBBsecurityImportant: samba security updateGhttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127 Bllibsmbclient-devel-4.16.4-103.el9_1.i686.rpmMlsamba-test-4.16.4-103.el9_1.x86_64.rpmBllibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpmFlsamba-devel-4.16.4-103.el9_1.i686.rpmCllibwbclient-devel-4.16.4-103.el9_1.x86_64.rpmNlsamba-test-libs-4.16.4-103.el9_1.x86_64.rpmFlsamba-devel-4.16.4-103.el9_1.x86_64.rpmCllibwbclient-devel-4.16.4-103.el9_1.i686.rpmlsamba-pidl-4.16.4-103.el9_1.noarch.rpm Bllibsmbclient-devel-4.16.4-103.el9_1.i686.rpmMlsamba-test-4.16.4-103.el9_1.x86_64.rpmBllibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpmFlsamba-devel-4.16.4-103.el9_1.i686.rpmCllibwbclient-devel-4.16.4-103.el9_1.x86_64.rpmNlsamba-test-libs-4.16.4-103.el9_1.x86_64.rpmFlsamba-devel-4.16.4-103.el9_1.x86_64.rpmCllibwbclient-devel-4.16.4-103.el9_1.i686.rpmlsamba-pidl-4.16.4-103.el9_1.noarch.rpmӿ(@ DBBsecurityImportant: edk2 security, bug fix, and enhancement update[ https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165 https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165 >]edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpmw]edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm?]edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm>]edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpmw]edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm?]edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpmA HBBBBBBBBBBsecurityModerate: freeradius security and bug fix update jfhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166 https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166 tPfreeradius-sqlite-3.0.21-37.el9.x86_64.rpmqPfreeradius-perl-3.0.21-37.el9.x86_64.rpmsPfreeradius-rest-3.0.21-37.el9.x86_64.rpmuPfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpmrPfreeradius-postgresql-3.0.21-37.el9.x86_64.rpmpPfreeradius-mysql-3.0.21-37.el9.x86_64.rpmtPfreeradius-sqlite-3.0.21-37.el9.x86_64.rpmqPfreeradius-perl-3.0.21-37.el9.x86_64.rpmsPfreeradius-rest-3.0.21-37.el9.x86_64.rpmuPfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpmrPfreeradius-postgresql-3.0.21-37.el9.x86_64.rpmpPfreeradius-mysql-3.0.21-37.el9.x86_64.rpm:B TBBsecurityModerate: xorg-x11-server security and bug fix update POhttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248 UUxorg-x11-server-source-1.20.11-17.el9.noarch.rpmaUxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmaUxorg-x11-server-devel-1.20.11-17.el9.i686.rpmUUxorg-x11-server-source-1.20.11-17.el9.noarch.rpmaUxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmaUxorg-x11-server-devel-1.20.11-17.el9.i686.rpm>C XBBBBBBBBBBsecurityModerate: poppler security and bug fix update https://access.redhat.com/errata/RHSA-2023:2259RHSA-2023:2259RHSA-2023:2259 https://access.redhat.com/security/cve/CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/21245272124527https://errata.almalinux.org/9/ALSA-2023-2259.htmlALSA-2023:2259ALSA-2023:2259 7poppler-qt5-devel-21.01.0-14.el9.i686.rpm7poppler-qt5-devel-21.01.0-14.el9.x86_64.rpm 7poppler-devel-21.01.0-14.el9.x86_64.rpm 7poppler-cpp-devel-21.01.0-14.el9.i686.rpm 7poppler-cpp-devel-21.01.0-14.el9.x86_64.rpm 7poppler-devel-21.01.0-14.el9.i686.rpm 7poppler-glib-devel-21.01.0-14.el9.i686.rpm 7poppler-glib-devel-21.01.0-14.el9.x86_64.rpm7poppler-qt5-devel-21.01.0-14.el9.i686.rpm7poppler-qt5-devel-21.01.0-14.el9.x86_64.rpm 7poppler-devel-21.01.0-14.el9.x86_64.rpm 7poppler-cpp-devel-21.01.0-14.el9.i686.rpm 7poppler-cpp-devel-21.01.0-14.el9.x86_64.rpm 7poppler-devel-21.01.0-14.el9.i686.rpm 7poppler-glib-devel-21.01.0-14.el9.i686.rpm 7poppler-glib-devel-21.01.0-14.el9.x86_64.rpmSD RSBBBsecurityModerate: bind security and bug fix update 8J https://access.redhat.com/errata/RHSA-2023:2261RHSA-2023:2261RHSA-2023:2261 https://access.redhat.com/security/cve/CVE-2022-2795CVE-2022-2795CVE-2022-2795https://access.redhat.com/security/cve/CVE-2022-3094CVE-2022-3094CVE-2022-3094https://access.redhat.com/security/cve/CVE-2022-3736CVE-2022-3736CVE-2022-3736https://access.redhat.com/security/cve/CVE-2022-3924CVE-2022-3924CVE-2022-3924https://bugzilla.redhat.com/21285842128584https://bugzilla.redhat.com/21640322164032https://bugzilla.redhat.com/21640382164038https://bugzilla.redhat.com/21640392164039https://errata.almalinux.org/9/ALSA-2023-2261.htmlALSA-2023:2261ALSA-2023:2261 V<bind-libs-9.16.23-11.el9.i686.rpmQ<bind-devel-9.16.23-11.el9.x86_64.rpm=<bind-doc-9.16.23-11.el9.noarch.rpmQ<bind-devel-9.16.23-11.el9.i686.rpmV<bind-libs-9.16.23-11.el9.i686.rpmQ<bind-devel-9.16.23-11.el9.x86_64.rpm=<bind-doc-9.16.23-11.el9.noarch.rpmQ<bind-devel-9.16.23-11.el9.i686.rpm[E iBBBBsecurityModerate: freerdp security update fhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326 https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326 ,;freerdp-devel-2.4.1-5.el9.x86_64.rpm/;libwinpr-devel-2.4.1-5.el9.x86_64.rpm/;libwinpr-devel-2.4.1-5.el9.i686.rpm,;freerdp-devel-2.4.1-5.el9.i686.rpm,;freerdp-devel-2.4.1-5.el9.x86_64.rpm/;libwinpr-devel-2.4.1-5.el9.x86_64.rpm/;libwinpr-devel-2.4.1-5.el9.i686.rpm,;freerdp-devel-2.4.1-5.el9.i686.rpm%F osecurityModerate: libtiff security update h>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340 https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340 x+libtiff-tools-4.4.0-7.el9.x86_64.rpmx+libtiff-tools-4.4.0-7.el9.x86_64.rpm4G qBsecurityModerate: unbound security update &9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370 https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370 G unbound-devel-1.16.2-3.el9.x86_64.rpmG unbound-devel-1.16.2-3.el9.i686.rpmG unbound-devel-1.16.2-3.el9.x86_64.rpmG unbound-devel-1.16.2-3.el9.i686.rpmEH tBsecurityModerate: wireshark security and bug fix update _4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373 https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373 1#wireshark-devel-3.4.10-4.el9.i686.rpm1#wireshark-devel-3.4.10-4.el9.x86_64.rpm1#wireshark-devel-3.4.10-4.el9.i686.rpm1#wireshark-devel-3.4.10-4.el9.x86_64.rpm I wBBsecurityImportant: kernel security, bug fix, and enhancement updateSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458 wkernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpmwkernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpmwkernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpmwkernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpmCJ ({BsecurityModerate: device-mapper-multipath security and bug fix update f]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459 https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459 @device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm@device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm@device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm@device-mapper-multipath-devel-0.8.7-20.el9.i686.rpmK ~securityModerate: fwupd security and bug fix update CM https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487 lfwupd-devel-1.8.10-2.el9.alma.x86_64.rpmlfwupd-devel-1.8.10-2.el9.alma.x86_64.rpm}L @BBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement updateJhttps://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519 FEsamba-devel-4.17.5-102.el9.x86_64.rpmCElibwbclient-devel-4.17.5-102.el9.i686.rpmEsamba-pidl-4.17.5-102.el9.noarch.rpmNEsamba-test-libs-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.i686.rpmFEsamba-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.x86_64.rpmdEpython3-samba-test-4.17.5-102.el9.x86_64.rpmBElibsmbclient-devel-4.17.5-102.el9.x86_64.rpmBElibsmbclient-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.i686.rpmCElibwbclient-devel-4.17.5-102.el9.x86_64.rpmMEsamba-test-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.x86_64.rpmFEsamba-devel-4.17.5-102.el9.x86_64.rpmCElibwbclient-devel-4.17.5-102.el9.i686.rpmEsamba-pidl-4.17.5-102.el9.noarch.rpmNEsamba-test-libs-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.i686.rpmFEsamba-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.x86_64.rpmdEpython3-samba-test-4.17.5-102.el9.x86_64.rpmBElibsmbclient-devel-4.17.5-102.el9.x86_64.rpmBElibsmbclient-devel-4.17.5-102.el9.i686.rpm Elibnetapi-devel-4.17.5-102.el9.i686.rpmCElibwbclient-devel-4.17.5-102.el9.x86_64.rpmMEsamba-test-4.17.5-102.el9.x86_64.rpmEpython3-samba-devel-4.17.5-102.el9.x86_64.rpmfM VBsecurityLow: libarchive security updateJYhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532 D=libarchive-devel-3.5.3-4.el9.x86_64.rpmD=libarchive-devel-3.5.3-4.el9.i686.rpmD=libarchive-devel-3.5.3-4.el9.x86_64.rpmD=libarchive-devel-3.5.3-4.el9.i686.rpmN \~BBsecurityLow: lua security updateJmRhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582 }<lua-5.4.4-3.el9.i686.rpm0<lua-devel-5.4.4-3.el9.x86_64.rpm0<lua-devel-5.4.4-3.el9.i686.rpm}<lua-5.4.4-3.el9.i686.rpm0<lua-devel-5.4.4-3.el9.x86_64.rpm0<lua-devel-5.4.4-3.el9.i686.rpmoO ]BsecurityModerate: autotrace security update ?yhttps://access.redhat.com/errata/RHSA-2023:2589RHSA-2023:2589RHSA-2023:2589 https://access.redhat.com/security/cve/CVE-2022-32323CVE-2022-32323CVE-2022-32323https://bugzilla.redhat.com/21074712107471https://errata.almalinux.org/9/ALSA-2023-2589.htmlALSA-2023:2589ALSA-2023:2589 Jautotrace-0.31.1-65.el9.x86_64.rpmJautotrace-0.31.1-65.el9.i686.rpmJautotrace-0.31.1-65.el9.x86_64.rpmJautotrace-0.31.1-65.el9.i686.rpm`P #asecurityModerate: golang-github-cpuguy83-md2man security, bug fix, and enhancement update 8chttps://access.redhat.com/errata/RHSA-2023:2592RHSA-2023:2592RHSA-2023:2592 https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2592.htmlALSA-2023:2592ALSA-2023:2592 mgolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpmmgolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpmoQ dBBBBsecurityImportant: mysql security updateLhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621 https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621 Kmysql-devel-8.0.32-1.el9_2.x86_64.rpmLmysql-test-8.0.32-1.el9_2.x86_64.rpm-mysql-libs-8.0.32-1.el9_2.x86_64.rpmKmysql-devel-8.0.32-1.el9_2.x86_64.rpmLmysql-test-8.0.32-1.el9_2.x86_64.rpm-mysql-libs-8.0.32-1.el9_2.x86_64.rpmhR jBsecurityImportant: cups-filters security updateihttps://access.redhat.com/errata/RHSA-2023:3423RHSA-2023:3423RHSA-2023:3423 https://access.redhat.com/security/cve/CVE-2023-24805CVE-2023-24805CVE-2023-24805https://bugzilla.redhat.com/22030512203051https://errata.almalinux.org/9/ALSA-2023-3423.htmlALSA-2023:3423ALSA-2023:3423 ?cups-filters-devel-1.28.7-11.el9_2.1.i686.rpm?cups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm?cups-filters-devel-1.28.7-11.el9_2.1.i686.rpm?cups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpmS msecurityImportant: .NET 6.0 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:3581RHSA-2023:3581RHSA-2023:3581 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3581.htmlALSA-2023:3581ALSA-2023:3581 m3dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpmm3dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm.T #aBNBBBBBBBBBsecurityImportant: python3.11 security updateyhttps://access.redhat.com/errata/RHSA-2023:3585RHSA-2023:3585RHSA-2023:3585 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3585.htmlALSA-2023:3585ALSA-2023:3585  python3.11-idle-3.11.2-2.el9_2.1.i686.rpm python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm python3.11-test-3.11.2-2.el9_2.1.i686.rpm python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpmc python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm python3.11-debug-3.11.2-2.el9_2.1.i686.rpmb python3.11-3.11.2-2.el9_2.1.i686.rpm python3.11-idle-3.11.2-2.el9_2.1.i686.rpm python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm python3.11-test-3.11.2-2.el9_2.1.i686.rpm python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpmc python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm python3.11-debug-3.11.2-2.el9_2.1.i686.rpmb python3.11-3.11.2-2.el9_2.1.i686.rpmU $zsecurityImportant: .NET 7.0 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:3592RHSA-2023:3592RHSA-2023:3592 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-32032CVE-2023-32032CVE-2023-32032https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126152212615https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3592.htmlALSA-2023:3592ALSA-2023:3592 H?dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpmH?dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpmV &eETBBBBBBBBBsecurityImportant: python3.9 security update+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595 &python3-idle-3.9.16-1.el9_2.1.x86_64.rpm&python3-debug-3.9.16-1.el9_2.1.x86_64.rpm&python3-test-3.9.16-1.el9_2.1.i686.rpm&python3-test-3.9.16-1.el9_2.1.x86_64.rpm&python3-debug-3.9.16-1.el9_2.1.i686.rpm&python3-idle-3.9.16-1.el9_2.1.i686.rpmP&python3-tkinter-3.9.16-1.el9_2.1.i686.rpmO&python3-3.9.16-1.el9_2.1.i686.rpm&python3-idle-3.9.16-1.el9_2.1.x86_64.rpm&python3-debug-3.9.16-1.el9_2.1.x86_64.rpm&python3-test-3.9.16-1.el9_2.1.i686.rpm&python3-test-3.9.16-1.el9_2.1.x86_64.rpm&python3-debug-3.9.16-1.el9_2.1.i686.rpm&python3-idle-3.9.16-1.el9_2.1.i686.rpmP&python3-tkinter-3.9.16-1.el9_2.1.i686.rpmO&python3-3.9.16-1.el9_2.1.i686.rpmxW 'GBBsecurityImportant: texlive security updateA https://access.redhat.com/errata/RHSA-2023:3661RHSA-2023:3661RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700CVE-2023-32700CVE-2023-32700https://bugzilla.redhat.com/22089432208943https://errata.almalinux.org/9/ALSA-2023-3661.htmlALSA-2023:3661ALSA-2023:3661 satexlive-gnu-freefont-20200406-26.el9_2.noarch.rpmfatexlive-lib-devel-20200406-26.el9_2.x86_64.rpmfatexlive-lib-devel-20200406-26.el9_2.i686.rpmsatexlive-gnu-freefont-20200406-26.el9_2.noarch.rpmfatexlive-lib-devel-20200406-26.el9_2.x86_64.rpmfatexlive-lib-devel-20200406-26.el9_2.i686.rpm׺yX (KsecurityModerate: libtiff security update Nphttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711 https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711 x,libtiff-tools-4.4.0-8.el9_2.x86_64.rpmx,libtiff-tools-4.4.0-8.el9_2.x86_64.rpmiY )MBBBBBBBBBBsecurityModerate: postgresql security update >Shttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714 yLpostgresql-docs-13.11-1.el9_2.x86_64.rpm}Lpostgresql-test-13.11-1.el9_2.x86_64.rpm{Lpostgresql-server-devel-13.11-1.el9_2.x86_64.rpmzLpostgresql-private-devel-13.11-1.el9_2.x86_64.rpm~Lpostgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm|Lpostgresql-static-13.11-1.el9_2.x86_64.rpmyLpostgresql-docs-13.11-1.el9_2.x86_64.rpm}Lpostgresql-test-13.11-1.el9_2.x86_64.rpm{Lpostgresql-server-devel-13.11-1.el9_2.x86_64.rpmzLpostgresql-private-devel-13.11-1.el9_2.x86_64.rpm~Lpostgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm|Lpostgresql-static-13.11-1.el9_2.x86_64.rpmZ *YBBBBBBsecurityModerate: libvirt security update }https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715 https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715 libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-devel-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-docs-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-devel-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-docs-9.0.0-10.2.el9_2.x86_64.rpmlibvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm [ +asecurityImportant: kernel security and bug fix updatehttps://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723 .kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm.kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpmV\ ,csecurityImportant: .NET 7.0 security, bug fix, and enhancement updateEhttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057 H@dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpmH@dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpmB] -esecurityImportant: .NET 6.0 security, bug fix, and enhancement updateaFhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060 m4dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpmm4dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm9^ /nzBBBsecurityImportant: bind security update'Nhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099 https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099 Q=bind-devel-9.16.23-11.el9_2.1.x86_64.rpm==bind-doc-9.16.23-11.el9_2.1.noarch.rpmV=bind-libs-9.16.23-11.el9_2.1.i686.rpmQ=bind-devel-9.16.23-11.el9_2.1.i686.rpmQ=bind-devel-9.16.23-11.el9_2.1.x86_64.rpm==bind-doc-9.16.23-11.el9_2.1.noarch.rpmV=bind-libs-9.16.23-11.el9_2.1.i686.rpmQ=bind-devel-9.16.23-11.el9_2.1.i686.rpmٟ _ 0lBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update u"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158 ^%java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmY%java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmd%java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmZ%java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm_%java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmW%java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm\%java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm[%java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm]%java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmb%java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmc%java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmX%java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm`%java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpma%java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm^%java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmY%java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmd%java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmZ%java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm_%java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmW%java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm\%java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm[%java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm]%java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmb%java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmc%java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmX%java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm`%java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpma%java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm ` 1HBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update Nhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177 o7java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmx7java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn7java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmu7java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmq7java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmv7java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmz7java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmr7java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{7java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms7java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmw7java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmt7java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmy7java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmp7java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmo7java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmx7java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn7java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmu7java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmq7java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmv7java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmz7java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmr7java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{7java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms7java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmw7java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmt7java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmy7java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmp7java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{a 2dBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update eyhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178 https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178 ~Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm ~Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmUjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm-b 3xBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update ^https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325 CFlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpmBFlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpmCFlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmFsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpmMFsamba-test-4.17.5-103.el9_2.alma.x86_64.rpmNFsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpmdFpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpmBFlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmFFsamba-devel-4.17.5-103.el9_2.alma.i686.rpmFFsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpmCFlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpmBFlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpmFpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpmCFlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmFsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpmMFsamba-test-4.17.5-103.el9_2.alma.x86_64.rpmNFsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm Flibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpmdFpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpmBFlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmFFsamba-devel-4.17.5-103.el9_2.alma.i686.rpmFFsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm<c 4NBBsecurityImportant: kernel security, bug fix, and enhancement updatef0 https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377 xkernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpmxkernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpmxkernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpmxkernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm0d 5RsecurityImportant: .NET 7.0 security, bug fix, and enhancement updatehttps://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642 HAdotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpmHAdotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpme 6TsecurityImportant: .NET 6.0 security, bug fix, and enhancement update-https://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644 m5dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpmm5dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm/f 7VBBBsecurityImportant: flac security updateDwhttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048 https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048 o0flac-1.3.3-10.el9_2.1.x86_64.rpmB0flac-devel-1.3.3-10.el9_2.1.i686.rpmB0flac-devel-1.3.3-10.el9_2.1.x86_64.rpmo0flac-1.3.3-10.el9_2.1.x86_64.rpmB0flac-devel-1.3.3-10.el9_2.1.i686.rpmB0flac-devel-1.3.3-10.el9_2.1.x86_64.rpm5g 8[securityImportant: kernel security, bug fix, and enhancement update;_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069 /kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm/kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpmxh 9]securityModerate: .NET 6.0 security update Rhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143 m6dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpmm6dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm}i :_securityModerate: .NET 7.0 security update lRhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146 HBdotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpmHBdotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpmnj ;asecurityImportant: libwebp security update>-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214 %libwebp-tools-1.2.0-7.el9_2.x86_64.rpm%libwebp-tools-1.2.0-7.el9_2.x86_64.rpm]k bind-devel-9.16.23-11.el9_2.2.i686.rpmV>bind-libs-9.16.23-11.el9_2.2.i686.rpm=>bind-doc-9.16.23-11.el9_2.2.noarch.rpmQ>bind-devel-9.16.23-11.el9_2.2.x86_64.rpmQ>bind-devel-9.16.23-11.el9_2.2.i686.rpmV>bind-libs-9.16.23-11.el9_2.2.i686.rpm=>bind-doc-9.16.23-11.el9_2.2.noarch.rpmQ>bind-devel-9.16.23-11.el9_2.2.x86_64.rpm~r [securityImportant: dotnet6.0 security update*ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708 m7dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpmm7dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpmps ]securityModerate: nginx security update Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711  nginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm nginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm;t _BBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update jEhttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733 https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733 Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm~Vjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm~Vjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmVjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpmu sBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update /&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744 https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744 b&java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmX&java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmc&java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm[&java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm\&java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmW&java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm^&java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmY&java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpma&java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm]&java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm_&java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm`&java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmZ&java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmd&java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmb&java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmX&java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmc&java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm[&java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm\&java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmW&java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm^&java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmY&java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpma&java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm]&java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm_&java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm`&java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmZ&java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmd&java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm˶ v OsecurityImportant: .NET 7.0 security updateUohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749 HCdotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpmHCdotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpmw QBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update D<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753 z8java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmq8java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpms8java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm{8java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmv8java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmx8java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt8java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmp8java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmo8java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmu8java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmy8java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmr8java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmw8java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmn8java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmz8java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmq8java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpms8java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm{8java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmv8java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmx8java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt8java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmp8java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmo8java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmu8java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmy8java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmr8java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmw8java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmn8java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm˩nx +mBBBsecurityImportant: nghttp2 security update-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838 ~1nghttp2-1.43.0-5.el9_2.1.x86_64.rpm-1libnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm-1libnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm~1nghttp2-1.43.0-5.el9_2.1.x86_64.rpm-1libnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm-1libnghttp2-devel-1.43.0-5.el9_2.1.i686.rpmÙ1y rBsecurityImportant: varnish security update-https://access.redhat.com/errata/RHSA-2023:5924RHSA-2023:5924RHSA-2023:5924 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5924.htmlALSA-2023:5924ALSA-2023:5924 Fvarnish-devel-6.6.2-3.el9_2.1.i686.rpmFvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpmFvarnish-devel-6.6.2-3.el9_2.1.i686.rpmFvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpmzz usecurityModerate: .NET 6.0 security update =Qhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242 m8dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpmm8dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm{v wsecurityModerate: .NET 7.0 security update Qhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246 HDdotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpmHDdotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpmI| SBBeBBBBsecurityImportant: ghostscript security update_https://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265 ghostscript-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.x86_64.rpmghostscript-tools-printing-9.54.0-11.el9_2.i686.rpmghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpmghostscript-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.i686.rpm`libgs-devel-9.54.0-11.el9_2.x86_64.rpmghostscript-tools-printing-9.54.0-11.el9_2.i686.rpmghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm~} WBhBsecurityModerate: edk2 security, bug fix, and enhancement update `Bhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330 https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330 wOedk2-tools-20230524-3.el9.x86_64.rpm>Oedk2-aarch64-20230524-3.el9.noarch.rpm?Oedk2-tools-doc-20230524-3.el9.noarch.rpmOedk2-ovmf-20230524-3.el9.noarch.rpmwOedk2-tools-20230524-3.el9.x86_64.rpm>Oedk2-aarch64-20230524-3.el9.noarch.rpm?Oedk2-tools-doc-20230524-3.el9.noarch.rpmOedk2-ovmf-20230524-3.el9.noarch.rpm~ BBBsecurityModerate: xorg-x11-server security and bug fix update "https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340 aVxorg-x11-server-devel-1.20.11-19.el9.i686.rpmUVxorg-x11-server-source-1.20.11-19.el9.noarch.rpmaVxorg-x11-server-devel-1.20.11-19.el9.x86_64.rpmaVxorg-x11-server-devel-1.20.11-19.el9.i686.rpmUVxorg-x11-server-source-1.20.11-19.el9.noarch.rpmaVxorg-x11-server-devel-1.20.11-19.el9.x86_64.rpmP FBsecurityModerate: LibRaw security update &Ghttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343 https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343 =LibRaw-devel-0.20.2-6.el9.x86_64.rpm=LibRaw-devel-0.20.2-6.el9.i686.rpm=LibRaw-devel-0.20.2-6.el9.x86_64.rpm=LibRaw-devel-0.20.2-6.el9.i686.rpm  IBBsecurityModerate: qt5 security and bug fix update m https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369 https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369 Yqt5-devel-5.15.9-1.el9.noarch.rpm@qt5-qtbase-static-5.15.9-7.el9.x86_64.rpm@qt5-qtbase-static-5.15.9-7.el9.i686.rpmYqt5-devel-5.15.9-1.el9.noarch.rpm@qt5-qtbase-static-5.15.9-7.el9.x86_64.rpm@qt5-qtbase-static-5.15.9-7.el9.i686.rpm] MBBBBBBsecurityModerate: libvirt security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409 https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409 libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm%libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpmlibvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm%libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpmO UsecurityModerate: libfastjson security update [https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431 https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431 libfastjson-devel-0.99.9-5.el9.x86_64.rpmlibfastjson-devel-0.99.9-5.el9.x86_64.rpmv WBsecurityModerate: wireshark security update tGhttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469 https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469 1$wireshark-devel-3.4.10-6.el9.x86_64.rpm1$wireshark-devel-3.4.10-6.el9.i686.rpm1$wireshark-devel-3.4.10-6.el9.x86_64.rpm1$wireshark-devel-3.4.10-6.el9.i686.rpm ZBsecurityModerate: librabbitmq security update ;Whttps://access.redhat.com/errata/RHSA-2023:6482RHSA-2023:6482RHSA-2023:6482 https://access.redhat.com/security/cve/CVE-2023-35789CVE-2023-35789CVE-2023-35789https://bugzilla.redhat.com/22157622215762https://errata.almalinux.org/9/ALSA-2023-6482.htmlALSA-2023:6482ALSA-2023:6482 Wlibrabbitmq-devel-0.11.0-7.el9.i686.rpmWlibrabbitmq-devel-0.11.0-7.el9.x86_64.rpmWlibrabbitmq-devel-0.11.0-7.el9.i686.rpmWlibrabbitmq-devel-0.11.0-7.el9.x86_64.rpm #aB|BBBBBBBBBsecurityModerate: python3.11 security update bhttps://access.redhat.com/errata/RHSA-2023:6494RHSA-2023:6494RHSA-2023:6494 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://access.redhat.com/security/cve/CVE-2023-41105CVE-2023-41105CVE-2023-41105https://bugzilla.redhat.com/22357952235795https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6494.htmlALSA-2023:6494ALSA-2023:6494 python3.11-idle-3.11.5-1.el9_3.x86_64.rpmpython3.11-debug-3.11.5-1.el9_3.x86_64.rpmbpython3.11-3.11.5-1.el9_3.i686.rpmpython3.11-debug-3.11.5-1.el9_3.i686.rpmcpython3.11-tkinter-3.11.5-1.el9_3.i686.rpmpython3.11-test-3.11.5-1.el9_3.x86_64.rpmpython3.11-test-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.x86_64.rpmpython3.11-debug-3.11.5-1.el9_3.x86_64.rpmbpython3.11-3.11.5-1.el9_3.i686.rpmpython3.11-debug-3.11.5-1.el9_3.i686.rpmcpython3.11-tkinter-3.11.5-1.el9_3.i686.rpmpython3.11-test-3.11.5-1.el9_3.x86_64.rpmpython3.11-test-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.i686.rpm? $hBBsecurityModerate: libreoffice security update t/ https://access.redhat.com/errata/RHSA-2023:6508RHSA-2023:6508RHSA-2023:6508 https://access.redhat.com/security/cve/CVE-2022-38745CVE-2022-38745CVE-2022-38745https://access.redhat.com/security/cve/CVE-2023-0950CVE-2023-0950CVE-2023-0950https://access.redhat.com/security/cve/CVE-2023-1183CVE-2023-1183CVE-2023-1183https://access.redhat.com/security/cve/CVE-2023-2255CVE-2023-2255CVE-2023-2255https://bugzilla.redhat.com/21820442182044https://bugzilla.redhat.com/22085062208506https://bugzilla.redhat.com/22101852210185https://bugzilla.redhat.com/22101862210186https://errata.almalinux.org/9/ALSA-2023-6508.htmlALSA-2023:6508ALSA-2023:6508 Ijlibreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpmJjlibreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpmIjlibreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpmJjlibreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm 'eBGBBBsecurityModerate: flatpak security, bug fix, and enhancement update #whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518 https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518 flatpak-devel-1.12.8-1.el9.i686.rpmbflatpak-1.12.8-1.el9.i686.rpmcflatpak-session-helper-1.12.8-1.el9.i686.rpmflatpak-devel-1.12.8-1.el9.x86_64.rpmflatpak-devel-1.12.8-1.el9.i686.rpmbflatpak-1.12.8-1.el9.i686.rpmcflatpak-session-helper-1.12.8-1.el9.i686.rpmflatpak-devel-1.12.8-1.el9.x86_64.rpmT +hBBHBBBBsecurityModerate: ghostscript security and bug fix update rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544 https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544 ghostscript-tools-fonts-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.x86_64.rpmghostscript-9.54.0-13.el9.i686.rpmghostscript-tools-printing-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.i686.rpmghostscript-tools-fonts-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.x86_64.rpmghostscript-9.54.0-13.el9.i686.rpmghostscript-tools-printing-9.54.0-13.el9.i686.rpm`libgs-devel-9.54.0-13.el9.i686.rpm  ,wBsecurityModerate: yajl security update ,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551 https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551 h(yajl-devel-2.1.0-22.el9.i686.rpmh(yajl-devel-2.1.0-22.el9.x86_64.rpmh(yajl-devel-2.1.0-22.el9.i686.rpmh(yajl-devel-2.1.0-22.el9.x86_64.rpm  -zBBsecurityModerate: libmicrohttpd security update 8~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566 https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566 V\libmicrohttpd-devel-0.9.72-5.el9.i686.rpmV\libmicrohttpd-devel-0.9.72-5.el9.x86_64.rpmg\libmicrohttpd-doc-0.9.72-5.el9.noarch.rpmV\libmicrohttpd-devel-0.9.72-5.el9.i686.rpmV\libmicrohttpd-devel-0.9.72-5.el9.x86_64.rpmg\libmicrohttpd-doc-0.9.72-5.el9.noarch.rpmV  .~securityModerate: libtiff security update 6N https://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575 https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575 x$libtiff-tools-4.4.0-10.el9.x86_64.rpmx$libtiff-tools-4.4.0-10.el9.x86_64.rpm}  ,@BBBBsecurityModerate: protobuf-c security update }https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621 https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621 b2protobuf-c-devel-1.3.3-13.el9.i686.rpma2protobuf-c-compiler-1.3.3-13.el9.x86_64.rpmb2protobuf-c-devel-1.3.3-13.el9.x86_64.rpma2protobuf-c-compiler-1.3.3-13.el9.i686.rpmb2protobuf-c-devel-1.3.3-13.el9.i686.rpma2protobuf-c-compiler-1.3.3-13.el9.x86_64.rpmb2protobuf-c-devel-1.3.3-13.el9.x86_64.rpma2protobuf-c-compiler-1.3.3-13.el9.i686.rpm_  /FBsecurityLow: glib2 security and bug fix updateJohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631 *glib2-static-2.68.4-11.el9.x86_64.rpm*glib2-static-2.68.4-11.el9.i686.rpm*glib2-static-2.68.4-11.el9.x86_64.rpm*glib2-static-2.68.4-11.el9.i686.rpm -IBsecurityLow: shadow-utils security and bug fix updateJpYhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632 https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632 P5shadow-utils-subid-devel-4.9-8.el9.i686.rpmP5shadow-utils-subid-devel-4.9-8.el9.x86_64.rpmP5shadow-utils-subid-devel-4.9-8.el9.i686.rpmP5shadow-utils-subid-devel-4.9-8.el9.x86_64.rpm 1p_BBBBBBBBBsecurityModerate: python3.9 security update I https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659 (python3-debug-3.9.18-1.el9_3.x86_64.rpm(python3-test-3.9.18-1.el9_3.i686.rpm(python3-test-3.9.18-1.el9_3.x86_64.rpm(python3-debug-3.9.18-1.el9_3.i686.rpmO(python3-3.9.18-1.el9_3.i686.rpm(python3-idle-3.9.18-1.el9_3.x86_64.rpm(python3-idle-3.9.18-1.el9_3.i686.rpmP(python3-tkinter-3.9.18-1.el9_3.i686.rpm(python3-debug-3.9.18-1.el9_3.x86_64.rpm(python3-test-3.9.18-1.el9_3.i686.rpm(python3-test-3.9.18-1.el9_3.x86_64.rpm(python3-debug-3.9.18-1.el9_3.i686.rpmO(python3-3.9.18-1.el9_3.i686.rpm(python3-idle-3.9.18-1.el9_3.x86_64.rpm(python3-idle-3.9.18-1.el9_3.i686.rpmP(python3-tkinter-3.9.18-1.el9_3.i686.rpmE 2WBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update iK https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667 dGpython3-samba-test-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.i686.rpmBGlibsmbclient-devel-4.18.6-100.el9.x86_64.rpmFGsamba-devel-4.18.6-100.el9.i686.rpmCGlibwbclient-devel-4.18.6-100.el9.i686.rpmGsamba-pidl-4.18.6-100.el9.noarch.rpmGpython3-samba-devel-4.18.6-100.el9.i686.rpmNGsamba-test-libs-4.18.6-100.el9.x86_64.rpmGpython3-samba-devel-4.18.6-100.el9.x86_64.rpmMGsamba-test-4.18.6-100.el9.x86_64.rpmBGlibsmbclient-devel-4.18.6-100.el9.i686.rpmCGlibwbclient-devel-4.18.6-100.el9.x86_64.rpmFGsamba-devel-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.x86_64.rpmdGpython3-samba-test-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.i686.rpmBGlibsmbclient-devel-4.18.6-100.el9.x86_64.rpmFGsamba-devel-4.18.6-100.el9.i686.rpmCGlibwbclient-devel-4.18.6-100.el9.i686.rpmGsamba-pidl-4.18.6-100.el9.noarch.rpmGpython3-samba-devel-4.18.6-100.el9.i686.rpmNGsamba-test-libs-4.18.6-100.el9.x86_64.rpmGpython3-samba-devel-4.18.6-100.el9.x86_64.rpmMGsamba-test-4.18.6-100.el9.x86_64.rpmBGlibsmbclient-devel-4.18.6-100.el9.i686.rpmCGlibwbclient-devel-4.18.6-100.el9.x86_64.rpmFGsamba-devel-4.18.6-100.el9.x86_64.rpm Glibnetapi-devel-4.18.6-100.el9.x86_64.rpm0 /mBsecurityLow: tpm2-tss security and enhancement updateJ4Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685 https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685 g9tpm2-tss-devel-3.2.2-2.el9.i686.rpmg9tpm2-tss-devel-3.2.2-2.el9.x86_64.rpmg9tpm2-tss-devel-3.2.2-2.el9.i686.rpmg9tpm2-tss-devel-3.2.2-2.el9.x86_64.rpm  0pBsecurityLow: procps-ng security and bug fix updateJHhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705 https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705 `<procps-ng-devel-3.3.17-13.el9.x86_64.rpm`<procps-ng-devel-3.3.17-13.el9.i686.rpm`<procps-ng-devel-3.3.17-13.el9.x86_64.rpm`<procps-ng-devel-3.3.17-13.el9.i686.rpm# 3sBBBBBBBBBBBBBBBBsecurityModerate: avahi security update Nhttps://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 )Mavahi-devel-0.8-15.el9.x86_64.rpm'Mavahi-compat-libdns_sd-0.8-15.el9.i686.rpm&Mavahi-compat-howl-devel-0.8-15.el9.i686.rpm'Mavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm&Mavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm)Mavahi-devel-0.8-15.el9.i686.rpm(Mavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm*Mavahi-glib-devel-0.8-15.el9.i686.rpm*Mavahi-glib-devel-0.8-15.el9.x86_64.rpm%Mavahi-compat-howl-0.8-15.el9.i686.rpm%Mavahi-compat-howl-0.8-15.el9.x86_64.rpm(Mavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm )Mavahi-devel-0.8-15.el9.x86_64.rpm'Mavahi-compat-libdns_sd-0.8-15.el9.i686.rpm&Mavahi-compat-howl-devel-0.8-15.el9.i686.rpm'Mavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm&Mavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm)Mavahi-devel-0.8-15.el9.i686.rpm(Mavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm*Mavahi-glib-devel-0.8-15.el9.i686.rpm*Mavahi-glib-devel-0.8-15.el9.x86_64.rpm%Mavahi-compat-howl-0.8-15.el9.i686.rpm%Mavahi-compat-howl-0.8-15.el9.x86_64.rpm(Mavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm EsecurityModerate: python-wheel security update _?https://access.redhat.com/errata/RHSA-2023:6712RHSA-2023:6712RHSA-2023:6712 https://access.redhat.com/security/cve/CVE-2022-40898CVE-2022-40898CVE-2022-40898https://bugzilla.redhat.com/21658642165864https://errata.almalinux.org/9/ALSA-2023-6712.htmlALSA-2023:6712ALSA-2023:6712 qkpython3-wheel-wheel-0.36.2-8.el9.noarch.rpmpkpython3-wheel-0.36.2-8.el9.noarch.rpmqkpython3-wheel-wheel-0.36.2-8.el9.noarch.rpmpkpython3-wheel-0.36.2-8.el9.noarch.rpm& 7tBBSBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732 `libgs-devel-9.54.0-14.el9_3.i686.rpmghostscript-tools-printing-9.54.0-14.el9_3.i686.rpmghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpmghostscript-9.54.0-14.el9_3.i686.rpm`libgs-devel-9.54.0-14.el9_3.x86_64.rpm`libgs-devel-9.54.0-14.el9_3.i686.rpmghostscript-tools-printing-9.54.0-14.el9_3.i686.rpmghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpmghostscript-9.54.0-14.el9_3.i686.rpm`libgs-devel-9.54.0-14.el9_3.x86_64.rpm 8NBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix update https://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738 k9java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmq9java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmh9java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmg9java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmj9java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmr9java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpme9java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmm9java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmo9java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpml9java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmp9java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmf9java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmi9java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmn9java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmk9java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmq9java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmh9java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmg9java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmj9java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmr9java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpme9java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmm9java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmo9java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpml9java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmp9java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmf9java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmi9java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmn9java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm 9jBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update 9Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744 BHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmCHlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmdHpython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmMHsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpmCHlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmHsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpmNHsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmFHsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmFHsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpmBHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmBHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmCHlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmdHpython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmMHsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm Hlibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpmCHlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmHsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpmNHsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmFHsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpmHpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmFHsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpmBHlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm 1@BBBsecurityImportant: nghttp2 security update-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746 ~2nghttp2-1.43.0-5.el9_3.1.x86_64.rpm-2libnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm-2libnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm~2nghttp2-1.43.0-5.el9_3.1.x86_64.rpm-2libnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm-2libnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpml :EsecurityModerate: dotnet8.0 security update ?https://access.redhat.com/errata/RHSA-2023:7253RHSA-2023:7253RHSA-2023:7253 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7253.htmlALSA-2023:7253ALSA-2023:7253 IJdotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpmIJdotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpmٍ ;GsecurityModerate: dotnet7.0 security update [1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255 HEdotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpmHEdotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpmr WBsecurityImportant: gstreamer1-plugins-bad-free security update@https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791 https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791  gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpmM ?securityModerate: ipa security update ]4https://access.redhat.com/errata/RHSA-2024:0141RHSA-2024:0141RHSA-2024:0141 https://access.redhat.com/security/cve/CVE-2023-5455CVE-2023-5455CVE-2023-5455https://bugzilla.redhat.com/22428282242828https://errata.almalinux.org/9/ALSA-2024-0141.htmlALSA-2024:0141ALSA-2024:0141 uQpython3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpmuQpython3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm[ [securityImportant: .NET 7.0 security updateghttps://access.redhat.com/errata/RHSA-2024:0151RHSA-2024:0151RHSA-2024:0151 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0151.htmlALSA-2024:0151ALSA-2024:0151 HFdotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpmHFdotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpmS  ]securityImportant: .NET 8.0 security updatexfhttps://access.redhat.com/errata/RHSA-2024:0152RHSA-2024:0152RHSA-2024:0152 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0152.htmlALSA-2024:0152ALSA-2024:0152 IKdotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpmIKdotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm! _securityImportant: .NET 6.0 security update^ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156 m:dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpmm:dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpmv" aBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateE! https://access.redhat.com/errata/RHSA-2024:0249RHSA-2024:0249RHSA-2024:0249 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0249.htmlALSA-2024:0249ALSA-2024:0249 m;java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmg;java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmk;java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmh;java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmr;java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmn;java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpml;java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmj;java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmi;java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmq;java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmf;java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmo;java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpme;java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmp;java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmm;java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmg;java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmk;java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmh;java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmr;java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmn;java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpml;java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmj;java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmi;java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmq;java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmf;java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmo;java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpme;java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmp;java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm# }BBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix updatef1https://access.redhat.com/errata/RHSA-2024:0265RHSA-2024:0265RHSA-2024:0265 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0265.htmlALSA-2024:0265ALSA-2024:0265 Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm~Wjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm~Wjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmWjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm$ QBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updatephttps://access.redhat.com/errata/RHSA-2024:0266RHSA-2024:0266RHSA-2024:0266 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0266.htmlALSA-2024:0266ALSA-2024:0266 ^'java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm]'java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm`'java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmW'java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmZ'java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmY'java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmb'java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm\'java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmX'java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmc'java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm['java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm_'java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmd'java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpma'java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm^'java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm]'java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm`'java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmW'java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmZ'java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmY'java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmb'java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm\'java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmX'java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmc'java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm['java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm_'java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmd'java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpma'java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmC% mBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update*https://access.redhat.com/errata/RHSA-2024:0267RHSA-2024:0267RHSA-2024:0267 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20932CVE-2024-20932CVE-2024-20932https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577202257720https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0267.htmlALSA-2024:0267ALSA-2024:0267 t+java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr+java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmn+java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms+java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmz+java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmx+java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp+java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmw+java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmq+java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm{+java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmy+java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmu+java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmv+java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmo+java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmt+java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr+java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmn+java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms+java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmz+java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmx+java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp+java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmw+java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmq+java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm{+java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmy+java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmu+java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmv+java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmo+java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm3& GlXBBBBBBBBBsecurityModerate: python3.9 security update 1chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466 )python3-idle-3.9.18-1.el9_3.1.i686.rpmP)python3-tkinter-3.9.18-1.el9_3.1.i686.rpm)python3-idle-3.9.18-1.el9_3.1.x86_64.rpm)python3-debug-3.9.18-1.el9_3.1.i686.rpm)python3-debug-3.9.18-1.el9_3.1.x86_64.rpm)python3-test-3.9.18-1.el9_3.1.i686.rpmO)python3-3.9.18-1.el9_3.1.i686.rpm)python3-test-3.9.18-1.el9_3.1.x86_64.rpm)python3-idle-3.9.18-1.el9_3.1.i686.rpmP)python3-tkinter-3.9.18-1.el9_3.1.i686.rpm)python3-idle-3.9.18-1.el9_3.1.x86_64.rpm)python3-debug-3.9.18-1.el9_3.1.i686.rpm)python3-debug-3.9.18-1.el9_3.1.x86_64.rpm)python3-test-3.9.18-1.el9_3.1.i686.rpmO)python3-3.9.18-1.el9_3.1.i686.rpm)python3-test-3.9.18-1.el9_3.1.x86_64.rpmˤ' TsecurityImportant: dotnet7.0 security updatexhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805 HGdotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpmHGdotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm@( VsecurityImportant: dotnet6.0 security update xhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807 m;dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpmm;dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm2) XsecurityImportant: .NET 8.0 security updatewhttps://access.redhat.com/errata/RHSA-2024:0848RHSA-2024:0848RHSA-2024:0848 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0848.htmlALSA-2024:0848ALSA-2024:0848 ILdotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpmILdotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm * ZBBBBBBBBBBsecurityImportant: postgresql security update{ https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951 }Npostgresql-test-13.14-1.el9_3.x86_64.rpm~Npostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm{Npostgresql-server-devel-13.14-1.el9_3.x86_64.rpmyNpostgresql-docs-13.14-1.el9_3.x86_64.rpm|Npostgresql-static-13.14-1.el9_3.x86_64.rpmzNpostgresql-private-devel-13.14-1.el9_3.x86_64.rpm}Npostgresql-test-13.14-1.el9_3.x86_64.rpm~Npostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm{Npostgresql-server-devel-13.14-1.el9_3.x86_64.rpmyNpostgresql-docs-13.14-1.el9_3.x86_64.rpm|Npostgresql-static-13.14-1.el9_3.x86_64.rpmzNpostgresql-private-devel-13.14-1.el9_3.x86_64.rpm+ fBsecurityImportant: unbound security update[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977 G unbound-devel-1.16.2-3.el9_3.1.i686.rpmG unbound-devel-1.16.2-3.el9_3.1.x86_64.rpmG unbound-devel-1.16.2-3.el9_3.1.i686.rpmG unbound-devel-1.16.2-3.el9_3.1.x86_64.rpm, iBBBBsecurityModerate: kernel security update _https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274 qlibperf-5.14.0-503.15.1.el9_5.x86_64.rpmqkernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpmqkernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpmqlibperf-5.14.0-503.15.1.el9_5.x86_64.rpmqkernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpmqkernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpmn- OB`BsecurityImportant: edk2 security update~6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075 https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075 wPedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpmPedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm?Pedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm>Pedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmwPedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpmPedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm?Pedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm>Pedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmO. rBBBBBBBBBBBsecurityImportant: postgresql security update4`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791 ~9postgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpmy9postgresql-docs-13.18-1.el9_5.x86_64.rpmz9postgresql-private-devel-13.18-1.el9_5.x86_64.rpm.9postgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm|9postgresql-static-13.18-1.el9_5.x86_64.rpm}9postgresql-test-13.18-1.el9_5.x86_64.rpm{9postgresql-server-devel-13.18-1.el9_5.x86_64.rpm~9postgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpmy9postgresql-docs-13.18-1.el9_5.x86_64.rpmz9postgresql-private-devel-13.18-1.el9_5.x86_64.rpm.9postgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm|9postgresql-static-13.18-1.el9_5.x86_64.rpm}9postgresql-test-13.18-1.el9_5.x86_64.rpm{9postgresql-server-devel-13.18-1.el9_5.x86_64.rpmy/ ?securityImportant: ruby security update%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858 gPruby-doc-3.0.7-163.el9_5.noarch.rpmgPruby-doc-3.0.7-163.el9_5.noarch.rpm 0 @BBBBsecurityModerate: kernel security update 9Ahttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939 rkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpmrkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpmrlibperf-5.14.0-503.16.1.el9_5.x86_64.rpmrkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpmrkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpmrlibperf-5.14.0-503.16.1.el9_5.x86_64.rpm(1 UBqBBBBBBBBBsecurityImportant: python3.12 security updatez-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978 https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978 Ipython3.12-debug-3.12.5-2.el9_5.2.