SOLV  0dnf1.01.2UBvG%O4.?q{缷{q]8x86_64cvebugzillai686noarch3finalpackager@almalinux.orgrhsaself1ModerateImportantkernel-tools-libs-develcross-headersCopyright 2024 AlmaLinux OSlibperfCopyright 2025 AlmaLinux OS 3 AlmaLinux OSpython3-debugidletest1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_05.14.0-70.17.1.el9_0 22.1.el9_0python3.11-debug idle testCopyright 2026 AlmaLinux OS1:1.8.0.342.b07-1.el9_025.0.2.0.10-1.el9.alma.13.0.9-1.el9.alma.1python3.12-debug idle test0.8-22.el9_61:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.19.0.10-2.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.13:10.5.16-2.el9_0Copyright 2022 AlmaLinux OS4.17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.1python3-tkinterbind-devel1:2.06-27.el9_0.7.alma0.8-15.el920.el91:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.1python3.11 -tkinterxorg-x11-server-devel1:1.48.4-2.el9.almalibgs-develjava-17-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug12.0.1-11.2.el92.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.74.16.4-101.el9 3.el9_1dotnet-sdk-6.0-source-built-artifacts21.01.0-21.el9 3.el9_7freerdp-devellibwinpr-develbind-docdotnet-sdk-8.0-source-built-artifactsjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebugpython3.12 -tkinter3.11.11-2.el9 _6.123-5.1.el9_7 2.el9_7 3.el9_7 el9_72-2.el9_2.125-1.el9_37-1.el9 _4.13569-7.el9 _5.1232.1-4.el9_4.342-1.el9_74.el9_7.1235-2.el9 _5.1239-1.el9 _6.129.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_7.12321.01.0-13.el9 4.el96.0.8-1.el9_013.18-1.el9_520-1.el9_52-1.el9_63-1.el9_72.el9_7edk2-aarch64tools-docglibc-nss-develstaticlibsmbclient-develwbclient-develnss_dbhesiodsamba-develunbound-develxorg-x11-server-sourcedotnet-sdk-7.0-source-built-artifactsLow13.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_43.0.21-37.el940.el9_4bind-libsgstreamer1-plugins-bad-free-develxorg-x11-server-Xwayland-develjava-11-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug21-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugpostgresql-docs private-devel server-devel tatic test upgrade-devel3.14.0-13.el96.el97.el9_7python3-ipatests3.9.10-3.el9_0edk2-toolslibtiff-tools9.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6bind9.18-develflatpak-develglib2-staticlibnetapi-develghttp2-develvpx-develpoppler-cpp-develdevelglib-develqt5-develython3-samba-develqt5-qtbase-staticvarnish-develedk2-ovmfghostscript -tools-fontsprintingsamba-pidl6.0.108-1.el9_09.0.0-10.2.el9_25.0-7.el9_3.alma.1libvirt-devel ocsmysql-develtest1.12.8-1.el99-1.el9_43.el9_4 58.1-3.el94.el9_49.3-2.el9_03.5.3-2.el9_0LibRaw-develavahi-compat-howl-devel libdns_sd-develdevelglib-develfontforgelua-developenexr-develpostgresql-test-rpm-macrosrotobuf-compiler devel lite-develwireshark-devel1.3.3-13.el91.5.0-5.el9_5.alma.12.0.90-6.el9_17.el937.4-21.el9_74.0-7.el98.el9:2.11.2-1.el97-1.el9_7.123564.1-5.el932:9.16.23-11.el9_2.12 4.el9_3.4 8.el9_4.16 24.el9_5.3 34.el9_7.12 5.el9_18.29-1.el9_5.1 4.el9_6.2 5.el9_7.244.0.2-11.el9_7dotnet-sdk-9.0-source-built-artifactsglibc-benchtestslibreoffice-sdk-docsamba-test -libs20230524-3.el9 4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.31.2.12-2.el90.0.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.15.0-7.el9_5.alma.1:1.9.1-12.el9_52.70.1-2.el98.0-1.el96-1.el92.el9389-ds-base-devel:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6 3.el9_75.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 6.1.el9_7 8.1.el9_7 41.1.el9_7 5.1.el9_7 7.1.el9_7 9.1.el9_7 5.1.el9_78.0.30-3.el9_02-1.el9_26-1.el9_341-2.el9_53-1.el9_65.0-7.el9_1bind9.18-doclibvirt-daemon-plugin-sanlockmariadb-develembedded-develtestingw32-glib2 -static64-glib2 -staticysql-libsxorg-x11-server-Xwayland1.3.3-10.el9 _2.143.0-5.el9_2.1 3.1 4.36.el9_7.1:2.3.16-11.el9_4.1 7.el923.2.7-1.el93.el9_64.el9_65.el9_76.el9_75.4.2-4.el9_0.34-2.el9_13.el9NetworkManager-libnm-develcups-filters-develdevice-mapper-multipath-develovecot-develflac-devellibarchive-develksba-develnbd-develsndfile-develss_nss_idmap-developencryptoki-develjpeg2-devel toolsrepokey:type:idshadow-utils-subid-develturbojpeg -develzziplib-devel1.20.11-11.el9 7.el9 9.el924.el9 6.el9 8.el9_631.el9_6 2.el9_7 3.el9_7:0.9.72-5.el920221207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_59:20200406-26.el9_2bind9.18-libsflatpak-session-helpernghttp2inx-mod-develpython3-samba-testruby-docyajl-devel15.6-1.el9.alma:7.1.8.1-11.el9.alma 2.el9_3.alma4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 8.el9_1.alma2.41-3.el932:9.16.23-1.el9_0.15.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1284.11.1.el9_2 25.1.el9_270.26.1.el9_0 30.1.el9_08.0.44-1.el9_75-1.el9_7lua0.11.0-7.el93.71-11.el9_4 2.el920.2-6.el91.1-1.el92.el9_730.0-6.el91.1-65.el95.13-14.el9_78.7-20.el97.el9_0.11.0.31-8.el9 _5.216.2-19.el9_6.12.el93.el9 _3.158.el9_5.12.0-11.el92.1-2.el9_34.el92-3.el94.el9_65.el9_78.7-11.el9_2.17.el9_43.3-0.el92.9-1.el9_55.1-5.el9_06.el9_16-17.el9_6.29.0-10.el9_77.el9_2.alma.18.el9_59.el9_64-1.el9:1.42.0-2.el9_48.10-2.el9_5.alma.1 5.el9_52.5.4-38.el9_7.33.4.10-4.el9 6.el9 8.el9_7.12.0.15-32.el9_532-5.el9_41.0-22.el95.2-1.el968.4-11.el94.el9_4.16.el9_6.28.el9_7.17.0-11.el9_7.39.4-11.el9_6.16.el9_47-4.el9_7.10201107-6.el9 7.el9_7 8.el9_7:4.9-15.el98.el90.3-2.el9_6.13.1.1-2.el9_4.1 5.13.el9_7.12.2-2.el93-5.el91.0-9.el9_3.alma.15.0-4.el9_7.23.17-13.el95.3-4.el95.15.9-10.el9_41.el9_67.el99.el939-16.el94.0-5.el972-2.el96.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.1OpenIPMI-develautotracevahi-gobject -develbluez-libs-develcapstone-develfile-develgcc-plugin-develjq-devellasso-develibfdisk-develinput-develjose-develldb-develmicrohttpd-develnfsidmap-develrabbitmq-develsmartcols-develtdc++-statictirpc-develudisks2-develv-develmpg123-develunge-develpmix-pmi-develrocps-ng-develtobuf-c-compiler develraptor2-develepokey:type:strspeex-develtexlive-lib-develpm2-tss-develwavpack-develyelp-devel0.42.2-3.el91:0.36.2-8.el92.0.7-6.el9bpftooldovecotflacreeradius-mysql perl ostgresql rest sqlite unixODBCjava-25-openjdk-crypto-adapter-fastdebugslowdebugdemo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebugkernel-abi-stablelistscoredebug -core devel-matched modules-extra vel -matchedocheadersmodules-extratools -libslibvirt-client-qemulock-sanlockocaml-libnbd -develperfoppler-glib-docython3-perf.12-setuptools-wheelqt5-devel0.99.9-5.el91.0.9-1.el92.0-7.el9_211-32.el9_08.10-2.el9.alma0.0.104-1.el9_7:0.82-6.1.el9_61.20.1-14.el9_2.1.alma.13.2.7b-11.el9_74.04-1.el9_62.0.2-4.el91.0-21.el94.5-8.el9_49.el9_45.2-9.el9_56.1-8.el9_67.0-10.el9_752-32.el9_4.alma.1:1.20.1-22.el9_6.2.alma.1 4.el9_7.1.alma.12.alma.13.1.9-2.el9_624.31-5.el94.4.0-10.el92.el9 _4.13.el9_6.25.el9_7.22.el95.el9_17.el98.el9_25.1.8-6.el9_14.0-284.18.1.el9_2 30.1.el9_26.0.109-1.el9_010-1.el9_03-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.100-2.el9_31-1.el9_32-2.el9_33-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_44-1.el9_56-1.el9_67-1.el9_621-1.el9_65-1.el9_76-1.el9_72.0-18.el9_7.29.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_65-1.el9_7aspnetcore-runtime-6.0 targeting-pack-6.0bash-develcc-develsdtarcorosync-vqsimdotnet-apphost-pack-6.0host fxr-6.0runtime-6.0sdk-10.0-source-built-artifacts 6.0targeting-pack-6.0emplates-6.0xygen-doxywizardlatexfwupd-develgolang-github-cpuguy83-md2manrub2-efi-x64 -cdbootpctools -efi xtra minimaltk3-devel-docsjava-1.8.0-openjdk-demovelheadlesssrc1-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs7-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsmclibarchivefastjson-develguestfs-devel gobject-develinput-utilswebp-toolsua-guestfsmariadb-backupcommonembedded rrmsggssapi-serveroqgraph-enginepamserver-galerautilsingw32-binutilscppgcc -c++libgcc64-binutilscppgcc -c++libgccnetstandard-targeting-pack-2.1ocaml-libguestfs-develperl-JSON-XSYAML-LibYAMLhp-libguestfsython3-capstoneqatzip-develrepokey:type:flexarrayuby-libguestfsshim-unsigned-x64x64ystemd-boot-unsignedtransfigzlib-static0.34-19.1.el9_641.2-3.el9_7.11.30-6.el99.4-10.el9_63.0.4-160.el9_07-162.el9_43.el9_54.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_42.2-1.el9_5.34.el9_6.1522.el9_7.15.15.3-1.el99-1.el968.2.2-3.el9_4.15.el9_6apache-commons-beanutilsbcc-doccapstone-javagrub2-commonefi-aa64-modules x64-modulespc-modulespc64le-modulesjava-1.8.0-openjdk-javadoc-ziplibguestfs-man-pages-jaukmicrohttpd-docmingw32-pixmanzlib -static64-pixmanzlib -staticperl-File-Find-RuleModule-ScanDepsython3-wheel -wheel.12-wheel-wheeltexlive-gnu-freefontvirt-v2v-man-pages-jauk2patch:ALBA-2022:8256SA-2022:5099249527695709369486003435218590610763913997007139018531482399586870980032262878139519420782152673178534001582034936433:00771942021030243440626951371068470693703879809092127656248596132640703458987519328299262134235815925661711452340576099158778325776424504869143621445369625396849708113344953838924624266533040369409316982945081844516675621312596785705712328446725357784914:014151262496567466805748951771027475918589397883111121932742418623930910427691750898182258213747698499204836647687992535377944336351225851607175884233306395016197548357895999407783494395056378738362374955676679928355192231334635338392899614663799735646452967757997734686798037117214762374446761780091435908893122867814790231771413394295016854386058275:00593123477422657891436101364889379585837627731140411849612627468343294660296244208785007101894296617406086398597018180708416237742760814951281815214911340958493050205185983892854660111101462240586531094224132342627689363148455259374244491697771079386357820130950954022233075869860090381428333376435581379080114884302330462517877806:01263744591700529392783236107457494913609884340810786179133920394821272276863034667951894887309406641658216445754675982898559960360041532856300405706287667002668915807545769888921968693repokey:type:relidarrayCriticalrepokey:type:numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistreference:hrefidtitleypeightsseveritytatus::>>BB5577;;<<889922??GGAA@@II4466QQ""iiVVWW~~FFiissEEjjCCrrkkAAnnqqDD??gghhmm@@ppttoollBB>>  ==;;99<<      ::  ggttLLNNOOppiiGGjjlloohhnnJJssIImmMMHHqqkkKKrraacc[[ddZZ__``]]^^MMKK\\LLbb~~**&&''oo++))%%$$dP Scb'&(CCiRR00//{{yy77112255446633zzOvv~QQdjjjfff}}OPAA ASSttTTxxppYYUUqqDDEEFFEDFDD..--YYYQhhh!!!   ppooopgggddd  jjiiXXTTXUUTUllmmnnhhffiikkgg[[$$$gghh  ssttts  !!GGG//""  "ttt00eeecbXXRRSSVVRWWWVSffff'(&f999###JJRR    rrr   >><<;;<;>==???:::={{xxwwzzuu}}||vvyy~~eee##%%$$$#%lll   nnn   kkFFkEEjjeeuuuyyymmm{{sssBBBSfff88!!dddwww@@@ee{{{--,,..zzzrr|||##vvvuuuss||PP''((##**&&..//--%%""11++00$$,,))}}}   ((xxuux, QRST3UVWXYZ[\=]^_`abcdefghijklmnopqrstuvwx. y8z8{8|8}8~8/ 7777770       !"#$%&'()*+,-./0121  3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N  O P 2 QRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~3 IIIIIIIIII I I I I IIIIIIIIIIIIII4 opQR=STkluvmnijWXef[\]^qr3abcdgh_`UVstYZwx5 JJ**J J!J"J#J$J%*&*'J(J)***+*,*-J.J/J0J6 7 8 9 : 1; < = > ? B C 2 D 3aE F G H I J K L 1_M N O P Q R 4[S T U V W 22Y ^ 23_ ` a b c d e f g j 24k 3bl m n o p q r s t u v w x 1Vy z { | } ~    3c    67  25        1W              76! DEF" 26# $ % 1X& ' ( ) * + , . / 0+DEF1 Pk%k2 3 4 5 6 7 8 9 67: ; I1J1< DEF= > ? @ B 27D E H DEFJ K L N O P QRSTUVWXYZ28[\]^_`a%lPlbcdeK-L-f2?g7"6"h%oPoilmnpqrst1Yuvwxyz{|}~67     1ZI2J2FED76 29!"#$%&'()*%mPm+,-.67/2:01231[456789:K$L$;2;<76=FDE>J3I3?@4ZABCDEFGHIJKLM76N2<OK%L%PQRSPn%nTU5\VWXYZ[\K+L+]7 6 ^_2=`aJ4I4d6!7!eL,K,f2>ghijklmnopqrs2Au67vL0K0wxz{|}~  L1K1 76  2BPGQGV`1\ !"#$%&'(Va)*,-./5_011]2Vb3456789K&L&:2C;<=>L.K.?6#7#@ABCDEF2@GL/K/H67IJK5]LMNOQRDFESTUVEDFWXYZ[\]^_`abcefg5^hjlmnopqtuvwxyL*K*z67{2G|}5`~K'L'672D  %pPp   K(L(2E67 "#K)L)$67%&'(2F*+Vc-1^./01234Y Z [R\R]R^R_R`RaRbRcRdRRRReRfRgRhRRi j R- @ A k X k2Z k3h i k4 k5k6- A C k7F G M k8k?ok9k:k;k<k=k>kAykB+kCk@kGkDkE!kF,lMmMO8n7oo TCUCPCQCRCSC]^[\opqpp[:\:y:z:}:~:q:r:i:j:c:d:]:^:e:f:Q:R:g:h:S:T:w:x:a:b:m:n:?U@U3U4UEUFUGUHU7U8UKULUOUPU5U6UMUNUCUDU'' ' ')'*'#'$'''('!'"'+','-'.''' ''''''' '''r>s>t>u+v+w+xOyO[\]^z { | } ~    aaaaeee e e e e eeeeeeeeeee*)         4 4!4"H#H$H%H&H'HK (/)/*/q__+_p_o_,T-T.T/T0T1m2m3m4H5H6H7H8H9H:H;HH?H@hAhBMCMDMEMFMGMH[I[J[K[ZvLvMvNvOWPW]^[\Q|R|S|T|U|V|W|X|Y|Z|[|\|]|)|^P_P`P~22{2|2}222a2b2c2z2d<e<f<guhuiujukulumunuoupuqurusutuuuvu[ QwNwPwOw\ !qq"qq] w}x}c3|3~33b33z3}3a33{3yozo{oqq];^;a;b;e;f;i;j;g;h;Q;R;m;n;};~;S;T;w;x;[;\;q;r;c;d;y;z;(( ( (((-(.( ((((( (((!("('(((+(,(#($()(*(((KVLVOVPVMVNV5V6V7V8V?V@VGVHV3V4VEVFVCVDV@iAi|}~]^[\llr?s?t?]^[\a44~4}4{4|4b44z4c44bbbbJJJJJJ]^[\B]C]8]9]>]?]:];]@]A]<]=][\]^m<n<a<b<q<r<e<f<g<h<[<\<w<x<y<z<}<~<c<d<S<T<i<j<Q<R<]<^<!)")))+),)#)$)-).)))')()))) )))*))) ) ) ))))EWFWKWLWCWDW?W@W3W4WGWHW7W8W5W6WOWPWMWNW\}X}S}T}W}Y}V}Z}[}Q}R}U}]})}P Q b b b bbbbbbbbbZwLwMwNw:I5I4II?IqV+VpVVoVUUUUUU@jAj*0)0(0JJJ[\]^w*v*u*P PUKVK]K[K)KQKRK!K"KYK#K$K%K&KWKXK\K'KZKSKTK(K}g~gOgcccc)(*(+( ,V-V TDUDRDSDPDQD.:/:0:rr123456789:;w~x~~55{5|555b5c5a5}5z5(<=>@kAk<^=^@^A^B^C^8^9^>^?^:^;^"+#+&+'+$+%+M+N+]m^mwxss+WpWWqWoW****)*** **+*,** *-*.***#*$*** * *!*"*'*(***g=h=w=x=Q=R=i=j=a=b=e=f=m=n=y=z=S=T=c=d=[=\=q=r=}=~=]=^=?X@XOXPXKXLXMXNX5X6XCXDXEXFX7X8XGXHX3X4X]L[L\LXL#L$L!L"L(LZL)LSLTLQLRL'L%L&LWLYLVLUL[\]^wxtt/U0U,U-U.U]n^nuuwx?N@NA{B{C{D{E{F{G{H{I{J{K{L{M{N{1256:;74938OPQRST}6~66b66c6|66a6{6z6UBVBWB||||||oXpXqXX+XvvGSHSEYFYKYLYGYHY3Y4YMYNYCYDY?Y@YOYPY5Y6Y7Y8Y++!+"+ + +++-+.++ +++++++#+$+++,+'+(+ ++)+*+wxm>n>a>b>c>d>S>T>e>f>w>x>q>r>]>^>g>h>i>j>}>~>y>z>[>\>Q>R>XVYVZV[V\Vypzp{pwwwxSOPTRQk kQkNxMxZxLx]$^$_$K `jajbjM,N,&,',$,%,c,d,eLfLKKKg!h!i!8256;:93471| } ~  j1k1l1m1n1QTPSROoOPOOOpqr@cAcsHtHuHvHwHxHyQzQ{Q|]}]~]{7|777b7c7z7~77a7}7%M&M'M$MWMXMYMVM]M[M)M!M"MQMRM(MSMTM\MZMUM#MbbbfffSSSS S S S S SSSSSSSSSS&%I OPRQST????????? ?!?"?#?$?%?&?'?(?)?*?+?,?-?.?/?0?1?2?\NXNZN[N#N$N%N&NSNTN'N]N)NQNRNUNVN!N"N(NYNWNXWYW\W[WZW3 4 wxxxB_C_8_9_@_A_<_=_>_?_:_;_556575 wx3 4 yy%A&AAAAAAA!A"A1A2A)A*AA A/A0AAA-A.A'A(A#A$A+A,A5Z6ZMZNZ3Z4ZGZHZ?Z@ZCZDZKZLZOZPZ7Z8ZEZFZ,,#,$,',(,, , ,,,,,,-,.,!,", , ,,,+,,,),*,,,q0r0y0z0Q0R0c0d0m0n0w0x0]0^0[0\0a0b0S0T0}0~0i0j0e0f0g0h0a88}8~8c8|8{888z8b8wxzz3 4 @`A`>`?`B`C`<`=`:`;`8`9`(1)1*189[\]^l lQl>K?K-?-@-A-B-C-D-}?b??{?|?a??z?~??c?8"2":"6"5"7"4"3"9";"1"Qoo o(3)3*3jE-F-G-kH=I=J=RESETEUEPEQE89]^[\KdLdMdwx3 4 |}~{qzqyq*2)2(2+YpYYoYqYC[D[E[F[5[6[3[4[M[N[G[H[?[@[7[8[K[L[O[P['-(--- ----)-*-- -------.-#-$- - -+-,-!-"---]1^1m1n1Q1R1c1d1w1x1}1~1e1f1a1b1y1z1i1j1S1T1[1\1q1r1g1h1%B&BB B/B0B'B(BBBBB-B.B!B"BBBBB+B,B#B$B1B2B)B*B_%^%]% ZyLyMyNyE,F,G,NcOcPcQ5R5S5T5U5V5W5OOOOOO&t't$t%tctdtP Qbkak`k766656@dAd74;123:6985KKKKKKXYZ[\"]"^"89[\]^ TTTT TTTTTTTTT T T TTTW]X]_l`lal QxPxNxOxqZoZpZ+ZZ&r'r$r%rcrdrbWcWdW]^89[\3 4 wx89]^[\MvNvEvFvLvDvCvGvBvJvIvHvKvAv\X[XXXYXZX89[\]^ |}~eXfX l2n2k2m2j2SOPQTR743982;:651a99b99}99{9|9z9~9c9[\89]^{{347\8\K\L\C\D\O\P\3\4\5\6\E\F\M\N\?\@\G\H\-.......#.$.... .).*.....+.,.'.(.!.". .. . .g2h2w2x2a2b2[2\2e2f2i2j2}2~2Q2R2y2z2S2T2]2^2m2n2c2d2q2r2/C0CCCC C!C"C#C$C1C2C%C&CCCCC+C,C)C*C-C.C'C(CCC]^[\89bhah`hQmm m~|}gFhFiF&s'scsds$s%s:634712589;c:|:a::{:::z:}:b:~:89]^[\cccc c c c ccccceYfYo[p[+[q[[3489[\]^J~|}]^89[\BaCa>a?a@aAa8a9a$?$A$D$:$};z;~;;;;b;{;|;a;c;:634821;759TPROQSm3n3k3j3l3{RzRyRJZIZKZHZ8 9 ] ^ [ \ U6R6S6T6V6W6Q6[ \ 8 9 ] ^ 0;/;.;||34jNkNlN5]6]K]L]?]@]M]N]3]4]O]P]C]D]E]F]7]8]G]H]'/(/// /// /-/./+/,/#/$///// / /////)/*/!/"/]3^3q3r3[3\3w3x3Q3R3}3~3e3f3i3j3c3d3y3z3g3h3S3T3a3b3m3n3DDDD)D*D1D2D!D"DDD%D&D'D(D#D$DDDD D/D0D-D.D+D,D[ \ ] ^ 8 9 9;5682:3417b<<~<<a<<{<|<}<z<c<<%=%C%>%?%B%;%@%A%D%:%8 9 [ \ ] ^ m_n_o_@eAen nQnP Qp\q\r\s\ZzLzMzNz$u%ucudu&u'u=>?6745<9H:;8tEuEvEwbxby'z''C+=+B+;+>+?+@+D+<+:+A+7 4 ; 8 2 : 6 9 5 3 1 {G|G}G}=~==a={=|=c=b==z==~nnnYYYbQyNyOyPycl4n4k4j4m47!4!8!2!1!5!6!3!9!:!;!<,=,@,B,;,A,?,:,C,>,D,b>>~>>{>|>>}>z>c>a>m`n`o`[ \ ] ^ 8 9 UCVCWC]^[\89MMM }H|H{H}4~4]4^4[4\4g4h4e4f4i4j4y4z4a4b4q4r4Q4R4S4T4m4n4w4x4c4d4+E,EEEE E!E"E)E*EEE#E$EEE-E.EEE'E(E/E0E1E2E%E&E[\]^89}}}}}}NzOzQzPztAAbAaAAzA{A|AcA}A~A:69743512;8<0=0B0;0@0C0>0?0D0A0:0[\89]^ @ @ @[ \ ] ^ 8 9 E_F_O_P_7_8_C_D_G_H_3_4_5_6_K_L_?_@_M_N_g6h6e6f6c6d6m6n6Q6R6i6j6}6~6q6r6y6z6w6x6]6^6a6b6[6\6S6T6G GGGGG/G0G+G,GGG)G*G#G$G'G(G%G&GGG-G.G!G"G1G2GySzS{S]!^!8!9![!\!*.).(.8"9"]"^"["\"]^[\898#9#[#\#]#^#J v vvvvvIIIIII8$9$]$^$[$\$[%\%]%^%8%9%[&\&]&^&8&9&:M;M>M?M8M9MCM1D156;74823:19['\']'^'8'9'VVVcB|B~BB}B{BaBzBbBBB](^([(\(8(9(])^)[)\)8)9)8*9*]*^*[*\*TGUGRGSG8+9+]+^+[+\+[\89]^``I```TFUFPFQFRFSF\o\p\+\q\[,\,8,9,],^, U U]-^-[-\-8-9-BLCLCL8L9L@LAL:L;LL?L[.\.8.9.].^.34]/^/[/\/8/9/G`H`O`P`K`L`?`@`C`D`7`8`E`F`3`4`M`N`5`6`y7z7m7n7[7\7Q7R7a7b7i7j7c7d7S7T7}7~7w7x7e7f7]7^7q7r7g7h7)H*H#H$HHH+H,H'H(H!H"H-H.HHHH HHHHH/H0H%H&H1H2H@fAf]0^0[0\08090~~~~~~]1^1[1\18191aaIaaa8B9B]B^B[B\B|\}\~\^#]#\# dXcXbX@gAgs_r_q_p_N}M}Z}L}+]p]o]]q]bbbIbb!U"U#U]2^2[2\28292[3\3]3^38393RSTULLL]4^4[4\48494>&?&D&@&C&=&A&<&:&;&B&bCC~CC}C{C|CCaCcCzC89]^[\34D.>.?.B.;.@.<.=.A.:.C.5#6#:#7#4#1#2#;#3#8#9#O^P^?^@^E^F^5^6^7^8^G^H^3^4^M^N^C^D^K^L^a5b5Q5R5e5f5}5~5m5n5c5d5S5T5y5z5q5r5i5j5g5h5w5x5]5^5[5\5'F(F+F,FFFF F%F&F)F*F#F$FFFFF/F0F1F2FFF!F"F-F.F[\]^89GwBwMwNwEwFwLwDwCwHwIwAwKwJweZfZa@@{@|@~@b@@}@@z@c@B/;/@/A/?//C/127498:63;5         Z{N{M{L{s]r]p]q]776757$a%aGNCNFNENDNBN$Pe[f[G^H^QOPTRS89]^[\&^'^(^&&&&&& &&&&)&*&&+&&,&-&&& & &.& & &RTPQSO34]^[\8989]^[\786858]^89[\yrzr{r]^[\89ExFxJxIxMxNxLxDxGxBxCxHxKxAx34[\]^89dWDVDUD 89[\]^q^r^s^N|M|Z|p^L|/R0Ribiai`i#~kMyNyLyDyKyFyCyEyJyIyAyByGyHy89[\]^;76H:5<948?>=8595]5^5[5\5N?N1T2Tr34s8696]6^6[6\6y8z8e8f8a8b8Q8R8w8x8}8~8]8^8q8r8[8\8g8h8m8n8i8j8S8T8c8d8@@)@*@!@"@%@&@1@2@-@.@#@$@@@@ @@@+@,@'@(@@@/@0@CaDaOaPaMaNaGaHa7a8aKaLa5a6a3a4aEaFa?a@a5!6!7!8!9!:!;!!?!@!A!B!C!D!E!F!G!H!I!J!K!L!M!N!O!P!Q!R!S!T!{TzTyTA*?*:*;*B*>*<*=*C*@*D*561274;389:}GGGaGGcG|G{G~GbGzG_&^&]&s`r`q`p`N~M~Z~L~[7\7]7^78797:';'@'<'='D'>'?'C'A'B'8234;7:6915cD|DzDbDDaDD{D}DD~D8898[8\8]8^8ULVLWLXLYLZL'ZZZPPPPPP8999[9\9]9^9[:\:]:^:8:9:Qpp pLzDzMzNzGzBzKzFzJzIzAzEzCzHz[)\)])];^;8;9;[;\;QQQQQQ         e\f\8<9<[<\<]<^<>O?OBOCOCO@OAO:O;O(<(B(cE|EaEEEEbEzE{E}E~E5682:7491;3aQbQUAVAWA34]>^>[>\>8>9>RSTUcdddedfdgddG_H_MeLeKeRRRRRR]?^?[?\?8?9?@)<)=)>)?)A)C)B);):)D)56128974:;3796959SSSSSS8@9@]@^@[@\@[[[)FFcF|FbF{F~FFzF}FaFG`H`\Y[YXYYYZYcccIcc+^p^q^^o^TTTTTT34manaoa]A^A[A\A8A9Ae9f9c9d9y9z9q9r9m9n9}9~9w9x9g9h9]9^9Q9R9i9j9S9T9a9b9[9\9K"L"9":";"<"7"8"I"J"S"T"Q"R"?"@"O"P"E"F"M"N"C"D"5"6"A"B"G"H"=">">q9q=qBq@5;5]8w?PqANqOq<JKLMqIwGqEqDqFCwHw:7 NOPSTUABCDEFHIJKLMRWXNW , )wbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256 https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256 vMqatzip-devel-1.0.9-1.el9.x86_64.rpmvMqatzip-devel-1.0.9-1.el9.x86_64.rpm|- uBBBBBBBBBBBBBBBBBBBBBsecurityImportant: grub2, mokutil, shim, and shim-unsigned-x64 security updateJy|https://access.redhat.com/errata/RHSA-2022:5099RHSA-2022:5099RHSA-2022:5099 https://access.redhat.com/security/cve/CVE-2021-3695CVE-2021-3695CVE-2021-3695https://access.redhat.com/security/cve/CVE-2021-3696CVE-2021-3696CVE-2021-3696https://access.redhat.com/security/cve/CVE-2021-3697CVE-2021-3697CVE-2021-3697https://access.redhat.com/security/cve/CVE-2022-28733CVE-2022-28733CVE-2022-28733https://access.redhat.com/security/cve/CVE-2022-28734CVE-2022-28734CVE-2022-28734https://access.redhat.com/security/cve/CVE-2022-28735CVE-2022-28735CVE-2022-28735https://access.redhat.com/security/cve/CVE-2022-28736CVE-2022-28736CVE-2022-28736https://access.redhat.com/security/cve/CVE-2022-28737CVE-2022-28737CVE-2022-28737https://bugzilla.redhat.com/19916851991685https://bugzilla.redhat.com/19916861991686https://bugzilla.redhat.com/19916871991687https://bugzilla.redhat.com/20833392083339https://bugzilla.redhat.com/20904632090463https://bugzilla.redhat.com/20908572090857https://bugzilla.redhat.com/20908992090899https://bugzilla.redhat.com/20926132092613https://errata.almalinux.org/9/ALSA-2022-5099.htmlALSA-2022:5099ALSA-2022:5099 y shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm7Rgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm1Rgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm2Rgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm5Rgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm4Rgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmRgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmRgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmRgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm6Rgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm3Rgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmRgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmz shim-x64-15.6-1.el9.alma.x86_64.rpmRgrub2-common-2.06-27.el9_0.7.alma.noarch.rpmy shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm7Rgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm1Rgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm2Rgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm5Rgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm4Rgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpmRgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpmRgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpmRgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm6Rgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm3Rgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpmRgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpmz shim-x64-15.6-1.el9.alma.x86_64.rpmRgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm1. jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: kernel security and bug fix updateJu https://access.redhat.com/errata/RHSA-2022:5249RHSA-2022:5249RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012CVE-2022-1012CVE-2022-1012https://access.redhat.com/security/cve/CVE-2022-1729CVE-2022-1729CVE-2022-1729https://access.redhat.com/security/cve/CVE-2022-1966CVE-2022-1966CVE-2022-1966https://access.redhat.com/security/cve/CVE-2022-27666CVE-2022-27666CVE-2022-27666https://bugzilla.redhat.com/20616332061633https://bugzilla.redhat.com/20646042064604https://bugzilla.redhat.com/20867532086753https://bugzilla.redhat.com/20924272092427https://errata.almalinux.org/9/ALSA-2022-5249.htmlALSA-2022:5249ALSA-2022:5249 :kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm>kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm3kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpmBkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm5kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm7kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm=kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm;kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm<kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm8kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm9kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm2kernel-5.14.0-70.17.1.el9_0.x86_64.rpm?kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpmGperf-5.14.0-70.17.1.el9_0.x86_64.rpmAkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm@kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmIpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm4kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm6kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm:kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm>kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm3kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpmBkernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm5kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm7kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm=kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpmkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm;kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm<kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpmbpftool-5.14.0-70.17.1.el9_0.x86_64.rpm8kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm9kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm2kernel-5.14.0-70.17.1.el9_0.x86_64.rpm?kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpmGperf-5.14.0-70.17.1.el9_0.x86_64.rpmAkernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm@kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpmIpython3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm4kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm6kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm/ UBBBBB securityModerate: libarchive security updateJ Xhttps://access.redhat.com/errata/RHSA-2022:5252RHSA-2022:5252RHSA-2022:5252 https://access.redhat.com/security/cve/CVE-2022-26280CVE-2022-26280CVE-2022-26280https://bugzilla.redhat.com/20719312071931https://errata.almalinux.org/9/ALSA-2022-5252.htmlALSA-2022:5252ALSA-2022:5252 Q8libarchive-3.5.3-2.el9_0.x86_64.rpm"8bsdtar-3.5.3-2.el9_0.x86_64.rpmi8libarchive-devel-3.5.3-2.el9_0.i686.rpmi8libarchive-devel-3.5.3-2.el9_0.x86_64.rpmQ8libarchive-3.5.3-2.el9_0.x86_64.rpm"8bsdtar-3.5.3-2.el9_0.x86_64.rpmi8libarchive-devel-3.5.3-2.el9_0.i686.rpmi8libarchive-devel-3.5.3-2.el9_0.x86_64.rpm 0 "\BBBBBsecurityModerate: libinput security updateJ b3https://access.redhat.com/errata/RHSA-2022:5257RHSA-2022:5257RHSA-2022:5257 https://access.redhat.com/security/cve/CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/20749522074952https://errata.almalinux.org/9/ALSA-2022-5257.htmlALSA-2022:5257ALSA-2022:5257 V7libinput-1.19.3-2.el9_0.x86_64.rpmW7libinput-utils-1.19.3-2.el9_0.x86_64.rpm~7libinput-devel-1.19.3-2.el9_0.i686.rpm~7libinput-devel-1.19.3-2.el9_0.x86_64.rpmV7libinput-1.19.3-2.el9_0.x86_64.rpmW7libinput-utils-1.19.3-2.el9_0.x86_64.rpm~7libinput-devel-1.19.3-2.el9_0.i686.rpm~7libinput-devel-1.19.3-2.el9_0.x86_64.rpm1 cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement updateJ+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695 Fjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmijava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmsjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmEjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmjjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmCjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmrjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmkjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmAjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpmnjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmqjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmDjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm?java-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmgjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmhjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmmjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm@java-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpmpjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmtjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmojava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmljava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmBjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm>java-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpmFjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmijava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmsjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmEjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmjjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmCjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmrjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmkjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmAjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpmnjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmqjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmDjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm?java-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmgjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmhjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmmjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm@java-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpmpjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmtjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmojava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmljava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmBjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm>java-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm2 2RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement updateJ@.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709  java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm= java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm; java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm9 java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm< java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm: java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm= java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm; java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm9 java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm< java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm: java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm3 !sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement updateJne https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736 gjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmLjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpmNjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpmOjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmijava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmGjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmjjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmljava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmhjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmnjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmJjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmIjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmmjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpmHjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmkjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmKjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmgjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmtjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmLjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpmNjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpmOjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmpjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmijava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmGjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmjjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmljava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmojava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmhjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmnjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmJjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmsjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmIjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmmjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpmHjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmqjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmkjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmKjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmrjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm4 >bBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement updateJ SiJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948 https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948 aImariadb-pam-10.5.16-2.el9_0.x86_64.rpmcImariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm[Imariadb-backup-10.5.16-2.el9_0.x86_64.rpmdImariadb-server-utils-10.5.16-2.el9_0.x86_64.rpmZImariadb-10.5.16-2.el9_0.x86_64.rpm_Imariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm`Imariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm]Imariadb-embedded-10.5.16-2.el9_0.x86_64.rpm^Imariadb-errmsg-10.5.16-2.el9_0.x86_64.rpmMImariadb-test-10.5.16-2.el9_0.x86_64.rpmKImariadb-devel-10.5.16-2.el9_0.x86_64.rpm\Imariadb-common-10.5.16-2.el9_0.x86_64.rpmLImariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpmbImariadb-server-10.5.16-2.el9_0.x86_64.rpmaImariadb-pam-10.5.16-2.el9_0.x86_64.rpmcImariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm[Imariadb-backup-10.5.16-2.el9_0.x86_64.rpmdImariadb-server-utils-10.5.16-2.el9_0.x86_64.rpmZImariadb-10.5.16-2.el9_0.x86_64.rpm_Imariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm`Imariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm]Imariadb-embedded-10.5.16-2.el9_0.x86_64.rpm^Imariadb-errmsg-10.5.16-2.el9_0.x86_64.rpmMImariadb-test-10.5.16-2.el9_0.x86_64.rpmKImariadb-devel-10.5.16-2.el9_0.x86_64.rpm\Imariadb-common-10.5.16-2.el9_0.x86_64.rpmLImariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpmbImariadb-server-10.5.16-2.el9_0.x86_64.rpmͯo5 )BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement updateJ kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm?kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm4kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpmGperf-5.14.0-70.22.1.el9_0.x86_64.rpm2kernel-5.14.0-70.22.1.el9_0.x86_64.rpm5kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm8kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm@kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm3kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm<kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmbpftool-5.14.0-70.22.1.el9_0.x86_64.rpm9kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm;kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpmBkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpmIpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm7kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm6kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmAkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm:kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm=kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm>kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm?kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm4kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpmGperf-5.14.0-70.22.1.el9_0.x86_64.rpm2kernel-5.14.0-70.22.1.el9_0.x86_64.rpm5kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm8kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm@kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm3kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm<kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmbpftool-5.14.0-70.22.1.el9_0.x86_64.rpm9kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm;kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpmBkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpmIpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm7kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm6kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmB6 jBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement updateJ -Jhttps://access.redhat.com/errata/RHSA-2022:6043RHSA-2022:6043RHSA-2022:6043 https://access.redhat.com/security/cve/CVE-2022-34716CVE-2022-34716CVE-2022-34716https://bugzilla.redhat.com/21151832115183https://errata.almalinux.org/9/ALSA-2022-6043.htmlALSA-2022:6043ALSA-2022:6043 Jaspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm~*dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm*Jdotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm&Jdotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm'Jdotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpmo*netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpmJaspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm+*dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm)*dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm%Jdotnet-host-6.0.8-1.el9_0.x86_64.rpm$Jdotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm Jaspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm~*dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm*Jdotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm&Jdotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm'Jdotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpmo*netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpmJaspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm+*dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm)*dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm%Jdotnet-host-6.0.8-1.el9_0.x86_64.rpm$Jdotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpmнi7 {securityModerate: .NET 6.0 security and bugfix updateJ wxhttps://access.redhat.com/errata/RHSA-2022:6521RHSA-2022:6521RHSA-2022:6521 https://access.redhat.com/security/cve/CVE-2022-38013CVE-2022-38013CVE-2022-38013https://bugzilla.redhat.com/21251242125124https://errata.almalinux.org/9/ALSA-2022-6521.htmlALSA-2022:6521ALSA-2022:6521 ~odotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm~odotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm8 =securityModerate: ruby security, bug fix, and enhancement updateJ oMhttps://access.redhat.com/errata/RHSA-2022:6585RHSA-2022:6585RHSA-2022:6585 https://access.redhat.com/security/cve/CVE-2022-28738CVE-2022-28738CVE-2022-28738https://access.redhat.com/security/cve/CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/20756852075685https://bugzilla.redhat.com/20756872075687https://errata.almalinux.org/9/ALSA-2022-6585.htmlALSA-2022:6585ALSA-2022:6585  ruby-doc-3.0.4-160.el9_0.noarch.rpm ruby-doc-3.0.4-160.el9_0.noarch.rpm9 ~BBBBsecurityModerate: mysql security, bug fix, and enhancement updateJ  iBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updateJ D_ https://access.redhat.com/errata/RHSA-2022:7007RHSA-2022:7007RHSA-2022:7007 https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://errata.almalinux.org/9/ALSA-2022-7007.htmlALSA-2022:7007ALSA-2022:7007 Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmUjava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm Ujava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpmɷ? }BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix updateJ # https://access.redhat.com/errata/RHSA-2022:7013RHSA-2022:7013RHSA-2022:7013 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-7013.htmlALSA-2022:7013ALSA-2022:7013 r'java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpms'java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmt'java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmm'java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmp'java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmh'java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmo'java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpml'java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmq'java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmj'java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmk'java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmn'java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmg'java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmi'java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmr'java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpms'java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmt'java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmm'java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmp'java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmh'java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmo'java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpml'java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmq'java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmj'java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpmk'java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmn'java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmg'java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpmi'java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm@ YBsecurityImportant: libksba security updateJ.Yhttps://access.redhat.com/errata/RHSA-2022:7090RHSA-2022:7090RHSA-2022:7090 https://access.redhat.com/security/cve/CVE-2022-3515CVE-2022-3515CVE-2022-3515https://bugzilla.redhat.com/21356102135610https://errata.almalinux.org/9/ALSA-2022-7090.htmlALSA-2022:7090ALSA-2022:7090 j>libksba-devel-1.5.1-5.el9_0.i686.rpmj>libksba-devel-1.5.1-5.el9_0.x86_64.rpmj>libksba-devel-1.5.1-5.el9_0.i686.rpmj>libksba-devel-1.5.1-5.el9_0.x86_64.rpm_A \BsecurityImportant: device-mapper-multipath security updateJchttps://access.redhat.com/errata/RHSA-2022:7185RHSA-2022:7185RHSA-2022:7185 https://access.redhat.com/security/cve/CVE-2022-41974CVE-2022-41974CVE-2022-41974https://bugzilla.redhat.com/21339882133988https://errata.almalinux.org/9/ALSA-2022-7185.htmlALSA-2022:7185ALSA-2022:7185 f+device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpmf+device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpmf+device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpmf+device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpmhB _securityModerate: zlib security updateJ jOhttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314 }Ozlib-static-1.2.11-32.el9_0.i686.rpm}Ozlib-static-1.2.11-32.el9_0.i686.rpmSC aBBsecurityImportant: kernel security, bug fix, and enhancement updateJ9https://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318 https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 kernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpmSD MCWBBBBBBsecurityModerate: python3.9 security updateJ https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003 https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003 DHlibvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm.Hlibvirt-docs-8.5.0-7.el9_1.x86_64.rpm-Hlibvirt-devel-8.5.0-7.el9_1.x86_64.rpmDHlibvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm.Hlibvirt-docs-8.5.0-7.el9_1.x86_64.rpm-Hlibvirt-devel-8.5.0-7.el9_1.x86_64.rpmܩKK securityModerate: qt5 security and bug fix updateJ N9https://access.redhat.com/errata/RHSA-2022:8022RHSA-2022:8022RHSA-2022:8022 https://access.redhat.com/security/cve/CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/20555052055505https://errata.almalinux.org/9/ALSA-2022-8022.htmlALSA-2022:8022ALSA-2022:8022 K qt5-devel-5.15.3-1.el9.noarch.rpmK qt5-devel-5.15.3-1.el9.noarch.rpmܣPL XBsecurityModerate: unbound security, bug fix, and enhancement updateJ 5https://access.redhat.com/errata/RHSA-2022:8062RHSA-2022:8062RHSA-2022:8062 https://access.redhat.com/security/cve/CVE-2022-30698CVE-2022-30698CVE-2022-30698https://access.redhat.com/security/cve/CVE-2022-30699CVE-2022-30699CVE-2022-30699https://bugzilla.redhat.com/21167252116725https://bugzilla.redhat.com/21167292116729https://errata.almalinux.org/9/ALSA-2022-8062.htmlALSA-2022:8062ALSA-2022:8062 Y/unbound-devel-1.16.2-2.el9.i686.rpmY/unbound-devel-1.16.2-2.el9.x86_64.rpmY/unbound-devel-1.16.2-2.el9.i686.rpmY/unbound-devel-1.16.2-2.el9.x86_64.rpmބ{M XDBBBsecurityModerate: bind security updateJ < https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068 https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068 d_bind-libs-9.16.23-5.el9_1.i686.rpm_bind-doc-9.16.23-5.el9_1.noarch.rpmQ_bind-devel-9.16.23-5.el9_1.x86_64.rpmQ_bind-devel-9.16.23-5.el9_1.i686.rpmd_bind-libs-9.16.23-5.el9_1.i686.rpm_bind-doc-9.16.23-5.el9_1.noarch.rpmQ_bind-devel-9.16.23-5.el9_1.x86_64.rpmQ_bind-devel-9.16.23-5.el9_1.i686.rpmކN `BBBsecurityModerate: flac security updateJ Ijhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078 https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078 hTflac-devel-1.3.3-10.el9.i686.rpmhTflac-devel-1.3.3-10.el9.x86_64.rpmTflac-1.3.3-10.el9.x86_64.rpmhTflac-devel-1.3.3-10.el9.i686.rpmhTflac-devel-1.3.3-10.el9.x86_64.rpmTflac-1.3.3-10.el9.x86_64.rpmކGO eBsecurityLow: wavpack security updateJ\32https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139 https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139 mwavpack-devel-5.4.0-5.el9.x86_64.rpmmwavpack-devel-5.4.0-5.el9.i686.rpmmwavpack-devel-5.4.0-5.el9.x86_64.rpmmwavpack-devel-5.4.0-5.el9.i686.rpmއCP hBBBBBBBBBBsecurityModerate: poppler security and bug fix updateJ e(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151 https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151 !Hpoppler-qt5-devel-21.01.0-13.el9.x86_64.rpmHpoppler-cpp-devel-21.01.0-13.el9.x86_64.rpmHpoppler-devel-21.01.0-13.el9.i686.rpm!Hpoppler-qt5-devel-21.01.0-13.el9.i686.rpmHpoppler-cpp-devel-21.01.0-13.el9.i686.rpmHpoppler-devel-21.01.0-13.el9.x86_64.rpm Hpoppler-glib-devel-21.01.0-13.el9.i686.rpm Hpoppler-glib-devel-21.01.0-13.el9.x86_64.rpm!Hpoppler-qt5-devel-21.01.0-13.el9.x86_64.rpmHpoppler-cpp-devel-21.01.0-13.el9.x86_64.rpmHpoppler-devel-21.01.0-13.el9.i686.rpm!Hpoppler-qt5-devel-21.01.0-13.el9.i686.rpmHpoppler-cpp-devel-21.01.0-13.el9.i686.rpmHpoppler-devel-21.01.0-13.el9.x86_64.rpm Hpoppler-glib-devel-21.01.0-13.el9.i686.rpm Hpoppler-glib-devel-21.01.0-13.el9.x86_64.rpmއcQ tsecurityModerate: libtiff security updateJ @https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194 https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194 hlibtiff-tools-4.4.0-2.el9.x86_64.rpmhlibtiff-tools-4.4.0-2.el9.x86_64.rpm܀ZR vBBBBsecurityLow: openjpeg2 security updateJ\Mhttps://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207 https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207 pMopenjpeg2-tools-2.4.0-7.el9.x86_64.rpmoMopenjpeg2-devel-2.4.0-7.el9.i686.rpmoMopenjpeg2-devel-2.4.0-7.el9.x86_64.rpmpMopenjpeg2-tools-2.4.0-7.el9.i686.rpmpMopenjpeg2-tools-2.4.0-7.el9.x86_64.rpmoMopenjpeg2-devel-2.4.0-7.el9.i686.rpmoMopenjpeg2-devel-2.4.0-7.el9.x86_64.rpmpMopenjpeg2-tools-2.4.0-7.el9.i686.rpmވ`S _^BBsecurityModerate: dovecot security and enhancement updateJ hZhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208 https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208 g[dovecot-devel-2.3.16-7.el9.x86_64.rpmg[dovecot-devel-2.3.16-7.el9.i686.rpm[dovecot-2.3.16-7.el9.i686.rpmg[dovecot-devel-2.3.16-7.el9.x86_64.rpmg[dovecot-devel-2.3.16-7.el9.i686.rpm[dovecot-2.3.16-7.el9.i686.rpmވoT !@BBsecurityModerate: xorg-x11-server security and bug fix updateJ BZhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221 Zvxorg-x11-server-source-1.20.11-11.el9.noarch.rpmdvxorg-x11-server-devel-1.20.11-11.el9.x86_64.rpmdvxorg-x11-server-devel-1.20.11-11.el9.i686.rpmZvxorg-x11-server-source-1.20.11-11.el9.noarch.rpmdvxorg-x11-server-devel-1.20.11-11.el9.x86_64.rpmdvxorg-x11-server-devel-1.20.11-11.el9.i686.rpmމ(U "DsecurityModerate: yajl security updateJ Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252 https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252  Wyajl-devel-2.1.0-21.el9.x86_64.rpm Wyajl-devel-2.1.0-21.el9.x86_64.rpm3V #FBBsecurityModerate: kernel security, bug fix, and enhancement updateJ q?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 kernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm۰EW $JBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement updateJ tmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317 j|samba-test-libs-4.16.4-101.el9.x86_64.rpmi|samba-test-4.16.4-101.el9.x86_64.rpmX|samba-devel-4.16.4-101.el9.x86_64.rpmT|libsmbclient-devel-4.16.4-101.el9.x86_64.rpmX|samba-devel-4.16.4-101.el9.i686.rpmU|libwbclient-devel-4.16.4-101.el9.x86_64.rpmT|libsmbclient-devel-4.16.4-101.el9.i686.rpmU|libwbclient-devel-4.16.4-101.el9.i686.rpm)|samba-pidl-4.16.4-101.el9.noarch.rpm j|samba-test-libs-4.16.4-101.el9.x86_64.rpmi|samba-test-4.16.4-101.el9.x86_64.rpmX|samba-devel-4.16.4-101.el9.x86_64.rpmT|libsmbclient-devel-4.16.4-101.el9.x86_64.rpmX|samba-devel-4.16.4-101.el9.i686.rpmU|libwbclient-devel-4.16.4-101.el9.x86_64.rpmT|libsmbclient-devel-4.16.4-101.el9.i686.rpmU|libwbclient-devel-4.16.4-101.el9.i686.rpm)|samba-pidl-4.16.4-101.el9.noarch.rpmދrX XBsecurityModerate: libldb security, bug fix, and enhancement updateJ aLhttps://access.redhat.com/errata/RHSA-2022:8318RHSA-2022:8318RHSA-2022:8318 https://access.redhat.com/security/cve/CVE-2022-32746CVE-2022-32746CVE-2022-32746https://bugzilla.redhat.com/21082152108215https://errata.almalinux.org/9/ALSA-2022-8318.htmlALSA-2022:8318ALSA-2022:8318 Plibldb-devel-2.5.2-1.el9.x86_64.rpmPlibldb-devel-2.5.2-1.el9.i686.rpmPlibldb-devel-2.5.2-1.el9.x86_64.rpmPlibldb-devel-2.5.2-1.el9.i686.rpmތY &emKBBBBBBBBBsecurityModerate: python3.9 security, bug fix, and enhancement updateJ -5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353 2python3-idle-3.9.14-1.el9.x86_64.rpm2python3-debug-3.9.14-1.el9.x86_64.rpmP2python3-tkinter-3.9.14-1.el9.i686.rpm2python3-test-3.9.14-1.el9.i686.rpm2python3-idle-3.9.14-1.el9.i686.rpm2python3-test-3.9.14-1.el9.x86_64.rpm2python3-debug-3.9.14-1.el9.i686.rpmO2python3-3.9.14-1.el9.i686.rpm2python3-idle-3.9.14-1.el9.x86_64.rpm2python3-debug-3.9.14-1.el9.x86_64.rpmP2python3-tkinter-3.9.14-1.el9.i686.rpm2python3-test-3.9.14-1.el9.i686.rpm2python3-idle-3.9.14-1.el9.i686.rpm2python3-test-3.9.14-1.el9.x86_64.rpm2python3-debug-3.9.14-1.el9.i686.rpmO2python3-3.9.14-1.el9.i686.rpmތ[Z fBsecurityModerate: libtirpc security updateJ b{https://access.redhat.com/errata/RHSA-2022:8400RHSA-2022:8400RHSA-2022:8400 https://access.redhat.com/security/cve/CVE-2021-46828CVE-2021-46828CVE-2021-46828https://bugzilla.redhat.com/21093522109352https://errata.almalinux.org/9/ALSA-2022-8400.htmlALSA-2022:8400ALSA-2022:8400 <libtirpc-devel-1.3.3-0.el9.i686.rpm<libtirpc-devel-1.3.3-0.el9.x86_64.rpm<libtirpc-devel-1.3.3-0.el9.i686.rpm<libtirpc-devel-1.3.3-0.el9.x86_64.rpmލW[ 9iBBBBBBBBBBBBBBsecurityLow: mingw-gcc security and bug fix updateJ\].https://access.redhat.com/errata/RHSA-2022:8415RHSA-2022:8415RHSA-2022:8415 https://access.redhat.com/security/cve/CVE-2021-46195CVE-2021-46195CVE-2021-46195https://bugzilla.redhat.com/20463002046300https://errata.almalinux.org/9/ALSA-2022-8415.htmlALSA-2022:8415ALSA-2022:8415 lumingw64-gcc-12.0.1-11.2.el9.x86_64.rpmmumingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpmnumingw64-libgcc-12.0.1-11.2.el9.x86_64.rpmhumingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpmfumingw32-cpp-12.0.1-11.2.el9.x86_64.rpmiumingw32-libgcc-12.0.1-11.2.el9.x86_64.rpmkumingw64-cpp-12.0.1-11.2.el9.x86_64.rpmgumingw32-gcc-12.0.1-11.2.el9.x86_64.rpmlumingw64-gcc-12.0.1-11.2.el9.x86_64.rpmmumingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpmnumingw64-libgcc-12.0.1-11.2.el9.x86_64.rpmhumingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpmfumingw32-cpp-12.0.1-11.2.el9.x86_64.rpmiumingw32-libgcc-12.0.1-11.2.el9.x86_64.rpmkumingw64-cpp-12.0.1-11.2.el9.x86_64.rpmgumingw32-gcc-12.0.1-11.2.el9.x86_64.rpmx\ >zBBsecurityLow: mingw-glib2 security and bug fix updateJ\ Yhttps://access.redhat.com/errata/RHSA-2022:8418RHSA-2022:8418RHSA-2022:8418 https://access.redhat.com/security/cve/CVE-2021-28153CVE-2021-28153CVE-2021-28153https://bugzilla.redhat.com/19382911938291https://errata.almalinux.org/9/ALSA-2022-8418.htmlALSA-2022:8418ALSA-2022:8418 