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.2.x86_64.rpmJpython3.12-idle-3.12.5-2.el9_5.2.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.2.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.2.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.2.i686.rpmKpython3.12-test-3.12.5-2.el9_5.2.i686.rpmSpython3.12-3.12.5-2.el9_5.2.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.2.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.2.x86_64.rpmJpython3.12-idle-3.12.5-2.el9_5.2.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.2.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.2.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.2.i686.rpmKpython3.12-test-3.12.5-2.el9_5.2.i686.rpmSpython3.12-3.12.5-2.el9_5.2.i686.rpm2 X\_BBBBBBBBBsecurityModerate: python3.9:3.9.21 security update 'https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983 P0python3-tkinter-3.9.21-1.el9_5.i686.rpm0python3-test-3.9.21-1.el9_5.x86_64.rpm0python3-debug-3.9.21-1.el9_5.x86_64.rpm0python3-idle-3.9.21-1.el9_5.i686.rpmO0python3-3.9.21-1.el9_5.i686.rpm0python3-idle-3.9.21-1.el9_5.x86_64.rpm0python3-test-3.9.21-1.el9_5.i686.rpm0python3-debug-3.9.21-1.el9_5.i686.rpmP0python3-tkinter-3.9.21-1.el9_5.i686.rpm0python3-test-3.9.21-1.el9_5.x86_64.rpm0python3-debug-3.9.21-1.el9_5.x86_64.rpm0python3-idle-3.9.21-1.el9_5.i686.rpmO0python3-3.9.21-1.el9_5.i686.rpm0python3-idle-3.9.21-1.el9_5.x86_64.rpm0python3-test-3.9.21-1.el9_5.i686.rpm0python3-debug-3.9.21-1.el9_5.i686.rpmI3 ZBBBBBBBBBBBsecurityModerate: python3.11 security update EMhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111 https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111 python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-debug-3.11.9-7.el9_5.2.i686.rpmpython3.11-debug-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.2.i686.rpmpython3.11-test-3.11.9-7.el9_5.2.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmbpython3.11-3.11.9-7.el9_5.2.i686.rpmpython3.11-idle-3.11.9-7.el9_5.2.i686.rpmpython3.11-idle-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-debug-3.11.9-7.el9_5.2.i686.rpmpython3.11-debug-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.2.i686.rpmpython3.11-test-3.11.9-7.el9_5.2.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmbpython3.11-3.11.9-7.el9_5.2.i686.rpmpython3.11-idle-3.11.9-7.el9_5.2.i686.rpm}4 ]BJBsecurityModerate: edk2:20240524 security update Bhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219 https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219 ?Sedk2-tools-doc-20240524-6.el9_5.3.noarch.rpmSedk2-ovmf-20240524-6.el9_5.3.noarch.rpm>Sedk2-aarch64-20240524-6.el9_5.3.noarch.rpmwSedk2-tools-20240524-6.el9_5.3.x86_64.rpm?Sedk2-tools-doc-20240524-6.el9_5.3.noarch.rpmSedk2-ovmf-20240524-6.el9_5.3.noarch.rpm>Sedk2-aarch64-20240524-6.el9_5.3.noarch.rpmwSedk2-tools-20240524-6.el9_5.3.x86_64.rpmV5 -jBsecurityModerate: unbound:1.16.2 security update T https://access.redhat.com/errata/RHSA-2024:11232RHSA-2024:11232RHSA-2024:11232 https://access.redhat.com/security/cve/CVE-2024-8508CVE-2024-8508CVE-2024-8508https://bugzilla.redhat.com/23163212316321https://errata.almalinux.org/9/ALSA-2024-11232.htmlALSA-2024:11232ALSA-2024:11232 Gunbound-devel-1.16.2-8.el9_5.1.i686.rpmGunbound-devel-1.16.2-8.el9_5.1.x86_64.rpmGunbound-devel-1.16.2-8.el9_5.1.i686.rpmGunbound-devel-1.16.2-8.el9_5.1.x86_64.rpm~6 1nBsecurityModerate: libsndfile:1.0.31 security update _+https://access.redhat.com/errata/RHSA-2024:11237RHSA-2024:11237RHSA-2024:11237 https://access.redhat.com/security/cve/CVE-2024-50612CVE-2024-50612CVE-2024-50612https://bugzilla.redhat.com/23220572322057https://errata.almalinux.org/9/ALSA-2024-11237.htmlALSA-2024:11237ALSA-2024:11237 G libsndfile-devel-1.0.31-8.el9_5.2.i686.rpmG libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpmG libsndfile-devel-1.0.31-8.el9_5.2.i686.rpmG libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm:7 rBsecurityModerate: mpg123:1.32.9 security update qhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242 https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242 ]mpg123-devel-1.32.9-1.el9_5.i686.rpm]mpg123-devel-1.32.9-1.el9_5.x86_64.rpm]mpg123-devel-1.32.9-1.el9_5.i686.rpm]mpg123-devel-1.32.9-1.el9_5.x86_64.rpm8 !uBBBBsecurityModerate: mysql security update {thttps://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141 https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141 L mysql-test-8.0.36-1.el9_3.x86_64.rpmK mysql-devel-8.0.36-1.el9_3.x86_64.rpm- mysql-libs-8.0.36-1.el9_3.x86_64.rpmL mysql-test-8.0.36-1.el9_3.x86_64.rpmK mysql-devel-8.0.36-1.el9_3.x86_64.rpm- mysql-libs-8.0.36-1.el9_3.x86_64.rpmy9 "{BBBBsecurityModerate: kernel security update oc$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486 slibperf-5.14.0-503.19.1.el9_5.x86_64.rpmskernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpmskernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpmslibperf-5.14.0-503.19.1.el9_5.x86_64.rpmskernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpmskernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpma: 4ABsecurityModerate: opencryptoki security update RWhttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239 https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239 ^;opencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm^;opencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm^;opencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm^;opencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpmD; #DsecurityModerate: .NET 7.0 security update )Fhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309 HHdotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpmHHdotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm˥s< $FsecurityModerate: .NET 8.0 security update oEhttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310 IMdotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpmIMdotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpme= %HBBsecurityImportant: libreoffice security update4https://access.redhat.com/errata/RHSA-2024:1427RHSA-2024:1427RHSA-2024:1427 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-1427.htmlALSA-2024:1427ALSA-2024:1427 Iklibreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpmJklibreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpmIklibreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpmJklibreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpmz> &LBsecurityImportant: varnish security updateGthttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691 https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691 Gvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpmGvarnish-devel-6.6.2-4.el9_3.1.i686.rpmGvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpmGvarnish-devel-6.6.2-4.el9_3.1.i686.rpm=? 'OBsecurityImportant: unbound security update;6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750 https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750 Gunbound-devel-1.16.2-3.el9_3.5.x86_64.rpmGunbound-devel-1.16.2-3.el9_3.5.i686.rpmGunbound-devel-1.16.2-3.el9_3.5.x86_64.rpmGunbound-devel-1.16.2-3.el9_3.5.i686.rpmF@ )hkBBBsecurityImportant: bind security updateqGhttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789 Q?bind-devel-9.16.23-14.el9_3.4.x86_64.rpm=?bind-doc-9.16.23-14.el9_3.4.noarch.rpmQ?bind-devel-9.16.23-14.el9_3.4.i686.rpmV?bind-libs-9.16.23-14.el9_3.4.i686.rpmQ?bind-devel-9.16.23-14.el9_3.4.x86_64.rpm=?bind-doc-9.16.23-14.el9_3.4.noarch.rpmQ?bind-devel-9.16.23-14.el9_3.4.i686.rpmV?bind-libs-9.16.23-14.el9_3.4.i686.rpmA *WBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update 8 https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818 Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm~Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm~Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmhB +kBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update Wn https://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822 `(java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmY(java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmZ(java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm[(java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmd(java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmW(java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpma(java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmb(java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm\(java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm](java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmc(java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm_(java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmX(java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm^(java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm`(java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmY(java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmZ(java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm[(java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmd(java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmW(java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpma(java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmb(java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm\(java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm](java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmc(java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm_(java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmX(java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm^(java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmQC ,GBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update E$ https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825 p,java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmz,java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmn,java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpms,java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmx,java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmy,java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmv,java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmq,java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmr,java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmu,java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm{,java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmw,java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmt,java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo,java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmp,java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmz,java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmn,java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpms,java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmx,java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmy,java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmv,java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmq,java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmr,java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmu,java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm{,java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmw,java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmt,java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo,java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm(D -cBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update iHhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828 m<java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmj<java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmi<java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmo<java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmg<java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmh<java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmf<java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmr<java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmq<java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmk<java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmp<java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpme<java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmn<java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpml<java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmm<java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmj<java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmi<java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmo<java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmg<java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmh<java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmf<java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmr<java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmq<java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmk<java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmp<java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpme<java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmn<java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpml<java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmVE .BsecurityLow: LibRaw security updateJ1https://access.redhat.com/errata/RHSA-2024:2137RHSA-2024:2137RHSA-2024:2137 https://access.redhat.com/security/cve/CVE-2023-1729CVE-2023-1729CVE-2023-1729https://bugzilla.redhat.com/21882402188240https://errata.almalinux.org/9/ALSA-2024-2137.htmlALSA-2024:2137ALSA-2024:2137 =LibRaw-devel-0.21.1-1.el9.i686.rpm=LibRaw-devel-0.21.1-1.el9.x86_64.rpm=LibRaw-devel-0.21.1-1.el9.i686.rpm=LibRaw-devel-0.21.1-1.el9.x86_64.rpmIF /securityModerate: ipa security update Iuhttps://access.redhat.com/errata/RHSA-2024:2147RHSA-2024:2147RHSA-2024:2147 https://access.redhat.com/security/cve/CVE-2024-1481CVE-2024-1481CVE-2024-1481https://bugzilla.redhat.com/22621692262169https://errata.almalinux.org/9/ALSA-2024-2147.htmlALSA-2024:2147ALSA-2024:2147 uSpython3-ipatests-4.11.0-9.el9_4.noarch.rpmuSpython3-ipatests-4.11.0-9.el9_4.noarch.rpm G 0CBBsecurityModerate: xorg-x11-server security update >https://access.redhat.com/errata/RHSA-2024:2169RHSA-2024:2169RHSA-2024:2169 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22447362244736https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2169.htmlALSA-2024:2169ALSA-2024:2169 UWxorg-x11-server-source-1.20.11-24.el9.noarch.rpmaWxorg-x11-server-devel-1.20.11-24.el9.x86_64.rpmaWxorg-x11-server-devel-1.20.11-24.el9.i686.rpmUWxorg-x11-server-source-1.20.11-24.el9.noarch.rpmaWxorg-x11-server-devel-1.20.11-24.el9.x86_64.rpmaWxorg-x11-server-devel-1.20.11-24.el9.i686.rpm$H 1GBsecurityModerate: libsndfile security update >&https://access.redhat.com/errata/RHSA-2024:2184RHSA-2024:2184RHSA-2024:2184 https://access.redhat.com/security/cve/CVE-2022-33065CVE-2022-33065CVE-2022-33065https://bugzilla.redhat.com/22389342238934https://errata.almalinux.org/9/ALSA-2024-2184.htmlALSA-2024:2184ALSA-2024:2184 Glibsndfile-devel-1.0.31-8.el9.i686.rpmGlibsndfile-devel-1.0.31-8.el9.x86_64.rpmGlibsndfile-devel-1.0.31-8.el9.i686.rpmGlibsndfile-devel-1.0.31-8.el9.x86_64.rpmSI 2JBsecurityImportant: pmix security updated:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199 https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199 _:pmix-pmi-devel-3.2.3-5.el9.i686.rpm_:pmix-pmi-devel-3.2.3-5.el9.x86_64.rpm_:pmix-pmi-devel-3.2.3-5.el9.i686.rpm_:pmix-pmi-devel-3.2.3-5.el9.x86_64.rpmWJ 3MBBBBBsecurityModerate: libnbd security update <https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204 https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204 F!libnbd-devel-1.18.1-3.el9.x86_64.rpm !ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpmF!libnbd-devel-1.18.1-3.el9.i686.rpm !ocaml-libnbd-1.18.1-3.el9.x86_64.rpmF!libnbd-devel-1.18.1-3.el9.x86_64.rpm !ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpmF!libnbd-devel-1.18.1-3.el9.i686.rpm !ocaml-libnbd-1.18.1-3.el9.x86_64.rpmLK 4TBBBBsecurityModerate: freerdp security update Zihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208 https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208 /9libwinpr-devel-2.11.2-1.el9.i686.rpm/9libwinpr-devel-2.11.2-1.el9.x86_64.rpm,9freerdp-devel-2.11.2-1.el9.x86_64.rpm,9freerdp-devel-2.11.2-1.el9.i686.rpm/9libwinpr-devel-2.11.2-1.el9.i686.rpm/9libwinpr-devel-2.11.2-1.el9.x86_64.rpm,9freerdp-devel-2.11.2-1.el9.x86_64.rpm,9freerdp-devel-2.11.2-1.el9.i686.rpmL 5ZBBBBsecurityModerate: libvirt security update Chttps://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236 https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236 Xlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpmXlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm%Xlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpmXlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpmXlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm%Xlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpmiM 6`BBsecurityImportant: edk2 security updateYjhttps://access.redhat.com/errata/RHSA-2024:2264RHSA-2024:2264RHSA-2024:2264 https://access.redhat.com/security/cve/CVE-2022-36763CVE-2022-36763CVE-2022-36763https://access.redhat.com/security/cve/CVE-2022-36764CVE-2022-36764CVE-2022-36764https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-45229CVE-2023-45229CVE-2023-45229https://access.redhat.com/security/cve/CVE-2023-45231CVE-2023-45231CVE-2023-45231https://access.redhat.com/security/cve/CVE-2023-45232CVE-2023-45232CVE-2023-45232https://access.redhat.com/security/cve/CVE-2023-45233CVE-2023-45233CVE-2023-45233https://access.redhat.com/security/cve/CVE-2023-45235CVE-2023-45235CVE-2023-45235https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22575822257582https://bugzilla.redhat.com/22575832257583https://bugzilla.redhat.com/22586772258677https://bugzilla.redhat.com/22586882258688https://bugzilla.redhat.com/22586912258691https://bugzilla.redhat.com/22586942258694https://bugzilla.redhat.com/22587002258700https://errata.almalinux.org/9/ALSA-2024-2264.htmlALSA-2024:2264ALSA-2024:2264 >^edk2-aarch64-20231122-6.el9.noarch.rpmw^edk2-tools-20231122-6.el9.x86_64.rpm?^edk2-tools-doc-20231122-6.el9.noarch.rpm>^edk2-aarch64-20231122-6.el9.noarch.rpmw^edk2-tools-20231122-6.el9.x86_64.rpm?^edk2-tools-doc-20231122-6.el9.noarch.rpmhN 7dBsecurityModerate: qt5-qtbase security update Cshttps://access.redhat.com/errata/RHSA-2024:2276RHSA-2024:2276RHSA-2024:2276 https://access.redhat.com/security/cve/CVE-2023-51714CVE-2023-51714CVE-2023-51714https://access.redhat.com/security/cve/CVE-2024-25580CVE-2024-25580CVE-2024-25580https://bugzilla.redhat.com/22558562255856https://bugzilla.redhat.com/22644232264423https://errata.almalinux.org/9/ALSA-2024-2276.htmlALSA-2024:2276ALSA-2024:2276 Aqt5-qtbase-static-5.15.9-9.el9.i686.rpmAqt5-qtbase-static-5.15.9-9.el9.x86_64.rpmAqt5-qtbase-static-5.15.9-9.el9.i686.rpmAqt5-qtbase-static-5.15.9-9.el9.x86_64.rpmeO 8gBsecurityModerate: gstreamer1-plugins-bad-free security update 6P https://access.redhat.com/errata/RHSA-2024:2287RHSA-2024:2287RHSA-2024:2287 https://access.redhat.com/security/cve/CVE-2023-40474CVE-2023-40474CVE-2023-40474https://access.redhat.com/security/cve/CVE-2023-40475CVE-2023-40475CVE-2023-40475https://access.redhat.com/security/cve/CVE-2023-40476CVE-2023-40476CVE-2023-40476https://access.redhat.com/security/cve/CVE-2023-50186CVE-2023-50186CVE-2023-50186https://bugzilla.redhat.com/22545872254587https://bugzilla.redhat.com/22545882254588https://bugzilla.redhat.com/22545892254589https://bugzilla.redhat.com/22556392255639https://errata.almalinux.org/9/ALSA-2024-2287.htmlALSA-2024:2287ALSA-2024:2287  gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpmkP 9jsecurityModerate: libtiff security update : https://access.redhat.com/errata/RHSA-2024:2289RHSA-2024:2289RHSA-2024:2289 https://access.redhat.com/security/cve/CVE-2022-40090CVE-2022-40090CVE-2022-40090https://access.redhat.com/security/cve/CVE-2023-3618CVE-2023-3618CVE-2023-3618https://access.redhat.com/security/cve/CVE-2023-40745CVE-2023-40745CVE-2023-40745https://access.redhat.com/security/cve/CVE-2023-41175CVE-2023-41175CVE-2023-41175https://access.redhat.com/security/cve/CVE-2023-6228CVE-2023-6228CVE-2023-6228https://bugzilla.redhat.com/22158652215865https://bugzilla.redhat.com/22349702234970https://bugzilla.redhat.com/22352642235264https://bugzilla.redhat.com/22352652235265https://bugzilla.redhat.com/22409952240995https://errata.almalinux.org/9/ALSA-2024-2289.htmlALSA-2024:2289ALSA-2024:2289 x%libtiff-tools-4.4.0-12.el9.x86_64.rpmx%libtiff-tools-4.4.0-12.el9.x86_64.rpmQ }BBsecurityModerate: mingw components security update Bhttps://access.redhat.com/errata/RHSA-2024:2353RHSA-2024:2353RHSA-2024:2353 https://access.redhat.com/security/cve/CVE-2023-1579CVE-2023-1579CVE-2023-1579https://bugzilla.redhat.com/21809052180905https://errata.almalinux.org/9/ALSA-2024-2353.htmlALSA-2024:2353ALSA-2024:2353 7pmingw64-binutils-2.41-3.el9.x86_64.rpm2pmingw32-binutils-2.41-3.el9.x86_64.rpm7pmingw64-binutils-2.41-3.el9.x86_64.rpm2pmingw32-binutils-2.41-3.el9.x86_64.rpm/T ?ABsecurityModerate: zziplib security update Fhttps://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377 https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377 Szziplib-devel-0.13.71-11.el9_4.x86_64.rpmSzziplib-devel-0.13.71-11.el9_4.i686.rpmSzziplib-devel-0.13.71-11.el9_4.x86_64.rpmSzziplib-devel-0.13.71-11.el9_4.i686.rpm/U DBBBBsecurityImportant: kernel security, bug fix, and enhancement updateT%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394 https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671clibperf-5.14.0-427.13.1.el9_4.x86_64.rpmckernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpmckernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpmclibperf-5.14.0-427.13.1.el9_4.x86_64.rpmckernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpmckernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpmV JBBBBBBBBBBBBBBBBsecurityModerate: avahi security update yO https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433 )Navahi-devel-0.8-20.el9.i686.rpm*Navahi-glib-devel-0.8-20.el9.x86_64.rpm'Navahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm(Navahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm%Navahi-compat-howl-0.8-20.el9.i686.rpm)Navahi-devel-0.8-20.el9.x86_64.rpm'Navahi-compat-libdns_sd-0.8-20.el9.i686.rpm%Navahi-compat-howl-0.8-20.el9.x86_64.rpm&Navahi-compat-howl-devel-0.8-20.el9.i686.rpm&Navahi-compat-howl-devel-0.8-20.el9.x86_64.rpm(Navahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm*Navahi-glib-devel-0.8-20.el9.i686.rpm )Navahi-devel-0.8-20.el9.i686.rpm*Navahi-glib-devel-0.8-20.el9.x86_64.rpm'Navahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm(Navahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm%Navahi-compat-howl-0.8-20.el9.i686.rpm)Navahi-devel-0.8-20.el9.x86_64.rpm'Navahi-compat-libdns_sd-0.8-20.el9.i686.rpm%Navahi-compat-howl-0.8-20.el9.x86_64.rpm&Navahi-compat-howl-devel-0.8-20.el9.i686.rpm&Navahi-compat-howl-devel-0.8-20.el9.x86_64.rpm(Navahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm*Navahi-glib-devel-0.8-20.el9.i686.rpmtW \securityModerate: systemd security update Hhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463 https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 G systemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpmG systemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpmX ^BsecurityLow: file security updateJIBhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512 https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512 NBfile-devel-5.39-16.el9.i686.rpmNBfile-devel-5.39-16.el9.x86_64.rpmNBfile-devel-5.39-16.el9.i686.rpmNBfile-devel-5.39-16.el9.x86_64.rpmY #asecurityModerate: mingw-pixman security update https://access.redhat.com/errata/RHSA-2024:2525RHSA-2024:2525RHSA-2024:2525 https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2024-2525.htmlALSA-2024:2525ALSA-2024:2525 hjmingw32-pixman-0.42.2-3.el9.noarch.rpmkjmingw64-pixman-0.42.2-3.el9.noarch.rpmhjmingw32-pixman-0.42.2-3.el9.noarch.rpmkjmingw64-pixman-0.42.2-3.el9.noarch.rpmuZ (dBBsecurityLow: mingw-glib2 security updateJ% https://access.redhat.com/errata/RHSA-2024:2528RHSA-2024:2528RHSA-2024:2528 