Qwmingw64-glib2-static-2.70.1-2.el9.noarch.rpmNwmingw32-glib2-2.70.1-2.el9.noarch.rpmPwmingw64-glib2-2.70.1-2.el9.noarch.rpmOwmingw32-glib2-static-2.70.1-2.el9.noarch.rpmQwmingw64-glib2-static-2.70.1-2.el9.noarch.rpmNwmingw32-glib2-2.70.1-2.el9.noarch.rpmPwmingw64-glib2-2.70.1-2.el9.noarch.rpmOwmingw32-glib2-static-2.70.1-2.el9.noarch.rpm ] BBsecurityImportant: mingw-zlib security updateJd:https://access.redhat.com/errata/RHSA-2022:8420RHSA-2022:8420RHSA-2022:8420 https://access.redhat.com/security/cve/CVE-2018-25032CVE-2018-25032CVE-2018-25032https://bugzilla.redhat.com/20679452067945https://errata.almalinux.org/9/ALSA-2022-8420.htmlALSA-2022:8420ALSA-2022:8420 !qmingw64-zlib-1.2.12-2.el9.noarch.rpmqmingw32-zlib-1.2.12-2.el9.noarch.rpm"qmingw64-zlib-static-1.2.12-2.el9.noarch.rpmqmingw32-zlib-static-1.2.12-2.el9.noarch.rpm!qmingw64-zlib-1.2.12-2.el9.noarch.rpmqmingw32-zlib-1.2.12-2.el9.noarch.rpm"qmingw64-zlib-static-1.2.12-2.el9.noarch.rpmqmingw32-zlib-static-1.2.12-2.el9.noarch.rpm@^ 'DsecurityModerate: dotnet7.0 security, bug fix, and enhancement updateJ Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434 [}dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm[}dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpmZ_ )hltBBBBBBBBBsecurityImportant: python3.9 security updateJgQhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493 3python3-debug-3.9.14-1.el9_1.1.i686.rpm3python3-idle-3.9.14-1.el9_1.1.x86_64.rpm3python3-test-3.9.14-1.el9_1.1.x86_64.rpmO3python3-3.9.14-1.el9_1.1.i686.rpmP3python3-tkinter-3.9.14-1.el9_1.1.i686.rpm3python3-idle-3.9.14-1.el9_1.1.i686.rpm3python3-test-3.9.14-1.el9_1.1.i686.rpm3python3-debug-3.9.14-1.el9_1.1.x86_64.rpm3python3-debug-3.9.14-1.el9_1.1.i686.rpm3python3-idle-3.9.14-1.el9_1.1.x86_64.rpm3python3-test-3.9.14-1.el9_1.1.x86_64.rpmO3python3-3.9.14-1.el9_1.1.i686.rpmP3python3-tkinter-3.9.14-1.el9_1.1.i686.rpm3python3-idle-3.9.14-1.el9_1.1.i686.rpm3python3-test-3.9.14-1.el9_1.1.i686.rpm3python3-debug-3.9.14-1.el9_1.1.x86_64.rpm}` *QBsecurityImportant: varnish security updateJ8Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643 https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643 $ovarnish-devel-6.6.2-2.el9_1.1.i686.rpm$ovarnish-devel-6.6.2-2.el9_1.1.x86_64.rpm$ovarnish-devel-6.6.2-2.el9_1.1.i686.rpm$ovarnish-devel-6.6.2-2.el9_1.1.x86_64.rpma +TsecurityModerate: .NET 6.0 security, bug fix, and enhancement update `https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077 https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077 ~qdotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm~qdotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpmb ,VBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update nHhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194 i;java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmj;java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmo;java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmn;java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmh;java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmg;java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpms;java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmr;java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmt;java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmq;java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmp;java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmm;java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpml;java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmk;java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmi;java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmj;java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmo;java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmn;java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmh;java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmg;java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpms;java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmr;java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmt;java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmq;java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmp;java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpmm;java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpml;java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmk;java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpmc -rBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update 6lhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202 k(java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpms(java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmi(java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpml(java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmj(java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmr(java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmg(java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmq(java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmh(java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmp(java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmo(java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmm(java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmt(java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmn(java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmk(java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpms(java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmi(java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpml(java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmj(java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmr(java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmg(java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmq(java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmh(java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmp(java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmo(java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmm(java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmt(java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpmn(java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpmd .NBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update "xhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210 https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210  Vjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm  Vjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpmVjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm Vjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpme /bsecurityModerate: libtiff security update {https://access.redhat.com/errata/RHSA-2023:0302RHSA-2023:0302RHSA-2023:0302 https://access.redhat.com/security/cve/CVE-2022-2056CVE-2022-2056CVE-2022-2056https://access.redhat.com/security/cve/CVE-2022-2057CVE-2022-2057CVE-2022-2057https://access.redhat.com/security/cve/CVE-2022-2058CVE-2022-2058CVE-2022-2058https://access.redhat.com/security/cve/CVE-2022-2519CVE-2022-2519CVE-2022-2519https://access.redhat.com/security/cve/CVE-2022-2520CVE-2022-2520CVE-2022-2520https://access.redhat.com/security/cve/CVE-2022-2521CVE-2022-2521CVE-2022-2521https://access.redhat.com/security/cve/CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/21032222103222https://bugzilla.redhat.com/21227892122789https://bugzilla.redhat.com/21227922122792https://bugzilla.redhat.com/21227992122799https://bugzilla.redhat.com/21344322134432https://errata.almalinux.org/9/ALSA-2023-0302.htmlALSA-2023:0302ALSA-2023:0302 ilibtiff-tools-4.4.0-5.el9_1.x86_64.rpmilibtiff-tools-4.4.0-5.el9_1.x86_64.rpmKf 0dBBsecurityModerate: libreoffice security update z https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304 https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304 glibreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpmYg 1hBBsecurityImportant: kernel security and bug fix update;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpmkernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpmMh lsecurityModerate: bash security update J}https://access.redhat.com/errata/RHSA-2023:0340RHSA-2023:0340RHSA-2023:0340 https://access.redhat.com/security/cve/CVE-2022-3715CVE-2022-3715CVE-2022-3715https://bugzilla.redhat.com/21267202126720https://errata.almalinux.org/9/ALSA-2023-0340.htmlALSA-2023:0340ALSA-2023:0340  lbash-devel-5.1.8-6.el9_1.x86_64.rpm lbash-devel-5.1.8-6.el9_1.x86_64.rpmi nBsecurityImportant: libksba security updateGJhttps://access.redhat.com/errata/RHSA-2023:0626RHSA-2023:0626RHSA-2023:0626 https://access.redhat.com/security/cve/CVE-2022-47629CVE-2022-47629CVE-2022-47629https://bugzilla.redhat.com/21615712161571https://errata.almalinux.org/9/ALSA-2023-0626.htmlALSA-2023:0626ALSA-2023:0626 j?libksba-devel-1.5.1-6.el9_1.i686.rpmj?libksba-devel-1.5.1-6.el9_1.x86_64.rpmj?libksba-devel-1.5.1-6.el9_1.i686.rpmj?libksba-devel-1.5.1-6.el9_1.x86_64.rpmxj 2qBBsecurityImportant: kernel security and bug fix update~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 kernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpmk 4sd`BBBBBBBBBsecurityModerate: python3.9 security update 9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953 4python3-idle-3.9.14-1.el9_1.2.i686.rpm4python3-idle-3.9.14-1.el9_1.2.x86_64.rpmP4python3-tkinter-3.9.14-1.el9_1.2.i686.rpm4python3-debug-3.9.14-1.el9_1.2.x86_64.rpm4python3-test-3.9.14-1.el9_1.2.x86_64.rpmO4python3-3.9.14-1.el9_1.2.i686.rpm4python3-debug-3.9.14-1.el9_1.2.i686.rpm4python3-test-3.9.14-1.el9_1.2.i686.rpm4python3-idle-3.9.14-1.el9_1.2.i686.rpm4python3-idle-3.9.14-1.el9_1.2.x86_64.rpmP4python3-tkinter-3.9.14-1.el9_1.2.i686.rpm4python3-debug-3.9.14-1.el9_1.2.x86_64.rpm4python3-test-3.9.14-1.el9_1.2.x86_64.rpmO4python3-3.9.14-1.el9_1.2.i686.rpm4python3-debug-3.9.14-1.el9_1.2.i686.rpm4python3-test-3.9.14-1.el9_1.2.i686.rpmEl 6uLBBsecurityModerate: lua security update H8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 Ablua-devel-5.4.4-2.el9_1.i686.rpmAblua-devel-5.4.4-2.el9_1.x86_64.rpm blua-5.4.4-2.el9_1.i686.rpmAblua-devel-5.4.4-2.el9_1.i686.rpmAblua-devel-5.4.4-2.el9_1.x86_64.rpm blua-5.4.4-2.el9_1.i686.rpmZm 7DBBBBsecurityModerate: libjpeg-turbo security update .https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068 https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068 sJturbojpeg-2.0.90-6.el9_1.x86_64.rpmtJturbojpeg-devel-2.0.90-6.el9_1.x86_64.rpmtJturbojpeg-devel-2.0.90-6.el9_1.i686.rpmsJturbojpeg-2.0.90-6.el9_1.i686.rpmsJturbojpeg-2.0.90-6.el9_1.x86_64.rpmtJturbojpeg-devel-2.0.90-6.el9_1.x86_64.rpmtJturbojpeg-devel-2.0.90-6.el9_1.i686.rpmsJturbojpeg-2.0.90-6.el9_1.i686.rpmn 8JBBsecurityImportant: kernel security, bug fix, and enhancement update.Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm8o 9NBBBBBBBBBBsecurityModerate: postgresql security update jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693 https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693 ]postgresql-server-devel-13.10-1.el9_1.x86_64.rpm]postgresql-private-devel-13.10-1.el9_1.x86_64.rpm]postgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm]postgresql-static-13.10-1.el9_1.x86_64.rpm]postgresql-test-13.10-1.el9_1.x86_64.rpm]postgresql-docs-13.10-1.el9_1.x86_64.rpm]postgresql-server-devel-13.10-1.el9_1.x86_64.rpm]postgresql-private-devel-13.10-1.el9_1.x86_64.rpm]postgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm]postgresql-static-13.10-1.el9_1.x86_64.rpm]postgresql-test-13.10-1.el9_1.x86_64.rpm]postgresql-docs-13.10-1.el9_1.x86_64.rpmp :ZBBsecurityImportant: kernel security and bug fix updateq4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 kernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpmkernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpmq ;^BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update%https://access.redhat.com/errata/RHSA-2023:1879RHSA-2023:1879RHSA-2023:1879 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1879.htmlALSA-2023:1879ALSA-2023:1879 s<java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmj<java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmm<java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo<java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmh<java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp<java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq<java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmk<java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr<java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpml<java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt<java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn<java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmg<java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmi<java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpms<java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmj<java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmm<java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmo<java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmh<java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmp<java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmq<java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmk<java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr<java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpml<java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmt<java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpmn<java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmg<java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmi<java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpmr jBBBBBBBBBBBBsecurityImportant: samba security updateGhttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127 T}libsmbclient-devel-4.16.4-103.el9_1.i686.rpmi}samba-test-4.16.4-103.el9_1.x86_64.rpmT}libsmbclient-devel-4.16.4-103.el9_1.x86_64.rpmX}samba-devel-4.16.4-103.el9_1.i686.rpmU}libwbclient-devel-4.16.4-103.el9_1.x86_64.rpmj}samba-test-libs-4.16.4-103.el9_1.x86_64.rpmX}samba-devel-4.16.4-103.el9_1.x86_64.rpmU}libwbclient-devel-4.16.4-103.el9_1.i686.rpm)}samba-pidl-4.16.4-103.el9_1.noarch.rpm T}libsmbclient-devel-4.16.4-103.el9_1.i686.rpmi}samba-test-4.16.4-103.el9_1.x86_64.rpmT}libsmbclient-devel-4.16.4-103.el9_1.x86_64.rpmX}samba-devel-4.16.4-103.el9_1.i686.rpmU}libwbclient-devel-4.16.4-103.el9_1.x86_64.rpmj}samba-test-libs-4.16.4-103.el9_1.x86_64.rpmX}samba-devel-4.16.4-103.el9_1.x86_64.rpmU}libwbclient-devel-4.16.4-103.el9_1.i686.rpm)}samba-pidl-4.16.4-103.el9_1.noarch.rpmӿ(u ?xBBsecurityImportant: edk2 security, bug fix, and enhancement update[ https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165 https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165 Pedk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpmedk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpmQedk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpmPedk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpmedk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpmQedk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpmv |BBBBBBBBBBsecurityModerate: freeradius security and bug fix update jfhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166 https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166  bfreeradius-sqlite-3.0.21-37.el9.x86_64.rpmbfreeradius-perl-3.0.21-37.el9.x86_64.rpmbfreeradius-rest-3.0.21-37.el9.x86_64.rpm!bfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpmbfreeradius-postgresql-3.0.21-37.el9.x86_64.rpmbfreeradius-mysql-3.0.21-37.el9.x86_64.rpm bfreeradius-sqlite-3.0.21-37.el9.x86_64.rpmbfreeradius-perl-3.0.21-37.el9.x86_64.rpmbfreeradius-rest-3.0.21-37.el9.x86_64.rpm!bfreeradius-unixODBC-3.0.21-37.el9.x86_64.rpmbfreeradius-postgresql-3.0.21-37.el9.x86_64.rpmbfreeradius-mysql-3.0.21-37.el9.x86_64.rpm:w HBBsecurityModerate: xorg-x11-server security and bug fix update POhttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248 Zwxorg-x11-server-source-1.20.11-17.el9.noarch.rpmdwxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmdwxorg-x11-server-devel-1.20.11-17.el9.i686.rpmZwxorg-x11-server-source-1.20.11-17.el9.noarch.rpmdwxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpmdwxorg-x11-server-devel-1.20.11-17.el9.i686.rpm>x LBBBBBBBBBBsecurityModerate: poppler security and bug fix update https://access.redhat.com/errata/RHSA-2023:2259RHSA-2023:2259RHSA-2023:2259 https://access.redhat.com/security/cve/CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/21245272124527https://errata.almalinux.org/9/ALSA-2023-2259.htmlALSA-2023:2259ALSA-2023:2259 !Ipoppler-qt5-devel-21.01.0-14.el9.i686.rpm!Ipoppler-qt5-devel-21.01.0-14.el9.x86_64.rpmIpoppler-devel-21.01.0-14.el9.x86_64.rpmIpoppler-cpp-devel-21.01.0-14.el9.i686.rpmIpoppler-cpp-devel-21.01.0-14.el9.x86_64.rpmIpoppler-devel-21.01.0-14.el9.i686.rpm Ipoppler-glib-devel-21.01.0-14.el9.i686.rpm Ipoppler-glib-devel-21.01.0-14.el9.x86_64.rpm!Ipoppler-qt5-devel-21.01.0-14.el9.i686.rpm!Ipoppler-qt5-devel-21.01.0-14.el9.x86_64.rpmIpoppler-devel-21.01.0-14.el9.x86_64.rpmIpoppler-cpp-devel-21.01.0-14.el9.i686.rpmIpoppler-cpp-devel-21.01.0-14.el9.x86_64.rpmIpoppler-devel-21.01.0-14.el9.i686.rpm Ipoppler-glib-devel-21.01.0-14.el9.i686.rpm Ipoppler-glib-devel-21.01.0-14.el9.x86_64.rpmSy CVBBBsecurityModerate: bind security and bug fix update 8J https://access.redhat.com/errata/RHSA-2023:2261RHSA-2023:2261RHSA-2023:2261 https://access.redhat.com/security/cve/CVE-2022-2795CVE-2022-2795CVE-2022-2795https://access.redhat.com/security/cve/CVE-2022-3094CVE-2022-3094CVE-2022-3094https://access.redhat.com/security/cve/CVE-2022-3736CVE-2022-3736CVE-2022-3736https://access.redhat.com/security/cve/CVE-2022-3924CVE-2022-3924CVE-2022-3924https://bugzilla.redhat.com/21285842128584https://bugzilla.redhat.com/21640322164032https://bugzilla.redhat.com/21640382164038https://bugzilla.redhat.com/21640392164039https://errata.almalinux.org/9/ALSA-2023-2261.htmlALSA-2023:2261ALSA-2023:2261 dVbind-libs-9.16.23-11.el9.i686.rpmQVbind-devel-9.16.23-11.el9.x86_64.rpmVbind-doc-9.16.23-11.el9.noarch.rpmQVbind-devel-9.16.23-11.el9.i686.rpmdVbind-libs-9.16.23-11.el9.i686.rpmQVbind-devel-9.16.23-11.el9.x86_64.rpmVbind-doc-9.16.23-11.el9.noarch.rpmQVbind-devel-9.16.23-11.el9.i686.rpm[z ]BBBBsecurityModerate: freerdp security update fhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326 https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326 Ufreerdp-devel-2.4.1-5.el9.x86_64.rpmUlibwinpr-devel-2.4.1-5.el9.x86_64.rpmUlibwinpr-devel-2.4.1-5.el9.i686.rpmUfreerdp-devel-2.4.1-5.el9.i686.rpmUfreerdp-devel-2.4.1-5.el9.x86_64.rpmUlibwinpr-devel-2.4.1-5.el9.x86_64.rpmUlibwinpr-devel-2.4.1-5.el9.i686.rpmUfreerdp-devel-2.4.1-5.el9.i686.rpm%{ csecurityModerate: libtiff security update h>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340 https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340 jlibtiff-tools-4.4.0-7.el9.x86_64.rpmjlibtiff-tools-4.4.0-7.el9.x86_64.rpm4| eBsecurityModerate: unbound security update &9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370 https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370 Y0unbound-devel-1.16.2-3.el9.x86_64.rpmY0unbound-devel-1.16.2-3.el9.i686.rpmY0unbound-devel-1.16.2-3.el9.x86_64.rpmY0unbound-devel-1.16.2-3.el9.i686.rpmE} hBsecurityModerate: wireshark security and bug fix update _4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373 https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373 GJwireshark-devel-3.4.10-4.el9.i686.rpmGJwireshark-devel-3.4.10-4.el9.x86_64.rpmGJwireshark-devel-3.4.10-4.el9.i686.rpmGJwireshark-devel-3.4.10-4.el9.x86_64.rpm ~ kBBsecurityImportant: kernel security, bug fix, and enhancement updateSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458 kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpmkernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpmC oBsecurityModerate: device-mapper-multipath security and bug fix update f]https://access.redhat.com/errata/RHSA-2023:2459RHSA-2023:2459RHSA-2023:2459 https://access.redhat.com/security/cve/CVE-2022-41973CVE-2022-41973CVE-2022-41973https://bugzilla.redhat.com/21238942123894https://errata.almalinux.org/9/ALSA-2023-2459.htmlALSA-2023:2459ALSA-2023:2459 f*device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpmf*device-mapper-multipath-devel-0.8.7-20.el9.i686.rpmf*device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpmf*device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm rsecurityModerate: fwupd security and bug fix update CM https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487 /Pfwupd-devel-1.8.10-2.el9.alma.x86_64.rpm/Pfwupd-devel-1.8.10-2.el9.alma.x86_64.rpm} tBBBBBBBBBBBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update\https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519 XKsamba-devel-4.17.5-102.el9.x86_64.rpmUKlibwbclient-devel-4.17.5-102.el9.i686.rpm)Ksamba-pidl-4.17.5-102.el9.noarch.rpmjKsamba-test-libs-4.17.5-102.el9.x86_64.rpm"Kpython3-samba-devel-4.17.5-102.el9.i686.rpmXKsamba-devel-4.17.5-102.el9.i686.rpmKlibnetapi-devel-4.17.5-102.el9.x86_64.rpm Kpython3-samba-test-4.17.5-102.el9.x86_64.rpmTKlibsmbclient-devel-4.17.5-102.el9.x86_64.rpmTKlibsmbclient-devel-4.17.5-102.el9.i686.rpmKlibnetapi-devel-4.17.5-102.el9.i686.rpmUKlibwbclient-devel-4.17.5-102.el9.x86_64.rpmiKsamba-test-4.17.5-102.el9.x86_64.rpm"Kpython3-samba-devel-4.17.5-102.el9.x86_64.rpmXKsamba-devel-4.17.5-102.el9.x86_64.rpmUKlibwbclient-devel-4.17.5-102.el9.i686.rpm)Ksamba-pidl-4.17.5-102.el9.noarch.rpmjKsamba-test-libs-4.17.5-102.el9.x86_64.rpm"Kpython3-samba-devel-4.17.5-102.el9.i686.rpmXKsamba-devel-4.17.5-102.el9.i686.rpmKlibnetapi-devel-4.17.5-102.el9.x86_64.rpm Kpython3-samba-test-4.17.5-102.el9.x86_64.rpmTKlibsmbclient-devel-4.17.5-102.el9.x86_64.rpmTKlibsmbclient-devel-4.17.5-102.el9.i686.rpmKlibnetapi-devel-4.17.5-102.el9.i686.rpmUKlibwbclient-devel-4.17.5-102.el9.x86_64.rpmiKsamba-test-4.17.5-102.el9.x86_64.rpm"Kpython3-samba-devel-4.17.5-102.el9.x86_64.rpmf JBsecurityLow: libarchive security update\Yhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532 iglibarchive-devel-3.5.3-4.el9.x86_64.rpmiglibarchive-devel-3.5.3-4.el9.i686.rpmiglibarchive-devel-3.5.3-4.el9.x86_64.rpmiglibarchive-devel-3.5.3-4.el9.i686.rpm MABBsecurityLow: lua security update\mRhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582  clua-5.4.4-3.el9.i686.rpmAclua-devel-5.4.4-3.el9.x86_64.rpmAclua-devel-5.4.4-3.el9.i686.rpm clua-5.4.4-3.el9.i686.rpmAclua-devel-5.4.4-3.el9.x86_64.rpmAclua-devel-5.4.4-3.el9.i686.rpmo QBsecurityModerate: autotrace security update ?yhttps://access.redhat.com/errata/RHSA-2023:2589RHSA-2023:2589RHSA-2023:2589 https://access.redhat.com/security/cve/CVE-2022-32323CVE-2022-32323CVE-2022-32323https://bugzilla.redhat.com/21074712107471https://errata.almalinux.org/9/ALSA-2023-2589.htmlALSA-2023:2589ALSA-2023:2589 t(autotrace-0.31.1-65.el9.x86_64.rpmt(autotrace-0.31.1-65.el9.i686.rpmt(autotrace-0.31.1-65.el9.x86_64.rpmt(autotrace-0.31.1-65.el9.i686.rpm` UsecurityModerate: golang-github-cpuguy83-md2man security, bug fix, and enhancement update 8chttps://access.redhat.com/errata/RHSA-2023:2592RHSA-2023:2592RHSA-2023:2592 https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2592.htmlALSA-2023:2592ALSA-2023:2592 0Vgolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm0Vgolang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpmo XBBBBsecurityImportant: mysql security updateLhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621 https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621 /Dmysql-devel-8.0.32-1.el9_2.x86_64.rpm0Dmysql-test-8.0.32-1.el9_2.x86_64.rpmRDmysql-libs-8.0.32-1.el9_2.x86_64.rpm/Dmysql-devel-8.0.32-1.el9_2.x86_64.rpm0Dmysql-test-8.0.32-1.el9_2.x86_64.rpmRDmysql-libs-8.0.32-1.el9_2.x86_64.rpmh ^BsecurityImportant: cups-filters security updateihttps://access.redhat.com/errata/RHSA-2023:3423RHSA-2023:3423RHSA-2023:3423 https://access.redhat.com/security/cve/CVE-2023-24805CVE-2023-24805CVE-2023-24805https://bugzilla.redhat.com/22030512203051https://errata.almalinux.org/9/ALSA-2023-3423.htmlALSA-2023:3423ALSA-2023:3423 e:cups-filters-devel-1.28.7-11.el9_2.1.i686.rpme:cups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpme:cups-filters-devel-1.28.7-11.el9_2.1.i686.rpme:cups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm asecurityImportant: .NET 6.0 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:3581RHSA-2023:3581RHSA-2023:3581 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3581.htmlALSA-2023:3581ALSA-2023:3581 ~rdotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm~rdotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm.  RBQBBBBBBBBBsecurityImportant: python3.11 security updateyhttps://access.redhat.com/errata/RHSA-2023:3585RHSA-2023:3585RHSA-2023:3585 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3585.htmlALSA-2023:3585ALSA-2023:3585 python3.11-idle-3.11.2-2.el9_2.1.i686.rpmpython3.11-test-3.11.2-2.el9_2.1.x86_64.rpmpython3.11-debug-3.11.2-2.el9_2.1.x86_64.rpmpython3.11-test-3.11.2-2.el9_2.1.i686.rpmpython3.11-idle-3.11.2-2.el9_2.1.x86_64.rpmcpython3.11-tkinter-3.11.2-2.el9_2.1.i686.rpmpython3.11-debug-3.11.2-2.el9_2.1.i686.rpmbpython3.11-3.11.2-2.el9_2.1.i686.rpmpython3.11-idle-3.11.2-2.el9_2.1.i686.rpmpython3.11-test-3.11.2-2.el9_2.1.x86_64.rpmpython3.11-debug-3.11.2-2.el9_2.1.x86_64.rpmpython3.11-test-3.11.2-2.el9_2.1.i686.rpmpython3.11-idle-3.11.2-2.el9_2.1.x86_64.rpmcpython3.11-tkinter-3.11.2-2.el9_2.1.i686.rpmpython3.11-debug-3.11.2-2.el9_2.1.i686.rpmbpython3.11-3.11.2-2.el9_2.1.i686.rpm  nsecurityImportant: .NET 7.0 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:3592RHSA-2023:3592RHSA-2023:3592 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-32032CVE-2023-32032CVE-2023-32032https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126152212615https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3592.htmlALSA-2023:3592ALSA-2023:3592 [~dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm[~dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm  VCYBBBBBBBBBsecurityImportant: python3.9 security update+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595 5python3-idle-3.9.16-1.el9_2.1.x86_64.rpm5python3-debug-3.9.16-1.el9_2.1.x86_64.rpm5python3-test-3.9.16-1.el9_2.1.i686.rpm5python3-test-3.9.16-1.el9_2.1.x86_64.rpm5python3-debug-3.9.16-1.el9_2.1.i686.rpm5python3-idle-3.9.16-1.el9_2.1.i686.rpmP5python3-tkinter-3.9.16-1.el9_2.1.i686.rpmO5python3-3.9.16-1.el9_2.1.i686.rpm5python3-idle-3.9.16-1.el9_2.1.x86_64.rpm5python3-debug-3.9.16-1.el9_2.1.x86_64.rpm5python3-test-3.9.16-1.el9_2.1.i686.rpm5python3-test-3.9.16-1.el9_2.1.x86_64.rpm5python3-debug-3.9.16-1.el9_2.1.i686.rpm5python3-idle-3.9.16-1.el9_2.1.i686.rpmP5python3-tkinter-3.9.16-1.el9_2.1.i686.rpmO5python3-3.9.16-1.el9_2.1.i686.rpmx  {BBsecurityImportant: texlive security updateA https://access.redhat.com/errata/RHSA-2023:3661RHSA-2023:3661RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700CVE-2023-32700CVE-2023-32700https://bugzilla.redhat.com/22089432208943https://errata.almalinux.org/9/ALSA-2023-3661.htmlALSA-2023:3661ALSA-2023:3661 (texlive-gnu-freefont-20200406-26.el9_2.noarch.rpmtexlive-lib-devel-20200406-26.el9_2.x86_64.rpmtexlive-lib-devel-20200406-26.el9_2.i686.rpm(texlive-gnu-freefont-20200406-26.el9_2.noarch.rpmtexlive-lib-devel-20200406-26.el9_2.x86_64.rpmtexlive-lib-devel-20200406-26.el9_2.i686.rpm׺y  securityModerate: libtiff security update Nphttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711 https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711 klibtiff-tools-4.4.0-8.el9_2.x86_64.rpmklibtiff-tools-4.4.0-8.el9_2.x86_64.rpmi ABBBBBBBBBBsecurityModerate: postgresql security update >Shttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714 ^postgresql-docs-13.11-1.el9_2.x86_64.rpm^postgresql-test-13.11-1.el9_2.x86_64.rpm^postgresql-server-devel-13.11-1.el9_2.x86_64.rpm^postgresql-private-devel-13.11-1.el9_2.x86_64.rpm^postgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm^postgresql-static-13.11-1.el9_2.x86_64.rpm^postgresql-docs-13.11-1.el9_2.x86_64.rpm^postgresql-test-13.11-1.el9_2.x86_64.rpm^postgresql-server-devel-13.11-1.el9_2.x86_64.rpm^postgresql-private-devel-13.11-1.el9_2.x86_64.rpm^postgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm^postgresql-static-13.11-1.el9_2.x86_64.rpm MBBBBBBsecurityModerate: libvirt security update }https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715 https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715 D+libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm-+libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm.+libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpmC+libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpmD+libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm-+libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm.+libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpmC+libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm  UsecurityImportant: kernel security and bug fix updatehttps://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723 mkernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpmmkernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpmV WsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateEhttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057 [dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpmB YsecurityImportant: .NET 6.0 security, bug fix, and enhancement updateaFhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060 ~sdotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm~sdotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm9 _}BBBsecurityImportant: bind security update'Nhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099 https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099 QWbind-devel-9.16.23-11.el9_2.1.x86_64.rpmWbind-doc-9.16.23-11.el9_2.1.noarch.rpmdWbind-libs-9.16.23-11.el9_2.1.i686.rpmQWbind-devel-9.16.23-11.el9_2.1.i686.rpmQWbind-devel-9.16.23-11.el9_2.1.x86_64.rpmWbind-doc-9.16.23-11.el9_2.1.noarch.rpmdWbind-libs-9.16.23-11.el9_2.1.i686.rpmQWbind-devel-9.16.23-11.el9_2.1.i686.rpmٟ  !`BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update u"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158 n*java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmi*java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmt*java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmj*java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmo*java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmg*java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpml*java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmk*java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmm*java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmr*java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpms*java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmh*java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmp*java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmq*java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmn*java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmi*java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmt*java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmj*java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmo*java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmg*java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpml*java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmk*java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmm*java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmr*java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpms*java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpmh*java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmp*java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpmq*java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm  "|BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update Nhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177 h=java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmq=java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmg=java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn=java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmj=java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmo=java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms=java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmk=java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmt=java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpml=java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmp=java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmm=java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmr=java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmi=java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmh=java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmq=java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmg=java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmn=java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmj=java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmo=java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpms=java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmk=java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmt=java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpml=java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpmp=java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmm=java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmr=java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpmi=java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm{ #XBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix update eyhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178 https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178 Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpmXjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm Xjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm- $lBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security and bug fix update ^https://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325 ULlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpmTLlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpmLlibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm"Lpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm"Lpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpmULlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm)Lsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpmiLsamba-test-4.17.5-103.el9_2.alma.x86_64.rpmjLsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpmLlibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm Lpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpmTLlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmXLsamba-devel-4.17.5-103.el9_2.alma.i686.rpmXLsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpmULlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpmTLlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpmLlibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm"Lpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm"Lpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpmULlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm)Lsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpmiLsamba-test-4.17.5-103.el9_2.alma.x86_64.rpmjLsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpmLlibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm Lpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpmTLlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpmXLsamba-devel-4.17.5-103.el9_2.alma.i686.rpmXLsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm< %BBBsecurityImportant: kernel security, bug fix, and enhancement updatef0 https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377 kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpmkernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpmkernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpmkernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm0 &FsecurityImportant: .NET 7.0 security, bug fix, and enhancement updatehttps://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642 [dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm 'HsecurityImportant: .NET 6.0 security, bug fix, and enhancement update-https://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644 ~tdotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm~tdotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm/ (JBBBsecurityImportant: flac security updateDwhttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048 https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048 Uflac-1.3.3-10.el9_2.1.x86_64.rpmhUflac-devel-1.3.3-10.el9_2.1.i686.rpmhUflac-devel-1.3.3-10.el9_2.1.x86_64.rpmUflac-1.3.3-10.el9_2.1.x86_64.rpmhUflac-devel-1.3.3-10.el9_2.1.i686.rpmhUflac-devel-1.3.3-10.el9_2.1.x86_64.rpm5 )OsecurityImportant: kernel security, bug fix, and enhancement update;_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069 nkernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpmnkernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpmx *QsecurityModerate: .NET 6.0 security update Rhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143 ~udotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm~udotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm} +SsecurityModerate: .NET 7.0 security update lRhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146 [dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpmn ,UsecurityImportant: libwebp security update>-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214 XNlibwebp-tools-1.2.0-7.el9_2.x86_64.rpmXNlibwebp-tools-1.2.0-7.el9_2.x86_64.rpm]  -WBBBBBBBBBBBBsecurityImportant: glibc security updatek https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453 https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453 R{glibc-nss-devel-2.34-60.el9_2.7.x86_64.rpmS{glibc-static-2.34-60.el9_2.7.i686.rpmV{nss_db-2.34-60.el9_2.7.i686.rpmR{glibc-nss-devel-2.34-60.el9_2.7.i686.rpmW{nss_hesiod-2.34-60.el9_2.7.x86_64.rpmW{nss_hesiod-2.34-60.el9_2.7.i686.rpmV{nss_db-2.34-60.el9_2.7.x86_64.rpmS{glibc-static-2.34-60.el9_2.7.x86_64.rpmf{glibc-benchtests-2.34-60.el9_2.7.x86_64.rpm R{glibc-nss-devel-2.34-60.el9_2.7.x86_64.rpmS{glibc-static-2.34-60.el9_2.7.i686.rpmV{nss_db-2.34-60.el9_2.7.i686.rpmR{glibc-nss-devel-2.34-60.el9_2.7.i686.rpmW{nss_hesiod-2.34-60.el9_2.7.x86_64.rpmW{nss_hesiod-2.34-60.el9_2.7.i686.rpmV{nss_db-2.34-60.el9_2.7.x86_64.rpmS{glibc-static-2.34-60.el9_2.7.x86_64.rpmf{glibc-benchtests-2.34-60.el9_2.7.x86_64.rpmm! 0nBwBBBBBBBBBsecurityImportant: python3.11 security updatewihttps://access.redhat.com/errata/RHSA-2023:5456RHSA-2023:5456RHSA-2023:5456 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5456.htmlALSA-2023:5456ALSA-2023:5456 python3.11-idle-3.11.2-2.el9_2.2.i686.rpmpython3.11-debug-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-debug-3.11.2-2.el9_2.2.i686.rpmbpython3.11-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.i686.rpmcpython3.11-tkinter-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-idle-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-idle-3.11.2-2.el9_2.2.i686.rpmpython3.11-debug-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-debug-3.11.2-2.el9_2.2.i686.rpmbpython3.11-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.i686.rpmcpython3.11-tkinter-3.11.2-2.el9_2.2.i686.rpmpython3.11-test-3.11.2-2.el9_2.2.x86_64.rpmpython3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm=" 4qBB~BBBBsecurityImportant: ghostscript security update`https://access.redhat.com/errata/RHSA-2023:5459RHSA-2023:5459RHSA-2023:5459 https://access.redhat.com/security/cve/CVE-2023-36664CVE-2023-36664CVE-2023-36664https://bugzilla.redhat.com/22177982217798https://errata.almalinux.org/9/ALSA-2023-5459.htmlALSA-2023:5459ALSA-2023:5459 flibgs-devel-9.54.0-10.el9_2.i686.rpm'ghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm(ghostscript-tools-printing-9.54.0-10.el9_2.i686.rpm&ghostscript-9.54.0-10.el9_2.i686.rpmflibgs-devel-9.54.0-10.el9_2.x86_64.rpmflibgs-devel-9.54.0-10.el9_2.i686.rpm'ghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm(ghostscript-tools-printing-9.54.0-10.el9_2.i686.rpm&ghostscript-9.54.0-10.el9_2.i686.rpmflibgs-devel-9.54.0-10.el9_2.x86_64.rpm\# 6ue^BBBBBBBBBsecurityImportant: python3.9 security updateqhttps://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462 P6python3-tkinter-3.9.16-1.el9_2.2.i686.rpm6python3-idle-3.9.16-1.el9_2.2.x86_64.rpm6python3-test-3.9.16-1.el9_2.2.x86_64.rpm6python3-debug-3.9.16-1.el9_2.2.i686.rpm6python3-test-3.9.16-1.el9_2.2.i686.rpm6python3-idle-3.9.16-1.el9_2.2.i686.rpm6python3-debug-3.9.16-1.el9_2.2.x86_64.rpmO6python3-3.9.16-1.el9_2.2.i686.rpmP6python3-tkinter-3.9.16-1.el9_2.2.i686.rpm6python3-idle-3.9.16-1.el9_2.2.x86_64.rpm6python3-test-3.9.16-1.el9_2.2.x86_64.rpm6python3-debug-3.9.16-1.el9_2.2.i686.rpm6python3-test-3.9.16-1.el9_2.2.i686.rpm6python3-idle-3.9.16-1.el9_2.2.i686.rpm6python3-debug-3.9.16-1.el9_2.2.x86_64.rpmO6python3-3.9.16-1.el9_2.2.i686.rpmI$ 7ABsecurityImportant: libvpx security update https://access.redhat.com/errata/RHSA-2023:5539RHSA-2023:5539RHSA-2023:5539 https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22411912241191https://bugzilla.redhat.com/22418062241806https://errata.almalinux.org/9/ALSA-2023-5539.htmlALSA-2023:5539ALSA-2023:5539 Blibvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpmBlibvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpmBlibvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpmBlibvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpmx% 8DBBBBsecurityImportant: galera and mariadb security updateUhttps://access.redhat.com/errata/RHSA-2023:5684RHSA-2023:5684RHSA-2023:5684 https://access.redhat.com/security/cve/CVE-2022-32081CVE-2022-32081CVE-2022-32081https://access.redhat.com/security/cve/CVE-2022-32082CVE-2022-32082CVE-2022-32082https://access.redhat.com/security/cve/CVE-2022-32084CVE-2022-32084CVE-2022-32084https://access.redhat.com/security/cve/CVE-2022-32089CVE-2022-32089CVE-2022-32089https://access.redhat.com/security/cve/CVE-2022-32091CVE-2022-32091CVE-2022-32091https://access.redhat.com/security/cve/CVE-2022-38791CVE-2022-38791CVE-2022-38791https://access.redhat.com/security/cve/CVE-2022-47015CVE-2022-47015CVE-2022-47015https://access.redhat.com/security/cve/CVE-2023-5157CVE-2023-5157CVE-2023-5157https://bugzilla.redhat.com/21060282106028https://bugzilla.redhat.com/21060302106030https://bugzilla.redhat.com/21060342106034https://bugzilla.redhat.com/21060352106035https://bugzilla.redhat.com/21060422106042https://bugzilla.redhat.com/21301052130105https://bugzilla.redhat.com/21636092163609https://bugzilla.redhat.com/22402462240246https://errata.almalinux.org/9/ALSA-2023-5684.htmlALSA-2023:5684ALSA-2023:5684 M|mariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpmL|mariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpmK|mariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpmM|mariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpmL|mariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpmK|mariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm0& :yRBBBsecurityImportant: bind security updateeEhttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689 https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689 QXbind-devel-9.16.23-11.el9_2.2.i686.rpmdXbind-libs-9.16.23-11.el9_2.2.i686.rpmXbind-doc-9.16.23-11.el9_2.2.noarch.rpmQXbind-devel-9.16.23-11.el9_2.2.x86_64.rpmQXbind-devel-9.16.23-11.el9_2.2.i686.rpmdXbind-libs-9.16.23-11.el9_2.2.i686.rpmXbind-doc-9.16.23-11.el9_2.2.noarch.rpmQXbind-devel-9.16.23-11.el9_2.2.x86_64.rpm~' ;OsecurityImportant: dotnet6.0 security update*ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708 ~vdotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm~vdotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpmp( gBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update /&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744 https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744 r+java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmh+java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpms+java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmk+java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpml+java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmg+java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmn+java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmi+java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmq+java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmm+java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmo+java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmp+java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmj+java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmt+java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmr+java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmh+java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpms+java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmk+java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpml+java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmg+java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmn+java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmi+java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmq+java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpmm+java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmo+java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmp+java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmj+java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpmt+java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm˶ + ?CsecurityImportant: .NET 7.0 security updateUohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749 [dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm, EBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update D<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753 s>java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmj>java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpml>java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt>java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmo>java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmq>java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmm>java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmi>java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmh>java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmn>java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmr>java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmk>java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmp>java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmg>java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpms>java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmj>java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpml>java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmt>java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmo>java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmq>java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmm>java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmi>java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmh>java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmn>java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmr>java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmk>java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpmp>java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpmg>java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm˩n- aBBBsecurityImportant: nghttp2 security update-https://access.redhat.com/errata/RHSA-2023:5838RHSA-2023:5838RHSA-2023:5838 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5838.htmlALSA-2023:5838ALSA-2023:5838 Vnghttp2-1.43.0-5.el9_2.1.x86_64.rpmVlibnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpmVlibnghttp2-devel-1.43.0-5.el9_2.1.i686.rpmVnghttp2-1.43.0-5.el9_2.1.x86_64.rpmVlibnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpmVlibnghttp2-devel-1.43.0-5.el9_2.1.i686.rpmÙ1. fBsecurityImportant: varnish security update-https://access.redhat.com/errata/RHSA-2023:5924RHSA-2023:5924RHSA-2023:5924 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5924.htmlALSA-2023:5924ALSA-2023:5924 $pvarnish-devel-6.6.2-3.el9_2.1.i686.rpm$pvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpm$pvarnish-devel-6.6.2-3.el9_2.1.i686.rpm$pvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpmz/ isecurityModerate: .NET 6.0 security update =Qhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242 ~wdotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm~wdotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm0+ ksecurityModerate: .NET 7.0 security update Qhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246 [dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpmI1 DBBhBBBBsecurityImportant: ghostscript security update_https://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265 &ghostscript-9.54.0-11.el9_2.i686.rpmflibgs-devel-9.54.0-11.el9_2.i686.rpmflibgs-devel-9.54.0-11.el9_2.x86_64.rpm(ghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm'ghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm&ghostscript-9.54.0-11.el9_2.i686.rpmflibgs-devel-9.54.0-11.el9_2.i686.rpmflibgs-devel-9.54.0-11.el9_2.x86_64.rpm(ghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm'ghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm~2 HBkBsecurityModerate: edk2 security, bug fix, and enhancement update `Bhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330 https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330 kedk2-tools-20230524-3.el9.x86_64.rpmPkedk2-aarch64-20230524-3.el9.noarch.rpmQkedk2-tools-doc-20230524-3.el9.noarch.rpm%kedk2-ovmf-20230524-3.el9.noarch.rpmkedk2-tools-20230524-3.el9.x86_64.rpmPkedk2-aarch64-20230524-3.el9.noarch.rpmQkedk2-tools-doc-20230524-3.el9.noarch.rpm%kedk2-ovmf-20230524-3.el9.noarch.rpm3 vBBsecurityModerate: xorg-x11-server security and bug fix update "https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340 