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32636CVE-2023-32636CVE-2023-32636https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://bugzilla.redhat.com/22118332211833https://errata.almalinux.org/9/ALSA-2024-2528.htmlALSA-2024:2528ALSA-2024:2528 ,\mingw64-glib2-static-2.78.0-1.el9.noarch.rpm+\mingw64-glib2-2.78.0-1.el9.noarch.rpm)\mingw32-glib2-2.78.0-1.el9.noarch.rpm*\mingw32-glib2-static-2.78.0-1.el9.noarch.rpm,\mingw64-glib2-static-2.78.0-1.el9.noarch.rpm+\mingw64-glib2-2.78.0-1.el9.noarch.rpm)\mingw32-glib2-2.78.0-1.el9.noarch.rpm*\mingw32-glib2-static-2.78.0-1.el9.noarch.rpmT[ DfBBBsecurityImportant: bind security updateDhttps://access.redhat.com/errata/RHSA-2024:2551RHSA-2024:2551RHSA-2024:2551 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-2551.htmlALSA-2024:2551ALSA-2024:2551 V@bind-libs-9.16.23-18.el9_4.1.i686.rpmQ@bind-devel-9.16.23-18.el9_4.1.i686.rpmQ@bind-devel-9.16.23-18.el9_4.1.x86_64.rpm=@bind-doc-9.16.23-18.el9_4.1.noarch.rpmV@bind-libs-9.16.23-18.el9_4.1.i686.rpmQ@bind-devel-9.16.23-18.el9_4.1.i686.rpmQ@bind-devel-9.16.23-18.el9_4.1.x86_64.rpm=@bind-doc-9.16.23-18.el9_4.1.noarch.rpm)\ nBBBBsecurityModerate: libvirt security and bug fix update R2https://access.redhat.com/errata/RHSA-2024:2560RHSA-2024:2560RHSA-2024:2560 https://access.redhat.com/security/cve/CVE-2024-1441CVE-2024-1441CVE-2024-1441https://access.redhat.com/security/cve/CVE-2024-2494CVE-2024-2494CVE-2024-2494https://bugzilla.redhat.com/22638412263841https://bugzilla.redhat.com/22701152270115https://errata.almalinux.org/9/ALSA-2024-2560.htmlALSA-2024:2560ALSA-2024:2560 Vlibvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpmVlibvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm%Vlibvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpmVlibvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpmVlibvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm%Vlibvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm!] tBsecurityModerate: sssd security and bug fix update Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571 H0libsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpmH0libsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpmH0libsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpmH0libsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpmC^ wBBBBsecurityModerate: kernel security and bug fix update L&https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758 https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743dkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpmdlibperf-5.14.0-427.16.1.el9_4.x86_64.rpmdkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpmdkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpmdlibperf-5.14.0-427.16.1.el9_4.x86_64.rpmdkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpmh_ }securityImportant: .NET 8.0 security updater"https://access.redhat.com/errata/RHSA-2024:2842RHSA-2024:2842RHSA-2024:2842 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2842.htmlALSA-2024:2842ALSA-2024:2842 INdotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpmINdotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpmC` securityImportant: .NET 7.0 security update#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843 HIdotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpmHIdotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpmla ABBBBsecurityModerate: kernel security and bug fix update 7x https://access.redhat.com/errata/RHSA-2024:3306RHSA-2024:3306RHSA-2024:3306 https://bugzilla.redhat.com/22708792270879https://bugzilla.redhat.com/22708812270881https://bugzilla.redhat.com/22728162272816https://bugzilla.redhat.com/22734232273423https://errata.almalinux.org/9/ALSA-2024-3306.htmlALSA-2024:3306ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.htmlCVE-2024-26642CVE-2024-26642https://www.redhat.com/security/data/cve/CVE-2024-26643.htmlCVE-2024-26643CVE-2024-26643https://www.redhat.com/security/data/cve/CVE-2024-26673.htmlCVE-2024-26673CVE-2024-26673https://www.redhat.com/security/data/cve/CVE-2024-26804.htmlCVE-2024-26804CVE-2024-26804https://www.redhat.com/security/data/cve/CVE-2024-35890.htmlCVE-2024-35890CVE-2024-35890elibperf-5.14.0-427.18.1.el9_4.x86_64.rpmekernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpmekernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpmelibperf-5.14.0-427.18.1.el9_4.x86_64.rpmekernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpmekernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpmb GBBBBBBBBBBBBsecurityImportant: glibc security update/ https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339 Heglibc-benchtests-2.34-100.el9_4.2.x86_64.rpmDenss_db-2.34-100.el9_4.2.i686.rpmAeglibc-static-2.34-100.el9_4.2.x86_64.rpmAeglibc-static-2.34-100.el9_4.2.i686.rpm@eglibc-nss-devel-2.34-100.el9_4.2.i686.rpmEenss_hesiod-2.34-100.el9_4.2.i686.rpmEenss_hesiod-2.34-100.el9_4.2.x86_64.rpmDenss_db-2.34-100.el9_4.2.x86_64.rpm@eglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm Heglibc-benchtests-2.34-100.el9_4.2.x86_64.rpmDenss_db-2.34-100.el9_4.2.i686.rpmAeglibc-static-2.34-100.el9_4.2.x86_64.rpmAeglibc-static-2.34-100.el9_4.2.i686.rpm@eglibc-nss-devel-2.34-100.el9_4.2.i686.rpmEenss_hesiod-2.34-100.el9_4.2.i686.rpmEenss_hesiod-2.34-100.el9_4.2.x86_64.rpmDenss_db-2.34-100.el9_4.2.x86_64.rpm@eglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpmtc 5UBBBsecurityModerate: nghttp2 security update ?mhttps://access.redhat.com/errata/RHSA-2024:3501RHSA-2024:3501RHSA-2024:3501 https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22686392268639https://errata.almalinux.org/9/ALSA-2024-3501.htmlALSA-2024:3501ALSA-2024:3501 -3libnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm~3nghttp2-1.43.0-5.el9_4.3.x86_64.rpm-3libnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm-3libnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm~3nghttp2-1.43.0-5.el9_4.3.x86_64.rpm-3libnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm>d ZBBBBsecurityModerate: kernel security and bug fix update ,bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619 flibperf-5.14.0-427.20.1.el9_4.x86_64.rpmfkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpmfkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpmflibperf-5.14.0-427.20.1.el9_4.x86_64.rpmfkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpmfkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpmFe  securityImportant: ipa security updatewhttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754 https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754 uRpython3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpmuRpython3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpmѧmf aBBsecurityImportant: libreoffice security updateXhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835 Illibreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmJllibreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmIllibreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmJllibreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmg esecurityImportant: 389-ds-base security update]mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837 https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837 `389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm`389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpmh 'securityModerate: ruby security update JXhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838 gOruby-doc-3.0.7-162.el9_4.noarch.rpmgOruby-doc-3.0.7-162.el9_4.noarch.rpmi RBVBBBsecurityImportant: flatpak security update"|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959 https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959 bflatpak-1.12.9-1.el9_4.i686.rpmflatpak-devel-1.12.9-1.el9_4.x86_64.rpmcflatpak-session-helper-1.12.9-1.el9_4.i686.rpmflatpak-devel-1.12.9-1.el9_4.i686.rpmbflatpak-1.12.9-1.el9_4.i686.rpmflatpak-devel-1.12.9-1.el9_4.x86_64.rpmcflatpak-session-helper-1.12.9-1.el9_4.i686.rpmflatpak-devel-1.12.9-1.el9_4.i686.rpm@j UBBWBBBBsecurityImportant: ghostscript security updateqhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999 https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999 ghostscript-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.i686.rpmghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.x86_64.rpmghostscript-tools-printing-9.54.0-16.el9_4.i686.rpmghostscript-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.i686.rpmghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm`libgs-devel-9.54.0-16.el9_4.x86_64.rpmghostscript-tools-printing-9.54.0-16.el9_4.i686.rpmЧk YBZBBBBBBBBBsecurityImportant: python3.11 security update0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077 python3.11-test-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpmpython3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmbpython3.11-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpmpython3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmbpython3.11-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.1.i686.rpmIl \[IBBBBBBBBBsecurityImportant: python3.9 security update?https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078 *python3-idle-3.9.18-3.el9_4.1.i686.rpm*python3-test-3.9.18-3.el9_4.1.x86_64.rpmP*python3-tkinter-3.9.18-3.el9_4.1.i686.rpm*python3-test-3.9.18-3.el9_4.1.i686.rpm*python3-debug-3.9.18-3.el9_4.1.x86_64.rpmO*python3-3.9.18-3.el9_4.1.i686.rpm*python3-idle-3.9.18-3.el9_4.1.x86_64.rpm*python3-debug-3.9.18-3.el9_4.1.i686.rpm*python3-idle-3.9.18-3.el9_4.1.i686.rpm*python3-test-3.9.18-3.el9_4.1.x86_64.rpmP*python3-tkinter-3.9.18-3.el9_4.1.i686.rpm*python3-test-3.9.18-3.el9_4.1.i686.rpm*python3-debug-3.9.18-3.el9_4.1.x86_64.rpmO*python3-3.9.18-3.el9_4.1.i686.rpm*python3-idle-3.9.18-3.el9_4.1.x86_64.rpm*python3-debug-3.9.18-3.el9_4.1.i686.rpm#m IBBBBsecurityModerate: kernel security and bug fix update Thttps://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 gkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpmglibperf-5.14.0-427.24.1.el9_4.x86_64.rpmgkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpmgkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpmglibperf-5.14.0-427.24.1.el9_4.x86_64.rpmgkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpmrn OsecurityModerate: dotnet6.0 security update bJhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439 https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439 m<dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpmm<dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpmIo QsecurityImportant: dotnet8.0 security update,&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450 https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450 IOdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpmIOdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm p !SBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateRPhttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563 Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm~Yjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm~Yjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpmYjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm+q "gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update"Ohttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567 \)java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm^)java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmY)java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm])java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm[)java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmW)java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmd)java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpma)java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmb)java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm_)java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm`)java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmX)java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmZ)java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmc)java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm\)java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm^)java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmY)java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm])java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm[)java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmW)java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmd)java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpma)java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmb)java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm_)java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm`)java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmX)java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmZ)java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmc)java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmwr #CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updateqi https://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568 o-java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmx-java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmq-java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmw-java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmv-java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmu-java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmy-java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn-java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmr-java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm{-java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmp-java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmz-java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpms-java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmt-java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmo-java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmx-java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmq-java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmw-java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmv-java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmu-java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmy-java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn-java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmr-java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm{-java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmp-java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmz-java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpms-java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmt-java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmns $_BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateZi https://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573 i=java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmk=java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmj=java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmr=java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpme=java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmn=java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmm=java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmq=java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmg=java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmp=java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpml=java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmf=java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmo=java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmh=java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmi=java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmk=java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmj=java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmr=java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpme=java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmn=java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmm=java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmq=java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmg=java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmp=java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpml=java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmf=java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmo=java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmh=java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmt %{BBBBsecurityImportant: kernel security updateC$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583 hkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpmhkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpmhlibperf-5.14.0-427.26.1.el9_4.x86_64.rpmhkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpmhkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpmhlibperf-5.14.0-427.26.1.el9_4.x86_64.rpmu &ABsecurityImportant: qt5-qtbase security update]@https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623 https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623 >qt5-qtbase-static-5.15.9-10.el9_4.i686.rpm>qt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm>qt5-qtbase-static-5.15.9-10.el9_4.i686.rpm>qt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpmv )gB]BsecurityModerate: edk2 security update Lhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749 https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749 Qedk2-ovmf-20231122-6.el9_4.2.noarch.rpm>Qedk2-aarch64-20231122-6.el9_4.2.noarch.rpm?Qedk2-tools-doc-20231122-6.el9_4.2.noarch.rpmwQedk2-tools-20231122-6.el9_4.2.x86_64.rpmQedk2-ovmf-20231122-6.el9_4.2.noarch.rpm>Qedk2-aarch64-20231122-6.el9_4.2.noarch.rpm?Qedk2-tools-doc-20231122-6.el9_4.2.noarch.rpmwQedk2-tools-20231122-6.el9_4.2.x86_64.rpmKw *GBBsecurityModerate: libreoffice security update ihttps://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755 https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755 Jmlibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmImlibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmJmlibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmImlibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%x +KBsecurityModerate: libuv security update whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756 https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756 \ libuv-devel-1.42.0-2.el9_4.x86_64.rpm\ libuv-devel-1.42.0-2.el9_4.i686.rpm\ libuv-devel-1.42.0-2.el9_4.x86_64.rpm\ libuv-devel-1.42.0-2.el9_4.i686.rpm5y ,NBBBBsecurityModerate: libvirt security update w\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757 https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757 Wlibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm%Wlibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpmWlibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpmWlibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm%Wlibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpmWlibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpmz /mBgBBBBBBBBBsecurityLow: python3 security updateJS,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766 python3.11-debug-3.11.7-1.el9_4.3.i686.rpmpython3.11-test-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-test-3.11.7-1.el9_4.3.i686.rpmpython3.11-idle-3.11.7-1.el9_4.3.i686.rpmpython3.11-debug-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.3.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.3.i686.rpmbpython3.11-3.11.7-1.el9_4.3.i686.rpmpython3.11-debug-3.11.7-1.el9_4.3.i686.rpmpython3.11-test-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-test-3.11.7-1.el9_4.3.i686.rpmpython3.11-idle-3.11.7-1.el9_4.3.i686.rpmpython3.11-debug-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.3.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.3.i686.rpmbpython3.11-3.11.7-1.el9_4.3.i686.rpm{ 1pHiBBBBBBBBBsecurityLow: python3 security updateJ,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 +python3-debug-3.9.18-3.el9_4.3.i686.rpm+python3-idle-3.9.18-3.el9_4.3.i686.rpm+python3-debug-3.9.18-3.el9_4.3.x86_64.rpm+python3-test-3.9.18-3.el9_4.3.i686.rpmO+python3-3.9.18-3.el9_4.3.i686.rpmP+python3-tkinter-3.9.18-3.el9_4.3.i686.rpm+python3-test-3.9.18-3.el9_4.3.x86_64.rpm+python3-idle-3.9.18-3.el9_4.3.x86_64.rpm+python3-debug-3.9.18-3.el9_4.3.i686.rpm+python3-idle-3.9.18-3.el9_4.3.i686.rpm+python3-debug-3.9.18-3.el9_4.3.x86_64.rpm+python3-test-3.9.18-3.el9_4.3.i686.rpmO+python3-3.9.18-3.el9_4.3.i686.rpmP+python3-tkinter-3.9.18-3.el9_4.3.i686.rpm+python3-test-3.9.18-3.el9_4.3.x86_64.rpm+python3-idle-3.9.18-3.el9_4.3.x86_64.rpm| 2jBBBBsecurityModerate: kernel security update +1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928 ilibperf-5.14.0-427.28.1.el9_4.x86_64.rpmikernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpmikernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpmilibperf-5.14.0-427.28.1.el9_4.x86_64.rpmikernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpmikernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpmG} 3pBBBBBBBBBBsecurityImportant: freeradius security update\Ghttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935 sQfreeradius-rest-3.0.21-40.el9_4.x86_64.rpmpQfreeradius-mysql-3.0.21-40.el9_4.x86_64.rpmtQfreeradius-sqlite-3.0.21-40.el9_4.x86_64.rpmqQfreeradius-perl-3.0.21-40.el9_4.x86_64.rpmuQfreeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpmrQfreeradius-postgresql-3.0.21-40.el9_4.x86_64.rpmsQfreeradius-rest-3.0.21-40.el9_4.x86_64.rpmpQfreeradius-mysql-3.0.21-40.el9_4.x86_64.rpmtQfreeradius-sqlite-3.0.21-40.el9_4.x86_64.rpmqQfreeradius-perl-3.0.21-40.el9_4.x86_64.rpmuQfreeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpmrQfreeradius-postgresql-3.0.21-40.el9_4.x86_64.rpmʚN~ 4|securityModerate: 389-ds-base security update #jhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192 https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192 `389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm`389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm2 6uJBBBsecurityImportant: bind and bind-dyndb-ldap security update "https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231 https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231 QAbind-devel-9.16.23-18.el9_4.6.i686.rpmQAbind-devel-9.16.23-18.el9_4.6.x86_64.rpmVAbind-libs-9.16.23-18.el9_4.6.i686.rpm=Abind-doc-9.16.23-18.el9_4.6.noarch.rpmQAbind-devel-9.16.23-18.el9_4.6.i686.rpmQAbind-devel-9.16.23-18.el9_4.6.x86_64.rpmVAbind-libs-9.16.23-18.el9_4.6.i686.rpm=Abind-doc-9.16.23-18.el9_4.6.noarch.rpmn 7CsecurityModerate: .NET 8.0 security update /}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334 https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334 IPdotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpmIPdotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpmR 8EBBBBsecurityImportant: kernel security update,4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363 jlibperf-5.14.0-427.31.1.el9_4.x86_64.rpmjkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpmjkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpmjlibperf-5.14.0-427.31.1.el9_4.x86_64.rpmjkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpmjkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpms 9 securityImportant: python3.12-setuptools security update`https://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533 Zpython3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpmZpython3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm_ :LBBsecurityModerate: libreoffice security update w{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583 https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583 Jnlibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmInlibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJnlibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmInlibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmW ;PBBBBsecurityImportant: kernel security updaterThttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928 kkernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpmklibperf-5.14.0-427.33.1.el9_4.x86_64.rpmkkernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpmkkernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpmklibperf-5.14.0-427.33.1.el9_4.x86_64.rpmkkernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm  q https://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124 p.java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt.java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmw.java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmx.java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn.java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmy.java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmv.java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmu.java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms.java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr.java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo.java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm{.java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq.java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmz.java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmp.java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt.java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmw.java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmx.java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn.java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmy.java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmv.java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmu.java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms.java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr.java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo.java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm{.java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq.java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmz.java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn ~BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update / https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127 k>java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmg>java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpml>java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmn>java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmr>java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmh>java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmm>java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmo>java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpme>java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmq>java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmj>java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmi>java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmf>java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmp>java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmk>java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmg>java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpml>java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmn>java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmr>java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmh>java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmm>java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmo>java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpme>java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmq>java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmj>java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmi>java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmf>java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmp>java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm_ ZBBBBsecurityModerate: kernel security update E<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162 nkernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpmnkernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpmnlibperf-5.14.0-427.40.1.el9_4.x86_64.rpmnkernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpmnkernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpmnlibperf-5.14.0-427.40.1.el9_4.x86_64.rpm{ [BEBBBBBBBBBsecurityModerate: python3.11 security update Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374 cpython3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmbpython3.11-3.11.7-1.el9_4.6.i686.rpmpython3.11-debug-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-debug-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.i686.rpmcpython3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmbpython3.11-3.11.7-1.el9_4.6.i686.rpmpython3.11-debug-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-debug-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.i686.rpmw ^\sBBBBBBBBBsecurityModerate: python3.9 security update U\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 -python3-test-3.9.18-3.el9_4.6.x86_64.rpm-python3-idle-3.9.18-3.el9_4.6.x86_64.rpm-python3-idle-3.9.18-3.el9_4.6.i686.rpm-python3-test-3.9.18-3.el9_4.6.i686.rpm-python3-debug-3.9.18-3.el9_4.6.x86_64.rpmP-python3-tkinter-3.9.18-3.el9_4.6.i686.rpmO-python3-3.9.18-3.el9_4.6.i686.rpm-python3-debug-3.9.18-3.el9_4.6.i686.rpm-python3-test-3.9.18-3.el9_4.6.x86_64.rpm-python3-idle-3.9.18-3.el9_4.6.x86_64.rpm-python3-idle-3.9.18-3.el9_4.6.i686.rpm-python3-test-3.9.18-3.el9_4.6.i686.rpm-python3-debug-3.9.18-3.el9_4.6.x86_64.rpmP-python3-tkinter-3.9.18-3.el9_4.6.i686.rpmO-python3-3.9.18-3.el9_4.6.i686.rpm-python3-debug-3.9.18-3.el9_4.6.i686.rpm "`BVBBBBBBBBBsecurityModerate: python3.12 security update 1 https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447 Kpython3.12-test-3.12.1-4.el9_4.4.