dxxorg-x11-server-devel-1.20.11-19.el9.i686.rpmZxxorg-x11-server-source-1.20.11-19.el9.noarch.rpmdxxorg-x11-server-devel-1.20.11-19.el9.x86_64.rpmdxxorg-x11-server-devel-1.20.11-19.el9.i686.rpmZxxorg-x11-server-source-1.20.11-19.el9.noarch.rpmdxxorg-x11-server-devel-1.20.11-19.el9.x86_64.rpmP4 zBsecurityModerate: LibRaw security update &Ghttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343 https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343 9$LibRaw-devel-0.20.2-6.el9.x86_64.rpm9$LibRaw-devel-0.20.2-6.el9.i686.rpm9$LibRaw-devel-0.20.2-6.el9.x86_64.rpm9$LibRaw-devel-0.20.2-6.el9.i686.rpm 5 }BBsecurityModerate: qt5 security and bug fix update m https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369 https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369 K qt5-devel-5.15.9-1.el9.noarch.rpm#jqt5-qtbase-static-5.15.9-7.el9.x86_64.rpm#jqt5-qtbase-static-5.15.9-7.el9.i686.rpmK qt5-devel-5.15.9-1.el9.noarch.rpm#jqt5-qtbase-static-5.15.9-7.el9.x86_64.rpm#jqt5-qtbase-static-5.15.9-7.el9.i686.rpm]6 ABBBBBBsecurityModerate: libvirt security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409 https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409 C,libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm-,libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm.,libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpmJ,libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpmC,libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm-,libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm.,libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpmJ,libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpmO7 IsecurityModerate: libfastjson security update [https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431 https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431 RLlibfastjson-devel-0.99.9-5.el9.x86_64.rpmRLlibfastjson-devel-0.99.9-5.el9.x86_64.rpmv8 KBsecurityModerate: wireshark security update tGhttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469 https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469 GKwireshark-devel-3.4.10-6.el9.x86_64.rpmGKwireshark-devel-3.4.10-6.el9.i686.rpmGKwireshark-devel-3.4.10-6.el9.x86_64.rpmGKwireshark-devel-3.4.10-6.el9.i686.rpm9 NBsecurityModerate: librabbitmq security update ;Whttps://access.redhat.com/errata/RHSA-2023:6482RHSA-2023:6482RHSA-2023:6482 https://access.redhat.com/security/cve/CVE-2023-35789CVE-2023-35789CVE-2023-35789https://bugzilla.redhat.com/22157622215762https://errata.almalinux.org/9/ALSA-2023-6482.htmlALSA-2023:6482ALSA-2023:6482 !librabbitmq-devel-0.11.0-7.el9.i686.rpm!librabbitmq-devel-0.11.0-7.el9.x86_64.rpm!librabbitmq-devel-0.11.0-7.el9.i686.rpm!librabbitmq-devel-0.11.0-7.el9.x86_64.rpm: RBBBBBBBBBBsecurityModerate: python3.11 security update bhttps://access.redhat.com/errata/RHSA-2023:6494RHSA-2023:6494RHSA-2023:6494 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://access.redhat.com/security/cve/CVE-2023-41105CVE-2023-41105CVE-2023-41105https://bugzilla.redhat.com/22357952235795https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6494.htmlALSA-2023:6494ALSA-2023:6494 python3.11-idle-3.11.5-1.el9_3.x86_64.rpmpython3.11-debug-3.11.5-1.el9_3.x86_64.rpmbpython3.11-3.11.5-1.el9_3.i686.rpmpython3.11-debug-3.11.5-1.el9_3.i686.rpmcpython3.11-tkinter-3.11.5-1.el9_3.i686.rpmpython3.11-test-3.11.5-1.el9_3.x86_64.rpmpython3.11-test-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.x86_64.rpmpython3.11-debug-3.11.5-1.el9_3.x86_64.rpmbpython3.11-3.11.5-1.el9_3.i686.rpmpython3.11-debug-3.11.5-1.el9_3.i686.rpmcpython3.11-tkinter-3.11.5-1.el9_3.i686.rpmpython3.11-test-3.11.5-1.el9_3.x86_64.rpmpython3.11-test-3.11.5-1.el9_3.i686.rpmpython3.11-idle-3.11.5-1.el9_3.i686.rpm?; \BBsecurityModerate: libreoffice security update t/ https://access.redhat.com/errata/RHSA-2023:6508RHSA-2023:6508RHSA-2023:6508 https://access.redhat.com/security/cve/CVE-2022-38745CVE-2022-38745CVE-2022-38745https://access.redhat.com/security/cve/CVE-2023-0950CVE-2023-0950CVE-2023-0950https://access.redhat.com/security/cve/CVE-2023-1183CVE-2023-1183CVE-2023-1183https://access.redhat.com/security/cve/CVE-2023-2255CVE-2023-2255CVE-2023-2255https://bugzilla.redhat.com/21820442182044https://bugzilla.redhat.com/22085062208506https://bugzilla.redhat.com/22101852210185https://bugzilla.redhat.com/22101862210186https://errata.almalinux.org/9/ALSA-2023-6508.htmlALSA-2023:6508ALSA-2023:6508 g libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpmh libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpmg libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpmh libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm< VBJBBBsecurityModerate: flatpak security, bug fix, and enhancement update #whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518 https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518 1flatpak-devel-1.12.8-1.el9.i686.rpm1flatpak-1.12.8-1.el9.i686.rpm1flatpak-session-helper-1.12.8-1.el9.i686.rpm1flatpak-devel-1.12.8-1.el9.x86_64.rpm1flatpak-devel-1.12.8-1.el9.i686.rpm1flatpak-1.12.8-1.el9.i686.rpm1flatpak-session-helper-1.12.8-1.el9.i686.rpm1flatpak-devel-1.12.8-1.el9.x86_64.rpmT= YBBKBBBBsecurityModerate: ghostscript security and bug fix update rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544 https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544 'ghostscript-tools-fonts-9.54.0-13.el9.i686.rpmflibgs-devel-9.54.0-13.el9.x86_64.rpm&ghostscript-9.54.0-13.el9.i686.rpm(ghostscript-tools-printing-9.54.0-13.el9.i686.rpmflibgs-devel-9.54.0-13.el9.i686.rpm'ghostscript-tools-fonts-9.54.0-13.el9.i686.rpmflibgs-devel-9.54.0-13.el9.x86_64.rpm&ghostscript-9.54.0-13.el9.i686.rpm(ghostscript-tools-printing-9.54.0-13.el9.i686.rpmflibgs-devel-9.54.0-13.el9.i686.rpm> kBsecurityModerate: yajl security update ,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551 https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551  Oyajl-devel-2.1.0-22.el9.i686.rpm Oyajl-devel-2.1.0-22.el9.x86_64.rpm Oyajl-devel-2.1.0-22.el9.i686.rpm Oyajl-devel-2.1.0-22.el9.x86_64.rpm? nBBsecurityModerate: libmicrohttpd security update 8~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566 https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566 libmicrohttpd-devel-0.9.72-5.el9.i686.rpmlibmicrohttpd-devel-0.9.72-5.el9.x86_64.rpmlibmicrohttpd-doc-0.9.72-5.el9.noarch.rpmlibmicrohttpd-devel-0.9.72-5.el9.i686.rpmlibmicrohttpd-devel-0.9.72-5.el9.x86_64.rpmlibmicrohttpd-doc-0.9.72-5.el9.noarch.rpmV@ rsecurityModerate: libtiff security update 6N https://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575 https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575 clibtiff-tools-4.4.0-10.el9.x86_64.rpmclibtiff-tools-4.4.0-10.el9.x86_64.rpm}A tBBBBsecurityModerate: protobuf-c security update }https://access.redhat.com/errata/RHSA-2023:6621RHSA-2023:6621RHSA-2023:6621 https://access.redhat.com/security/cve/CVE-2022-48468CVE-2022-48468CVE-2022-48468https://bugzilla.redhat.com/21866732186673https://errata.almalinux.org/9/ALSA-2023-6621.htmlALSA-2023:6621ALSA-2023:6621 Hprotobuf-c-devel-1.3.3-13.el9.i686.rpm Hprotobuf-c-compiler-1.3.3-13.el9.x86_64.rpmHprotobuf-c-devel-1.3.3-13.el9.x86_64.rpm Hprotobuf-c-compiler-1.3.3-13.el9.i686.rpmHprotobuf-c-devel-1.3.3-13.el9.i686.rpm Hprotobuf-c-compiler-1.3.3-13.el9.x86_64.rpmHprotobuf-c-devel-1.3.3-13.el9.x86_64.rpm Hprotobuf-c-compiler-1.3.3-13.el9.i686.rpm_B zBsecurityLow: glib2 security and bug fix update\ohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631 Qglib2-static-2.68.4-11.el9.x86_64.rpmQglib2-static-2.68.4-11.el9.i686.rpmQglib2-static-2.68.4-11.el9.x86_64.rpmQglib2-static-2.68.4-11.el9.i686.rpmC }BsecurityLow: shadow-utils security and bug fix update\pYhttps://access.redhat.com/errata/RHSA-2023:6632RHSA-2023:6632RHSA-2023:6632 https://access.redhat.com/security/cve/CVE-2023-4641CVE-2023-4641CVE-2023-4641https://bugzilla.redhat.com/22159452215945https://errata.almalinux.org/9/ALSA-2023-6632.htmlALSA-2023:6632ALSA-2023:6632 r]shadow-utils-subid-devel-4.9-8.el9.i686.rpmr]shadow-utils-subid-devel-4.9-8.el9.x86_64.rpmr]shadow-utils-subid-devel-4.9-8.el9.i686.rpmr]shadow-utils-subid-devel-4.9-8.el9.x86_64.rpmD "a}dBBBBBBBBBsecurityModerate: python3.9 security update I https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659 7python3-debug-3.9.18-1.el9_3.x86_64.rpm7python3-test-3.9.18-1.el9_3.i686.rpm7python3-test-3.9.18-1.el9_3.x86_64.rpm7python3-debug-3.9.18-1.el9_3.i686.rpmO7python3-3.9.18-1.el9_3.i686.rpm7python3-idle-3.9.18-1.el9_3.x86_64.rpm7python3-idle-3.9.18-1.el9_3.i686.rpmP7python3-tkinter-3.9.18-1.el9_3.i686.rpm7python3-debug-3.9.18-1.el9_3.x86_64.rpm7python3-test-3.9.18-1.el9_3.i686.rpm7python3-test-3.9.18-1.el9_3.x86_64.rpm7python3-debug-3.9.18-1.el9_3.i686.rpmO7python3-3.9.18-1.el9_3.i686.rpm7python3-idle-3.9.18-1.el9_3.x86_64.rpm7python3-idle-3.9.18-1.el9_3.i686.rpmP7python3-tkinter-3.9.18-1.el9_3.i686.rpmEE #KBBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update iK https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667  Mpython3-samba-test-4.18.6-100.el9.x86_64.rpmMlibnetapi-devel-4.18.6-100.el9.i686.rpmTMlibsmbclient-devel-4.18.6-100.el9.x86_64.rpmXMsamba-devel-4.18.6-100.el9.i686.rpmUMlibwbclient-devel-4.18.6-100.el9.i686.rpm)Msamba-pidl-4.18.6-100.el9.noarch.rpm"Mpython3-samba-devel-4.18.6-100.el9.i686.rpmjMsamba-test-libs-4.18.6-100.el9.x86_64.rpm"Mpython3-samba-devel-4.18.6-100.el9.x86_64.rpmiMsamba-test-4.18.6-100.el9.x86_64.rpmTMlibsmbclient-devel-4.18.6-100.el9.i686.rpmUMlibwbclient-devel-4.18.6-100.el9.x86_64.rpmXMsamba-devel-4.18.6-100.el9.x86_64.rpmMlibnetapi-devel-4.18.6-100.el9.x86_64.rpm Mpython3-samba-test-4.18.6-100.el9.x86_64.rpmMlibnetapi-devel-4.18.6-100.el9.i686.rpmTMlibsmbclient-devel-4.18.6-100.el9.x86_64.rpmXMsamba-devel-4.18.6-100.el9.i686.rpmUMlibwbclient-devel-4.18.6-100.el9.i686.rpm)Msamba-pidl-4.18.6-100.el9.noarch.rpm"Mpython3-samba-devel-4.18.6-100.el9.i686.rpmjMsamba-test-libs-4.18.6-100.el9.x86_64.rpm"Mpython3-samba-devel-4.18.6-100.el9.x86_64.rpmiMsamba-test-4.18.6-100.el9.x86_64.rpmTMlibsmbclient-devel-4.18.6-100.el9.i686.rpmUMlibwbclient-devel-4.18.6-100.el9.x86_64.rpmXMsamba-devel-4.18.6-100.el9.x86_64.rpmMlibnetapi-devel-4.18.6-100.el9.x86_64.rpm0F aBsecurityLow: tpm2-tss security and enhancement update\4Rhttps://access.redhat.com/errata/RHSA-2023:6685RHSA-2023:6685RHSA-2023:6685 https://access.redhat.com/security/cve/CVE-2023-22745CVE-2023-22745CVE-2023-22745https://bugzilla.redhat.com/21626102162610https://errata.almalinux.org/9/ALSA-2023-6685.htmlALSA-2023:6685ALSA-2023:6685 btpm2-tss-devel-3.2.2-2.el9.i686.rpmbtpm2-tss-devel-3.2.2-2.el9.x86_64.rpmbtpm2-tss-devel-3.2.2-2.el9.i686.rpmbtpm2-tss-devel-3.2.2-2.el9.x86_64.rpm G dBsecurityLow: procps-ng security and bug fix update\Hhttps://access.redhat.com/errata/RHSA-2023:6705RHSA-2023:6705RHSA-2023:6705 https://access.redhat.com/security/cve/CVE-2023-4016CVE-2023-4016CVE-2023-4016https://bugzilla.redhat.com/22284942228494https://errata.almalinux.org/9/ALSA-2023-6705.htmlALSA-2023:6705ALSA-2023:6705  fprocps-ng-devel-3.3.17-13.el9.x86_64.rpm fprocps-ng-devel-3.3.17-13.el9.i686.rpm fprocps-ng-devel-3.3.17-13.el9.x86_64.rpm fprocps-ng-devel-3.3.17-13.el9.i686.rpm#H $gBBBBBBBBBBBBBBBBsecurityModerate: avahi security update Nhttps://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 >Savahi-devel-0.8-15.el9.x86_64.rpmSavahi-devel-0.8-15.el9.i686.rpm=Savahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm?Savahi-glib-devel-0.8-15.el9.i686.rpm?Savahi-glib-devel-0.8-15.el9.x86_64.rpm:Savahi-compat-howl-0.8-15.el9.i686.rpm:Savahi-compat-howl-0.8-15.el9.x86_64.rpm=Savahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm >Savahi-devel-0.8-15.el9.x86_64.rpmSavahi-devel-0.8-15.el9.i686.rpm=Savahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm?Savahi-glib-devel-0.8-15.el9.i686.rpm?Savahi-glib-devel-0.8-15.el9.x86_64.rpm:Savahi-compat-howl-0.8-15.el9.i686.rpm:Savahi-compat-howl-0.8-15.el9.x86_64.rpm=Savahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpmI ;ysecurityModerate: python-wheel security update _?https://access.redhat.com/errata/RHSA-2023:6712RHSA-2023:6712RHSA-2023:6712 https://access.redhat.com/security/cve/CVE-2022-40898CVE-2022-40898CVE-2022-40898https://bugzilla.redhat.com/21658642165864https://errata.almalinux.org/9/ALSA-2023-6712.htmlALSA-2023:6712ALSA-2023:6712 &python3-wheel-wheel-0.36.2-8.el9.noarch.rpm%python3-wheel-0.36.2-8.el9.noarch.rpm&python3-wheel-wheel-0.36.2-8.el9.noarch.rpm%python3-wheel-0.36.2-8.el9.noarch.rpm&J (eBBVBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732 flibgs-devel-9.54.0-14.el9_3.i686.rpm(ghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm'ghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm&ghostscript-9.54.0-14.el9_3.i686.rpmflibgs-devel-9.54.0-14.el9_3.x86_64.rpmflibgs-devel-9.54.0-14.el9_3.i686.rpm(ghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm'ghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm&ghostscript-9.54.0-14.el9_3.i686.rpmflibgs-devel-9.54.0-14.el9_3.x86_64.rpmK )BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix update https://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738 {?java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmx?java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmw?java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmz?java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmu?java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm}?java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm|?java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmv?java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmy?java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm~?java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm{?java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmx?java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmw?java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmz?java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmu?java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm}?java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm|?java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm?java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmv?java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmy?java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm~?java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpmL *^BBBBBBBBBBBBBBBBBBBBsecurityModerate: samba security update 9Yhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744 TNlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmUNlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmNlibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm Npython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmiNsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmNlibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpmUNlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm)Nsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpmjNsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmXNsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm"Npython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm"Npython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmXNsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpmTNlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmTNlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpmUNlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmNlibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm Npython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmiNsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpmNlibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpmUNlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm)Nsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpmjNsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpmXNsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm"Npython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm"Npython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmXNsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpmTNlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpmM tBBBsecurityImportant: nghttp2 security update-https://access.redhat.com/errata/RHSA-2023:6746RHSA-2023:6746RHSA-2023:6746 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6746.htmlALSA-2023:6746ALSA-2023:6746 Wnghttp2-1.43.0-5.el9_3.1.x86_64.rpmWlibnghttp2-devel-1.43.0-5.el9_3.1.i686.rpmWlibnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpmWnghttp2-1.43.0-5.el9_3.1.x86_64.rpmWlibnghttp2-devel-1.43.0-5.el9_3.1.i686.rpmWlibnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpmlN +ysecurityModerate: dotnet8.0 security update ?https://access.redhat.com/errata/RHSA-2023:7253RHSA-2023:7253RHSA-2023:7253 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7253.htmlALSA-2023:7253ALSA-2023:7253  dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpmٍO ,{securityModerate: dotnet7.0 security update [1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255 [dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpmrP -}securityModerate: dotnet6.0 security update .https://access.redhat.com/errata/RHSA-2023:7257RHSA-2023:7257RHSA-2023:7257 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7257.htmlALSA-2023:7257ALSA-2023:7257 ~xdotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm~xdotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpmو9Q .BBBBBBBBBBsecurityImportant: postgresql security update: https://access.redhat.com/errata/RHSA-2023:7784RHSA-2023:7784RHSA-2023:7784 https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7784.htmlALSA-2023:7784ALSA-2023:7784 _postgresql-server-devel-13.13-1.el9_3.x86_64.rpm_postgresql-private-devel-13.13-1.el9_3.x86_64.rpm_postgresql-test-13.13-1.el9_3.x86_64.rpm_postgresql-docs-13.13-1.el9_3.x86_64.rpm_postgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm_postgresql-static-13.13-1.el9_3.x86_64.rpm_postgresql-server-devel-13.13-1.el9_3.x86_64.rpm_postgresql-private-devel-13.13-1.el9_3.x86_64.rpm_postgresql-test-13.13-1.el9_3.x86_64.rpm_postgresql-docs-13.13-1.el9_3.x86_64.rpm_postgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm_postgresql-static-13.13-1.el9_3.x86_64.rpmbR /KBsecurityImportant: gstreamer1-plugins-bad-free security update@https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791 https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791 e5gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpme5gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpme5gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpme5gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpmMS 0securityModerate: ipa security update ]4https://access.redhat.com/errata/RHSA-2024:0141RHSA-2024:0141RHSA-2024:0141 https://access.redhat.com/security/cve/CVE-2023-5455CVE-2023-5455CVE-2023-5455https://bugzilla.redhat.com/22428282242828https://errata.almalinux.org/9/ALSA-2024-0141.htmlALSA-2024:0141ALSA-2024:0141  python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm[T 1OsecurityImportant: .NET 7.0 security updateghttps://access.redhat.com/errata/RHSA-2024:0151RHSA-2024:0151RHSA-2024:0151 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0151.htmlALSA-2024:0151ALSA-2024:0151 [dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpmSU 2QsecurityImportant: .NET 8.0 security updatexfhttps://access.redhat.com/errata/RHSA-2024:0152RHSA-2024:0152RHSA-2024:0152 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0152.htmlALSA-2024:0152ALSA-2024:0152  dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpmV 3SsecurityImportant: .NET 6.0 security update^ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156 ~ydotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm~ydotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpmvW 4UBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateE! https://access.redhat.com/errata/RHSA-2024:0249RHSA-2024:0249RHSA-2024:0249 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0249.htmlALSA-2024:0249ALSA-2024:0249 }Ajava-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmwAjava-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm{Ajava-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmxAjava-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm~Ajava-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm|Ajava-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmzAjava-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmyAjava-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmvAjava-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmuAjava-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm}Ajava-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmwAjava-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm{Ajava-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmxAjava-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm~Ajava-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm|Ajava-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmzAjava-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmyAjava-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmvAjava-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmuAjava-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmAjava-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpmX 5qBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix updatef1https://access.redhat.com/errata/RHSA-2024:0265RHSA-2024:0265RHSA-2024:0265 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0265.htmlALSA-2024:0265ALSA-2024:0265 Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmZjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm Zjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpmY 6EBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updatephttps://access.redhat.com/errata/RHSA-2024:0266RHSA-2024:0266RHSA-2024:0266 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20926CVE-2024-20926CVE-2024-20926https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578502257850https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0266.htmlALSA-2024:0266ALSA-2024:0266 n,java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmm,java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmp,java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmg,java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmj,java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmi,java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmr,java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpml,java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmh,java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpms,java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmk,java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmo,java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmt,java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmq,java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmn,java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmm,java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmp,java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmg,java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmj,java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmi,java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmr,java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpml,java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmh,java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpms,java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmk,java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmo,java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmt,java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpmq,java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpmCZ 7aBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update*https://access.redhat.com/errata/RHSA-2024:0267RHSA-2024:0267RHSA-2024:0267 https://access.redhat.com/security/cve/CVE-2024-20918CVE-2024-20918CVE-2024-20918https://access.redhat.com/security/cve/CVE-2024-20919CVE-2024-20919CVE-2024-20919https://access.redhat.com/security/cve/CVE-2024-20921CVE-2024-20921CVE-2024-20921https://access.redhat.com/security/cve/CVE-2024-20932CVE-2024-20932CVE-2024-20932https://access.redhat.com/security/cve/CVE-2024-20945CVE-2024-20945CVE-2024-20945https://access.redhat.com/security/cve/CVE-2024-20952CVE-2024-20952CVE-2024-20952https://bugzilla.redhat.com/22577202257720https://bugzilla.redhat.com/22577282257728https://bugzilla.redhat.com/22578372257837https://bugzilla.redhat.com/22578532257853https://bugzilla.redhat.com/22578592257859https://bugzilla.redhat.com/22578742257874https://errata.almalinux.org/9/ALSA-2024-0267.htmlALSA-2024:0267ALSA-2024:0267 m0java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmk0java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmg0java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpml0java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms0java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmq0java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmi0java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp0java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmj0java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmt0java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr0java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmn0java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmo0java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmh0java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmm0java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmk0java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmg0java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpml0java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpms0java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmq0java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmi0java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmp0java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmj0java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmt0java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmr0java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmn0java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpmo0java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpmh0java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm3[ 9xj]BBBBBBBBBsecurityModerate: python3.9 security update 1chttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466 8python3-idle-3.9.18-1.el9_3.1.i686.rpmP8python3-tkinter-3.9.18-1.el9_3.1.i686.rpm8python3-idle-3.9.18-1.el9_3.1.x86_64.rpm8python3-debug-3.9.18-1.el9_3.1.i686.rpm8python3-debug-3.9.18-1.el9_3.1.x86_64.rpm8python3-test-3.9.18-1.el9_3.1.i686.rpmO8python3-3.9.18-1.el9_3.1.i686.rpm8python3-test-3.9.18-1.el9_3.1.x86_64.rpm8python3-idle-3.9.18-1.el9_3.1.i686.rpmP8python3-tkinter-3.9.18-1.el9_3.1.i686.rpm8python3-idle-3.9.18-1.el9_3.1.x86_64.rpm8python3-debug-3.9.18-1.el9_3.1.i686.rpm8python3-debug-3.9.18-1.el9_3.1.x86_64.rpm8python3-test-3.9.18-1.el9_3.1.i686.rpmO8python3-3.9.18-1.el9_3.1.i686.rpm8python3-test-3.9.18-1.el9_3.1.x86_64.rpmˤ\ :HsecurityImportant: dotnet7.0 security updatexhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805 [dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm@] ;JsecurityImportant: dotnet6.0 security update xhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807 ~zdotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm~zdotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm2^ ZBsecurityImportant: unbound security update[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977 Y1unbound-devel-1.16.2-3.el9_3.1.i686.rpmY1unbound-devel-1.16.2-3.el9_3.1.x86_64.rpmY1unbound-devel-1.16.2-3.el9_3.1.i686.rpmY1unbound-devel-1.16.2-3.el9_3.1.x86_64.rpma ?]BBBBsecurityModerate: kernel security update _https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274 libperf-5.14.0-503.15.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpmlibperf-5.14.0-503.15.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpmnb @BcBsecurityImportant: edk2 security update~6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075 https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075 ledk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm%ledk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpmQledk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpmPledk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmledk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm%ledk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpmQledk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpmPledk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmOc fBBBBBBBBBBBsecurityImportant: postgresql security update4`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791 Kpostgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpmKpostgresql-docs-13.18-1.el9_5.x86_64.rpmKpostgresql-private-devel-13.18-1.el9_5.x86_64.rpmCKpostgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpmKpostgresql-static-13.18-1.el9_5.x86_64.rpmKpostgresql-test-13.18-1.el9_5.x86_64.rpmKpostgresql-server-devel-13.18-1.el9_5.x86_64.rpmKpostgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpmKpostgresql-docs-13.18-1.el9_5.x86_64.rpmKpostgresql-private-devel-13.18-1.el9_5.x86_64.rpmCKpostgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpmKpostgresql-static-13.18-1.el9_5.x86_64.rpmKpostgresql-test-13.18-1.el9_5.x86_64.rpmKpostgresql-server-devel-13.18-1.el9_5.x86_64.rpmyd 3securityImportant: ruby security update%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858  ruby-doc-3.0.7-163.el9_5.noarch.rpm ruby-doc-3.0.7-163.el9_5.noarch.rpm e tBBBBsecurityModerate: kernel security update 9Ahttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939 kernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpmlibperf-5.14.0-503.16.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpmlibperf-5.14.0-503.16.1.el9_5.x86_64.rpm(f FBtBBBBBBBBBsecurityImportant: python3.12 security updatez-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978 https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978 #-python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm%-python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm$-python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm-python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm$-python3.12-idle-3.12.5-2.el9_5.2.i686.rpm#-python3.12-debug-3.12.5-2.el9_5.2.i686.rpm%-python3.12-test-3.12.5-2.el9_5.2.i686.rpm-python3.12-3.12.5-2.el9_5.2.i686.rpm#-python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm%-python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm$-python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm-python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm$-python3.12-idle-3.12.5-2.el9_5.2.i686.rpm#-python3.12-debug-3.12.5-2.el9_5.2.i686.rpm%-python3.12-test-3.12.5-2.el9_5.2.i686.rpm-python3.12-3.12.5-2.el9_5.2.i686.rpmg IZdBBBBBBBBBsecurityModerate: python3.9:3.9.21 security update 'https://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983 P?python3-tkinter-3.9.21-1.el9_5.i686.rpm?python3-test-3.9.21-1.el9_5.x86_64.rpm?python3-debug-3.9.21-1.el9_5.x86_64.rpm?python3-idle-3.9.21-1.el9_5.i686.rpmO?python3-3.9.21-1.el9_5.i686.rpm?python3-idle-3.9.21-1.el9_5.x86_64.rpm?python3-test-3.9.21-1.el9_5.i686.rpm?python3-debug-3.9.21-1.el9_5.i686.rpmP?python3-tkinter-3.9.21-1.el9_5.i686.rpm?python3-test-3.9.21-1.el9_5.x86_64.rpm?python3-debug-3.9.21-1.el9_5.x86_64.rpm?python3-idle-3.9.21-1.el9_5.i686.rpmO?python3-3.9.21-1.el9_5.i686.rpm?python3-idle-3.9.21-1.el9_5.x86_64.rpm?python3-test-3.9.21-1.el9_5.i686.rpm?python3-debug-3.9.21-1.el9_5.i686.rpmIh KBEBBBBBBBBBsecurityModerate: python3.11 security update EMhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111 https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111 "python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm"python3.11-debug-3.11.9-7.el9_5.2.i686.rpm"python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm"python3.11-test-3.11.9-7.el9_5.2.i686.rpm"python3.11-test-3.11.9-7.el9_5.2.x86_64.rpmc"python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmb"python3.11-3.11.9-7.el9_5.2.i686.rpm"python3.11-idle-3.11.9-7.el9_5.2.i686.rpm"python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm"python3.11-debug-3.11.9-7.el9_5.2.i686.rpm"python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm"python3.11-test-3.11.9-7.el9_5.2.i686.rpm"python3.11-test-3.11.9-7.el9_5.2.x86_64.rpmc"python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpmb"python3.11-3.11.9-7.el9_5.2.i686.rpm"python3.11-idle-3.11.9-7.el9_5.2.i686.rpm}i NBMBsecurityModerate: edk2:20240524 security update Bhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219 https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219 Qoedk2-tools-doc-20240524-6.el9_5.3.noarch.rpm%oedk2-ovmf-20240524-6.el9_5.3.noarch.rpmPoedk2-aarch64-20240524-6.el9_5.3.noarch.rpmoedk2-tools-20240524-6.el9_5.3.x86_64.rpmQoedk2-tools-doc-20240524-6.el9_5.3.noarch.rpm%oedk2-ovmf-20240524-6.el9_5.3.noarch.rpmPoedk2-aarch64-20240524-6.el9_5.3.noarch.rpmoedk2-tools-20240524-6.el9_5.3.x86_64.rpmVj !^BsecurityModerate: unbound:1.16.2 security update T https://access.redhat.com/errata/RHSA-2024:11232RHSA-2024:11232RHSA-2024:11232 https://access.redhat.com/security/cve/CVE-2024-8508CVE-2024-8508CVE-2024-8508https://bugzilla.redhat.com/23163212316321https://errata.almalinux.org/9/ALSA-2024-11232.htmlALSA-2024:11232ALSA-2024:11232 Y3unbound-devel-1.16.2-8.el9_5.1.i686.rpmY3unbound-devel-1.16.2-8.el9_5.1.x86_64.rpmY3unbound-devel-1.16.2-8.el9_5.1.i686.rpmY3unbound-devel-1.16.2-8.el9_5.1.x86_64.rpm~k %bBsecurityModerate: libsndfile:1.0.31 security update _+https://access.redhat.com/errata/RHSA-2024:11237RHSA-2024:11237RHSA-2024:11237 https://access.redhat.com/security/cve/CVE-2024-50612CVE-2024-50612CVE-2024-50612https://bugzilla.redhat.com/23220572322057https://errata.almalinux.org/9/ALSA-2024-11237.htmlALSA-2024:11237ALSA-2024:11237 l-libsndfile-devel-1.0.31-8.el9_5.2.i686.rpml-libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpml-libsndfile-devel-1.0.31-8.el9_5.2.i686.rpml-libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm:l fBsecurityModerate: mpg123:1.32.9 security update qhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242 https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242  =mpg123-devel-1.32.9-1.el9_5.i686.rpm =mpg123-devel-1.32.9-1.el9_5.x86_64.rpm =mpg123-devel-1.32.9-1.el9_5.i686.rpm =mpg123-devel-1.32.9-1.el9_5.x86_64.rpmm iBBBBsecurityModerate: mysql security update {thttps://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141 https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141 0Emysql-test-8.0.36-1.el9_3.x86_64.rpm/Emysql-devel-8.0.36-1.el9_3.x86_64.rpmREmysql-libs-8.0.36-1.el9_3.x86_64.rpm0Emysql-test-8.0.36-1.el9_3.x86_64.rpm/Emysql-devel-8.0.36-1.el9_3.x86_64.rpmREmysql-libs-8.0.36-1.el9_3.x86_64.rpmyn oBBBBsecurityModerate: kernel security update oc$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486 libperf-5.14.0-503.19.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpmlibperf-5.14.0-503.19.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpmao #uBsecurityModerate: opencryptoki security update RWhttps://access.redhat.com/errata/RHSA-2024:1239RHSA-2024:1239RHSA-2024:1239 https://access.redhat.com/security/cve/CVE-2024-0914CVE-2024-0914CVE-2024-0914https://bugzilla.redhat.com/22604072260407https://errata.almalinux.org/9/ALSA-2024-1239.htmlALSA-2024:1239ALSA-2024:1239 ndopencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpmndopencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpmndopencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpmndopencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpmDp xsecurityModerate: .NET 7.0 security update )Fhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309 [dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm[dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm˥sq zsecurityModerate: .NET 8.0 security update oEhttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310  dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpmer |BBsecurityImportant: libreoffice security update4https://access.redhat.com/errata/RHSA-2024:1427RHSA-2024:1427RHSA-2024:1427 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-1427.htmlALSA-2024:1427ALSA-2024:1427 glibreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpmglibreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpmzs @BsecurityImportant: varnish security updateGthttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691 https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691 $qvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpm$qvarnish-devel-6.6.2-4.el9_3.1.i686.rpm$qvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpm$qvarnish-devel-6.6.2-4.el9_3.1.i686.rpm=t CBsecurityImportant: unbound security update;6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750 https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750 Y2unbound-devel-1.16.2-3.el9_3.5.x86_64.rpmY2unbound-devel-1.16.2-3.el9_3.5.i686.rpmY2unbound-devel-1.16.2-3.el9_3.5.x86_64.rpmY2unbound-devel-1.16.2-3.el9_3.5.i686.rpmFu YnBBBsecurityImportant: bind security updateqGhttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789 QYbind-devel-9.16.23-14.el9_3.4.x86_64.rpmYbind-doc-9.16.23-14.el9_3.4.noarch.rpmQYbind-devel-9.16.23-14.el9_3.4.i686.rpmdYbind-libs-9.16.23-14.el9_3.4.i686.rpmQYbind-devel-9.16.23-14.el9_3.4.x86_64.rpmYbind-doc-9.16.23-14.el9_3.4.noarch.rpmQYbind-devel-9.16.23-14.el9_3.4.i686.rpmdYbind-libs-9.16.23-14.el9_3.4.i686.rpmv KBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update 8 https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818  [java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm  [java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm [java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm[java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpmhw _BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security update Wn https://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822 p-java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmi-java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmj-java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmk-java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmt-java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmg-java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmq-java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmr-java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpml-java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmm-java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpms-java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmo-java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmh-java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmn-java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmp-java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmi-java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmj-java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmk-java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmt-java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmg-java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmq-java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmr-java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpml-java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmm-java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpms-java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmo-java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmh-java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpmn-java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpmQx {BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update E$ https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825 i1java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpms1java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmg1java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpml1java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmq1java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmr1java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo1java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmj1java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmk1java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmn1java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmt1java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmp1java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmm1java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmh1java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmi1java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpms1java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmg1java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpml1java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmq1java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmr1java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmo1java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmj1java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmk1java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmn1java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpmt1java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmp1java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmm1java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpmh1java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm(y WBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update iHhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828 }Bjava-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmzBjava-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmyBjava-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmwBjava-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmxBjava-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmvBjava-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm{Bjava-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmuBjava-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm~Bjava-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm|Bjava-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm}Bjava-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmzBjava-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmyBjava-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmwBjava-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmxBjava-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmvBjava-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm{Bjava-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmBjava-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmuBjava-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm~Bjava-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm|Bjava-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpmVz sBsecurityLow: LibRaw security update\1https://access.redhat.com/errata/RHSA-2024:2137RHSA-2024:2137RHSA-2024:2137 https://access.redhat.com/security/cve/CVE-2023-1729CVE-2023-1729CVE-2023-1729https://bugzilla.redhat.com/21882402188240https://errata.almalinux.org/9/ALSA-2024-2137.htmlALSA-2024:2137ALSA-2024:2137 9%LibRaw-devel-0.21.1-1.el9.i686.rpm9%LibRaw-devel-0.21.1-1.el9.x86_64.rpm9%LibRaw-devel-0.21.1-1.el9.i686.rpm9%LibRaw-devel-0.21.1-1.el9.x86_64.rpmI{ 6securityModerate: ipa security update Iuhttps://access.redhat.com/errata/RHSA-2024:2147RHSA-2024:2147RHSA-2024:2147 https://access.redhat.com/security/cve/CVE-2024-1481CVE-2024-1481CVE-2024-1481https://bugzilla.redhat.com/22621692262169https://errata.almalinux.org/9/ALSA-2024-2147.htmlALSA-2024:2147ALSA-2024:2147  python3-ipatests-4.11.0-9.el9_4.noarch.rpm python3-ipatests-4.11.0-9.el9_4.noarch.rpm | !wBBsecurityModerate: xorg-x11-server security update >https://access.redhat.com/errata/RHSA-2024:2169RHSA-2024:2169RHSA-2024:2169 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22447362244736https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2169.htmlALSA-2024:2169ALSA-2024:2169 Zyxorg-x11-server-source-1.20.11-24.el9.noarch.rpmdyxorg-x11-server-devel-1.20.11-24.el9.x86_64.rpmdyxorg-x11-server-devel-1.20.11-24.el9.i686.rpmZyxorg-x11-server-source-1.20.11-24.el9.noarch.rpmdyxorg-x11-server-devel-1.20.11-24.el9.x86_64.rpmdyxorg-x11-server-devel-1.20.11-24.el9.i686.rpm$} "{BsecurityModerate: libsndfile security update >&https://access.redhat.com/errata/RHSA-2024:2184RHSA-2024:2184RHSA-2024:2184 https://access.redhat.com/security/cve/CVE-2022-33065CVE-2022-33065CVE-2022-33065https://bugzilla.redhat.com/22389342238934https://errata.almalinux.org/9/ALSA-2024-2184.htmlALSA-2024:2184ALSA-2024:2184 l,libsndfile-devel-1.0.31-8.el9.i686.rpml,libsndfile-devel-1.0.31-8.el9.x86_64.rpml,libsndfile-devel-1.0.31-8.el9.i686.rpml,libsndfile-devel-1.0.31-8.el9.x86_64.rpmS~ #~BsecurityImportant: pmix security updated:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199 https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199  cpmix-pmi-devel-3.2.3-5.el9.i686.rpm cpmix-pmi-devel-3.2.3-5.el9.x86_64.rpm cpmix-pmi-devel-3.2.3-5.el9.i686.rpm cpmix-pmi-devel-3.2.3-5.el9.x86_64.rpmW $ABBBBBsecurityModerate: libnbd security update <https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204 https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204 k5libnbd-devel-1.18.1-3.el9.x86_64.rpmF5ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpmk5libnbd-devel-1.18.1-3.el9.i686.rpmE5ocaml-libnbd-1.18.1-3.el9.x86_64.rpmk5libnbd-devel-1.18.1-3.el9.x86_64.rpmF5ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpmk5libnbd-devel-1.18.1-3.el9.i686.rpmE5ocaml-libnbd-1.18.1-3.el9.x86_64.rpmL %HBBBBsecurityModerate: freerdp security update Zihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208 https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208 Olibwinpr-devel-2.11.2-1.el9.i686.rpmOlibwinpr-devel-2.11.2-1.el9.x86_64.rpmOfreerdp-devel-2.11.2-1.el9.x86_64.rpmOfreerdp-devel-2.11.2-1.el9.i686.rpmOlibwinpr-devel-2.11.2-1.el9.i686.rpmOlibwinpr-devel-2.11.2-1.el9.x86_64.rpmOfreerdp-devel-2.11.2-1.el9.x86_64.rpmOfreerdp-devel-2.11.2-1.el9.i686.rpm &NBBBBsecurityModerate: libvirt security update Chttps://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236 https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236 -tlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm.tlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpmJtlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm-tlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm.tlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpmJtlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpmi 'TBBsecurityImportant: edk2 security updateYjhttps://access.redhat.com/errata/RHSA-2024:2264RHSA-2024:2264RHSA-2024:2264 https://access.redhat.com/security/cve/CVE-2022-36763CVE-2022-36763CVE-2022-36763https://access.redhat.com/security/cve/CVE-2022-36764CVE-2022-36764CVE-2022-36764https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-45229CVE-2023-45229CVE-2023-45229https://access.redhat.com/security/cve/CVE-2023-45231CVE-2023-45231CVE-2023-45231https://access.redhat.com/security/cve/CVE-2023-45232CVE-2023-45232CVE-2023-45232https://access.redhat.com/security/cve/CVE-2023-45233CVE-2023-45233CVE-2023-45233https://access.redhat.com/security/cve/CVE-2023-45235CVE-2023-45235CVE-2023-45235https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22575822257582https://bugzilla.redhat.com/22575832257583https://bugzilla.redhat.com/22586772258677https://bugzilla.redhat.com/22586882258688https://bugzilla.redhat.com/22586912258691https://bugzilla.redhat.com/22586942258694https://bugzilla.redhat.com/22587002258700https://errata.almalinux.org/9/ALSA-2024-2264.htmlALSA-2024:2264ALSA-2024:2264 Pedk2-aarch64-20231122-6.el9.noarch.rpmedk2-tools-20231122-6.el9.x86_64.rpmQedk2-tools-doc-20231122-6.el9.noarch.rpmPedk2-aarch64-20231122-6.el9.noarch.rpmedk2-tools-20231122-6.el9.x86_64.rpmQedk2-tools-doc-20231122-6.el9.noarch.rpmh (XBsecurityModerate: qt5-qtbase security update Cshttps://access.redhat.com/errata/RHSA-2024:2276RHSA-2024:2276RHSA-2024:2276 https://access.redhat.com/security/cve/CVE-2023-51714CVE-2023-51714CVE-2023-51714https://access.redhat.com/security/cve/CVE-2024-25580CVE-2024-25580CVE-2024-25580https://bugzilla.redhat.com/22558562255856https://bugzilla.redhat.com/22644232264423https://errata.almalinux.org/9/ALSA-2024-2276.htmlALSA-2024:2276ALSA-2024:2276 #kqt5-qtbase-static-5.15.9-9.el9.i686.rpm#kqt5-qtbase-static-5.15.9-9.el9.x86_64.rpm#kqt5-qtbase-static-5.15.9-9.el9.i686.rpm#kqt5-qtbase-static-5.15.9-9.el9.x86_64.rpme )[BsecurityModerate: gstreamer1-plugins-bad-free security update 6P https://access.redhat.com/errata/RHSA-2024:2287RHSA-2024:2287RHSA-2024:2287 https://access.redhat.com/security/cve/CVE-2023-40474CVE-2023-40474CVE-2023-40474https://access.redhat.com/security/cve/CVE-2023-40475CVE-2023-40475CVE-2023-40475https://access.redhat.com/security/cve/CVE-2023-40476CVE-2023-40476CVE-2023-40476https://access.redhat.com/security/cve/CVE-2023-50186CVE-2023-50186CVE-2023-50186https://bugzilla.redhat.com/22545872254587https://bugzilla.redhat.com/22545882254588https://bugzilla.redhat.com/22545892254589https://bugzilla.redhat.com/22556392255639https://errata.almalinux.org/9/ALSA-2024-2287.htmlALSA-2024:2287ALSA-2024:2287 e6gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpme6gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpme6gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpme6gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpmk *^securityModerate: libtiff security update : https://access.redhat.com/errata/RHSA-2024:2289RHSA-2024:2289RHSA-2024:2289 https://access.redhat.com/security/cve/CVE-2022-40090CVE-2022-40090CVE-2022-40090https://access.redhat.com/security/cve/CVE-2023-3618CVE-2023-3618CVE-2023-3618https://access.redhat.com/security/cve/CVE-2023-40745CVE-2023-40745CVE-2023-40745https://access.redhat.com/security/cve/CVE-2023-41175CVE-2023-41175CVE-2023-41175https://access.redhat.com/security/cve/CVE-2023-6228CVE-2023-6228CVE-2023-6228https://bugzilla.redhat.com/22158652215865https://bugzilla.redhat.com/22349702234970https://bugzilla.redhat.com/22352642235264https://bugzilla.redhat.com/22352652235265https://bugzilla.redhat.com/22409952240995https://errata.almalinux.org/9/ALSA-2024-2289.htmlALSA-2024:2289ALSA-2024:2289 dlibtiff-tools-4.4.0-12.el9.x86_64.rpmdlibtiff-tools-4.4.0-12.el9.x86_64.rpm -kBuBBBBBBBBBsecurityModerate: python3.11 security update @rhttps://access.redhat.com/errata/RHSA-2024:2292RHSA-2024:2292RHSA-2024:2292 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-2292.htmlALSA-2024:2292ALSA-2024:2292 python3.11-test-3.11.7-1.el9.i686.rpmbpython3.11-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.i686.rpmpython3.11-test-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.i686.rpmcpython3.11-tkinter-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.x86_64.rpmpython3.11-test-3.11.7-1.el9.i686.rpmbpython3.11-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.i686.rpmpython3.11-test-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.i686.rpmcpython3.11-tkinter-3.11.7-1.el9.i686.rpmpython3.11-idle-3.11.7-1.el9.x86_64.rpmpython3.11-debug-3.11.7-1.el9.x86_64.rpm9 .kBBBBsecurityModerate: libjpeg-turbo security update 2Rhttps://access.redhat.com/errata/RHSA-2024:2295RHSA-2024:2295RHSA-2024:2295 https://access.redhat.com/security/cve/CVE-2021-29390CVE-2021-29390CVE-2021-29390https://bugzilla.redhat.com/22355212235521https://errata.almalinux.org/9/ALSA-2024-2295.htmlALSA-2024:2295ALSA-2024:2295 tKturbojpeg-devel-2.0.90-7.el9.x86_64.rpmsKturbojpeg-2.0.90-7.el9.i686.rpmtKturbojpeg-devel-2.0.90-7.el9.i686.rpmsKturbojpeg-2.0.90-7.el9.x86_64.rpmtKturbojpeg-devel-2.0.90-7.el9.x86_64.rpmsKturbojpeg-2.0.90-7.el9.i686.rpmtKturbojpeg-devel-2.0.90-7.el9.i686.rpmsKturbojpeg-2.0.90-7.el9.x86_64.rpm /qBBsecurityModerate: mingw components security update Bhttps://access.redhat.com/errata/RHSA-2024:2353RHSA-2024:2353RHSA-2024:2353 https://access.redhat.com/security/cve/CVE-2023-1579CVE-2023-1579CVE-2023-1579https://bugzilla.redhat.com/21809052180905https://errata.almalinux.org/9/ALSA-2024-2353.htmlALSA-2024:2353ALSA-2024:2353 jmingw64-binutils-2.41-3.el9.x86_64.rpmemingw32-binutils-2.41-3.el9.x86_64.rpmjmingw64-binutils-2.41-3.el9.x86_64.rpmemingw32-binutils-2.41-3.el9.x86_64.rpm/  0uBsecurityModerate: zziplib security update Fhttps://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377 https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377 u"zziplib-devel-0.13.71-11.el9_4.x86_64.rpmu"zziplib-devel-0.13.71-11.el9_4.i686.rpmu"zziplib-devel-0.13.71-11.el9_4.x86_64.rpmu"zziplib-devel-0.13.71-11.el9_4.i686.rpm/  1xBBBBsecurityImportant: kernel security, bug fix, and enhancement updateT%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394 https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671libperf-5.14.0-427.13.