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.x86_64.rpmIpython3.12-debug-3.12.1-4.el9_4.4.i686.rpmTpython3.12-tkinter-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.i686.rpmSpython3.12-3.12.1-4.el9_4.4.i686.rpmIpython3.12-debug-3.12.1-4.el9_4.4.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.4.x86_64.rpmKpython3.12-test-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.x86_64.rpmIpython3.12-debug-3.12.1-4.el9_4.4.i686.rpmTpython3.12-tkinter-3.12.1-4.el9_4.4.i686.rpmJpython3.12-idle-3.12.1-4.el9_4.4.i686.rpmSpython3.12-3.12.1-4.el9_4.4.i686.rpmIpython3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm  #ABBBBsecurityModerate: kernel security update >>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617 olibperf-5.14.0-427.42.1.el9_4.x86_64.rpmokernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpmokernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpmolibperf-5.14.0-427.42.1.el9_4.x86_64.rpmokernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpmokernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm< $GBsecurityImportant: openexr security update|:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800 I7openexr-devel-3.1.1-2.el9_4.1.x86_64.rpmI7openexr-devel-3.1.1-2.el9_4.1.i686.rpmI7openexr-devel-3.1.1-2.el9_4.1.x86_64.rpmI7openexr-devel-3.1.1-2.el9_4.1.i686.rpm %JsecurityModerate: libtiff security update 6 https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914 https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914 x&libtiff-tools-4.4.0-12.el9_4.1.x86_64.rpmx&libtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm (fBfBsecurityModerate: edk2 security update AEhttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935 https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935 >Redk2-aarch64-20231122-6.el9_4.4.noarch.rpmwRedk2-tools-20231122-6.el9_4.4.x86_64.rpm?Redk2-tools-doc-20231122-6.el9_4.4.noarch.rpmRedk2-ovmf-20231122-6.el9_4.4.noarch.rpm>Redk2-aarch64-20231122-6.el9_4.4.noarch.rpmwRedk2-tools-20231122-6.el9_4.4.x86_64.rpm?Redk2-tools-doc-20231122-6.el9_4.4.noarch.rpmRedk2-ovmf-20231122-6.el9_4.4.noarch.rpmw  )OBBsecurityModerate: edk2 security update = https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088 https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088 >_edk2-aarch64-20240524-6.el9_5.noarch.rpmw_edk2-tools-20240524-6.el9_5.x86_64.rpm?_edk2-tools-doc-20240524-6.el9_5.noarch.rpm>_edk2-aarch64-20240524-6.el9_5.noarch.rpmw_edk2-tools-20240524-6.el9_5.x86_64.rpm?_edk2-tools-doc-20240524-6.el9_5.noarch.rpm6! +jjBBsecurityModerate: xorg-x11-server-Xwayland security update C:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093 e6xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm6xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm6xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpme6xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm6xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm6xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm]" ,WBBsecurityModerate: xorg-x11-server security update })https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122 UXxorg-x11-server-source-1.20.11-26.el9.noarch.rpmaXxorg-x11-server-devel-1.20.11-26.el9.x86_64.rpmaXxorg-x11-server-devel-1.20.11-26.el9.i686.rpmUXxorg-x11-server-source-1.20.11-26.el9.noarch.rpmaXxorg-x11-server-devel-1.20.11-26.el9.x86_64.rpmaXxorg-x11-server-devel-1.20.11-26.el9.i686.rpm # -[BBBBsecurityModerate: libvirt security update &|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128 https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128 Ylibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm%Ylibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpmYlibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpmYlibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm%Ylibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpmYlibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm`$ .aBBBBBBBBBBBsecurityModerate: poppler security update "+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167 https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167  |poppler-glib-devel-21.01.0-21.el9.i686.rpm |poppler-glib-devel-21.01.0-21.el9.x86_64.rpm |poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm|poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm |poppler-devel-21.01.0-21.el9.x86_64.rpm |poppler-glib-doc-21.01.0-21.el9.noarch.rpm|poppler-qt5-devel-21.01.0-21.el9.i686.rpm |poppler-cpp-devel-21.01.0-21.el9.i686.rpm |poppler-devel-21.01.0-21.el9.i686.rpm  |poppler-glib-devel-21.01.0-21.el9.i686.rpm |poppler-glib-devel-21.01.0-21.el9.x86_64.rpm |poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm|poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm |poppler-devel-21.01.0-21.el9.x86_64.rpm |poppler-glib-doc-21.01.0-21.el9.noarch.rpm|poppler-qt5-devel-21.01.0-21.el9.i686.rpm |poppler-cpp-devel-21.01.0-21.el9.i686.rpm |poppler-devel-21.01.0-21.el9.i686.rpmV% /nBsecurityModerate: jose security update MRhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181 https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181 Tlibjose-devel-14-1.el9.x86_64.rpmTlibjose-devel-14-1.el9.i686.rpmTlibjose-devel-14-1.el9.x86_64.rpmTlibjose-devel-14-1.el9.i686.rpm@& 0qsecurityModerate: gtk3 security update +https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184 https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184 u#gtk3-devel-docs-3.24.31-5.el9.x86_64.rpmu#gtk3-devel-docs-3.24.31-5.el9.x86_64.rpm0' 1sBsecurityLow: bcc security updateJJvhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187 https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187 _bcc-devel-0.30.0-6.el9.x86_64.rpm]bcc-doc-0.30.0-6.el9.noarch.rpm_bcc-devel-0.30.0-6.el9.x86_64.rpm]bcc-doc-0.30.0-6.el9.noarch.rpmT( 4rBDBBBBBBBBBsecurityModerate: python3.12 security update @Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190 Kpython3.12-test-3.12.5-2.el9.i686.rpmIpython3.12-debug-3.12.5-2.el9.i686.rpmJpython3.12-idle-3.12.5-2.el9.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9.i686.rpmSpython3.12-3.12.5-2.el9.i686.rpmKpython3.12-test-3.12.5-2.el9.x86_64.rpmIpython3.12-debug-3.12.5-2.el9.x86_64.rpmJpython3.12-idle-3.12.5-2.el9.i686.rpmKpython3.12-test-3.12.5-2.el9.i686.rpmIpython3.12-debug-3.12.5-2.el9.i686.rpmJpython3.12-idle-3.12.5-2.el9.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9.i686.rpmSpython3.12-3.12.5-2.el9.i686.rpmKpython3.12-test-3.12.5-2.el9.x86_64.rpmIpython3.12-debug-3.12.5-2.el9.x86_64.rpmJpython3.12-idle-3.12.5-2.el9.i686.rpm>) 7uBLBBBBBBBBBsecurityModerate: python3.11 security update Rhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192 python3.11-test-3.11.9-7.el9.i686.rpmbpython3.11-3.11.9-7.el9.i686.rpmpython3.11-idle-3.11.9-7.el9.x86_64.rpmpython3.11-debug-3.11.9-7.el9.i686.rpmcpython3.11-tkinter-3.11.9-7.el9.i686.rpmpython3.11-debug-3.11.9-7.el9.x86_64.rpmpython3.11-test-3.11.9-7.el9.x86_64.rpmpython3.11-idle-3.11.9-7.el9.i686.rpmpython3.11-test-3.11.9-7.el9.i686.rpmbpython3.11-3.11.9-7.el9.i686.rpmpython3.11-idle-3.11.9-7.el9.x86_64.rpmpython3.11-debug-3.11.9-7.el9.i686.rpmcpython3.11-tkinter-3.11.9-7.el9.i686.rpmpython3.11-debug-3.11.9-7.el9.x86_64.rpmpython3.11-test-3.11.9-7.el9.x86_64.rpmpython3.11-idle-3.11.9-7.el9.i686.rpmf* 8LBsecurityLow: NetworkManager security updateJXjhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 >!NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm>!NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm>!NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm>!NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpmF+ :yBVBBBBBBBBBsecurityModerate: python3.9 security update Bkhttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371 https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371 P.python3-tkinter-3.9.19-8.el9.i686.rpm.python3-idle-3.9.19-8.el9.x86_64.rpm.python3-idle-3.9.19-8.el9.i686.rpm.python3-debug-3.9.19-8.el9.x86_64.rpm.python3-debug-3.9.19-8.el9.i686.rpm.python3-test-3.9.19-8.el9.x86_64.rpmO.python3-3.9.19-8.el9.i686.rpm.python3-test-3.9.19-8.el9.i686.rpmP.python3-tkinter-3.9.19-8.el9.i686.rpm.python3-idle-3.9.19-8.el9.x86_64.rpm.python3-idle-3.9.19-8.el9.i686.rpm.python3-debug-3.9.19-8.el9.x86_64.rpm.python3-debug-3.9.19-8.el9.i686.rpm.python3-test-3.9.19-8.el9.x86_64.rpmO.python3-3.9.19-8.el9.i686.rpm.python3-test-3.9.19-8.el9.i686.rpm7, ;ZBsecurityModerate: bluez security update -+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413 https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413 MDbluez-libs-devel-5.72-2.el9.i686.rpmMDbluez-libs-devel-5.72-2.el9.x86_64.rpmMDbluez-libs-devel-5.72-2.el9.i686.rpmMDbluez-libs-devel-5.72-2.el9.x86_64.rpmJ- ]BsecurityModerate: fontforge security update Xehttps://access.redhat.com/errata/RHSA-2024:9439RHSA-2024:9439RHSA-2024:9439 https://access.redhat.com/security/cve/CVE-2024-25081CVE-2024-25081CVE-2024-25081https://access.redhat.com/security/cve/CVE-2024-25082CVE-2024-25082CVE-2024-25082https://bugzilla.redhat.com/22661802266180https://bugzilla.redhat.com/22661812266181https://errata.almalinux.org/9/ALSA-2024-9439.htmlALSA-2024:9439ALSA-2024:9439 C2fontforge-20201107-6.el9.i686.rpmC2fontforge-20201107-6.el9.x86_64.rpmC2fontforge-20201107-6.el9.i686.rpmC2fontforge-20201107-6.el9.x86_64.rpmL. %aBBsecurityModerate: mingw-glib2 security update =(https://access.redhat.com/errata/RHSA-2024:9442RHSA-2024:9442RHSA-2024:9442 https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-9442.htmlALSA-2024:9442ALSA-2024:9442 ,]mingw64-glib2-static-2.78.6-1.el9.noarch.rpm)]mingw32-glib2-2.78.6-1.el9.noarch.rpm*]mingw32-glib2-static-2.78.6-1.el9.noarch.rpm+]mingw64-glib2-2.78.6-1.el9.noarch.rpm,]mingw64-glib2-static-2.78.6-1.el9.noarch.rpm)]mingw32-glib2-2.78.6-1.el9.noarch.rpm*]mingw32-glib2-static-2.78.6-1.el9.noarch.rpm+]mingw64-glib2-2.78.6-1.el9.noarch.rpm3/ >|BjBBBsecurityImportant: bubblewrap and flatpak security updateeRhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449 b flatpak-1.12.9-3.el9_5.i686.rpm flatpak-devel-1.12.9-3.el9_5.x86_64.rpm flatpak-devel-1.12.9-3.el9_5.i686.rpmc flatpak-session-helper-1.12.9-3.el9_5.i686.rpmb flatpak-1.12.9-3.el9_5.i686.rpm flatpak-devel-1.12.9-3.el9_5.x86_64.rpm flatpak-devel-1.12.9-3.el9_5.i686.rpmc flatpak-session-helper-1.12.9-3.el9_5.i686.rpm40 BlBBBBBBBBBsecurityModerate: python3.11 security update 7\https://access.redhat.com/errata/RHSA-2024:9450RHSA-2024:9450RHSA-2024:9450 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9450.htmlALSA-2024:9450ALSA-2024:9450 python3.11-test-3.11.9-7.el9_5.1.i686.rpmpython3.11-idle-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-idle-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.1.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.i686.rpmbpython3.11-3.11.9-7.el9_5.1.i686.rpmpython3.11-test-3.11.9-7.el9_5.1.i686.rpmpython3.11-idle-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-idle-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-test-3.11.9-7.el9_5.1.x86_64.rpmcpython3.11-tkinter-3.11.9-7.el9_5.1.i686.rpmpython3.11-debug-3.11.9-7.el9_5.1.i686.rpmbpython3.11-3.11.9-7.el9_5.1.i686.rpmy1 BBtBBBBBBBBBsecurityModerate: python3.12 security update  https://access.redhat.com/errata/RHSA-2024:9451RHSA-2024:9451RHSA-2024:9451 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9451.htmlALSA-2024:9451ALSA-2024:9451 Kpython3.12-test-3.12.5-2.el9_5.1.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.x86_64.rpmSpython3.12-3.12.5-2.el9_5.1.i686.rpmKpython3.12-test-3.12.5-2.el9_5.1.x86_64.rpmTpython3.12-tkinter-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.i686.rpmIpython3.12-debug-3.12.5-2.el9_5.1.x86_64.rpmKpython3.12-test-3.12.5-2.el9_5.1.i686.rpmJpython3.12-idle-3.12.5-2.el9_5.1.x86_64.rpmSpython3.12-3.12.5-2.el9_5.1.i686.rpm|2 EwGBBBBBBBBBsecurityModerate: python3.9 security update \https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468 /python3-test-3.9.19-8.el9_5.1.x86_64.rpm/python3-idle-3.9.19-8.el9_5.1.x86_64.rpm/python3-debug-3.9.19-8.el9_5.1.x86_64.rpm/python3-test-3.9.19-8.el9_5.1.i686.rpmP/python3-tkinter-3.9.19-8.el9_5.1.i686.rpmO/python3-3.9.19-8.el9_5.1.i686.rpm/python3-debug-3.9.19-8.el9_5.1.i686.rpm/python3-idle-3.9.19-8.el9_5.1.i686.rpm/python3-test-3.9.19-8.el9_5.1.x86_64.rpm/python3-idle-3.9.19-8.el9_5.1.x86_64.rpm/python3-debug-3.9.19-8.el9_5.1.x86_64.rpm/python3-test-3.9.19-8.el9_5.1.i686.rpmP/python3-tkinter-3.9.19-8.el9_5.1.i686.rpmO/python3-3.9.19-8.el9_5.1.i686.rpm/python3-debug-3.9.19-8.el9_5.1.i686.rpm/python3-idle-3.9.19-8.el9_5.1.i686.rpm3 LsecurityImportant: .NET 9.0 security update|fhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543 https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543 $Wdotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm$Wdotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpmO4 NBsecurityImportant: openexr security updateb:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548 I8openexr-devel-3.1.1-2.el9_5.1.x86_64.rpmI8openexr-devel-3.1.1-2.el9_5.1.i686.rpmI8openexr-devel-3.1.1-2.el9_5.1.x86_64.rpmI8openexr-devel-3.1.1-2.el9_5.1.i686.rpmX5 QBBBBsecurityModerate: kernel security update 'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605 pkernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpmpkernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpmplibperf-5.14.0-503.14.1.el9_5.x86_64.rpmpkernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpmpkernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpmplibperf-5.14.0-503.14.1.el9_5.x86_64.rpm:6 WBsecurityModerate: libvpx security update C>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827 https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827 .libvpx-devel-1.9.0-8.el9_5.i686.rpm.libvpx-devel-1.9.0-8.el9_5.x86_64.rpm.libvpx-devel-1.9.0-8.el9_5.i686.rpm.libvpx-devel-1.9.0-8.el9_5.x86_64.rpmZ7 ZBBBBsecurityImportant: kernel security update https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059 https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059 tkernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpmtkernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpmtlibperf-5.14.0-503.21.1.el9_5.x86_64.rpmtkernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpmtkernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpmtlibperf-5.14.0-503.21.1.el9_5.x86_64.rpm48 `BsecurityImportant: raptor2 security update @https://access.redhat.com/errata/RHSA-2025:0312RHSA-2025:0312RHSA-2025:0312 https://access.redhat.com/security/cve/CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/23369212336921https://errata.almalinux.org/9/ALSA-2025-0312.htmlALSA-2025:0312ALSA-2025:0312 c&raptor2-devel-2.0.15-32.el9_5.i686.rpmc&raptor2-devel-2.0.15-32.el9_5.x86_64.rpmc&raptor2-devel-2.0.15-32.el9_5.i686.rpmc&raptor2-devel-2.0.15-32.el9_5.x86_64.rpm@9 #securityModerate: ipa security update Kahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334 https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334 uTpython3-ipatests-4.12.2-1.el9_5.3.noarch.rpmuTpython3-ipatests-4.12.2-1.el9_5.3.noarch.rpmv: dBsecurityModerate: Security and bug fixes for NetworkManager ,Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 >"NetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm>"NetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm>"NetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm>"NetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm ; gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5 xfhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422 y/java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp/java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmw/java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo/java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmv/java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmu/java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr/java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq/java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt/java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn/java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm{/java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmz/java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmx/java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms/java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmy/java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp/java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmw/java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo/java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmv/java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmu/java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr/java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq/java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt/java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn/java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm{/java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmz/java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmx/java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms/java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmQ< CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5 ^https://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426 p?java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmk?java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmj?java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmr?java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpml?java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmq?java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpme?java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmg?java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmf?java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmh?java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmo?java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmi?java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmn?java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmm?java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmp?java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmk?java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmj?java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmr?java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpml?java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmq?java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpme?java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmg?java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmf?java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmh?java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmo?java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmi?java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmn?java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmm?java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmɲ%= _BBBBsecurityModerate: kernel security update aEhttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578 ukernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpmukernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpmulibperf-5.14.0-503.22.1.el9_5.x86_64.rpmukernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpmukernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpmulibperf-5.14.0-503.22.1.el9_5.x86_64.rpmՕ> eBBBBsecurityModerate: galera and mariadb security update &4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914 https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914 (`mariadb-test-10.5.27-1.el9_5.x86_64.rpm'`mariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm&`mariadb-devel-10.5.27-1.el9_5.x86_64.rpm(`mariadb-test-10.5.27-1.el9_5.x86_64.rpm'`mariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm&`mariadb-devel-10.5.27-1.el9_5.x86_64.rpm6? /kBBsecurityModerate: mingw-glib2 security update Zhttps://access.redhat.com/errata/RHSA-2025:0936RHSA-2025:0936RHSA-2025:0936 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://bugzilla.redhat.com/23253402325340https://errata.almalinux.org/9/ALSA-2025-0936.htmlALSA-2025:0936ALSA-2025:0936 )^mingw32-glib2-2.78.6-2.el9.noarch.rpm*^mingw32-glib2-static-2.78.6-2.el9.noarch.rpm,^mingw64-glib2-static-2.78.6-2.el9.noarch.rpm+^mingw64-glib2-2.78.6-2.el9.noarch.rpm)^mingw32-glib2-2.78.6-2.el9.noarch.rpm*^mingw32-glib2-static-2.78.6-2.el9.noarch.rpm,^mingw64-glib2-static-2.78.6-2.el9.noarch.rpm+^mingw64-glib2-2.78.6-2.el9.noarch.rpm@ SjuBBBBBBBBBsecurityImportant: python3.9 security updateog https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 2python3-test-3.9.21-2.el9_6.1.i686.rpm2python3-test-3.9.21-2.el9_6.1.x86_64.rpm2python3-idle-3.9.21-2.el9_6.1.i686.rpmO2python3-3.9.21-2.el9_6.1.i686.rpm2python3-debug-3.9.21-2.el9_6.1.x86_64.rpm2python3-debug-3.9.21-2.el9_6.1.i686.rpmP2python3-tkinter-3.9.21-2.el9_6.1.i686.rpm2python3-idle-3.9.21-2.el9_6.1.x86_64.rpm2python3-test-3.9.21-2.el9_6.1.i686.rpm2python3-test-3.9.21-2.el9_6.1.x86_64.rpm2python3-idle-3.9.21-2.el9_6.1.i686.rpmO2python3-3.9.21-2.el9_6.1.i686.rpm2python3-debug-3.9.21-2.el9_6.1.x86_64.rpm2python3-debug-3.9.21-2.el9_6.1.i686.rpmP2python3-tkinter-3.9.21-2.el9_6.1.i686.rpm2python3-idle-3.9.21-2.el9_6.1.x86_64.rpmÓDA UBfBBBBBBBBBsecurityImportant: python3.11 security updateVg https://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148  python3.11-debug-3.11.11-2.el9_6.1.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm python3.11-idle-3.11.11-2.el9_6.1.i686.rpmb python3.11-3.11.11-2.el9_6.1.i686.rpm python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.1.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.i686.rpm python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm python3.11-idle-3.11.11-2.el9_6.1.i686.rpmb python3.11-3.11.11-2.el9_6.1.i686.rpm python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpmÔoB XBnBBBBBBBBBsecurityImportant: python3.12 security update=g https://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189 K!python3.12-test-3.12.9-1.el9_6.1.x86_64.rpmI!python3.12-debug-3.12.9-1.el9_6.1.i686.rpmT!python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpmK!python3.12-test-3.12.9-1.el9_6.1.i686.rpmJ!python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpmS!python3.12-3.12.9-1.el9_6.1.i686.rpmJ!python3.12-idle-3.12.9-1.el9_6.1.i686.rpmI!python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpmK!python3.12-test-3.12.9-1.el9_6.1.x86_64.rpmI!python3.12-debug-3.12.9-1.el9_6.1.i686.rpmT!python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpmK!python3.12-test-3.12.9-1.el9_6.1.i686.rpmJ!python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpmS!python3.12-3.12.9-1.el9_6.1.i686.rpmJ!python3.12-idle-3.12.9-1.el9_6.1.i686.rpmI!python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpmÔdC QBBBBsecurityImportant: kernel security update$] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379 kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpmlibperf-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpmlibperf-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpmÿ}D =WBsecurityModerate: jq security update  https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585 https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585 Pjq-devel-1.6-17.el9_6.2.i686.rpmPjq-devel-1.6-17.el9_6.2.x86_64.rpmPjq-devel-1.6-17.el9_6.2.i686.rpmPjq-devel-1.6-17.el9_6.2.x86_64.rpmþDE ZBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837 kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpmlibperf-5.14.0-570.26.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpmlibperf-5.14.0-570.26.1.el9_6.x86_64.rpmQF `BBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862 \java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm~\java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm \java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm~\java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm\java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm+G tBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867 o1java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmv1java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms1java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmz1java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn1java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmu1java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmy1java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt1java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr1java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmx1java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp1java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq1java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmw1java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm{1java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmo1java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmv1java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms1java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmz1java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn1java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmu1java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmy1java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt1java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr1java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmx1java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp1java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq1java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmw1java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm{1java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm޿kH PBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update qhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873 jAjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmkAjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmhAjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmiAjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmpAjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmqAjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmlAjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmeAjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmoAjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmmAjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmgAjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmfAjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmrAjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmnAjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmjAjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmkAjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmhAjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmiAjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmpAjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmqAjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmlAjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmeAjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmoAjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmmAjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmgAjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmfAjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmrAjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmnAjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmĨpI lBsecurityModerate: glib2 security update ~https://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140 ,glib2-static-2.68.4-16.el9_6.2.x86_64.rpm,glib2-static-2.68.4-16.el9_6.2.i686.rpm,glib2-static-2.68.4-16.el9_6.2.x86_64.rpm,glib2-static-2.68.4-16.el9_6.2.i686.rpm޽/J !oBBBBsecurityImportant: kernel security updateVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411 kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpmlibperf-5.14.0-570.28.