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpmlibperf-5.14.0-427.13.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm  2~BBBBBBBBBBBBBBBBsecurityModerate: avahi security update yO https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433 >Tavahi-devel-0.8-20.el9.i686.rpm?Tavahi-glib-devel-0.8-20.el9.x86_64.rpmTavahi-devel-0.8-20.el9.x86_64.rpmTavahi-devel-0.8-20.el9.i686.rpm?Tavahi-glib-devel-0.8-20.el9.x86_64.rpmTavahi-devel-0.8-20.el9.x86_64.rpm >NBBBBsecurityModerate: kernel security and bug fix update ,bhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619 libperf-5.14.0-427.20.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpmlibperf-5.14.0-427.20.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpmF ?securityImportant: ipa security updatewhttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754 https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754  python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpmѧm UBBsecurityImportant: libreoffice security updateXhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835 glibreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmglibreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm YsecurityImportant: 389-ds-base security update]mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837 https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837 {X389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm{X389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm securityModerate: ruby security update JXhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838  ruby-doc-3.0.7-162.el9_4.noarch.rpm ruby-doc-3.0.7-162.el9_4.noarch.rpm CBYBBBsecurityImportant: flatpak security update"|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959 https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959 2flatpak-1.12.9-1.el9_4.i686.rpm2flatpak-devel-1.12.9-1.el9_4.x86_64.rpm2flatpak-session-helper-1.12.9-1.el9_4.i686.rpm2flatpak-devel-1.12.9-1.el9_4.i686.rpm2flatpak-1.12.9-1.el9_4.i686.rpm2flatpak-devel-1.12.9-1.el9_4.x86_64.rpm2flatpak-session-helper-1.12.9-1.el9_4.i686.rpm2flatpak-devel-1.12.9-1.el9_4.i686.rpm@ FBBZBBBBsecurityImportant: ghostscript security updateqhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999 https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999 &ghostscript-9.54.0-16.el9_4.i686.rpmflibgs-devel-9.54.0-16.el9_4.i686.rpm'ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpmflibgs-devel-9.54.0-16.el9_4.x86_64.rpm(ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm&ghostscript-9.54.0-16.el9_4.i686.rpmflibgs-devel-9.54.0-16.el9_4.i686.rpm'ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpmflibgs-devel-9.54.0-16.el9_4.x86_64.rpm(ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpmЧ  JB]BBBBBBBBBsecurityImportant: python3.11 security update0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077 python3.11-test-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpmpython3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmbpython3.11-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.i686.rpmpython3.11-test-3.11.7-1.el9_4.1.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.1.i686.rpmpython3.11-idle-3.11.7-1.el9_4.1.x86_64.rpmbpython3.11-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.i686.rpmpython3.11-debug-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.1.i686.rpmI! MYNBBBBBBBBBsecurityImportant: python3.9 security update?https://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078 9python3-idle-3.9.18-3.el9_4.1.i686.rpm9python3-test-3.9.18-3.el9_4.1.x86_64.rpmP9python3-tkinter-3.9.18-3.el9_4.1.i686.rpm9python3-test-3.9.18-3.el9_4.1.i686.rpm9python3-debug-3.9.18-3.el9_4.1.x86_64.rpmO9python3-3.9.18-3.el9_4.1.i686.rpm9python3-idle-3.9.18-3.el9_4.1.x86_64.rpm9python3-debug-3.9.18-3.el9_4.1.i686.rpm9python3-idle-3.9.18-3.el9_4.1.i686.rpm9python3-test-3.9.18-3.el9_4.1.x86_64.rpmP9python3-tkinter-3.9.18-3.el9_4.1.i686.rpm9python3-test-3.9.18-3.el9_4.1.i686.rpm9python3-debug-3.9.18-3.el9_4.1.x86_64.rpmO9python3-3.9.18-3.el9_4.1.i686.rpm9python3-idle-3.9.18-3.el9_4.1.x86_64.rpm9python3-debug-3.9.18-3.el9_4.1.i686.rpm#" }BBBBsecurityModerate: kernel security and bug fix update Thttps://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 kernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpmlibperf-5.14.0-427.24.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpmlibperf-5.14.0-427.24.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpmr# CsecurityModerate: dotnet6.0 security update bJhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439 https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439 ~{dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm~{dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpmI$ EsecurityImportant: dotnet8.0 security update,&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450 https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450 dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm % GBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateRPhttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563 \java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm\java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm \java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm+& [BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update"Ohttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567 l.java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmn.java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmi.java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmm.java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmk.java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmg.java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmt.java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmq.java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmr.java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmo.java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmp.java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmh.java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmj.java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpms.java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpml.java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmn.java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmi.java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmm.java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmk.java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmg.java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmt.java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmq.java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmr.java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmo.java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmp.java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmh.java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpmj.java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpms.java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpmw' wBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updateqi https://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568 h2java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmq2java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmj2java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmp2java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmo2java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn2java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmr2java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmg2java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmk2java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmt2java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmi2java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpms2java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpml2java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmm2java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmh2java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmq2java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmj2java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmp2java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmo2java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn2java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmr2java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmg2java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmk2java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmt2java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmi2java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpms2java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpml2java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpmm2java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpmn( SBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updateZi https://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573 yCjava-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm{Cjava-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmzCjava-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmuCjava-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm~Cjava-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm}Cjava-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmwCjava-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm|Cjava-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmvCjava-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmxCjava-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmyCjava-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm{Cjava-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmzCjava-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmuCjava-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm~Cjava-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm}Cjava-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmwCjava-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm|Cjava-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmvCjava-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmCjava-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpmxCjava-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm) oBBBBsecurityImportant: kernel security updateC$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583 kernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpmlibperf-5.14.0-427.26.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpmlibperf-5.14.0-427.26.1.el9_4.x86_64.rpm* uBsecurityImportant: qt5-qtbase security update]@https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623 https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623 #hqt5-qtbase-static-5.15.9-10.el9_4.i686.rpm#hqt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm#hqt5-qtbase-static-5.15.9-10.el9_4.i686.rpm#hqt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm+ XB`BsecurityModerate: edk2 security update Lhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749 https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749 %medk2-ovmf-20231122-6.el9_4.2.noarch.rpmPmedk2-aarch64-20231122-6.el9_4.2.noarch.rpmQmedk2-tools-doc-20231122-6.el9_4.2.noarch.rpmmedk2-tools-20231122-6.el9_4.2.x86_64.rpm%medk2-ovmf-20231122-6.el9_4.2.noarch.rpmPmedk2-aarch64-20231122-6.el9_4.2.noarch.rpmQmedk2-tools-doc-20231122-6.el9_4.2.noarch.rpmmedk2-tools-20231122-6.el9_4.2.x86_64.rpmK, {BBsecurityModerate: libreoffice security update ihttps://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755 https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755 hlibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%- BsecurityModerate: libuv security update whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756 https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756 Flibuv-devel-1.42.0-2.el9_4.x86_64.rpmFlibuv-devel-1.42.0-2.el9_4.i686.rpmFlibuv-devel-1.42.0-2.el9_4.x86_64.rpmFlibuv-devel-1.42.0-2.el9_4.i686.rpm5. BBBBBsecurityModerate: libvirt security update w\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757 https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757 -slibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpmJslibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.slibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm-slibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpmJslibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.slibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm/ ^BjBBBBBBBBBsecurityLow: python3 security update\S,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766 python3.11-debug-3.11.7-1.el9_4.3.i686.rpmpython3.11-test-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-test-3.11.7-1.el9_4.3.i686.rpmpython3.11-idle-3.11.7-1.el9_4.3.i686.rpmpython3.11-debug-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.3.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.3.i686.rpmbpython3.11-3.11.7-1.el9_4.3.i686.rpmpython3.11-debug-3.11.7-1.el9_4.3.i686.rpmpython3.11-test-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-test-3.11.7-1.el9_4.3.i686.rpmpython3.11-idle-3.11.7-1.el9_4.3.i686.rpmpython3.11-debug-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.3.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.3.i686.rpmbpython3.11-3.11.7-1.el9_4.3.i686.rpm0 "aFnBBBBBBBBBsecurityLow: python3 security update\,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 :python3-debug-3.9.18-3.el9_4.3.i686.rpm:python3-idle-3.9.18-3.el9_4.3.i686.rpm:python3-debug-3.9.18-3.el9_4.3.x86_64.rpm:python3-test-3.9.18-3.el9_4.3.i686.rpmO:python3-3.9.18-3.el9_4.3.i686.rpmP:python3-tkinter-3.9.18-3.el9_4.3.i686.rpm:python3-test-3.9.18-3.el9_4.3.x86_64.rpm:python3-idle-3.9.18-3.el9_4.3.x86_64.rpm:python3-debug-3.9.18-3.el9_4.3.i686.rpm:python3-idle-3.9.18-3.el9_4.3.i686.rpm:python3-debug-3.9.18-3.el9_4.3.x86_64.rpm:python3-test-3.9.18-3.el9_4.3.i686.rpmO:python3-3.9.18-3.el9_4.3.i686.rpmP:python3-tkinter-3.9.18-3.el9_4.3.i686.rpm:python3-test-3.9.18-3.el9_4.3.x86_64.rpm:python3-idle-3.9.18-3.el9_4.3.x86_64.rpm1 #^BBBBsecurityModerate: kernel security update +1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928 libperf-5.14.0-427.28.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpmlibperf-5.14.0-427.28.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpmG2 $dBBBBBBBBBBsecurityImportant: freeradius security update\Ghttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935 cfreeradius-rest-3.0.21-40.el9_4.x86_64.rpmcfreeradius-mysql-3.0.21-40.el9_4.x86_64.rpm cfreeradius-sqlite-3.0.21-40.el9_4.x86_64.rpmcfreeradius-perl-3.0.21-40.el9_4.x86_64.rpm!cfreeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpmcfreeradius-postgresql-3.0.21-40.el9_4.x86_64.rpmcfreeradius-rest-3.0.21-40.el9_4.x86_64.rpmcfreeradius-mysql-3.0.21-40.el9_4.x86_64.rpm cfreeradius-sqlite-3.0.21-40.el9_4.x86_64.rpmcfreeradius-perl-3.0.21-40.el9_4.x86_64.rpm!cfreeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpmcfreeradius-postgresql-3.0.21-40.el9_4.x86_64.rpmʚN3 %psecurityModerate: 389-ds-base security update #jhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192 https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192 {Y389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm{Y389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm24 'fMBBBsecurityImportant: bind and bind-dyndb-ldap security update "https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231 https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231 Q[bind-devel-9.16.23-18.el9_4.6.i686.rpmQ[bind-devel-9.16.23-18.el9_4.6.x86_64.rpmd[bind-libs-9.16.23-18.el9_4.6.i686.rpm[bind-doc-9.16.23-18.el9_4.6.noarch.rpmQ[bind-devel-9.16.23-18.el9_4.6.i686.rpmQ[bind-devel-9.16.23-18.el9_4.6.x86_64.rpmd[bind-libs-9.16.23-18.el9_4.6.i686.rpm[bind-doc-9.16.23-18.el9_4.6.noarch.rpmn5 (wsecurityModerate: .NET 8.0 security update /}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334 https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334 dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpmR6 )yBBBBsecurityImportant: kernel security update,4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363 libperf-5.14.0-427.31.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpmlibperf-5.14.0-427.31.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpms7 *?securityImportant: python3.12-setuptools security update`https://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533 Jpython3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpmJpython3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm_8 +@BBsecurityModerate: libreoffice security update w{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583 https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583 hlibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhlibreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmW9 ,DBBBBsecurityImportant: kernel security updaterThttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928 kernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpmlibperf-5.14.0-427.33.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpmkernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpmlibperf-5.14.0-427.33.1.el9_4.x86_64.rpmkernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm : -JBBBBBBBBBBsecurityImportant: postgresql security update https://access.redhat.com/errata/RHSA-2024:5999RHSA-2024:5999RHSA-2024:5999 https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5999.htmlALSA-2024:5999ALSA-2024:5999 apostgresql-server-devel-13.16-1.el9_4.x86_64.rpmapostgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpmapostgresql-test-13.16-1.el9_4.x86_64.rpmapostgresql-private-devel-13.16-1.el9_4.x86_64.rpmapostgresql-docs-13.16-1.el9_4.x86_64.rpmapostgresql-static-13.16-1.el9_4.x86_64.rpmapostgresql-server-devel-13.16-1.el9_4.x86_64.rpmapostgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpmapostgresql-test-13.16-1.el9_4.x86_64.rpmapostgresql-private-devel-13.16-1.el9_4.x86_64.rpmapostgresql-docs-13.16-1.el9_4.x86_64.rpmapostgresql-static-13.16-1.el9_4.x86_64.rpmy; 0nBhBBBBBBBBBsecurityModerate: python3.12 security update https://access.redhat.com/errata/RHSA-2024:6146RHSA-2024:6146RHSA-2024:6146 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6146.htmlALSA-2024:6146ALSA-2024:6146 %$python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm#$python3.12-debug-3.12.1-4.el9_4.3.i686.rpm%$python3.12-test-3.12.1-4.el9_4.3.i686.rpm$python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm$$python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm$$python3.12-idle-3.12.1-4.el9_4.3.i686.rpm$python3.12-3.12.1-4.el9_4.3.i686.rpm#$python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm%$python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm#$python3.12-debug-3.12.1-4.el9_4.3.i686.rpm%$python3.12-test-3.12.1-4.el9_4.3.i686.rpm$python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm$$python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm$$python3.12-idle-3.12.1-4.el9_4.3.i686.rpm$python3.12-3.12.1-4.el9_4.3.i686.rpm#$python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm'< 2qw{BBBBBBBBBsecurityModerate: python3.9 security update +hhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163 P;python3-tkinter-3.9.18-3.el9_4.5.i686.rpmO;python3-3.9.18-3.el9_4.5.i686.rpm;python3-idle-3.9.18-3.el9_4.5.x86_64.rpm;python3-test-3.9.18-3.el9_4.5.i686.rpm;python3-test-3.9.18-3.el9_4.5.x86_64.rpm;python3-debug-3.9.18-3.el9_4.5.x86_64.rpm;python3-idle-3.9.18-3.el9_4.5.i686.rpm;python3-debug-3.9.18-3.el9_4.5.i686.rpmP;python3-tkinter-3.9.18-3.el9_4.5.i686.rpmO;python3-3.9.18-3.el9_4.5.i686.rpm;python3-idle-3.9.18-3.el9_4.5.x86_64.rpm;python3-test-3.9.18-3.el9_4.5.i686.rpm;python3-test-3.9.18-3.el9_4.5.x86_64.rpm;python3-debug-3.9.18-3.el9_4.5.x86_64.rpm;python3-idle-3.9.18-3.el9_4.5.i686.rpm;python3-debug-3.9.18-3.el9_4.5.i686.rpm= 5sByBBBBBBBBBsecurityModerate: python3.11 security update hhttps://access.redhat.com/errata/RHSA-2024:6179RHSA-2024:6179RHSA-2024:6179 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6179.htmlALSA-2024:6179ALSA-2024:6179 python3.11-debug-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.i686.rpmbpython3.11-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.i686.rpmpython3.11-debug-3.11.7-1.el9_4.5.