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpmlibperf-5.14.0-570.28.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpmĂ*K "uBsecurityImportant: unbound security updateXhhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849 https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849 G unbound-devel-1.16.2-19.el9_6.1.x86_64.rpmG unbound-devel-1.16.2-19.el9_6.1.i686.rpmG unbound-devel-1.16.2-19.el9_6.1.x86_64.rpmG unbound-devel-1.16.2-19.el9_6.1.i686.rpmĞ]L #xBBBBsecurityModerate: kernel security update @https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861 libperf-5.14.0-570.30.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpmlibperf-5.14.0-570.30.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpmįM $~BBBBsecurityImportant: kernel security updateNhttps://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262 https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262 vkernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpmvkernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpmvlibperf-5.14.0-503.23.2.el9_5.x86_64.rpmvkernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpmvkernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpmvlibperf-5.14.0-503.23.2.el9_5.x86_64.rpmuN %DBBBBsecurityImportant: kernel security updatekohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746 https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746 libperf-5.14.0-570.32.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpmlibperf-5.14.0-570.32.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpmҙiO & securityModerate: python3.12-setuptools security update ZJhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834 [python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm[python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpmsP KBBBBsecurityModerate: doxygen security update $ehttps://access.redhat.com/errata/RHSA-2025:1329RHSA-2025:1329RHSA-2025:1329 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1329.htmlALSA-2025:1329ALSA-2025:1329 jZdoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpmiZdoxygen-1.9.1-12.el9_5.x86_64.rpmkZdoxygen-latex-1.9.1-12.el9_5.x86_64.rpmjZdoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpmiZdoxygen-1.9.1-12.el9_5.x86_64.rpmkZdoxygen-latex-1.9.1-12.el9_5.x86_64.rpmfQ 'RBBBBsecurityModerate: gcc security update Khttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 O3gcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmO3gcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpmY3libstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpmY3libstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpmO3gcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmO3gcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpmY3libstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpmY3libstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpmR (XBBBBsecurityModerate: kernel security update THhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602 libperf-5.14.0-570.33.2.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpmlibperf-5.14.0-570.33.2.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpmS )^BBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpmlibperf-5.14.0-570.35.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpmlibperf-5.14.0-570.35.1.el9_6.x86_64.rpmŠZT *dBBBBsecurityImportant: kernel security update-!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420  kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm libperf-5.14.0-570.37.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm libperf-5.14.0-570.37.1.el9_6.x86_64.rpmŻjU +jBBBBBBBBBBBsecurityImportant: postgresql security updateNNhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878 |;postgresql-static-13.22-1.el9_6.x86_64.rpm~;postgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpmz;postgresql-private-devel-13.22-1.el9_6.x86_64.rpm.;postgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpmy;postgresql-docs-13.22-1.el9_6.x86_64.rpm{;postgresql-server-devel-13.22-1.el9_6.x86_64.rpm};postgresql-test-13.22-1.el9_6.x86_64.rpm|;postgresql-static-13.22-1.el9_6.x86_64.rpm~;postgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpmz;postgresql-private-devel-13.22-1.el9_6.x86_64.rpm.;postgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpmy;postgresql-docs-13.22-1.el9_6.x86_64.rpm{;postgresql-server-devel-13.22-1.el9_6.x86_64.rpm};postgresql-test-13.22-1.el9_6.x86_64.rpmŚgV .lBKBBBBBBBBBsecurityModerate: python3.12 security update ;https://access.redhat.com/errata/RHSA-2025:15007RHSA-2025:15007RHSA-2025:15007 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15007.htmlALSA-2025:15007ALSA-2025:15007 K"python3.12-test-3.12.9-1.el9_6.2.i686.rpmI"python3.12-debug-3.12.9-1.el9_6.2.i686.rpmT"python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpmK"python3.12-test-3.12.9-1.el9_6.2.x86_64.rpmI"python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpmJ"python3.12-idle-3.12.9-1.el9_6.2.i686.rpmJ"python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpmS"python3.12-3.12.9-1.el9_6.2.i686.rpmK"python3.12-test-3.12.9-1.el9_6.2.i686.rpmI"python3.12-debug-3.12.9-1.el9_6.2.i686.rpmT"python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpmK"python3.12-test-3.12.9-1.el9_6.2.x86_64.rpmI"python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpmJ"python3.12-idle-3.12.9-1.el9_6.2.i686.rpmJ"python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpmS"python3.12-3.12.9-1.el9_6.2.i686.rpm%W 1oBSBBBBBBBBBsecurityModerate: python3.11 security update W;https://access.redhat.com/errata/RHSA-2025:15010RHSA-2025:15010RHSA-2025:15010 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15010.htmlALSA-2025:15010ALSA-2025:15010  python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmb python3.11-3.11.11-2.el9_6.2.i686.rpm python3.11-test-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmb python3.11-3.11.11-2.el9_6.2.i686.rpm python3.11-test-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm python3.11-debug-3.11.11-2.el9_6.2.i686.rpm python3.11-idle-3.11.11-2.el9_6.2.i686.rpmc python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm!X 2MBBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011 https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684 kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm libperf-5.14.0-570.39.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm libperf-5.14.0-570.39.1.el9_6.x86_64.rpmY 3SBsecurityImportant: udisks2 security update)https://access.redhat.com/errata/RHSA-2025:15018RHSA-2025:15018RHSA-2025:15018 https://access.redhat.com/security/cve/CVE-2025-8067CVE-2025-8067CVE-2025-8067https://bugzilla.redhat.com/23886232388623https://errata.almalinux.org/9/ALSA-2025-15018.htmlALSA-2025:15018ALSA-2025:15018 [/libudisks2-devel-2.9.4-11.el9_6.1.i686.rpm[/libudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm[/libudisks2-devel-2.9.4-11.el9_6.1.i686.rpm[/libudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpmWZ 5tKYBBBBBBBBBsecurityModerate: python3.9 security update ?;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019 3python3-debug-3.9.21-2.el9_6.2.i686.rpm3python3-idle-3.9.21-2.el9_6.2.x86_64.rpmP3python3-tkinter-3.9.21-2.el9_6.2.i686.rpm3python3-debug-3.9.21-2.el9_6.2.x86_64.rpm3python3-idle-3.9.21-2.el9_6.2.i686.rpmO3python3-3.9.21-2.el9_6.2.i686.rpm3python3-test-3.9.21-2.el9_6.2.x86_64.rpm3python3-test-3.9.21-2.el9_6.2.i686.rpm3python3-debug-3.9.21-2.el9_6.2.i686.rpm3python3-idle-3.9.21-2.el9_6.2.x86_64.rpmP3python3-tkinter-3.9.21-2.el9_6.2.i686.rpm3python3-debug-3.9.21-2.el9_6.2.x86_64.rpm3python3-idle-3.9.21-2.el9_6.2.i686.rpmO3python3-3.9.21-2.el9_6.2.i686.rpm3python3-test-3.9.21-2.el9_6.2.x86_64.rpm3python3-test-3.9.21-2.el9_6.2.i686.rpm[ 6aBBBBsecurityImportant: kernel security updatezWhttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429 https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429  kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm libperf-5.14.0-570.41.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm libperf-5.14.0-570.41.1.el9_6.x86_64.rpmƟ\ 7gBBBBsecurityImportant: kernel security updateQ https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661 https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661  kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm libperf-5.14.0-570.42.2.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm libperf-5.14.0-570.42.2.el9_6.x86_64.rpmƤG] 8mBBBBsecurityModerate: kernel security update khttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740 https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740  libperf-5.14.0-570.44.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm libperf-5.14.0-570.44.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpmԃ^ ;yBzBBsecurityModerate: mysql security update khhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086 https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086 K"mysql-devel-8.0.43-1.el9_6.x86_64.rpm-"mysql-libs-8.0.43-1.el9_6.x86_64.rpmL"mysql-test-8.0.43-1.el9_6.x86_64.rpmK"mysql-devel-8.0.43-1.el9_6.x86_64.rpm-"mysql-libs-8.0.43-1.el9_6.x86_64.rpmL"mysql-test-8.0.43-1.el9_6.x86_64.rpmo_ |BLBBBBBBBBBsecurityModerate: python3.12 security update 3[https://access.redhat.com/errata/RHSA-2025:7107RHSA-2025:7107RHSA-2025:7107 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7107.htmlALSA-2025:7107ALSA-2025:7107 I python3.12-debug-3.12.9-1.el9.i686.rpmT python3.12-tkinter-3.12.9-1.el9.i686.rpmJ python3.12-idle-3.12.9-1.el9.i686.rpmK python3.12-test-3.12.9-1.el9.x86_64.rpmS python3.12-3.12.9-1.el9.i686.rpmI python3.12-debug-3.12.9-1.el9.x86_64.rpmJ python3.12-idle-3.12.9-1.el9.x86_64.rpmK python3.12-test-3.12.9-1.el9.i686.rpmI python3.12-debug-3.12.9-1.el9.i686.rpmT python3.12-tkinter-3.12.9-1.el9.i686.rpmJ python3.12-idle-3.12.9-1.el9.i686.rpmK python3.12-test-3.12.9-1.el9.x86_64.rpmS python3.12-3.12.9-1.el9.i686.rpmI python3.12-debug-3.12.9-1.el9.x86_64.rpmJ python3.12-idle-3.12.9-1.el9.x86_64.rpmK python3.12-test-3.12.9-1.el9.i686.rpmÔ! BTBBBBBBBBBsecurityModerate: python3.11 security update [https://access.redhat.com/errata/RHSA-2025:7109RHSA-2025:7109RHSA-2025:7109 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7109.htmlALSA-2025:7109ALSA-2025:7109 python3.11-idle-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.i686.rpmcpython3.11-tkinter-3.11.11-2.el9.i686.rpmpython3.11-idle-3.11.11-2.el9.x86_64.rpmpython3.11-debug-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.x86_64.rpmbpython3.11-3.11.11-2.el9.i686.rpmpython3.11-debug-3.11.11-2.el9.x86_64.rpmpython3.11-idle-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.i686.rpmcpython3.11-tkinter-3.11.11-2.el9.i686.rpmpython3.11-idle-3.11.11-2.el9.x86_64.rpmpython3.11-debug-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.x86_64.rpmbpython3.11-3.11.11-2.el9.i686.rpmpython3.11-debug-3.11.11-2.el9.x86_64.rpmÔP ^BBBBBBBsecurityModerate: protobuf security update i:https://access.redhat.com/errata/RHSA-2025:7138RHSA-2025:7138RHSA-2025:7138 https://access.redhat.com/security/cve/CVE-2022-1941CVE-2022-1941CVE-2022-1941https://bugzilla.redhat.com/22914702291470https://errata.almalinux.org/9/ALSA-2025-7138.htmlALSA-2025:7138ALSA-2025:7138 Ntprotobuf-lite-devel-3.14.0-16.el9.x86_64.rpmLtprotobuf-compiler-3.14.0-16.el9.i686.rpmMtprotobuf-devel-3.14.0-16.el9.i686.rpmMtprotobuf-devel-3.14.0-16.el9.x86_64.rpmLtprotobuf-compiler-3.14.0-16.el9.x86_64.rpmNtprotobuf-lite-devel-3.14.0-16.el9.i686.rpmNtprotobuf-lite-devel-3.14.0-16.el9.x86_64.rpmLtprotobuf-compiler-3.14.0-16.el9.i686.rpmMtprotobuf-devel-3.14.0-16.el9.i686.rpmMtprotobuf-devel-3.14.0-16.el9.x86_64.rpmLtprotobuf-compiler-3.14.0-16.el9.x86_64.rpmNtprotobuf-lite-devel-3.14.0-16.el9.i686.rpmÔC gBBsecurityModerate: xorg-x11-server security update #shttps://access.redhat.com/errata/RHSA-2025:7163RHSA-2025:7163RHSA-2025:7163 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7163.htmlALSA-2025:7163ALSA-2025:7163 UYxorg-x11-server-source-1.20.11-28.el9_6.noarch.rpmaYxorg-x11-server-devel-1.20.11-28.el9_6.i686.rpmaYxorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpmUYxorg-x11-server-source-1.20.11-28.el9_6.noarch.rpmaYxorg-x11-server-devel-1.20.11-28.el9_6.i686.rpmaYxorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpmÔ- DhBBsecurityModerate: xorg-x11-server-Xwayland security update https://access.redhat.com/errata/RHSA-2025:7165RHSA-2025:7165RHSA-2025:7165 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7165.htmlALSA-2025:7165ALSA-2025:7165 7xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpme7xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm7xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm7xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpme7xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm7xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpmÔ oBsecurityModerate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update shttps://access.redhat.com/errata/RHSA-2025:7178RHSA-2025:7178RHSA-2025:7178 https://access.redhat.com/security/cve/CVE-2024-0444CVE-2024-0444CVE-2024-0444https://access.redhat.com/security/cve/CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/22829992282999https://bugzilla.redhat.com/22923352292335https://errata.almalinux.org/9/ALSA-2025-7178.htmlALSA-2025:7178ALSA-2025:7178  gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpmÔ/ rsecurityModerate: corosync security update $https://access.redhat.com/errata/RHSA-2025:7201RHSA-2025:7201RHSA-2025:7201 https://access.redhat.com/security/cve/CVE-2025-30472CVE-2025-30472CVE-2025-30472https://bugzilla.redhat.com/23542292354229https://errata.almalinux.org/9/ALSA-2025-7201.htmlALSA-2025:7201ALSA-2025:7201 a"corosync-vqsim-3.1.9-2.el9_6.x86_64.rpma"corosync-vqsim-3.1.9-2.el9_6.x86_64.rpmÔ: tBBBBsecurityModerate: openjpeg2 security update 1Xhttps://access.redhat.com/errata/RHSA-2025:7309RHSA-2025:7309RHSA-2025:7309 https://access.redhat.com/security/cve/CVE-2024-56826CVE-2024-56826CVE-2024-56826https://access.redhat.com/security/cve/CVE-2024-56827CVE-2024-56827CVE-2024-56827https://bugzilla.redhat.com/23351722335172https://bugzilla.redhat.com/23351742335174https://errata.almalinux.org/9/ALSA-2025-7309.htmlALSA-2025:7309ALSA-2025:7309 K8openjpeg2-tools-2.4.0-8.el9.i686.rpmJ8openjpeg2-devel-2.4.0-8.el9.x86_64.rpmJ8openjpeg2-devel-2.4.0-8.el9.i686.rpmK8openjpeg2-tools-2.4.0-8.el9.x86_64.rpmK8openjpeg2-tools-2.4.0-8.el9.i686.rpmJ8openjpeg2-devel-2.4.0-8.el9.x86_64.rpmJ8openjpeg2-devel-2.4.0-8.el9.i686.rpmK8openjpeg2-tools-2.4.0-8.el9.x86_64.rpmÔ< ;:securityModerate: perl-Module-ScanDeps security update https://access.redhat.com/errata/RHSA-2025:7350RHSA-2025:7350RHSA-2025:7350 https://access.redhat.com/security/cve/CVE-2024-10224CVE-2024-10224CVE-2024-10224https://bugzilla.redhat.com/23273292327329https://errata.almalinux.org/9/ALSA-2025-7350.htmlALSA-2025:7350ALSA-2025:7350 oLperl-Module-ScanDeps-1.30-6.el9.noarch.rpmoLperl-Module-ScanDeps-1.30-6.el9.noarch.rpmÔK |securityModerate: 389-ds-base security update zhttps://access.redhat.com/errata/RHSA-2025:7395RHSA-2025:7395RHSA-2025:7395 https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-7395.htmlALSA-2025:7395ALSA-2025:7395 `389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm`389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm ~securityModerate: nginx security update Ghttps://access.redhat.com/errata/RHSA-2025:7402RHSA-2025:7402RHSA-2025:7402 https://access.redhat.com/security/cve/CVE-2022-41741CVE-2022-41741CVE-2022-41741https://access.redhat.com/security/cve/CVE-2022-41742CVE-2022-41742CVE-2022-41742https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://bugzilla.redhat.com/21414952141495https://bugzilla.redhat.com/21414962141496https://errata.almalinux.org/9/ALSA-2025-7402.htmlALSA-2025:7402ALSA-2025:7402  !nginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm !nginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm^ KBBtBBBBsecurityModerate: ghostscript security update Nhhttps://access.redhat.com/errata/RHSA-2025:7422RHSA-2025:7422RHSA-2025:7422 https://access.redhat.com/security/cve/CVE-2023-46751CVE-2023-46751CVE-2023-46751https://access.redhat.com/security/cve/CVE-2024-46951CVE-2024-46951CVE-2024-46951https://access.redhat.com/security/cve/CVE-2024-46952CVE-2024-46952CVE-2024-46952https://access.redhat.com/security/cve/CVE-2024-46953CVE-2024-46953CVE-2024-46953https://access.redhat.com/security/cve/CVE-2024-46954CVE-2024-46954CVE-2024-46954https://access.redhat.com/security/cve/CVE-2024-46956CVE-2024-46956CVE-2024-46956https://bugzilla.redhat.com/22533652253365https://bugzilla.redhat.com/23250412325041https://bugzilla.redhat.com/23250432325043https://bugzilla.redhat.com/23250442325044https://bugzilla.redhat.com/23250452325045https://bugzilla.redhat.com/23250472325047https://errata.almalinux.org/9/ALSA-2025-7422.htmlALSA-2025:7422ALSA-2025:7422 ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpm`libgs-devel-9.54.0-18.el9_6.i686.rpm`libgs-devel-9.54.0-18.el9_6.x86_64.rpmghostscript-tools-printing-9.54.0-18.el9_6.i686.rpmghostscript-9.54.0-18.el9_6.i686.rpmghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpm`libgs-devel-9.54.0-18.el9_6.i686.rpm`libgs-devel-9.54.0-18.el9_6.x86_64.rpmghostscript-tools-printing-9.54.0-18.el9_6.i686.rpmghostscript-9.54.0-18.el9_6.i686.rpm^ FBBBBsecurityImportant: kernel security update6@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423 https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423 zlibperf-5.14.0-570.16.1.el9_6.x86_64.rpmzkernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpmzkernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpmzlibperf-5.14.0-570.16.1.el9_6.x86_64.rpmzkernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpmzkernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpmɐ#  LBsecurityImportant: yelp security updatevdhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430 https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430 i6yelp-devel-40.3-2.el9_6.1.x86_64.rpmi6yelp-devel-40.3-2.el9_6.1.i686.rpmi6yelp-devel-40.3-2.el9_6.1.x86_64.rpmi6yelp-devel-40.3-2.el9_6.1.i686.rpm5! OBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: avahi security update Z*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437 )!avahi-devel-0.8-22.el9_6.x86_64.rpm%!avahi-compat-howl-0.8-22.el9_6.i686.rpm*!avahi-glib-devel-0.8-22.el9_6.i686.rpm'!avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm(!avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpmL!avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm'!avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpmL!avahi-gobject-devel-0.8-22.el9_6.i686.rpm%!avahi-compat-howl-0.8-22.el9_6.x86_64.rpmK!avahi-gobject-0.8-22.el9_6.i686.rpm(!avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm*!avahi-glib-devel-0.8-22.el9_6.x86_64.rpm&!avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpmK!avahi-gobject-0.8-22.el9_6.x86_64.rpm)!avahi-devel-0.8-22.el9_6.i686.rpm&!avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm)!avahi-devel-0.8-22.el9_6.x86_64.rpm%!avahi-compat-howl-0.8-22.el9_6.i686.rpm*!avahi-glib-devel-0.8-22.el9_6.i686.rpm'!avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm(!avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpmL!avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm'!avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpmL!avahi-gobject-devel-0.8-22.el9_6.i686.rpm%!avahi-compat-howl-0.8-22.el9_6.x86_64.rpmK!avahi-gobject-0.8-22.el9_6.i686.rpm(!avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm*!avahi-glib-devel-0.8-22.el9_6.x86_64.rpm&!avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpmK!avahi-gobject-0.8-22.el9_6.x86_64.rpm)!avahi-devel-0.8-22.el9_6.i686.rpm&!avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm~" RBBTBBBBsecurityModerate: ghostscript security update fhttps://access.redhat.com/errata/RHSA-2025:7586RHSA-2025:7586RHSA-2025:7586 https://access.redhat.com/security/cve/CVE-2025-27832CVE-2025-27832CVE-2025-27832https://bugzilla.redhat.com/23549492354949https://errata.almalinux.org/9/ALSA-2025-7586.htmlALSA-2025:7586ALSA-2025:7586 ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpm`libgs-devel-9.54.0-19.el9_6.x86_64.rpmghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpmghostscript-9.54.0-19.el9_6.i686.rpm`libgs-devel-9.54.0-19.el9_6.i686.rpmghostscript-tools-printing-9.54.0-19.el9_6.i686.rpm`libgs-devel-9.54.0-19.el9_6.x86_64.rpmghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpmghostscript-9.54.0-19.el9_6.i686.rpm`libgs-devel-9.54.0-19.el9_6.i686.rpmÔv# msecurityImportant: .NET 8.0 security updatejGhttps://access.redhat.com/errata/RHSA-2025:7598RHSA-2025:7598RHSA-2025:7598 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7598.htmlALSA-2025:7598ALSA-2025:7598 ISdotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpmISdotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpmH$ osecurityImportant: .NET 9.0 security update1Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600 $Ydotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm$Ydotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpmÔ;% qBBBBsecurityImportant: kernel security updatew9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903 https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903 {kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm{kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm{libperf-5.14.0-570.17.1.el9_6.x86_64.rpm{kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm{kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm{libperf-5.14.0-570.17.1.el9_6.x86_64.rpmV& wBBBBsecurityModerate: kernel security update 0 https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142 https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142 |libperf-5.14.0-570.18.1.el9_6.x86_64.rpm|kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm|kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm|libperf-5.14.0-570.18.1.el9_6.x86_64.rpm|kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm|kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpmܣf' }BsecurityImportant: gstreamer1-plugins-bad-free security update=https://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183 https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183  gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm( @BBBBsecurityModerate: kernel security update KWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333 https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333 }kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm}libperf-5.14.0-570.19.1.el9_6.x86_64.rpm}kernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm}kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm}libperf-5.14.0-570.19.1.el9_6.x86_64.rpm}kernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpmÔH) FBsecurityImportant: varnish security update"Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337 https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337 Hvarnish-devel-6.6.2-6.el9_6.1.i686.rpmHvarnish-devel-6.6.2-6.el9_6.1.x86_64.rpmHvarnish-devel-6.6.2-6.el9_6.1.i686.rpmHvarnish-devel-6.6.2-6.el9_6.1.x86_64.rpm[* IBBBBsecurityImportant: kernel security update|https://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643 https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643 ~kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm~kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm~libperf-5.14.0-570.21.1.el9_6.x86_64.rpm~kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm~kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm~libperf-5.14.0-570.21.1.el9_6.x86_64.rpm«]+ OBBBBBBBBBBBBsecurityModerate: glibc security update Nhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655 https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655 Dgnss_db-2.34-168.el9_6.19.i686.rpmEgnss_hesiod-2.34-168.el9_6.19.i686.rpmHgglibc-benchtests-2.34-168.el9_6.19.x86_64.rpmAgglibc-static-2.34-168.el9_6.19.x86_64.rpm@gglibc-nss-devel-2.34-168.el9_6.19.i686.rpmAgglibc-static-2.34-168.el9_6.19.i686.rpmEgnss_hesiod-2.34-168.el9_6.19.x86_64.rpmDgnss_db-2.34-168.el9_6.19.x86_64.rpm@gglibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm Dgnss_db-2.34-168.el9_6.19.i686.rpmEgnss_hesiod-2.34-168.el9_6.19.i686.rpmHgglibc-benchtests-2.34-168.el9_6.19.x86_64.rpmAgglibc-static-2.34-168.el9_6.19.x86_64.rpm@gglibc-nss-devel-2.34-168.el9_6.19.i686.rpmAgglibc-static-2.34-168.el9_6.19.i686.rpmEgnss_hesiod-2.34-168.el9_6.19.x86_64.rpmDgnss_db-2.34-168.el9_6.19.x86_64.rpm@gglibc-nss-devel-2.34-168.el9_6.19.x86_64.rpmŸ , ]securityImportant: .NET 8.0 security updateR8https://access.redhat.com/errata/RHSA-2025:8813RHSA-2025:8813RHSA-2025:8813 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8813.htmlALSA-2025:8813ALSA-2025:8813 ITdotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpmITdotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm°q- _securityImportant: .NET 9.0 security update 7https://access.redhat.com/errata/RHSA-2025:8817RHSA-2025:8817RHSA-2025:8817 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8817.htmlALSA-2025:8817ALSA-2025:8817 $Zdotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm$Zdotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpmªB. !aBBBBsecurityImportant: kernel security updateAihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080 https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080 kernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpmlibperf-5.14.0-570.22.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpmlibperf-5.14.0-570.22.1.el9_6.x86_64.rpmÔ/ ('securityImportant: apache-commons-beanutils security update*ihttps://access.redhat.com/errata/RHSA-2025:9114RHSA-2025:9114RHSA-2025:9114 https://access.redhat.com/security/cve/CVE-2025-48734CVE-2025-48734CVE-2025-48734https://bugzilla.redhat.com/23689562368956https://errata.almalinux.org/9/ALSA-2025-9114.htmlALSA-2025:9114ALSA-2025:9114 \Mapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm\Mapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpmÔ30 "iBsecurityImportant: libvpx security update8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118 https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118 .libvpx-devel-1.9.0-9.el9_6.x86_64.rpm.libvpx-devel-1.9.0-9.el9_6.i686.rpm.libvpx-devel-1.9.0-9.el9_6.x86_64.rpm.libvpx-devel-1.9.0-9.el9_6.i686.rpmÔ@1 #,securityImportant: ipa security updateKghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184 https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184 uUpython3-ipatests-4.12.2-14.el9_6.1.noarch.rpmuUpython3-ipatests-4.12.2-14.el9_6.1.noarch.rpmÊE2 $mBBBBsecurityModerate: kernel security update 2 https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302 libperf-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpmlibperf-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpmÙ;3 &eOBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security updateLz https://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303 8xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm8xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpmaZxorg-x11-server-devel-1.20.11-31.el9_6.i686.rpmUZxorg-x11-server-source-1.20.11-31.el9_6.noarch.rpme8xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpmaZxorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm8xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm8xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpmaZxorg-x11-server-devel-1.20.11-31.el9_6.i686.rpmUZxorg-x11-server-source-1.20.11-31.el9_6.noarch.rpme8xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpmaZxorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpmÊ4 ={securityImportant: perl-YAML-LibYAML security updateFnhttps://access.redhat.com/errata/RHSA-2025:9330RHSA-2025:9330RHSA-2025:9330 https://access.redhat.com/security/cve/CVE-2025-40908CVE-2025-40908CVE-2025-40908https://bugzilla.redhat.com/23696302369630https://errata.almalinux.org/9/ALSA-2025-9330.htmlALSA-2025:9330ALSA-2025:9330 @perl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm@perl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpmØy5 '~BsecurityModerate: qt5-qtbase security update 4.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462 https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462 ?qt5-qtbase-static-5.15.9-11.el9_6.i686.rpm?qt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm?qt5-qtbase-static-5.15.9-11.el9_6.i686.rpm?qt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpmÊ6 securityImportant: perl-File-Find-Rule security updateb4https://access.redhat.com/errata/RHSA-2025:9517RHSA-2025:9517RHSA-2025:9517 https://access.redhat.com/security/cve/CVE-2011-10007CVE-2011-10007CVE-2011-10007https://bugzilla.redhat.com/23704242370424https://errata.almalinux.org/9/ALSA-2025-9517.htmlALSA-2025:9517ALSA-2025:9517 nJperl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpmnJperl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpmÊ7 (CBBBBBBBBBBBBsecurityModerate: glibc security update 2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877 Hhglibc-benchtests-2.34-168.el9_6.20.x86_64.rpmAhglibc-static-2.34-168.el9_6.20.x86_64.rpmDhnss_db-2.34-168.el9_6.20.x86_64.rpmAhglibc-static-2.34-168.el9_6.20.i686.rpmDhnss_db-2.34-168.el9_6.20.i686.rpmEhnss_hesiod-2.34-168.el9_6.20.i686.rpm@hglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm@hglibc-nss-devel-2.34-168.el9_6.20.i686.rpmEhnss_hesiod-2.34-168.el9_6.20.x86_64.rpm Hhglibc-benchtests-2.34-168.el9_6.20.x86_64.rpmAhglibc-static-2.34-168.el9_6.20.x86_64.rpmDhnss_db-2.34-168.el9_6.20.x86_64.rpmAhglibc-static-2.34-168.el9_6.20.i686.rpmDhnss_db-2.34-168.el9_6.20.i686.rpmEhnss_hesiod-2.34-168.el9_6.20.i686.rpm@hglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm@hglibc-nss-devel-2.34-168.el9_6.20.i686.rpmEhnss_hesiod-2.34-168.el9_6.20.x86_64.rpmÊt8 )QBBBBsecurityModerate: kernel security update H https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 libperf-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpmlibperf-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpmÓb9 *WBBBBBBBBBBBsecurityModerate: poppler security updateR Qxhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126 https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126  }poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm }poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm }poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm}poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm }poppler-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm }poppler-devel-21.01.0-23.el9_7.i686.rpm }poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm }poppler-glib-devel-21.01.0-23.el9_7.i686.rpm  }poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm }poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm }poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm}poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm }poppler-devel-21.01.0-23.el9_7.x86_64.rpm}poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm }poppler-devel-21.01.0-23.el9_7.i686.rpm }poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm }poppler-glib-devel-21.01.0-23.el9_7.i686.rpmq: +dBBBBsecurityImportant: mariadb security updateRI8https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137 https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137 &bmariadb-devel-10.5.29-3.el9_7.x86_64.rpm'bmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm(bmariadb-test-10.5.29-3.el9_7.x86_64.rpm&bmariadb-devel-10.5.29-3.el9_7.x86_64.rpm'bmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm(bmariadb-test-10.5.29-3.el9_7.x86_64.rpm; ,jBBBBsecurityModerate: kernel security updateR 0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445 libperf-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpmlibperf-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm˩F< -pBBBBBBBBBBBsecurityModerate: postgresql security updateR 1[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491 y<postgresql-docs-13.23-1.el9_7.x86_64.rpm}<postgresql-test-13.23-1.el9_7.x86_64.rpm|<postgresql-static-13.23-1.el9_7.x86_64.rpm{<postgresql-server-devel-13.23-1.el9_7.x86_64.rpm.<postgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpmz<postgresql-private-devel-13.23-1.el9_7.x86_64.rpm~<postgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpmy<postgresql-docs-13.23-1.el9_7.x86_64.rpm}<postgresql-test-13.23-1.el9_7.x86_64.rpm|<postgresql-static-13.23-1.el9_7.x86_64.rpm{<postgresql-server-devel-13.23-1.el9_7.x86_64.rpm.<postgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpmz<postgresql-private-devel-13.23-1.el9_7.x86_64.rpm~<postgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm˩W= ?}securityModerate: transfig security updateR Phttps://access.redhat.com/errata/RHSA-2026:0700RHSA-2026:0700RHSA-2026:0700 https://access.redhat.com/security/cve/CVE-2025-46397CVE-2025-46397CVE-2025-46397https://bugzilla.redhat.com/23620582362058https://errata.almalinux.org/9/ALSA-2026-0700.htmlALSA-2026:0700ALSA-2026:0700 Htransfig-3.2.7b-11.el9_7.x86_64.rpmHtransfig-3.2.7b-11.el9_7.x86_64.rpm˩Q> @securityImportant: jmc security updateR\"https://access.redhat.com/errata/RHSA-2026:0752RHSA-2026:0752RHSA-2026:0752 https://access.redhat.com/security/cve/CVE-2025-66566CVE-2025-66566CVE-2025-66566https://bugzilla.redhat.com/24195002419500https://errata.almalinux.org/9/ALSA-2026-0752.htmlALSA-2026:0752ALSA-2026:0752 Vjmc-8.2.0-18.el9_7.2.x86_64.rpmVjmc-8.2.0-18.el9_7.2.x86_64.rpm˽? .CBBBBsecurityImportant: kernel security updateR~+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793 libperf-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpmlibperf-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpmt@ /IBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updateR)dhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927 r3java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmv3java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq3java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn3java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmx3java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmy3java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp3java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt3java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmw3java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo3java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmz3java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmu3java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm{3java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms3java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmr3java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmv3java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq3java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn3java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmx3java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmy3java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp3java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt3java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmw3java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo3java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmz3java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmu3java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm{3java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms3java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm2A 0eBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateR )https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928 k:java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpml:java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmr:java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmm:java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmn:java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmf:java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpme:java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmq:java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmj:java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmh:java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmp:java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmo:java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmg:java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmi:java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmk:java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpml:java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmr:java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmm:java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmn:java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmf:java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpme:java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmq:java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmj:java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmh:java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmp:java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmo:java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmg:java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmi:java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm&B 1ABBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateR6whttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932 ^java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm~^java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ^java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm^java-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm~^java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmC 2UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security updateR-fhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933  java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpmD 3uBsecurityModerate: glib2 security updateR https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936 -glib2-static-2.68.4-18.el9_7.1.i686.rpm-glib2-static-2.68.4-18.el9_7.1.x86_64.rpm-glib2-static-2.68.4-18.el9_7.1.i686.rpm-glib2-static-2.68.4-18.el9_7.1.x86_64.rpmeE 4xBBBBsecurityImportant: kernel security updateR0https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143 kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpmlibperf-5.14.0-611.26.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpmlibperf-5.14.0-611.26.1.el9_7.x86_64.rpm/F 7uBIBBBBBBBBBsecurityModerate: python3.12 security updateR M,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408 Ipython3.12-debug-3.12.12-4.el9_7.x86_64.rpmTpython3.12-tkinter-3.12.12-4.el9_7.i686.rpmKpython3.12-test-3.12.12-4.el9_7.x86_64.rpmSpython3.12-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.x86_64.rpmKpython3.12-test-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.i686.rpmIpython3.12-debug-3.12.12-4.el9_7.i686.rpmIpython3.12-debug-3.12.12-4.el9_7.x86_64.rpmTpython3.12-tkinter-3.12.12-4.el9_7.i686.rpmKpython3.12-test-3.12.12-4.el9_7.x86_64.rpmSpython3.12-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.x86_64.rpmKpython3.12-test-3.12.12-4.el9_7.i686.rpmJpython3.12-idle-3.12.12-4.el9_7.i686.rpmIpython3.12-debug-3.12.12-4.el9_7.i686.rpmG :xBQBBBBBBBBBsecurityModerate: python3.11 security updateR y,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410  python3.11-idle-3.11.13-5.el9_7.x86_64.rpm python3.11-test-3.11.13-5.el9_7.x86_64.rpmb python3.11-3.11.13-5.el9_7.i686.rpm python3.11-test-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.i686.rpmc python3.11-tkinter-3.11.13-5.el9_7.i686.rpm python3.11-idle-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.x86_64.rpm python3.11-idle-3.11.13-5.el9_7.x86_64.rpm python3.11-test-3.11.13-5.el9_7.x86_64.rpmb python3.11-3.11.13-5.el9_7.i686.rpm python3.11-test-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.i686.rpmc python3.11-tkinter-3.11.13-5.el9_7.i686.rpm python3.11-idle-3.11.13-5.el9_7.i686.rpm python3.11-debug-3.11.13-5.el9_7.x86_64.rpmJH <{HSBBBBBBBBBsecurityModerate: python3.9 security updateR %bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 5python3-debug-3.9.25-3.el9_7.i686.rpmO5python3-3.9.25-3.el9_7.i686.rpm5python3-test-3.9.25-3.el9_7.x86_64.rpm5python3-idle-3.9.25-3.el9_7.i686.rpm5python3-debug-3.9.25-3.el9_7.x86_64.rpmP5python3-tkinter-3.9.25-3.el9_7.i686.rpm5python3-test-3.9.25-3.el9_7.i686.rpm5python3-idle-3.9.25-3.el9_7.x86_64.rpm5python3-debug-3.9.25-3.el9_7.i686.rpmO5python3-3.9.25-3.el9_7.i686.rpm5python3-test-3.9.25-3.el9_7.x86_64.rpm5python3-idle-3.9.25-3.el9_7.i686.rpm5python3-debug-3.9.25-3.el9_7.x86_64.rpmP5python3-tkinter-3.9.25-3.el9_7.i686.rpm5python3-test-3.9.25-3.el9_7.i686.rpm5python3-idle-3.9.25-3.el9_7.x86_64.rpmuI =_BBBBsecurityModerate: kernel security updateR Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617 https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617 libperf-5.14.0-611.27.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpmlibperf-5.14.0-611.27.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm̖4J >eBBBBsecurityModerate: util-linux security updateR Khttps://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 X6libsmartcols-devel-2.37.4-21.el9_7.i686.rpmR6libfdisk-devel-2.37.4-21.el9_7.x86_64.rpmX6libsmartcols-devel-2.37.4-21.el9_7.x86_64.rpmR6libfdisk-devel-2.37.4-21.el9_7.i686.rpmX6libsmartcols-devel-2.37.4-21.el9_7.i686.rpmR6libfdisk-devel-2.37.4-21.el9_7.x86_64.rpmX6libsmartcols-devel-2.37.4-21.el9_7.x86_64.rpmR6libfdisk-devel-2.37.4-21.el9_7.i686.rpm̫EK ?+securityImportant: python3.12-wheel security updateRghhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939 https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939 rKpython3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpmrKpython3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm̫!L /lBsecurityImportant: fontforge security updateROthttps://access.redhat.com/errata/RHSA-2026:2039RHSA-2026:2039RHSA-2026:2039 https://access.redhat.com/security/cve/CVE-2025-15269CVE-2025-15269CVE-2025-15269https://access.redhat.com/security/cve/CVE-2025-15275CVE-2025-15275CVE-2025-15275https://access.redhat.com/security/cve/CVE-2025-15279CVE-2025-15279CVE-2025-15279https://bugzilla.redhat.com/24264212426421https://bugzilla.redhat.com/24264232426423https://bugzilla.redhat.com/24264292426429https://errata.almalinux.org/9/ALSA-2026-2039.htmlALSA-2026:2039ALSA-2026:2039 C3fontforge-20201107-7.el9_7.x86_64.rpmC3fontforge-20201107-7.el9_7.i686.rpmC3fontforge-20201107-7.el9_7.x86_64.rpmC3fontforge-20201107-7.el9_7.i686.rpm̙JM pBBBBsecurityImportant: freerdp security updateRChttps://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048 https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048 ,:freerdp-devel-2.11.7-1.el9_7.1.i686.rpm/:libwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpm/:libwinpr-devel-2.11.7-1.el9_7.1.i686.rpm,:freerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm,:freerdp-devel-2.11.7-1.el9_7.1.i686.rpm/:libwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpm/:libwinpr-devel-2.11.7-1.el9_7.1.i686.rpm,:freerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm̫uN vBBBBsecurityModerate: kernel security updateR au"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212 https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212 libperf-5.14.0-611.30.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpmlibperf-5.14.0-611.30.1.el9_7.x86_64.rpmkernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpmkernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm̶#O BBzBsecurityModerate: edk2 security updateR VGhttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776 ?Tedk2-tools-doc-20241117-4.el9_7.3.noarch.rpmwTedk2-tools-20241117-4.el9_7.3.x86_64.rpmTedk2-ovmf-20241117-4.el9_7.3.noarch.rpm>Tedk2-aarch64-20241117-4.el9_7.3.noarch.rpm?Tedk2-tools-doc-20241117-4.el9_7.3.noarch.rpmwTedk2-tools-20241117-4.el9_7.3.x86_64.rpmTedk2-ovmf-20241117-4.el9_7.3.noarch.rpm>Tedk2-aarch64-20241117-4.el9_7.3.noarch.rpm׆=P BBBBBBBBBBBBsecurityModerate: glibc security updateR |https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786 https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786 Aiglibc-static-2.34-231.el9_7.10.x86_64.rpmHiglibc-benchtests-2.34-231.el9_7.10.x86_64.rpm@iglibc-nss-devel-2.34-231.el9_7.10.i686.rpmDinss_db-2.34-231.el9_7.10.x86_64.rpmEinss_hesiod-2.34-231.el9_7.10.i686.rpm@iglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpmDinss_db-2.34-231.el9_7.10.i686.rpmAiglibc-static-2.34-231.el9_7.10.i686.rpmEinss_hesiod-2.34-231.el9_7.10.x86_64.rpm Aiglibc-static-2.34-231.el9_7.10.x86_64.rpmHiglibc-benchtests-2.34-231.el9_7.10.x86_64.rpm@iglibc-nss-devel-2.34-231.el9_7.10.i686.rpmDinss_db-2.34-231.el9_7.10.x86_64.rpmEinss_hesiod-2.34-231.el9_7.10.i686.rpm@iglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpmDinss_db-2.34-231.el9_7.10.i686.rpmAiglibc-static-2.34-231.el9_7.10.i686.rpmEinss_hesiod-2.34-231.el9_7.10.x86_64.rpmׄ NFor detailed information changes this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.Tgrub2 packagprovide vers2 of?Grand UnifiVBoot Loader (GRUB), a highly configurable 5customizb:l:with modular architure. supportbvarietykernel .s, fi]system computeVs,hardwareuvi. mshimrénsrfirst-stUEFIthat hTlining to7truull3unurenvironmentSiFix(es): *: IntegBflow_net_recv_ip4_ets (CVE-2022-28733)HCrafPNGaysca=imnmay Kdout-of-bors wrJsheap^1-3695]SRQd7huffma)Vg6gJPEhc>hbN,7ZOȤwhensplit HTTPId/n4M[_lockXBls non-iDe*dQbuse-r-freӳcmd_k()B=: Bovޢ6cYH+moF+bګ[sissue(sinclu[ imt4CVSS scG cknowg o/ra,1Rgms, wf3S!,wanyoper vC: Smaڡ8b sizTCP sourcgen^algor+m*k1012){racdi-qp_evf_ƤT|privJe^Y729Yacsub$lrt966tbmIP ESPwansco76K Bug`make SHA512_.sCRYPTO_USER4-(BZ#207264SR-IOVn*> 50%d348303fix arupia d by dmgt=F98218_SC1cli$-sjpeeloffns [al(_-9]<404N#n finasymmetricV warequi~uTboh-D}HeSLPBF4=<-D..fips=f e=,ڢan{cbtr{F1l,ha} rI7fe,Ṇ-1@r=a Mae smF(!ed¶3)MaDBaF-u, th SQLFbr4pomp5My4. 5gra (2611),db0.5. ysql-sel~(C5)K=: ough M9ack/onr_co_to_i`BIGINTtypl,1-4v blengf -lfo-copym= $xed-;s-d8˒7exGLbjjp.( X,v50 abefsusa4u1uCONNECT StorapEng H1OvPkEkVp2pr3r !I_s::walk D6Dpoisqlex/"volgblobX7Xnsh0Z_tmp_)::f;&F8F]_B or:: e_r _X9Xmy_d ::uor=A80AField::s!defa=yzs cTRfx![s/updm+_map__ oSr$ca8bit` Ic*.cV3V#ɺ<ct::_5 r_c)rGW4enquery_a a$SEL?%view`d(__s8V]HAVI>#NOT EXIST d0 [a744_]f445IS NULLޡ _;BTj_MJHv l it)#oupGR4/iLz .ccA;wiw in ess ORDBYO5 ‘u˔5LWHERE h 8 eqd(˩VD/:/_ȴh K"dupue" erro; f@giqueP$)o5'*%Tun d/=bup/ds 31622XkCex VIEW ggreg\9S| 5  nfi_:dg^an mond%b(CTED 1˚ 13_,::VɹB&>|3|+ &s'_postjo=a# ă4 0sȏbe#jk Ĉ5- y~D2IN 8(m(csi_ioq!h*049[kc,w_(#(/s d/cls_api% J!ower9 - LPAR&t&Sha,cC&s[HT22H.+\&e-ss-ng`sO5RiV|nam>3 gfs,Fy0(Ll 5*en tP0tK730i/o i~ u:Kwork;jg 372.9.1.el8.x86_[82k c(tesv3SSATAM76Guestre3 migB21 -J<({Oops ~lt[ ?IRIPq +_K__labelr g+!sl1\l BUG:UH%tas (n'fs4ton ;lookuprlpaɢ: Kokada=ig:C$[# +tubontD(P10/ ibmvnic/L)3)S^vmOUmq\e') Enhf^'Bu/vt-d+DMAR_UNITS_SUPPORTED U5326).NETVd-sfrD.5 a}-eEC- API^ s(niPu CLRZ. N/_ddaT'vailD3 dU'VS%108%dot: ExtOE2"InjK2XML`natG1. 47:IZJ-9Q9L9MNDenOfS\iceASP]CMVCH0<MlS Diru.v801wRubaensp:.-or&0-he25 tYO5-,sks4Pr(3 " "Y428)JHou!( Rxp!59:5 =S-to-FPtEL f>fbiaM.daem0d)m5 2k1al"7Hw ((0J 8J2i6: r2und>%(2 Apr r#412, 43567840529678xD3NRe$V5VInno/j1512DDL/2iFTS$=27NGPlugi%5ʲPAM Au ZJulZ5/ZεLog" #R60R!` 505;52678O30153o69R "5+T3 gP= d .22vede,d$@4: cryi#_d z{,Dr logro) [wr78l92)Dd=A=nft_#9r3491 ?>3>Rd7r%06A0l"Rz/mlx5minunedly0C(sECDSASECD$("FsGdG108g! Nuget7%߱1 &orld-+A}U4r2Urh87FByp(M (JGSS}7607q8216g eex EaA ci8.5W#`Crk(h5Nh26hHttpSnoHcountmr<82 we8 M2c# c̯2MQ$NTLMhs26,9_nsj*F9QiJNDIM s0ƿ4_ SNI{ /2 (N!O9393939 PrIe 4 ,rvnr37(17;5= 329nA ob HVK718-KSB)p̱cKasbah?Rs8(wellMS eCBly;5. xZthi9 =M S/MIMETLSDkCMrU1P&O-(aqst; ;~<,!O~̔:("$Wby C,Wd!n"U2byT#?X,>-rzl 204M.gSS[5 fM4743Uix  r1, . "S$Un(dTKTPTRACE_SEIZEWO/-SPEND_COMP0D059-/Z0g0T14/G2DpV(mt7921e})0K1vjAt4e./7MabExeascr&vVGA*:iU somea]120UoaF9hU.o DRBGf1miyc] E  1\wod03+ #30G2$34s! [swq/30:0]O78\#j(D"l B}6p*qemu-kvm pfn:68a7_#0?vfioJEp0sE2M s>879VhH2)9$FNW.1 h*o?@HPE RL3 GenARMQXY34PY{ #B, aGYO,ZP,[[J3TMHy3l dynam`.sZ 4FnL _F9,nam{ddKtgv )g t`to3S0-?plua> LuapfulV-x lp2ed>/ Lwlso%.FJ| F , d-T\5/ u s#o G_!msde.c>unx}K0)?f30ibg!fM ࡖd `le8k _yein g$0As0 211! " 9C$s:ҤjRRk-v2v %7? cKV$# V-M-) hype|4sor. E iI3)*}%OUioci{+Qa.zso,)b-!%;ۢIObf` p#2P$Google'QuQ.3CenvsOQmd? dyetO6Rfl n68"autommeismser<Łc -c& ? nnchar. fbolN%ptry1-+c 9Shxa pajT e# +AchE$sM?vo(s(unw ,M-/Zx:kid@ad_saY$s E?NWAV- 23R@>  s$& n(^{il19Xs.qY,~();of~edG0885.80603<3JnwCFCoNumOfNWF7Kd=s' HF8q>Qt5 Qt 5, 5thcroFy/I)-q(QPaZLX?r%(GFosxPATHgm>8unbu2wXc`m Q ,-+Z5ZCj2a74:T'gT! dP/Z +LZPi^d4cS!6Ic1qu!4'1>YwaRRs .+: :1j"Y5r{03z: FLAC0F L A8oGM. * sOgg Vorbi2bu 8.0V^c7D'QZMr2R=, a command-line program to encode  de FLAC files,;metadata editor f2. Security Fix(es): * flac: out of bouWw$e in append_to_verify_fifo_interleaved_4stream_r.c (CVE-2021-0561) Fmoretails abpthe sissue(s),xcluding impact(CVSS scG cknowledgmento/r relatedFmation,fUR pagm lis,R&es:6AdO al Changes:Ҥj c%TiseasseefAlmaLinuxp Not0kNfromΎWavP ispletely o a7oressWviSlossl, high-qual~yVunique hybridNm. Jwavp: HeapR-of-RaeW#Sas()044269<1Popgr1Portable Docu F!(PDF) r'ibrarus`by lic\uch as Evil[py: A_gic error:Hi:: fun caudeniAaervice'2-27337<'Ttiff aiconn$scipulXTagghIm= le_TIF` }: DSvirafRIHiBNull source l"^2^Has.865.O R !cp=924=st-buf-oflow:rininK2-135Ą_memcpy>T_xp284Ĕh “extrWS[9pPd\avrgbFetchN[lsdirü0908tDi e By Zerorop89RawD StripedfÒN:O JPEGn [B iE2000= ajpeg:mfaultFopj2_ ? dueh[nvw zҶ122<DcotIMAP SݲU UNIXR khym)(tOpr*rio withind. It also7r sl POP3txsupp s e-mBeiŢ box SQL driIs u1nt plug-zrPOsub d): Pr&leescalZwhSimilasnon-db|: 30550<X.Org-i[ AX WSس!s bas -level $th f-fkphic useEtaasign&up:qxorg-x11-: SProcXkbSetGeo acc[31W7bDe Ist hI< @kben t2=Yet AnJSON(YAJL)[nt-SAX-style)7parANSI CKCvda 5generaGyajl a# ,?O Tput atc5S4795kern3W!,1anyfr(sE ff-pat't e1)j oTer8atm's TCsa0-36516h-r-fre6ulbiinI_sock_sms# N1N40Msmb2_ioctl_ry_ NULL derI 16S *udf_expaC[ _x icbd)glba[617wiotlb!k| DMA_FROM_DEVICE?8\ *i reg4 trnft_do_ui|$9,UM 0rac*nWspcm_hw_lv M4S o4bmŷarup e 8#ywbetwe`drmCt ,k_get xsb28cKYpfkey_:353 in P9k_htc_be_ Ocouldan of ß67) x86_eme_S nêGoSN85#fa- suse$d:tew. hG99nf_s ss-pot | @£lo g258uFsG= "^ _sfa_sf263`slab-~ etcv23din cn-upmhi-shp 乮 SBDRNY3Ni]archcturallTST5TpecifT RCL_DRPW_6po0debugNzochoA149AMD:+tBle@Arbitf Sp)v~ExO~2urLnuq 816, 9900nBranTyp[nfuFretb)LcInostt rriSB P iȓ637douHR_usb_rt_xmia/net//!/)839xf٦XSUNRPCw)589 impr9 dc_sched/cl32Ę958k5?ӣ`fqnl_m leC/nf hueê3694dis0bin8alyD91nfs_ _(s *aENOTDIR44: baM,Blo) SMB)toco+8C!otxtSIFS;,jPC-ma ne^{!pr*vou,Csh foUk haibT up;a7upK! xGX,(4.16.4). (BZ#207748v 287 A E1?274=xSldbp Jmc %LDAPAPI/< rZor TDBu4(2.5.2 AD(si ua lp addodh 6<Pythonpre, acFb-o n&mVluvpdu[clexcepx ve$ dynamR tD dl. hto y cCib'sell.w@7Vp3.9 (.1H24%e#6:2cap: fia() donsa zsefA150^OW reQy;/http/.py cr&ur 1 >.(#rpcSunU's| s7-i *rd9#- )dT&FC$iye - l: 9lotsonnsz46828@zgcuc ilfC++, Java,-&y, OF3Ada 95 GNUD):re&ib%y/rusTe,461>G!u*!?b=)*Cdu-GNOMEm%loop!,nse=/)stcRur: g;replaG_FILE_CREATE_REP/E STINATIc\|emptV tdm1w>zldl-pur /!x/sb` difwLR-1w FKr(- &der8. 8A03=<.NETn an#*ftwework.mWC-@sevywV CLR"N0 O `(a nfil&dU'VSDK 7.0.1)RC 2Rme&4 dot67X(} 3464 ;'7,jcach,son-zld-+Z 41W9 Cm!Yf78hodP2919PVarnish C7"6p`nVHTTP)l%)storebm"soHn't:toL aw@%g, giv*(s )ant e)vForgVP50606q133.<6s5445nParrb ppe3I)J#2(5sh3-2  j -17-;2dk <2 17Environ+S2Dop,Ki2?:*keA(DTLS:JSS#57411)83!Ysg baiURL Blo'(SI93I4BugpIn FIPSedof a1+ NwTm:  K!-only]-no PIN )edir8-ed…4e^_(Do뢏%. P"L fuwop"t-ps.nG2.@+nd-H'anffiguRF>lt.*9or to ly9LAs\~tuE (RH04747"P_5n c?rf/J01,6) [a9l0 -9]3097)G1G1G+G0j18k77{*k.8.0n8m*&li''regTFCORBA d*%6 (Sv5vE&Fv8u362t991C-solr brok~.,3"Be"io.%PE1(" "/>/pki/!/cas"ws-863594Sf AT>F'>E>2@q+057J-ԢV+Gc)0%HotFD at%?j*5s7\%1?&@^9 0^AsAfa:;20QIn60-aCl_V_cW g7eOff/.!),& un-ded o-d&,vsu b1ktO,OFo*=,ee (&xJ a-a&K. Ss68Ő6ǐW*4Keys0HZ8E:@tz/6[ l% @495USTAX88179_178A 3;USB eK-5.V64Vi915WeNGPU TLBushïralm$>413ït$;u1me{.9RgIX3945ò2n"b& e5ngtV5@Gismt_ 57YUndU+n'[PTR SEIZEe O_SUSPENDCCOMP1q0 wtW9.2:MD3avf b)fixesm)789vfMOQ5mi!t32M 7|)51>nvme-tcpCoc ro)CXm";EMCw NDU13qD4 U/5.19)-@WARNING: CPU: V6534406/8/mm/c:105_l9f}+0x3f/0x5058` ::e9ljK-:acy_scr9_095io:&or$ m np%elaroughfs3*"-EINVALIS69DE ::02i5+boo)HZ7RT~ c12"921 Nwal=2̷VGA monSt!:^. 9-acy5oee401 P>dy6"Dummyit"N kar!t9M2=ppc64lQun, oGpane's calef6zswLt/Z39fatalt:tK=G 8$g3q;rb!Mb0 AMdCLIENT: 5 ame"no:"̪ 8\ 7\zI:4I v* 9-ECI_5MA@MEMORYme0VM' S50910S z-:imes oynVMs9t gy)+  s16 9 !T0ODE R760, esobgEunessl>bashB(Bou- ll)'de8KB p:bc __,^71)KS(pd Kasbah#Et ke_G% s }MS e Hl9 4by . Both<K)omQ/MIME, ks,4>tWKde& y 762 a }5rl2N2_reW#mbl?du;blueto/';5 oAcCwL|c_skip_sp\ 78Q76__ 42_ss;i$s/n4r T~4 N<3fDpay6)py_vlas [u0AQX -* >5 8> H): Lk TeG YA f 14Shirda s Pum0+ 308L d1dNMI(dog'srLPM xFDSERVERFmdpsi#MtoT Gg a8`qla2xxx NVMe-F 0 122@scsi/=_? 70S__$e_wa2 25/ 0 [#21Reg,: 1 Lvo T480. AHp -C/4  59 S@u~M (9.2).79 < .fNx_Gzinr^{ _cr ,r#edu dlpa lD ](FW)0 / DLPAR4RMSFT, 0 A #Pp-9:{onL -CQ4(*n_i&Rf,b51k[ v W$;3o1EMLB4FBÕ D Fgs&F94'' 1oZ ?Kbs=Cx gL881HtoncW$$K613XCEE *hfs:d ;*i?BIPI9:Bs_r6Yef8]p41|%yzP!Ц25'+},^!:IDNb506ua| ILuaXSVght-weC>e  LuCVf?D 2,f#alonek ua YG_$SaWEs~ G<$y ::a^^1 7ibZ-!b$y[m;*yYGp0hmFbjMseb-V-'CasK{betEM?nc ^gL_rgb_rowo rdppm1:8[btuavoidKYQ_9 ALSAUAcmMo-rwsiuEn Re-) UAF 2M-y.TMTCGNr  -to-).H©f y- zbBx #?uesthusR ` Cgps_v28reOE*c/ , )puEf 79sk~l?QgFeTz: Adderai ) -rW>u: OcirMrR|Ac+Pe(&n->_%->&p->&  606S.AN_bal;3b86< 10 ! /kipQC1kdumpK690#gpioes3X9mKphd&*+E5 9 orvs lVolT;`,Ce V7u E"k(IBMl F= 1WQETH % .^ l' _ SPRAMXrnf~spBO8YQ)OQW`{ adv"j 3a-z# (DBMS)pdsq<Y.\ s#pseloy]# 6R_CflF<"n be7# QJ`(E7186"FUSE(&l]` W_"}3V(i_idEagle/ jn3Cstop'")buhutex p,em/()_`.4i&ա ut00(-44H_21WSHTML p6Y>y2>9>'\%oU.A$cFS'Z8191Z\Z`5 LS ?^negoM]3]67] N/jE&[l$62O KP B6e 5]8˭slZURI K4& 6Js6DcrypteiJalgorm:e"edD ;+c[i\%+6gD%$C4-Clc69Sribu. l;mf ;inhS5868e Pr(ly4X # runntoy./; e2 x+r7 b.7k-sedń18PKCS#5[d7i sF@t1ssome&( Yw]hyf{u-an#oun-.n,mrE ?)$|&dNs6 #78ҲI938) * OpenJDK: missing check for slasharacters in URI-to-patonvion (8298667) (CVE-2023-2196b FJmore details about the security {ue(s),cclud imp{, a CVSS scG cknowledgmentsnd o/r relatedFmat,ftoR pagm lis,R&ences:. Bug Fix(es): /T(SAPSSSignaturleo works wi") keys viacSun: provider. HoweIt did not fullytha/Nyuld be useyOfnattemptJo do so, lead3obilof errobe"ren_customms. validswill all!Ih"luch2wheat can. (RHBZ#2188024)Samba?[ o-sourcǐܫ~ervrMess Blo^(SMB)tocol+JCommAInnet lHys]IFS;,iPC-compb1machinesSe fHpriZvarioukSvs: RC4/HMAC-MD5 NetLog1h6el weakbsh>avoyd2-38EDK (EmbedD[lopu Kit),j/`enaUEFIxpportVirtual M;pɲ<nLpA64-bHfirmwIQEMUKVM. ssl: X.400 addr typkfuiX.509 GeneralNamet0286edk2: XgEun_fimmEntryPoingn5pot*iSMMvescalMo1/57Gtim}a[oDecryp;z4304IdoufreftcX\PEM_r_bio_exD450D!-<-GfoCBIO_new_NDEF@15Addi ges:Ҥj c%T㡑eass3fAlmaLinuxp NokNfrFxRADIUSzhigh-pn lyiguraRemi Au^cDIs$icee) s,siedFcezaRoriza rTus:Uln&REAP-PWD1859)=Cro :un*1ASIMA60Ain}inary a<1<X.OrgX WindH. It s basic -la  " -fkgraphic uRfaa߽upOxorg-x11->: bufov<_GetCounStr ()xkb/.cJ5VXkbEKbdBy283ATestSwapFakeInpsnD634͇IPa veUngp -of-bo.sc~H1HvdiS0ctVo3ify֡H2HSc)nSa SetAtabuK#IProk 4IDeepCop0erCl5ȓ?1_49emey6Qc( j=PoprP DocuH F (PDF) ;_ Ilibro,aE`s as Evilpy JBIG2coumalQ 8784<Berk8yDomaiBINDf )5JDNIl E  , (na);# olz (rh ~uw \ ~;tool=vfy Zabr"lyb:w+ar#de*may[veyg e1 279 ^&oUPDATEAqu/_DoS(0EsϢDspecif?rie@PcaSaP736;P92= DP Desktop((<),depache l nse!x dp cliAcan neW'Microsoft, , xJBox dp:z`/parel` cLl] s=mt r0unini8M 8 g`/v /h3h A*zgfx#>316>fi behavi ?7?d zero8>rleng0OG9Gheap B20ˊsaG`dr% `H47Hi N7N> fs$6EbmpuXTagdIm TIF x ~}Bc 7> wg]_= cpy./_MxQ97QextCogSsShif24% /͹98goS^leSW9s S6260eSg xXRRGBATGExϲVm W;pKI4645IBb  TAG_INKNAMESFNUMBEROF$Su30774zH32~,0Z==un`=$ng[Nc g0 SEC l: NRD M nrolSjcum4(Non-Resp LAL X2z>8wikxVwalyzelcap^!3br*fCrunn}oMhu" +5ethLiInfx *oo:-cyVyle so 190@3kOl03W!,1,anysYg2p_ le_I)c/b^th/7reb289Y-ulm rUL"et,* cpu: AMD CPU)ex౺beyonddi br7hZ1-2mar"m FPUT_VSCREENINFO ioOOB Z3365]]$?ra rty_sA146V4!ULLP der>Lkvm_mmu_pcid_gvaF785 ~_pipe_^W%eO W88nVMX IBPfexinegiSpv2G'G tnf k_im$ha>%orD669m_be_algs×U /g"N fib_nh_5ch ipv4/!seb };ȨhugetlYo_ mm/) 2T{6_re![s()5 s<k->_af;do_PsQK66KIG/3 ű\v_aclLP36/dj?h0!#Q_p SguZ dueoiso$e:$\2X]#fCdev,o!_m_getQUSB-C! brcmfR-"mul%t; ;modulumge!9͔:Ad7 i"-/C/shmsymj 00973@\fwN|,9x o 060n:b4lad% ;/etc/&/redf.cT- 328f shim: 3r (&-vbootd ?/1-@2-@=H52ha"beenv%20 rstkm&:z5 (4.17.5).&695GnuTLS gnutl_ ndvan gpics)ra"mH16>2+ araog{ 4l' $ 'kfS./7KsGNU ,ioeISO 9660 CD-ROM.Riy-$:bsdK ( 0,ri9l0u'i#_%py2n-񤄦+ula%qr L $_Yl2>?ua8Lua1p)t+.VVlso)aspg8-purpot-alonekouT Q2+<=*7oTj۶c@{! ve@4?aWtW-H?1#%?aDpbm0$23<}go-md2m+rofm s)go:gexp/syb x: +417> MySQL-usM; th]B#&b\-8cq#n0* M31dae (mysqld)Sm.Gss iD4 wD.0.32 77731, >: #:/+s0e ulaC(</r *E1_O mi#TO"&ƴtorEP2dc$[9[ICDB#I60ʥ,608511ɞ(n. Ha$^7@A0_3Re %V353AU9T0BT8@T1ʩDMLNJ 28 6%T63AT4AT5AT7ATJI357*7.EnG$_AG7+SA78ATI8*T1ATGIS%N* TT @oz A,c: -n*L$ e), #wascr4UNIX n1UPdisEbutn=@de)"UV2r<:=-_in&,; %4R.NETd-s#H1+#eɣC- APIDk+l'eICLR^NewB`DOaZav;y>adU'VS(P6 118Runt=)87zdotU (s2123})"7:KeV &: pZBX PCf 933JWC.5NuGehe-P_%$*a"v7vU@CE- SvtT.gcL%)&+BT rPilT,sB?JBSr TN?X 9 Pn }-,OLVOynQyRdƱp2V^*O*a1mphL"u) :e7ary hIvaO)@z(ird-]"Ni:7@l+.te b <"329 707 7= 7 r B E'Nof#u5-vAr$$.E >ToD6Kor%>inli:.] virtag nP ntV^Cu q S?S^v Es.aa',,* 7Y_~ed Z:2p(lwAPCIZTFLi;"nup UzGE|wX;oup_V [At{KPe#YEv42ZDnPEbE~3QbDTY 1F 2$KxB: Un{ded/Ve 0E_'s XFS=3-4Hi2cx_slrE2c_xNN9N4:Ho_5g>EZ\B3/4vE ,sn17l QAT U,:- ()*6zRPL-P IOTG/ S :HJ1cs:8i:zFIm,doeytxJto2n)RCTAPT l'6j8172jBUGiwlmvmEfi@Q.MeshF672NAz*,9 B2{Gq9b?7a0a36396f2fd6368a54a020f420c8916e9b [IIFDUYNreBcs]822blk nvme/047aE753$U-nqso clus,bee)rea"Olth hours`70 [-rt]:6sk8a*e_:-8Se3\Q5o$U8Kf8 ;GeJMkJ5JY2.w~H:los!0occձ JwRe^9234wG_wd |dog+Grigge-une0ec?58i2'"u:GNSRptp4s1v "smp<:ehersBwwob7, ٩!"nohz_hN15g})%D`Kk!FSQ[al-9]P2CFJ: [REG] NYiCQCOMMIT_.$4ERR_DELAY!p!Y3r- "ev- 2: '_layFc_}_G5'" b'_{V`4g,hximum 255'74( &DcuT2rpmi'$Ee/+s/zh_CN/G/mA c-nupr.rst82hcZD:w"smCp Jus CD9.101aefc40a7fTwro>n=/tsY)_treP908Xx86_64*d|U 2ns j*BAY=Py $38 D6DO$20DJE4 E'h'Js. s: 9@bgn Vc.Oer)8@Mj"-ndEjd[<} 11g,VEnon+Sx~ZIPAn; (830*, DfznAESD DQD\qKhaJ~30531e @fbuzz:oO(n^,gthc>co{KYǥuprnO4{?dyic dump featuschecksummouldeach%ui-olvIuuX7dgSial builH(RHf1650782852.8.08*&JD[/y8u3x066xSambaLann-sourc kServMBlock (SMB)tocol{CommAInnetlHʩIFS;, whiPPC-compbl9nes[sh,)Epvlan: -of-ndr DdIeakb->cb090)Ocls_erSl_'_ve_opt()P5788QKVM: x86/mmu: gndi]#r__fa:N2-45869Nspve6rQo_prlimiJ:/P.c0[YSpr 2OT mg bl<199<.NET6n5d8\fr . ItH+sub&MC- APIssevlwi eICLRN0rsd`thaddr aZvul bil nt&ila.upd6U'VSy1100dot: RCE und c*a/3d4Kelž3r attacf l 0on ice$i818i6}2121`FLAC D FreossNAo' dec. *N laoOgg Vorbibl8 0djecnsf ťod x libr21-l| fgrO@> ;ma e2flac:Smote" ExeLU )bbitfr_{_ fun},supplycrafp>ͭ v0-9vDT Vfo Yhave  up%deda r :(5.14.0) UAFnftS P Ukup_globOtriggeref{>dnonym) >batz e@ t nf_:x HinransQlogvBrt #jNFT_MSG_NEWRULEx61x/s7dj w`poncan4exploitMcq urecf_c1 iv'x776 -T-fdueezmovipipapo_e 4004 \_qru3]a iEBA_<_CHAIN_IDd+Űy1y3īݶibyid 1Os- -Ybyteorde4 001Vse/r MSRsS3sd*um163hwqmKCrO-ProcI{ L9205bypaskdeSaerrOQ= 2e&[l 9.3 BUG] [SPR][EMFHF] ACPI:1R wakeup2[DelT2TMonFl.lWD19TBSSUTlwi'VGA/DVIype-C nglej946rtmutex: Mbibwok)uQin2_3_adj _p1 ^A\AWS ARME3 DMichif2D23H9.x ` SEV-SNP g>Lrupfrom ne bblkush_m562 /p9 rq-x ".\70hbz20`9//lN~g-suit d #64Ps[pid]/w brd392bE(FEAT] cpuf:l_p:N<HWP IO bof@az7Y- MB,AMP C~ Mayay (ad)X896XZMDRA - Uk Ge  Add5 -uy1Xl2l2 l-C#Ci#dn,79QUQnU webpM"atool= LWebP 9 p.- geassydigitahQ=sP5$ba oVP8i+$( n chq F(RIFF)wmaste7  d#bBsera to,$%ribut Ce'ly (eap%#nJ8g@ Cie/POSIX& p$Am|%m)ڢie s= dae"(nscd)TWm`ip*s&Wseqm[ cy'): &sogpgscal ;91 QSHUgdrno-a m K527Kp n_'TP8*Baih_i@1 Py8nkac @,Qgh-l,a) ydƩ^ml u}, $ed\)mphasim!n &enLy hav~ ird-p&yp: TLS^k)n0217Gho+ treP1S+PDF cu.P 4=mapdaB)_playpry'd: ltOSwinj+misermiG.fzip6664Qlob8-orMP) 0~T.,qx y_ _-_ l. >LmKllC as ll.o)w`/+9vpx! ' B G+n/ǫe 26C ,G''x Mm 2$   vp85H sbOVP9A44M aDB&-u , BSQL pis a^-My4.6 gal (2m ),4iadC+(5 (:esTp *: nmysqgfaH15HdW Osop|/_'#l_ _`1tur0a.c 2-320 _jra Z ->g! _coun == 0`dict0\2\a_ $!"ylectK4K&Yi5_luq::0K_"M9MJO CACHE:: orfiela'N9Ep_$@r0fN87NNULL-spi db_m>::_/sl e-701{2XBerkHy1ND/(BIND)2)51DN1 EM '($); a 5r&rout1 apc{"yW,~;7v@ f '  %$"I hausntrol d2yDoS 3:W:33K;/2: MSyrR JQ?,RapidJ  nxohhxy T=,f: o | me6 . 4\;h iMed 94043?I !deserizGGCORBA:33 97Hc F+PL'G@authe c"d9966d8(Axime> t s%Ope, f.jar.-S(5S&,:?iduc[;z Yg-d/*6bde3)8!>eb72mi!soJAR(07w;92rstA&6c(w"13*f/usr//jf! aE+J w ow by_%1D1D+&9de:r "p)FZip$2E[r<F>,-'u zipA貪 b)"l.1,V)GJ*Bapk/pI3q[ )%thzsT27B'-D|..`ExFV==eB37W)I\ gXD)97u=) ei3HD6se2q,7 #d|&y12432-$^32\jcmMPE, ravtj(-#!,myƘ6)*7*$B'$=''Y ,MLl1A_iVAVX217J22ITk98$*68*M*-*651)nghttp20B1t#J"!PI =*I|5hV!C3(%DtIt*4j Om{#f8'tto{P@Z7, g(*(sh$aJ)'pep5 V 44k/!2[P`Pm~*: PDLHC`eUGY$G31!EP(Embed !+ ^I` UEFI09V%MS p Pa964-b[HfirmIQE>>P[edk2=u,1GetEfiGFV#2#8+ur=,#& DxeI3V"Ha%#19-145: yJ: ߪASN=<+ idenI D6z=C3;s:ҤjV0%Tse j=R)No2wBX.OrUaVXZ,$, *+b 1c-&3af-fked$7a2&,am1up:xorg-xS; : nWOl9$U(A(FMzP3E3Vj13 :LibRaZ 15RAWobO9mera.RW/CRNEF,<DNGOs:+&h- __",+::g Li)rc/w .cppE1-4273X>i~d=8197Un `Hv[%Gm-sPerEmC257=c 1irtcW C(&nte45n,^/%cap% 'X=aRs.$-C,Gm,,V _~ed40v1(9c10)F' 7+3aKStYJgePObjLi e>,dW> fj2 n8=O fsJSON) ]WT MMrAJ@ C8utpm7!-bE1cL# reԭaf|-c,H]d7_1XmV#0-12762@wihar&netayzjJ p%3Cmtf runcoMY4uLVHuOTHPdiso4066@1IEEE C378{nchh-?cG8GCPiMbme: 5:VMS TWOPtJb=Ne 78ƱXRA 895AFb_qH"0AdvPgQTP;(AMQP)'" youdn "8 J 0-9-I- U eeals-@w9Z>Ap)fCalcv 9vWL/yt 3- 33dloUutpromp@IFg 2 :Fp*`IfoRt4,P  s boxeE7\f(1`.8Y!9 =4eGIOCLINUXIsenda/?sU \f >C:ol81'YgMe-gH NSI Q?o~v lemia,^ ϹLyS/sbcp.ceQc/}~D)YOm [gn.c:3_pcxD_rl4rf"QB8 ;ditional Changes: For detailed informa$ c% this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.Yet Anor JSON Library (YAJL) oa small event-dri (SAX-style)7parsCwrittANSI C, andCvalidng5generator. Secu=y Fix(es)* yajl: MemokY_tree_u fun (CVE-2023-33460)X;e]boutsoissue(s),[clud impact,CVSS scG cknowgms߬@at,ftoR)gms, Ady+GNU'bmicrohttpdC9that makt cyrun) HTTP (vas5t ofAapplicaÁ:m DoS27371<T{tiff paiconn$̾s fanipulTagghIm=l (TIFF) fs}: nuppointe rLZWDecode()3/_lzw.c%$WYpaClosap16Lm[Á3574heap-bd uaffrviaecrdEoadRj26965kBufOflow9uv_<:>Mprotobuf-cPvideNbin=DGoogle's P3col+[: unsignteg@oA_required_b!2-48468=Hd s% buil?blockbiesR -sv C. It]obj sy,m]1GNOME,%mloopley largutilstr0comm aucturg: GVanafhtab"Hsizep)eckis_nl9499)Wg_vX_bywap-can`keoime with so non-Yfputs2611^pe doeXcWpec'[Y>kshadow-u m7gramUNIX-sswordP, we<#V agTu' |groupcou. º:ssiyadur[d(1)QY464= Pytho + pre, a&vjy-onmmVlu, whi"sdun, clӢexcepk, y highveEyna Mtypel. supportt aԩyc Cu.Rous2n̤;rfollohave beei pd HZ upsams죯3.9 (.18). (BZ#2210783)6:rK dct tracE07-4559<Sambaopen-sourc'_NASMess BgMB) :+8CdIn0RS(CIFS;aa PC-pKmachinnre,<"C7s,(4.6190412: -of-bFda#B AUTH_CRAP 2127)@inite n mdssvc RPC icrotltt4K|Bfu L˜#2-s hscureE= tpm2-ts? 5lTruP# M(TPM) 2.0APIpy. Tť  r Ue KJdecs3 TSS2_RC_@N 274A cps-6QiL _y#wpP=killgrepn(?,Tup` mst w pwdxq:s bYf 0%:GAvahi }DNS\yDi0= MultCst#ifSZerodgurTNetv kO h= atdddooc*n7. ~ -awyouplug mJRK,no{,7ewpeopleRcB0n fDrYPa: LbyFbusy-n o /4/C-dae /so11-3i 4 rL_s_host_ sol_stwhen edo  badly-˺?>s502®bb rashedDBuI198=Whew3t.ard,defi> PEP 427M-M:arscadeni-3)rR tpocli 4089A Gscript, twAkl=ݼ s6  hpVirtuM (JVsh r^s9Ieres& a ~+ > is@&get 4cOertIEv%)QH6 In l}:saI-leEf! sűd*inct.jsap)be yDShvve5 at ' ac>ǥu:e( !um*e,àumould"on h*<` "4l/usr//jfratisow by>519]jcmolNQ, ratth-ds)*$ e8)O smbd 2iunix #(ao"096"d"\tr w-on(Tmi 9R"rpcecho" ,slee#llAD DCh0#ng,2 ئHyextp(I e-/2{CZ,:  webs)vulDap ReA)4487.NET#ed frr+subWC-sevZ,wit CLRdot: ArNPWrXD2V':-Ftp(+604$\SP\ By$ZWBlazorsX55N0sd`N r<lZvil.upd6U' 7 144. {62525w^~SQL advanc)pi )b آ (DBMudsqB68 E1array g(?z586X8$Eggi u8)K8K en 9@tits@ ^quoH Dn5ĭ39417bRole5!_Xl_ba]  Bx u ,!79GS'er8'med 5]$phB h;on;gVer1- *-br 6aa lof2 -Pj:614;6"442m1IMXFmuxer-6FzIM(Ido6centrzedOӦ:(G.zbgeth*/\udeye!ipIn_CSRFM.57-   IDD.SqlCN(MD@&P.Y4-OaX509 Cs -  a:Az,L7LDq&M >2131e80166$o43Lr'{C mpir$4+WjRSA "i n -.(: ag3 ALS%547b52b$ Gv* fieclawun t@2C'2959g -op ܣI30Ʊ21Ilog* digit#pIukeysO6976O4'1.#8"*!aōi1/or84N6p,)I+# r #COcFh2Bu392)(RPM G8Q&-S&#PD'"  s{?fJRR8` _$$TEt>2(p!.nc 4i (exa( , "RG>6ÿ 1:.""'T'#^2@40`5-7w-?.w2w2Av^@*W7r 'REFRESH MATERIALIZED VIEW CONCURRENTLY'r098unb a'desa c gISECK rEW Q9: KeyTrXC- J>emPUH)s:SoF&038{OPHLa a53 -est en +e++exhaus8s]+M3! @ody+k .22 *K: bpf:-n@r[v *O4100iIUSB:C!:s7840:xIresumeF2244Fcxl/ +,99tcYqdrkutd8_5G+wE(Ee`dj+1^a` UEFI(Aq-sd 64-bmHfirmkIQEMUKVM>edk"9B-DHCPv6;cL+T4R5054inU`J66* 89)1044UDF#1>N@RAPIDanP4P4- 6T1S25671234^_8` : Encryp3_Privileges%_sV7* %R\UN9:N8$N  Firewa $_$Njzstd:Tb run# util.c82-489"Q3PluggAuth$Y4Y!Bug fb#33630199`8.0.32 troduC regressz--set-gtid-purged=OFF (AlmaLinuxy454)tTkernel pva?IȤ3!,c=opsyom Klueto: l2cap: fnull-ptr-deբ_chan_=eZO73Wbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type eGcegl3LINK_CREATEi385igaBٲr crashPstUsafe(45020Lnfsensu^that4_fr_args.ext!CoeiU6697͢J-after-free_u be_a_link_Ĭ7675sdiv;9888;arm64: ys?m= broktLDR (Pl) suppor500xfrmB-*leakalgo dumpO OSCOUAF on_sockH25HISHisHnKVM&SIgnnCR3[4:0]loaXPDPTEs from me yš:valid[ new SA'seSlenA[SA familyrsel.ixe42 bnewild--accto_unrXVirqchip/gic-v4Oon't a VMOVPra dyVPEO9Шhci__ed_cs\25qsched/numaWpotialfinjask_8_work5'3\-of-ndritM_get_nW_keyPVeoki2.11>PKCS#,l#jTIBM CNcardsuP/4ϡ5 u '. *\}G58ephicProo withêfirmwaed)Je MAjlMFC 4#1S pLD Exp/ 2:0863 F 7E=z)AP Ai sĔFunV3VKEbr softt[ ccaed OÓhH) Slot Dgpkcssjge l Y: -U ide- nbtRlR v1.5d$cipK-Ma&n09 .NET,ana -fe+subC-sev i" LRRN0M`i.Z nvr upd6U'VSDK 7 117RunL7fdotnet$Sb9C/ YARP HTTP 2 WebS1 21392E8,03E%DL0eOffi uZ,%mmun7 veldգ-p}tsu l ktop apiqa tdHsp shee&ula edit8  rawY. raO6,visimyrrtced#en\ 3-6186e6 riou lawJIRA:PA5 AVarniCachigh-p`N a zstore"bm DZ R!sa havecrtea:@g/ , giv*(s 9gnifi t upv:/2 B?WindAky den] O8 4 un esiveca;DNS SEC:olA{wasS}Udu*orredefamios,  | stgroupPmo%fyr figutbin " rolm$-c4 :@"$ eiexit" us  IPZf8" WcouldKrCssf Gn;Bltlhost N89fi al6~(.is ?unpJdkvanipupnin,ly wA 3,g1mrquet%.d bߣ {meseWdisrup(Ll eT{ g f "/etc/,/E.d/rt f"s>en ml, "R\vwo di“nxd-re”eչC~51V+lar Om@| yexUЪO44 *H ju-1.5-jdk ?<Jw##vamEnviron*SDI+Kit>:q(E7(831#1#10n(Mlge1C1pil 83"22XXP.,.|7 cI14IW$IC24fP"ej _n__sray"7507[9"1O+h[3\lookFO57{N77+U22+ͣGRay(3 rRAW bed'digithora RW/CR 1NEF,<DNGs)<: jeap---Z2im_exj%329 t+TCg)7j#c%Ti-_se,Sp NsVk;Ident:M(IdM centr=zeuth,b:m:B(orizxQ / ud-: snd>C YE  ^Ed%gg%AIF AU,WAV. @ src/ 47au.cO'$2-33$<%zH/ . (PMI)p+m+WMPICAascQxR 'v t7O!dard fl (J)s #e~s ` pmix: r"+7k_=@ Il3"rbitaI4=Netc,Bok NBD pn+J.hY1#ks9 -lik!)' n"nbdg^ sp1zfZzS:M%)4N=ez:87a?C&hisbe(i P.!"%Uep"!`2>F RDP@: :c D,P(<),d undp*lice8xardpF'MsMicro/ ] m$xJVirtualBox .E qy,00c<' DOSz3GK=DGN8 Der\C@in9FXL1Lin* *đOOf B#W S2S)ngS{ Ss~ gdiu CLAll s=2 <<E(E:+*. ju& UEFI>~1 /p9 64-b+H!>IQEMU~XBedk2:Vh;'*>+M0)HCPv6xyEvw's3"K523#2Tcg2Mu'GptT*67LFPeIE>mu;IA_NA/TAAjl o Bj D](O}/c@`1finyp(unnȲ73Lhea e2eaJ$dN.c]Y/:$ sp heckiDHC9},-44=QHAolki;- qt5#aA-st&, mlXn)3Qtq(F >$+Rqt:E`hKTX ] F>GStsmʹy ,m+m?on* w9h e";] gVer1-pOedle1- ji TMXFI6(un o 47IAES3A!diy5y_H.2bG[er{Mk6k3P3A t %X:XTag! ]l (T)O }&vaG? 4NA<9uV"&hClT teAI _pedic`28Flc?A258VD^R7: /in - "_hae___'shƯ78]/:o'OETH_P_1588 d ^orPaPPb: _cdskb coo g6dCIFS2DeiI(V'+CEx V`(e(e^ed_0ofe56taO^ex+KK 3L%cklog&`h;G4֔tx {u!Ԛ lxsw;!m_acl_t>cI7Ki2c801<."a“nxdH di”eed~51VPa}7OmyexЪloaO44P Buga-dyndb-ldap:.tt ABI0virt APIwPterv^Cuz/:XqVr t_~edQJ*X: -by-erro +vL5fa+ByS{us4-144Knegatng_new0ngun o Y249* Y.p[ahl8-9] (JIRA:{-2:n9515)1r\Ss DU (SSS~ }Zo uthEme,e S ()!Plugg A[Modul(PAM)war# de-ҢicSAcry u6 2eI5743 hw: amd-7rai##VC'Uat iW AMD-SN-3u,L2*ffdhe*gohm+~duc60a2e5b909z.fips_wed=1 l5pwcy t s009mm/mglru:x r }egeche235B[EMR] [TBOOT OS] SUT ld;go{S3 9.2 Tbo'OS Oy n -16 runBUSYɄ6<j  te- NMIpo pE30678E0:6f:00.0; TP e g C110.NETdd-softe a>bC-Q s5 Li CLR N0p iBd`a > rFhfn{il. updU'VSDK 8.0.105Run75dot?9Dou 4w4?;i%Oenv!n ipa lA"xyA.}ousFanstt8xz@ob"ash @L Y:5md clinrute-v318K+LicOfff &!?*mun-d lddvsuY kt!,,=%)p *orsp sheepr ԣ&$ e8t)awYo . )s OOimi'bu/c# *lt((mprx1pUVzo}bit<gstm/itec@6180hW i.macromion`w&bz(389 DRFLDAPx3 (v3)"s.* sݣvLiwejA^)R %*-Y$tor%dministg-ds:7>viW> Rr-r osZ-REQiO s365)hMal@.P,_shdo_mod*lapd/)1 8i _DRub\)" 8e=,&-n/lul?ha ea& @ +Ȣ"taskfouhavepge2" r /":by (3.0).3/cgi-: .spli/ GI 1 2n ?2 3UR33 7553&464B#>S IO7280wCE6.rdoc_o!RDocEA ɖ_RP+xarchV FNp  w*,but saz#oxed z:G $6KR)B Cal:246z~{;GB6ssr ^P1S1PDF u1 Pm3s4co]+ mC'ϡE') bep 'iaPVP zZ Dri'1Py"0)%vek m,i m",W'* v(hG veyb(32l. 06Z"y=llCcaell. -Lw0@;p}@(>-v n 5p.To' a 597/Gzi8. lD13mbs   f/mlx5eV$pedbu ~Imph:i_po]152626=Blueto>/ voi mhc> )_Kt8Y%o: qd- / rI&AER x?U974Uxe2rrܡd.akb_@_fcycl73ga`f%ny_cre__on;b ___x(9BUG:hage\ul= :&16bf752f593ff84+.4.z8+3>0[HPE & ] <gz'= l p4ex6220x+/\/_de.c:51!\68DPLL-f,D71)CNB95sd:" TCto6.y764.IPSR:*4XSCTRFE] BOt`67 ?DU825#IDsw tu(Ou8!sir_ ۈ59 )]@at]VFb9%x MDD !9083MC8)4 REGRESS] Lbob): oke10+ ,s495ybnx2x* PCI/iJR432)6.0iT'6;'32O'32 O'S%GX.509 'nPOd 8fiJ80 )9,7B7A\S T_ .Js$0,)2v)8 2640j-1.- jd}0'J J1Ea *SD+KRG>3k9C?Eli &iarradex&(8321h"114Pz UTF8?B/7B31BEZ:symbo2e62He@W9WW8W (c%e-Lt05480[P200}r>;,i)ere2106e4eOC "|2D[O \O454O1L11M+N7N7N+nN2727+uZTIPC*F sembly~AP 3688e7isil3_dsaf_Kc /NQ/ge_srseL_i vÁw>hclgevf_sYmbx_msgV9vb$l#F=.IharתR3Y R62ciPj1939j6*9bysGY#_s_t/Cw `&3?vmsfuMup_kd[Aaz5MUb>UH%bi,eBO>WQ x@+~Woccu.R5poQm4_c#858)cwe.87avmh5 +rved(gFHA5Jinc97$or e)iortcIiD_Q_$_zK+c8wsk_8/q75)98S2_hmm.c:3src_pfn  6\85E:rD9Iu CncTxRa`g!r givc#!8841^ytp82sil Pif1+*;bledf9%|2oB0x2:MYHu)2paO95blk-ZdK+oB664QtpKkiK2)qt5j.KW9,lʱ*3Qt. qt.Delay2g lP!eu(r,>-6e?E (E=d 6UUEFI`%VGM50chRisڮٳ(W 64-b%HfirmIQEMUKVM:%eXC"HobF HOB OR/W2KT*a4kRPVPcUTCPm3ip St #N?_"452A4w W8PseudoRand; Ge RDz&(!KMc6$i-N)z %promp#Bll e @bJ/t-$ȩ cMA a]0^l70vA-p_Z)$ foc)oTynch *I/Ob8iWLookup *&SSRF UaU[u2480YK) [< ()Kay#ll T<tBumerhC3UQrh^,+zf3 - 8 RuaGD9 Y$pLQtfUeTfRzH*NetC(IOELoHT8[$.'Y' prhe rs+032+ggYc+Iil.c6jBmAL9jg 5 4uncIIin5_&. c_bfE7!Lbp|;`beX?en_@r_c( l_a^pFc7 cdm:+/ umho/YDsuspqXK88/GZ00ip6_`e_mp3 >8,USquC+GGn:|Mqc  uh^98MfKd30y s [9;P;sOa^r[(sO3UicmSNULL|-_ <Hbe1Obig1 @_irq(Z N^iy R90Rs#3shut_nĚCGscsiffc_l _ptpru 8Wh_so(~2rx_krI],`M25`pdhbazef($_4_þ\24]MovPIV'1 unregi9C~.c@h5QY-xgb54aYI7e5:-bec7lifeŒ`3FRADIUS`-B{l!bfigu8R5H^DaUs^(e`E, 5e0KKaI 0Ku4org /:EG: ' v$EG5a=EGF.?gCG6#$'j'spzs|zhS :RRs `st s@namc1O *ijIG(0 'kJ975JAssi othqWve`!C=n!4074848$3I, mi+JlsS: 1.>C3MBARGOEDK58bB8Nabout the security issue(s), including impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.Tkernel pv7s conta3Linux!, ofyopersyom. SFix(es): *J: phy: (-2024-26600)!netfilter: multiple flaws6808, 706535899e5fcifs:R28"wifiԄ97Ą5243-52651ä78¤27434493794122857n6igc!53!dmaengine/idxd,182,ipv6 R74159690340961avt‚CƂe!mlxsw#52Eeprom$4<ce!91ŭpֺ/x86*+864L40M602Ÿrt%coco*c seeRRDRANDZ CoCoV80tlbmi_,Nv`"r{k!i)fFP"do s_i<'z%splhiopt_aS804'-of-bosopsê8mapH[ru#in&_' f!I%usb-sD a6 alauda: C\ag iG$izM/ 6% ms/x Ÿ9!'f:b Spiedf' Nmina55Pxh](Haj TD Ѳ=0stmO!0Hemlm_'_./sɵsolvhF')lai-as-LCP,a h e6&VL #vF)T/ng_)topfn_4_^%pN)PCI/MSI si_cap(7x /WARN8x{P!_o,lA082Js-'g ro "JƕReJ t 4;2Is10@"l$y+NBrot*g g%J3KLdou'P,i13yu079,Net)^De1 NBDmpEo28#.Ihan d!)NnE nbdgrmywM|BDaS:*` d3 certif )738 ] u6in_2k +C_mirr %'t@rTB/ w4p yskb dARe 9*/&fm %&{ i1@dno-m  $3*Gv pS/KK`ha( vp &X0XfcX E f: dV0k%vma l isHa g/ o D'n1l<.&0U&8pf,ck P(&(_'`2]-, 0 V"0_ra7Y pgpiok%w w_chHed_-(yY+>Yn*f=-:i o alA l - f.a*be j JsVi cppc_WJ2 O"P5Cfs2H=0gonPN)nl0+AOGcul8Tof 0 rradvg/I/y8 -add /os//umef. ACPICA + I\ [ BARY=K. )+v,3E ,t7V2?_@\ _ J22/9nr*ReEPERM,n , xs_=l)uo j+e cups-2<`e, #\i1S(CUPS)Z=!Aw02t+%%ws Yd'UDP7ADDR_ANY:631F:n 6] o()_ : `cfGeterA` API+ p!o5qz oIPP%47+~pp[Y3kh rot&PPD` .M4 3+d-- q)_+eC- sha-wi) CLR N0o(`m@7Zj~(avail %dU'VSDK 6.0.135R9@35 doC:.IO.A(- M>DoS ve u?SLis +,ZDSAoT*.JX2@5@ ACa$o9hfIPEe4{. 890 k<2t Z HTTP/38' cG s%Dq382NHlg#FIPMI#Q - H*toR5M™,#In1ligeP&M5, (). admj?toKtoa GD#lth GiT-g ipmo@P$? -o.LAN|#HGo429349j-1.-:jdkC?J J1En:on*S#D)J+Kit'ifHeap-B O7Im2SaD7Scr2RGB F3-481P* hG832@212,ARi]AmaxHSP2#PxAPUnied^/c-N;833144SPSIm:Wr - r,Y263&111+77+}21xTee}S<#Loc" LWu_n (R) AtJpuU287Z-nR_L&GGioG@4 ,e ,upP74M%nL:)&exXchPUfn coBsteQN#:^Hv],w]o5Srm_8[le-CPU8-9[hwm [w83792d)[WSNU&ry 5el"A\3Grmp[e+sn!x82#oCKR-,P%_9!"OOB_'!_H"ITa /)DNOh2[,0*vN+ O=%fxr=t ?Ue-9]ic1#ntHnapiL95y*xfrm67&pMst_iա8[`(uS+tM--" U%_*_J&Q20_.R'ctJke c5fd}in zR\_ht_YW27KRnon+ _J2_bZ8 @@@t5i1ReDo#sH"tra$BN7@w623B<S R UYҡL YJ Xs${L2LSL1_xhw.: NatBranHi1:yv2IBHI2. -m)y.toJ[  9=A668 hre-b)S +e#mE =e1giGhorl7sbQ()TJá-57Vec * 9gaO-_(S ^ bl20^Ue,Xh3H8r?W31'w12Oi<bl9K@4:Xr4ffCtdr(!ito cyc!`62:xAkog r b Ga_h_W18up`94 !inn`ahmeta 9#ŷUSB:[ :2c-wd8["dCa4fY;5une45<~];'rt6_pA646-\AB @-K0p2hu chg<_b71infWEHnfr__5n<^eA__<_l_g LZkp|$in_XlEBR P1f i mI\< = LNJ g $gS~&'Dgt DP :8^ t a ofMma='7TagOFIFI(TIFF)\ 3: t!k7006E(EdLdZ"! A =UEFIV}BuMasn|5Lsam+64-bmHk/IQEMU rssPhCMX.509o;61FimysMaOLY1305 MACZO1 IsM. r]PowerPC,61?]Ep x! RSA@bli sR237Rs=Is072CedkTempo(/253AC?s ֤n 'Xij, senAlma RN%ZAeM<Xw Xe#>XE W2. : Security Fix(es):  * xorg-x11-server: Heap buffer oread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080).bPassiveGrabDeviceb1bUse-after-freORenderAddGlyphƮ3) For more details about the sCissue(s),Wcluding impact, a CVSS scG cknowledgm#nd o/r relahE-spac)m5urun m.pV alsoVAPIs5nag/a with/H&opr;m;NFt"؊66v j-17-jdk= J%17AEC+SNDop,Ki A:^cedc*hal5-21BBrely--igs+a]b."Klis }beD/to,R oT=Ė E2%o %year@Ir,867, 712).\ 21 +R% /dc Don'# p)AQ(reqsk_queuo^k().< 15parm64/svE,eEst'S7t 75&40Rf rKnV CIdfA'[ute x 2 MaDB HndukQ MySQLxE. , ) d "B Cr_lD/sf %dae$((mdbd?+8 X !&| /S(S 'mysqpInnoZunO ..Or)20&\1KC:VAprV421096 +:0inu_ _ms253"!!T!'*s  bKrUor=0P 3kPBypa%OQoymk(o+1diCp2718kEdb}n~"_5+4"A7.e"t8lpathvS51K&),m tPJ'138x6Mc1:keRCUAtigmp6_s2 @75?Oovl[UAF9_ry_ v:byvdput#+_upd887d<%atmiq`HUɬ200audfR!si-o:@in*_f_X2-)46Xvmx3O!al&a+Us;in'_p\(_xd377)jqlLtwencxiHp=-lt(JSON o3=lik"^. YouE8sl,m, >, thoEYDd same4Wseawk,bYeDsimi3% yGtM jq:p5lejv.c:jvp__:2333OA#SaQ(zB -Xq_fuzz_p5Sj#y_vfm9e8060)fx86/& '/AMDp7 - NUMA. 99+&.8.0)8G*(FBet[ gQ+a 07hHuTLSDl66Is9?^B 4614˚4Y0On$r  5Q(VL w%"ES((ei$[`-D..-BSA=trueeo!I6 %X/)ceh d ^I.= Lo\ HDc Nw9reKgy /h+y8 9;H+sh/behavio+en$]SolarK"ٲi"viHW@'U> .L @wi: Ĵ_].M%04, 56789101#[HTTPR8 5005t/6ZD HdefaUc/L3yWay+7. "cau;aa5iltL*t)X11y awt.RoboQ s{ake cr#c+O,duaank 4($RPM8rev ew>2PipeW>28so Đ'f6666970 .$`8384   choomi,,tas#81O $anY i1 ga#cgoGG1A5Regionos,ac 9ato)d0u?Nob| re #c$sug, bOheP l)UK -to-T Qao93ȭ "cmid-O llO&lwaykJcLp/0<}903 81^B#$?B?U!5or23&/g.c\ gnx_r(ch^437$gv*vcg;=m}d#@80-Fsunrpleg+C_GARBAGEtsvc5 as^ 80XzB $4[\rsxg DNSSECr. 8r:s{C>soG 9,[=9nux operating system. Security Fix(es): * kernel: media: uvcvideo:( double free in error path (CVE-2024-57980)Kwifi: iwllimit printed strfrom FW fi`M5-21905MRDMA/mlx5page_size variaoverflowG2091Gext4:o!ut-of-bound readܡ_xattr_inode_dec_ref_all()Z12Zavoid journalb updatinvd pmd migntryZ958Dz: ch9200WuninitiMsXaccesSu_mii_nwaystartZ8086Z/mdiobuseoti,s } 457/wSeya11 Fmtails abO the sissue(s),clud impact,CVSS s,kknowledgmso/rlaainformV, y toR?m 4,Res:. T! pw8onɤ4Lio!, ofy4Skiprs;sgtype UVC_VS_UNDEFINEDӡ9_.e_ 3104)pa/pkord72!HID: l-ish-hiy[$tp_&^m1928+_Ycclb9bcif'ggwhproYclosetimeoluntt`62Eemstick: rtsx_usb_mqslab-n'_drv20eisc/vmw_vmcanleakU_host_doRceivg%2-4978bwiZ6em asild qd890tipa R%_a _Nrypne52]tztao_z_notm7nPytho"pre4, a'vobj2-orie *mlanguq,$chemoduleexce& Yygh levdyic dl. suppofat c ClibraJell.j oundow0s 1uptoolP6 TrasVV+*IndexI4J3IDoxygenvn eTon] e browsGIHTML)/a{TuJ#LaTeX)U aKdocuu t cem ;~ eJirlyNV>9¼also bWnfigur9Fqde uctureNF Ζ KjqueP UnOd]ex0via <\> :s DOM4ipulme$d 0- 2dgcc J 4mpmrs fC, C++, Java, F(rayOi?CAda 95 GNUd? B [A  A o:gif_hash -7_$p79P 12kN C 9G292)bpfPe run D_skb_pkt_[ 86i &( R'orgllo 4-2895r(tlb: shareMbleVMA sp$ , \ n f^ 4Ybm_fvs GUP-fast racP+ dp g !se3 E l g_S12Ť rtw88['a' buffkWoc5mBlueQ thNq flushz5li2c/ ig]OzPH3%t alH fh usockL471)Ǭk|F.205etad91esA,! 2 sc 1sxgreSQLwadva#dfq+al basa(DBMS) pjsq{v e|rbit y|t871BW N4Acp: Cjjoop%a O819:gdY;< | 8Wi40MMIO - a N in1ear_hw 0 i!iwcm( workh cm_id !uvb1,"OA   cs- eempsX  n_ 46 vy Ks_* TOCTOU:xfrm@ Đ?h]9_"=technologuF: O"%%UDD,06mgudma1`a<9"O-ef k0kdpXǡKtrolmxinl3+drm/vk#t(-8 ud+d*+~%scs+pf#U/em()BIOSs33#ix-cpu-$r~Kbetwe0*y)_)_)() f+s7 cquifrGEMs&(K(449)ipv6ec<: Dyt+c->iumldѢK!5 My ltir&r, th0 A# [. IJsc*bM (my7d.clqo K:dumpspec&d'(CPU Apr 072NOmlr#N62(NSd P=)d1##U99UUDF%1;<Re %P3PC"(nVSIi#XPI-"215747DN8Ě0DInnoDB%7;0ND$$40S%Y62G709_KsA$L:0]ĝ70le3<2)Kdwc3: gadgl>ethaYvy&'ye )vV1L9ec+: un1:ed/l*4Eu]84390al'SCCB p+'>96+}mmG;@8D"orG6pp@24:BIND (Berkeleyvt/t NBDom)gmpl( DNS((4S)toc. d`a3B(Cd)olv$<CIP*re; a&rTrout8P>v*);_9=WifCP䥰is ly b:9: Mrec?^ik#exhaus}4261 ]-O-HTTsc.plej @heavy8+oms2\`nssSSL0w#n:__ 5538rbGGnmAtok43737vuASN.11s72$" OG 2123 X Plugin#M1% ͜4C$ Sma%7Wd ͣ1$: N0!>GpGCS%ZAFT%HHealMo o%C1H-3!Κ36K$6K2PS%GHw48:3+Y%r@ssw 943!?5" 2214S6 VM>52H (Priv.'[DenLfBDpę)5I0=5]NHs$O4Bk Unau)rd8+)Modif35%P4h)͢<NP`n*3;49AlmaIde:MuA(IdM; cUEeHuth,ci:An#Abora`/4ud-P6ise viron EFIPA:es46;1dadmin'?74ni7vea7PerlCQJSON vS9imgoa]\1ituond'HRacGl^Ӥ't w7IteC -XS: =X,6a Hfa7Mf840Y'/keyXo;_task_fmicZJ 8YKVM=86/hy2-vL]non-TcHPV TLB Jx35_MDecrTIDRX pee5g V6O`97F>EoGquoAPIs %" usyx " foencoQIA1%'^L arden#2ton9g~sDw0 b%L PO$pBA#semn8e>Ncu96wKALSA %-auc: VeCC3 clVrd#ripZÜ975 IRseqivDRHe EBUSYy C%3Z.NET d-soft9O:ND e+subZXC-ӢseverawiteICLRN2^r b]n(1YilQN[fdU'VSDK 8.0.cRnN:21.1dot'4DisD_ 5K%$ Fl?@ByEG37G ĉ7910hfsAxd'gnU^ren Qesh0vegrWfirmUarmyKp E _9K,asU!hlŦd21dsunrhe}&sV_tt l-&K?WK6fivYF#g9 #_d_`81 cfg80 e:p2' UW__#zecttl9@9849CL/L Nicd2g o]1j-1.-(jdk#K@OJ[ aE*SDkIop+Kit :DKPheFaZK~90Ce t62 BugySiA8.8te0)9.2hasd bufNreedjnmaj EZ. Wot, sOiw$eobyf ]Jolܥ@8.2,46fQ OnJomw's FIPSell$XblLpi&>wprTM#Kbeha +-DQ..fips=fb-77, 89717+־88OL +6Sx1617  fb a fun4 STagImaF9QF (TIFF) :l9b4M-A  AWrQ-WweH 99Uc]Msr MAC is pnxnt- 7S xQtFc]aZgwww.g*r>NVb 'B.a~db%;(,C$D$E?[BG"$oy};"MoI_+r_view-~K7(7|O!)Ivulnerability (CPU Apr 2025)VE- -30693) For more details about the securEissue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoR pagm lis,R&ences:. Tkernel pw8s conɤ4Linux!, ofyop/tsypm. SFix(es): *K: leak via transi ex@some AMD prosors4-36350)j4U7Ux86/vmscape: Add7di\al IBPB m g8403008BIND (Berkeley Intt NaFDom@)le ;UDNS ((4S<)tocols. des3serv(n3dwhichsolv$host sIP addres;@&rbrarrou-fapplic>use_enfacwith);_tool=Wifya ( ly *bind: CacIpoison;attsuniciRRsg778)Gduew{PRNG;80;R7urce@hausAmalO|KEY hl]L8677)(can: tp: fixtidCAN fr;recepraceȣ0_rcv(2-4883soc: qcomimd-db: Map sharmey as WC, not WB46689OSquashfsYanױuckmb  izeF744FvAbetweevice_inoتf()&iput]767Ťtdx:t "in-MMIO"@72rxrpc>aĢOksupI/Orea"\986io_ng:if needdule¢& ovlow flush[5006Mm_pci:ssH_class_free_de?Nbe/r vethodl2ġnhposix-cl'dtipec64n_)_650195~V>cgllsM29o/rwsSNOWAITO_DIRECT start wrx[3052[aǢurs49vir%/vKdc_queu5 G11KVM: VMX: Bu0l PT_ualizguest/:mH)hiCONFIG_BROKENj3xePXhyt]afe ag(splvve(6Advis[)s241sRDMA/rxe"sqpwars\reqG2&buafErq^lPttags 7nfs1resvc_expkey/ o8rcu_wor216NetEdoZ? dmskiG6603k-cg [CUAF@cg_unpin_onl H7cpiivmoc--of-n,R[)_(_ctlT6Tbpfnisch_g/Fh RCUav Lj1939_ses_new( skb2 unX4XryptoZ -u  laydireyY padata_do_par+eljreturn -EBUSYp*+iowqn kill2bef:ƾ70 rtcH____T uc fulZr'73jp 's is 53b/ O \8*ig/" inv gb5Jķ2332ZpvUB9 un@iGs`p_vs kd3689etfil:Z ntrampi ximumshtableC NT_MAXZ5-C48Z2Hke bulk Nairnγsa D, bfq'wakqaf_splvR3zLKT  B7B~gejr@ f urMmmswap: nchrR ze 3 cr. s EhotQlugc9c s+D i{ c2eronUc6r uffd-wpE/PU n m ap9cpfifo_ _en: D 8 etȱj->li == 0U70Xusb| i rrcKBo 6powe /xH본Jicp_opaO4:NAPIom d 3druc99papr_scdon't{ s'0'db_353v |MimaJ!@N60 l/dimVdivid4 yL DIMD \sIDœ26a1tegnT raise_m urepî4/xrVtma>BOefb D G ce( fUEFIL e Bo) T2c 8X ta-ar$ ep->rdl#8J h)=L=In&:^ap-craenp-thgh Yl4NFSD# 4_shutdown_ bFSendgs% ousA !pm72p_:_r6Y445BluetotrtKNULLup  7982wibrcm cT rXecclc_phy_iqc}! ms_nd801ûbc@de_geWoard_Ǽq=mlx5PH ODPƟdrm/xe/PTP Uk495HIhidemas Q_G{ jrtw8 1mcel_hw_scan -/ 7X`mt76925gl n_ch:_vi `ath12(x FhOPP:ex]ert void$ fu9uıtin&_[_aseto_vi acl_/ defaultmLogico]  E:greord#d?vrf:Aul3ml_l3_oWf te beuEAM_OPTION_TYPE_STRIg] Wh'<  wmpZrt3ūvxlO _vni  uoffonlo,clcpv6ip6_ads6ASoCOF[ thda-daiDAIdge_ s®?LG @T'?b ýX let.[.weightways%next_h icemed_nd 8D +holzutexm!8hE-iCc nulf_imsg_ ǶtcAdT"4 s!as urr?-dstX6ds < r]M t:, las6 U7mm/migrX i S; f."o LRUH 5pIX6, vwopcodX6TfpFfp!rl1 8Mt_mNgeneopQf onƨ20oa @headl 8 c diay 3  H814jan$ke_k&C$(B$xim LSM Sc3 & Y&A=]jsp&֤n\ 'X ,WAlma&R NoedW'k&w-ls]')c) QUNIXw fil tP,5l)4a-$usn : ' ] |o gudL/etc/low. eldrc9i4433Ezzbq a5X^,,(nraF Y; )c,oUravz !t@b7%/-m6*c18-6T ?; Id>M%IdM.{!auth,, i:m:F(orhbo'ra/)ud-baeOs: 'on xFA IPAPrlegAs"d/admi?743S;S/i&Da SSSD) s$:d'~t+motei7)Isog"1SOcNSS!PZ"g^A[M$PA0Wowar< pJ-# c$mf[t1 # ss] Kerb\/.N w*&AD-jo#di/ 115 ?tiW0a 4/0TagggImF*F (TIFF):ob4 UA-) VE78)AW>-WhWher:0Xl_5XPer Xs un W2 xorgqm+:aXP-V_$&05-62 -XwX &valRv2ƫVKRSetComM&H1 .Orgwn-9)7X WP b c l l3la|sf-fe aph` aQi&up x> 99s9 999N9y9c'9}3< o 3L\ yli' Si5gn-On sSAML٢2ifaP {aw'a fe-cycl(e T!N _eZ3 -#id_rm72cfg+" cm/$3=e1000eDp _eepJ)%N. u'C91CC_)tY2sk(sk)->fa@ _rs*69,MGMTHK=sB.'s?&i'u/vt-Dis| O6%iScoh wal"(40058Xlj(ptrTxau/0F]W.B2 NETDEV_UNREGISTER+$*>2f'/f< WffoMu+V W$9BU_>PAW13499*Slz-at*$S7,ke "2+h?"CAP_SYS_ADMINr. 3n<$m f v5(ab$E cript)m6$ty"wai;p)8D8)i if*_p&)2, LPydnQ5e4, acF, ob.-nRm3XmT,0exK y7:dy^ic/"4'l. sup& BeZyH*,$.v: w< Scp")"Ef C kD"(EOC9L ocz%3$.-)_g:.1f]IE0OSSL nA KeJt9-19cNPNwV%'? ̥HTMLParNd&clex 6C _Qʦis...*vYs"3r=8d temp2'+ACPI`,t)?5".z3[H60sM/M-JKcocc/inAk->L202@:$7-_ d3|:I3E?6L4pr4show92KG 9 E_p_H_no_fšN1LS&.-aQA?oL %eExWyMbo7 m9.)&d-)4wNT Ia9&XC-'seveHi*LRZaaN2veQ bw ]nav&. upd9U'VSDK 9.0.104RMU3.dot:D)E&$nIn?*r. A MRS2OB0JEnh :(TBZ#2^7z.8143Un] 5r C" http@ok-$Q7592Wj-1.-UjdM#6J J1E!3*SDBop+Kit @:K)FLSnV15F7ImmpiRA50S:@/D%98717+21 +dL9o_Pu:adsIab7?50g c* C3 (/POS?ep),AmD%m)ۢi- s9$[f#nscd#by*r s Wi l ^ #Pc3i;0/:;RaGNU-L ,'s r+(03Q:389!"e.7 LDAP 3 (v3) ,Sgj%{%~- ?jV!P!^)R;P-kLB% =ist- -ds6-U'ueAC '>f948%+URL p+eure b+e?2B93B*BE p ( dGoo{7 W .3+ enaP>d? 8,/yeT 3Ra ?x,8"MFomHF !ā : m6 a䲿FT2-19o?>B-x11-_ : # n'7s:2H0q96i4rSB-r3gcso_65RBS>%T.Tq1HPMSdETsK0KnicReJY5.YOqUPCCe0Barr`CfX8XBCoTOfKeyM7MH:K`HCSymsGN/Xo?rg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s),Ucluding impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,toR pagm lis,R&ences:. Addi al Changes:֤n c'XiseasseejAlmaLinuxR Not/linkMfromΑ X is Xrvfounn;X cli undW2StFix(es) * xorg-x11-P: tig nc: heap-bd bprivge escalvulnerabilh4-9632)lX.O^: Use-after-fr%ofroot s[4GFSyncInitTrig601HPlaydEv]K0KuJalizHpointIi/ompRedirWindowJ9YOut-of-Qnds wףCrePaBarrierCX8XTypesOfKeyM7MH?KWCSymsG6%ە_Tgstemer1 p alconn+CmaO*work, Ggraphsfilhich op;te" _Sr_kable73-4675V UX{ E H0j6952YAr CExtht xtctx erro163Msojq6 &voiEXnumbe, 8007ZtpT dkvoc"elog/acpi^ H5Hrtpcf85063:Sx OOBPCF$ NVMEMZ69Znvme-tcpU_,_,_du192Tsi_ibfLF_UBSAN shifXSarRih._x5how_nicf93?Yelpm h browse`GNOMEsktop -ignZt5you9 a 871 yao> cralFolra m#s fo a|te DocBook y" 155Avahi= i$ exDNSd DiyMulticast#\ f<; ZConfigu Net/facl * n dd/an7. ~ -awlzwvtlug^u aRK n ,ewB eopl 0A ] fish YP a:W-ArPrct k IDQR261ȵ : NPDL :@mpr i~s78Q.NET6d-8i+subsetC-severKwit9 CLRN2 _fbadd]nil|upd9U'VSDK 8.0.116Rume6.Fdot:4=VisuSto oofV 46F9-0F5Eg@v k: KeepWbinl deGu| 7Mdm-fla_ 8 o _bbyt0A#t 6b.pp5 dd' eckskb '_@_txmungT 7749)8 ss[+R"le Wacregmaxhunt4Ge$#&#$-q d1' a le1-( / &: H%c#R38CgUG) FG)gru_p_'_0ob2-34[5: RCU_g__7VCacc-lor storesO=i  \s n'tP vrX*aQ @ogX, gA +(s'1peup Jv:*ques6mugoI4790ggsmxownhip__udp_62 v+: ece.ly tG,A0Axskaxp___as[_uXgen nggH20H4I,whs T dot - 8Hw: ?12v*.d? "_d_Vcap_n@b943g&)st{ar)' (/POSIX zp),Am%m)ۢincodae(nscd)&mps &o߾W&qż#no.un ly /:t?s~&idK dl) inO$ar LD_LIBRARY_PATHV80g7g7!G = 0399X766g et. bnx0es+jmb-xdp-pass c *) 61BT,tooOL2CAPs3-u"7Rfi 2se cmd] D C"T cfg11:Pcwiphy_efrcS7ŲUUAF_giny >md ;Z\-l laX f4ݡ[i'uJ*9'faaQ<*up C-@CC./ X /&Exk%AnimzCuCZ9d)'/Bigst6(tUnB ' o DuBy&I {80ud91.1,Awas oFin6b."6Pyn"rRub -:EbP5My4 jm~d':-j llr3e=imj O"Z 136+HID:to`t<;$mt;D_*up39_<auBQin _nre_dl_X4Vmm/+-f dVM_BUG_ONX"GE(PKRso())7%unppktp:>NUL<6r%unkA%D6iIi 2stgreFadvpbj%-qigL(DBMS) jsqCREATE STATISTICS^5 ma+\J4281'] q=(s },wdar7U9fig(T2 9FIG ((x@)9PIC ;e?t<(LaTeXn&exa,0:(TM)LiMt2,O:re s(i.e.EyO:B:v tyb).7 h?fna,a2ݪ cer -^:0sZ=TMm pu63*JN$MCool pow/uNowAHotSpOJVMshah%3 enVs ef7,ysisve-23FlMeKMn?inncoLLYYzr1W ` [lyOlof=w&d 7lz4-ji: I@tKGsuE U3Clea% 665'7' drm/x7 M8a-fO safe 0 8700 -$l2/Fd=v fy_TO, /ire_ &vmwgfx* em r &22~SVGA_CMD_MAX_DATASIZE 7/usbhwcGFj r.GP Nt+_ /S2\_ ESU8oep "'&53_ma 'osd_DA? \2D-17-\jdk3WL{,?*E+SDa,Ki n#Ame JMXn6{21HgPkS5E==Enhz5CyenJh64t n2}/PNGB6:Z031X850 Bug%Wz & P11SecVK |C#5n3#\(iIPS mPKCS11 ould KR_ATTRIBUTE_VALUE_INID ahas!e&c_Gj 4'KA_ENCRYPT=* ibutH>IiU -8xe"R. ($-142862, 81#34567 2r`^^+^076789( ..48/*.36678.7123,S5 5+5peG'R,t0%bloC3D#^$VC,<-Wd0loop!7),n le)^uC#T'tRK 9#p+g_1peZ_ip'Y:qCmfr@&z*1brze[\E3fMEj7vm_pN_ioctl5 O%F73ьNo=pAHK2\8\mp\2_2:4OĬAr; MGMTc es{>atla5 ?)U+RX830dh12084af  net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (CVE-2025-38568) * kernel: ASoC: Int bytcr_rt5640: Fiinvalid quirk put mappW40154Wdevlink: rate: Unset poior&_"_nodes_troy[251) For more3tails abothe secuy issue(s),[clud impact, a CVSS scG cknowledgmsnd o/r reldFformation,ftoRgm lis,R&ences:. Tutil-ux p{p6_xmit83=BluetNISOpoIbUAF so_ _9N41ه0Ɖ5WzUi_mdiN+ e2.Å271Ѕ ALSAari3 g clo@HÈ6hci_syncrcmdqueue_onW318tEDK (Embedd)Dxopv Kit) aenaEFI M. ;Lsa 64-bHfirmw@IQEMUKVM OssO6&RFC 3211 KEKwrL 92; gc: v< t{ar (/POSIX&7p),Ah%m)ۢicdaemnscd)d multi 9s Wi$Znot^ly /ngsgmep g .@6-086PWzero-L u wodryV9O%dexp wiWRDE_REUSEyAPPENDy rrnedobU8