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.5.i686.rpmpython3.11-debug-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.5.i686.rpmbpython3.11-3.11.7-1.el9_4.5.i686.rpmpython3.11-test-3.11.7-1.el9_4.5.i686.rpmpython3.11-debug-3.11.7-1.el9_4.5.x86_64.rpmcpython3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm8> 9vBB@BBBBsecurityModerate: ghostscript security update {Mhttps://access.redhat.com/errata/RHSA-2024:6197RHSA-2024:6197RHSA-2024:6197 https://access.redhat.com/security/cve/CVE-2024-29510CVE-2024-29510CVE-2024-29510https://access.redhat.com/security/cve/CVE-2024-33869CVE-2024-33869CVE-2024-33869https://access.redhat.com/security/cve/CVE-2024-33870CVE-2024-33870CVE-2024-33870https://bugzilla.redhat.com/22939502293950https://bugzilla.redhat.com/22939582293958https://bugzilla.redhat.com/22939592293959https://errata.almalinux.org/9/ALSA-2024-6197.htmlALSA-2024:6197ALSA-2024:6197 flibgs-devel-9.54.0-17.el9_4.x86_64.rpm(ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpmflibgs-devel-9.54.0-17.el9_4.i686.rpm'ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm&ghostscript-9.54.0-17.el9_4.i686.rpmflibgs-devel-9.54.0-17.el9_4.x86_64.rpm(ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpmflibgs-devel-9.54.0-17.el9_4.i686.rpm'ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm&ghostscript-9.54.0-17.el9_4.i686.rpm/? q https://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124 i3java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmm3java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmp3java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq3java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmg3java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr3java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo3java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn3java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpml3java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmk3java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmh3java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt3java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmj3java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms3java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmi3java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmm3java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmp3java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmq3java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmg3java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmr3java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmo3java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmn3java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpml3java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmk3java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmh3java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmt3java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmj3java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpms3java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpmnL rBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update / https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127 {Djava-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmwDjava-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm|Djava-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm~Djava-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmxDjava-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm}Djava-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmuDjava-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmzDjava-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmyDjava-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmvDjava-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm{Djava-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmwDjava-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm|Djava-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm~Djava-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmxDjava-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm}Djava-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmuDjava-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmzDjava-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmyDjava-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmvDjava-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpmDjava-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm_M NBBBBsecurityModerate: kernel security update E<https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162  kernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm kernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm libperf-5.14.0-427.40.1.el9_4.x86_64.rpm kernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm kernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm libperf-5.14.0-427.40.1.el9_4.x86_64.rpm{N LBHBBBBBBBBBsecurityModerate: python3.11 security update Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374 cpython3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmbpython3.11-3.11.7-1.el9_4.6.i686.rpmpython3.11-debug-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-debug-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.i686.rpmcpython3.11-tkinter-3.11.7-1.el9_4.6.i686.rpmbpython3.11-3.11.7-1.el9_4.6.i686.rpmpython3.11-debug-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-debug-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-idle-3.11.7-1.el9_4.6.i686.rpmpython3.11-test-3.11.7-1.el9_4.6.i686.rpmwO OZxBBBBBBBBBsecurityModerate: python3.9 security update U\https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 <python3-test-3.9.18-3.el9_4.6.x86_64.rpm<python3-idle-3.9.18-3.el9_4.6.x86_64.rpm<python3-idle-3.9.18-3.el9_4.6.i686.rpm<python3-test-3.9.18-3.el9_4.6.i686.rpm<python3-debug-3.9.18-3.el9_4.6.x86_64.rpmP<python3-tkinter-3.9.18-3.el9_4.6.i686.rpmO<python3-3.9.18-3.el9_4.6.i686.rpm<python3-debug-3.9.18-3.el9_4.6.i686.rpm<python3-test-3.9.18-3.el9_4.6.x86_64.rpm<python3-idle-3.9.18-3.el9_4.6.x86_64.rpm<python3-idle-3.9.18-3.el9_4.6.i686.rpm<python3-test-3.9.18-3.el9_4.6.i686.rpm<python3-debug-3.9.18-3.el9_4.6.x86_64.rpmP<python3-tkinter-3.9.18-3.el9_4.6.i686.rpmO<python3-3.9.18-3.el9_4.6.i686.rpm<python3-debug-3.9.18-3.el9_4.6.i686.rpmP QBYBBBBBBBBBsecurityModerate: python3.12 security update 1 https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447 %%python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm%%python3.12-test-3.12.1-4.el9_4.4.i686.rpm$%python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm#%python3.12-debug-3.12.1-4.el9_4.4.i686.rpm%python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm$%python3.12-idle-3.12.1-4.el9_4.4.i686.rpm%python3.12-3.12.1-4.el9_4.4.i686.rpm#%python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm%%python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm%%python3.12-test-3.12.1-4.el9_4.4.i686.rpm$%python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm#%python3.12-debug-3.12.1-4.el9_4.4.i686.rpm%python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm$%python3.12-idle-3.12.1-4.el9_4.4.i686.rpm%python3.12-3.12.1-4.el9_4.4.i686.rpm#%python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm Q uBBBBsecurityModerate: kernel security update >>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617  libperf-5.14.0-427.42.1.el9_4.x86_64.rpm kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm libperf-5.14.0-427.42.1.el9_4.x86_64.rpm kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm<R {BsecurityImportant: openexr security update|:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800 B_openexr-devel-3.1.1-2.el9_4.1.x86_64.rpmB_openexr-devel-3.1.1-2.el9_4.1.i686.rpmB_openexr-devel-3.1.1-2.el9_4.1.x86_64.rpmB_openexr-devel-3.1.1-2.el9_4.1.i686.rpmS ~securityModerate: libtiff security update 6 https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914 https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914 elibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpmelibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpmT WBiBsecurityModerate: edk2 security update AEhttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935 https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935 Pnedk2-aarch64-20231122-6.el9_4.4.noarch.rpmnedk2-tools-20231122-6.el9_4.4.x86_64.rpmQnedk2-tools-doc-20231122-6.el9_4.4.noarch.rpm%nedk2-ovmf-20231122-6.el9_4.4.noarch.rpmPnedk2-aarch64-20231122-6.el9_4.4.noarch.rpmnedk2-tools-20231122-6.el9_4.4.x86_64.rpmQnedk2-tools-doc-20231122-6.el9_4.4.noarch.rpm%nedk2-ovmf-20231122-6.el9_4.4.noarch.rpmwU CBBsecurityModerate: edk2 security update = https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088 https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088 Pedk2-aarch64-20240524-6.el9_5.noarch.rpmedk2-tools-20240524-6.el9_5.x86_64.rpmQedk2-tools-doc-20240524-6.el9_5.noarch.rpmPedk2-aarch64-20240524-6.el9_5.noarch.rpmedk2-tools-20240524-6.el9_5.x86_64.rpmQedk2-tools-doc-20240524-6.el9_5.noarch.rpm6V [mBBsecurityModerate: xorg-x11-server-Xwayland security update C:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093 S\xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpmf\xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpmf\xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpmS\xorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpmf\xorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpmf\xorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm]W KBBsecurityModerate: xorg-x11-server security update })https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122 Zzxorg-x11-server-source-1.20.11-26.el9.noarch.rpmdzxorg-x11-server-devel-1.20.11-26.el9.x86_64.rpmdzxorg-x11-server-devel-1.20.11-26.el9.i686.rpmZzxorg-x11-server-source-1.20.11-26.el9.noarch.rpmdzxorg-x11-server-devel-1.20.11-26.el9.x86_64.rpmdzxorg-x11-server-devel-1.20.11-26.el9.i686.rpm X OBBBBsecurityModerate: libvirt security update &|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128 https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128 .ulibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpmJulibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm-ulibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm.ulibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpmJulibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm-ulibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm`Y UBBBBBBBBBBBsecurityModerate: poppler security update "+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167 https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167  poppler-glib-devel-21.01.0-21.el9.i686.rpm poppler-glib-devel-21.01.0-21.el9.x86_64.rpmpoppler-cpp-devel-21.01.0-21.el9.x86_64.rpm!poppler-qt5-devel-21.01.0-21.el9.x86_64.rpmpoppler-devel-21.01.0-21.el9.x86_64.rpmHpoppler-glib-doc-21.01.0-21.el9.noarch.rpm!poppler-qt5-devel-21.01.0-21.el9.i686.rpmpoppler-cpp-devel-21.01.0-21.el9.i686.rpmpoppler-devel-21.01.0-21.el9.i686.rpm  poppler-glib-devel-21.01.0-21.el9.i686.rpm poppler-glib-devel-21.01.0-21.el9.x86_64.rpmpoppler-cpp-devel-21.01.0-21.el9.x86_64.rpm!poppler-qt5-devel-21.01.0-21.el9.x86_64.rpmpoppler-devel-21.01.0-21.el9.x86_64.rpmHpoppler-glib-doc-21.01.0-21.el9.noarch.rpm!poppler-qt5-devel-21.01.0-21.el9.i686.rpmpoppler-cpp-devel-21.01.0-21.el9.i686.rpmpoppler-devel-21.01.0-21.el9.i686.rpmVZ bBsecurityModerate: jose security update MRhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181 https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181 Elibjose-devel-14-1.el9.x86_64.rpmElibjose-devel-14-1.el9.i686.rpmElibjose-devel-14-1.el9.x86_64.rpmElibjose-devel-14-1.el9.i686.rpm@[ !esecurityModerate: gtk3 security update +https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184 https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184 8bgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm8bgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm0\ "gBsecurityLow: bcc security update\Jvhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187 https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187 !'bcc-devel-0.30.0-6.el9.x86_64.rpm'bcc-doc-0.30.0-6.el9.noarch.rpm!'bcc-devel-0.30.0-6.el9.x86_64.rpm'bcc-doc-0.30.0-6.el9.noarch.rpmT] %cBGBBBBBBBBBsecurityModerate: python3.12 security update @Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190 %+python3.12-test-3.12.5-2.el9.i686.rpm#+python3.12-debug-3.12.5-2.el9.i686.rpm$+python3.12-idle-3.12.5-2.el9.x86_64.rpm+python3.12-tkinter-3.12.5-2.el9.i686.rpm+python3.12-3.12.5-2.el9.i686.rpm%+python3.12-test-3.12.5-2.el9.x86_64.rpm#+python3.12-debug-3.12.5-2.el9.x86_64.rpm$+python3.12-idle-3.12.5-2.el9.i686.rpm%+python3.12-test-3.12.5-2.el9.i686.rpm#+python3.12-debug-3.12.5-2.el9.i686.rpm$+python3.12-idle-3.12.5-2.el9.x86_64.rpm+python3.12-tkinter-3.12.5-2.el9.i686.rpm+python3.12-3.12.5-2.el9.i686.rpm%+python3.12-test-3.12.5-2.el9.x86_64.rpm#+python3.12-debug-3.12.5-2.el9.x86_64.rpm$+python3.12-idle-3.12.5-2.el9.i686.rpm>^ (fBOBBBBBBBBBsecurityModerate: python3.11 security update Rhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192  python3.11-test-3.11.9-7.el9.i686.rpmb python3.11-3.11.9-7.el9.i686.rpm python3.11-idle-3.11.9-7.el9.x86_64.rpm python3.11-debug-3.11.9-7.el9.i686.rpmc python3.11-tkinter-3.11.9-7.el9.i686.rpm python3.11-debug-3.11.9-7.el9.x86_64.rpm python3.11-test-3.11.9-7.el9.x86_64.rpm python3.11-idle-3.11.9-7.el9.i686.rpm python3.11-test-3.11.9-7.el9.i686.rpmb python3.11-3.11.9-7.el9.i686.rpm python3.11-idle-3.11.9-7.el9.x86_64.rpm python3.11-debug-3.11.9-7.el9.i686.rpmc python3.11-tkinter-3.11.9-7.el9.i686.rpm python3.11-debug-3.11.9-7.el9.x86_64.rpm python3.11-test-3.11.9-7.el9.x86_64.rpm python3.11-idle-3.11.9-7.el9.i686.rpmf_ )@BsecurityLow: NetworkManager security update\Xjhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 dGNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpmdGNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpmdGNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpmdGNetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpmF` +j@[BBBBBBBBBsecurityModerate: python3.9 security update Bkhttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371 https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371 P=python3-tkinter-3.9.19-8.el9.i686.rpm=python3-idle-3.9.19-8.el9.x86_64.rpm=python3-idle-3.9.19-8.el9.i686.rpm=python3-debug-3.9.19-8.el9.x86_64.rpm=python3-debug-3.9.19-8.el9.i686.rpm=python3-test-3.9.19-8.el9.x86_64.rpmO=python3-3.9.19-8.el9.i686.rpm=python3-test-3.9.19-8.el9.i686.rpmP=python3-tkinter-3.9.19-8.el9.i686.rpm=python3-idle-3.9.19-8.el9.x86_64.rpm=python3-idle-3.9.19-8.el9.i686.rpm=python3-debug-3.9.19-8.el9.x86_64.rpm=python3-debug-3.9.19-8.el9.i686.rpm=python3-test-3.9.19-8.el9.x86_64.rpmO=python3-3.9.19-8.el9.i686.rpm=python3-test-3.9.19-8.el9.i686.rpm7a ,NBsecurityModerate: bluez security update -+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413 https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413 wnbluez-libs-devel-5.72-2.el9.i686.rpmwnbluez-libs-devel-5.72-2.el9.x86_64.rpmwnbluez-libs-devel-5.72-2.el9.i686.rpmwnbluez-libs-devel-5.72-2.el9.x86_64.rpmJb QBsecurityModerate: fontforge security update Xehttps://access.redhat.com/errata/RHSA-2024:9439RHSA-2024:9439RHSA-2024:9439 https://access.redhat.com/security/cve/CVE-2024-25081CVE-2024-25081CVE-2024-25081https://access.redhat.com/security/cve/CVE-2024-25082CVE-2024-25082CVE-2024-25082https://bugzilla.redhat.com/22661802266180https://bugzilla.redhat.com/22661812266181https://errata.almalinux.org/9/ALSA-2024-9439.htmlALSA-2024:9439ALSA-2024:9439 @Yfontforge-20201107-6.el9.i686.rpm@Yfontforge-20201107-6.el9.x86_64.rpm@Yfontforge-20201107-6.el9.i686.rpm@Yfontforge-20201107-6.el9.x86_64.rpmLc UBBsecurityModerate: mingw-glib2 security update =(https://access.redhat.com/errata/RHSA-2024:9442RHSA-2024:9442RHSA-2024:9442 https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-9442.htmlALSA-2024:9442ALSA-2024:9442 Qymingw64-glib2-static-2.78.6-1.el9.noarch.rpmNymingw32-glib2-2.78.6-1.el9.noarch.rpmOymingw32-glib2-static-2.78.6-1.el9.noarch.rpmPymingw64-glib2-2.78.6-1.el9.noarch.rpmQymingw64-glib2-static-2.78.6-1.el9.noarch.rpmNymingw32-glib2-2.78.6-1.el9.noarch.rpmOymingw32-glib2-static-2.78.6-1.el9.noarch.rpmPymingw64-glib2-2.78.6-1.el9.noarch.rpm3d /mBmBBBsecurityImportant: bubblewrap and flatpak security updateeRhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449 4flatpak-1.12.9-3.el9_5.i686.rpm4flatpak-devel-1.12.9-3.el9_5.x86_64.rpm4flatpak-devel-1.12.9-3.el9_5.i686.rpm4flatpak-session-helper-1.12.9-3.el9_5.i686.rpm4flatpak-1.12.9-3.el9_5.i686.rpm4flatpak-devel-1.12.9-3.el9_5.x86_64.rpm4flatpak-devel-1.12.9-3.el9_5.i686.rpm4flatpak-session-helper-1.12.9-3.el9_5.i686.rpm4e 2pBoBBBBBBBBBsecurityModerate: python3.11 security update 7\https://access.redhat.com/errata/RHSA-2024:9450RHSA-2024:9450RHSA-2024:9450 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9450.htmlALSA-2024:9450ALSA-2024:9450 !python3.11-test-3.11.9-7.el9_5.1.i686.rpm!python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm!python3.11-idle-3.11.9-7.el9_5.1.i686.rpm!python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm!python3.11-test-3.11.9-7.el9_5.1.x86_64.rpmc!python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm!python3.11-debug-3.11.9-7.el9_5.1.i686.rpmb!python3.11-3.11.9-7.el9_5.1.i686.rpm!python3.11-test-3.11.9-7.el9_5.1.i686.rpm!python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm!python3.11-idle-3.11.9-7.el9_5.1.i686.rpm!python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm!python3.11-test-3.11.9-7.el9_5.1.x86_64.rpmc!python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm!python3.11-debug-3.11.9-7.el9_5.1.i686.rpmb!python3.11-3.11.9-7.el9_5.1.i686.rpmyf 5sBwBBBBBBBBBsecurityModerate: python3.12 security update  https://access.redhat.com/errata/RHSA-2024:9451RHSA-2024:9451RHSA-2024:9451 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9451.htmlALSA-2024:9451ALSA-2024:9451 %,python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm,python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm#,python3.12-debug-3.12.5-2.el9_5.1.i686.rpm$,python3.12-idle-3.12.5-2.el9_5.1.i686.rpm#,python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm%,python3.12-test-3.12.5-2.el9_5.1.i686.rpm$,python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm,python3.12-3.12.5-2.el9_5.1.i686.rpm%,python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm,python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm#,python3.12-debug-3.12.5-2.el9_5.1.i686.rpm$,python3.12-idle-3.12.5-2.el9_5.1.i686.rpm#,python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm%,python3.12-test-3.12.5-2.el9_5.1.i686.rpm$,python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm,python3.12-3.12.5-2.el9_5.1.i686.rpm|g 7vuLBBBBBBBBBsecurityModerate: python3.9 security update \https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468 >python3-test-3.9.19-8.el9_5.1.x86_64.rpm>python3-idle-3.9.19-8.el9_5.1.x86_64.rpm>python3-debug-3.9.19-8.el9_5.1.x86_64.rpm>python3-test-3.9.19-8.el9_5.1.i686.rpmP>python3-tkinter-3.9.19-8.el9_5.1.i686.rpmO>python3-3.9.19-8.el9_5.1.i686.rpm>python3-debug-3.9.19-8.el9_5.1.i686.rpm>python3-idle-3.9.19-8.el9_5.1.i686.rpm>python3-test-3.9.19-8.el9_5.1.x86_64.rpm>python3-idle-3.9.19-8.el9_5.1.x86_64.rpm>python3-debug-3.9.19-8.el9_5.1.x86_64.rpm>python3-test-3.9.19-8.el9_5.1.i686.rpmP>python3-tkinter-3.9.19-8.el9_5.1.i686.rpmO>python3-3.9.19-8.el9_5.1.i686.rpm>python3-debug-3.9.19-8.el9_5.1.i686.rpm>python3-idle-3.9.19-8.el9_5.1.i686.rpmh 8@securityImportant: .NET 9.0 security update|fhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543 https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543 edotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpmedotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpmOi 9BBsecurityImportant: openexr security updateb:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548 B`openexr-devel-3.1.1-2.el9_5.1.x86_64.rpmB`openexr-devel-3.1.1-2.el9_5.1.i686.rpmB`openexr-devel-3.1.1-2.el9_5.1.x86_64.rpmB`openexr-devel-3.1.1-2.el9_5.1.i686.rpmXj :EBBBBsecurityModerate: kernel security update 'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605  kernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm kernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm libperf-5.14.0-503.14.1.el9_5.x86_64.rpm kernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm kernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm libperf-5.14.0-503.14.1.el9_5.x86_64.rpm:k ;KBsecurityModerate: libvpx security update C>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827 https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827 Clibvpx-devel-1.9.0-8.el9_5.i686.rpmClibvpx-devel-1.9.0-8.el9_5.x86_64.rpmClibvpx-devel-1.9.0-8.el9_5.i686.rpmClibvpx-devel-1.9.0-8.el9_5.x86_64.rpmZl securityModerate: ipa security update Kahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334 https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334  python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm python3-ipatests-4.12.2-1.el9_5.3.noarch.rpmvo ?XBsecurityModerate: Security and bug fixes for NetworkManager ,Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 dHNetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpmdHNetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpmdHNetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpmdHNetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm p [BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5 xfhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422 r4java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmi4java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp4java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmh4java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo4java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn4java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmk4java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmj4java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmm4java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmg4java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt4java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms4java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq4java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpml4java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmr4java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmi4java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmp4java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmh4java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmo4java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmn4java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmk4java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmj4java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmm4java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmg4java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmt4java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpms4java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmq4java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpml4java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpmQq wBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5 ^https://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426 Ejava-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm{Ejava-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmzEjava-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm|Ejava-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmuEjava-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmwEjava-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmvEjava-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmxEjava-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmyEjava-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm~Ejava-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm}Ejava-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm{Ejava-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmzEjava-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm|Ejava-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmuEjava-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmwEjava-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmvEjava-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmxEjava-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmEjava-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmyEjava-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm~Ejava-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm}Ejava-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpmɲ%r SBBBBsecurityModerate: kernel security update aEhttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578 kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpmlibperf-5.14.0-503.22.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpmlibperf-5.14.0-503.22.1.el9_5.x86_64.rpmՕs YBBBBsecurityModerate: galera and mariadb security update &4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914 https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914 M}mariadb-test-10.5.27-1.el9_5.x86_64.rpmL}mariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpmK}mariadb-devel-10.5.27-1.el9_5.x86_64.rpmM}mariadb-test-10.5.27-1.el9_5.x86_64.rpmL}mariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpmK}mariadb-devel-10.5.27-1.el9_5.x86_64.rpm6t #_BBsecurityModerate: mingw-glib2 security update Zhttps://access.redhat.com/errata/RHSA-2025:0936RHSA-2025:0936RHSA-2025:0936 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://bugzilla.redhat.com/23253402325340https://errata.almalinux.org/9/ALSA-2025-0936.htmlALSA-2025:0936ALSA-2025:0936 Nzmingw32-glib2-2.78.6-2.el9.noarch.rpmOzmingw32-glib2-static-2.78.6-2.el9.noarch.rpmQzmingw64-glib2-static-2.78.6-2.el9.noarch.rpmPzmingw64-glib2-2.78.6-2.el9.noarch.rpmNzmingw32-glib2-2.78.6-2.el9.noarch.rpmOzmingw32-glib2-static-2.78.6-2.el9.noarch.rpmQzmingw64-glib2-static-2.78.6-2.el9.noarch.rpmPzmingw64-glib2-2.78.6-2.el9.noarch.rpmu DhzBBBBBBBBBsecurityImportant: python3.9 security updateog https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 Apython3-test-3.9.21-2.el9_6.1.i686.rpmApython3-test-3.9.21-2.el9_6.1.x86_64.rpmApython3-idle-3.9.21-2.el9_6.1.i686.rpmOApython3-3.9.21-2.el9_6.1.i686.rpmApython3-debug-3.9.21-2.el9_6.1.x86_64.rpmApython3-debug-3.9.21-2.el9_6.1.i686.rpmPApython3-tkinter-3.9.21-2.el9_6.1.i686.rpmApython3-idle-3.9.21-2.el9_6.1.x86_64.rpmApython3-test-3.9.21-2.el9_6.1.i686.rpmApython3-test-3.9.21-2.el9_6.1.x86_64.rpmApython3-idle-3.9.21-2.el9_6.1.i686.rpmOApython3-3.9.21-2.el9_6.1.i686.rpmApython3-debug-3.9.21-2.el9_6.1.x86_64.rpmApython3-debug-3.9.21-2.el9_6.1.i686.rpmPApython3-tkinter-3.9.21-2.el9_6.1.i686.rpmApython3-idle-3.9.21-2.el9_6.1.x86_64.rpmÓDv FBiBBBBBBBBBsecurityImportant: python3.11 security updateVg https://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148 python3.11-debug-3.11.11-2.el9_6.1.i686.rpmcpython3.11-tkinter-3.11.11-2.el9_6.1.i686.rpmpython3.11-test-3.11.11-2.el9_6.1.i686.rpmpython3.11-test-3.11.11-2.el9_6.1.x86_64.rpmpython3.11-debug-3.11.11-2.el9_6.1.x86_64.rpmpython3.11-idle-3.11.11-2.el9_6.1.i686.rpmbpython3.11-3.11.11-2.el9_6.1.i686.rpmpython3.11-idle-3.11.11-2.el9_6.1.x86_64.rpmpython3.11-debug-3.11.11-2.el9_6.1.i686.rpmcpython3.11-tkinter-3.11.11-2.el9_6.1.i686.rpmpython3.11-test-3.11.11-2.el9_6.1.i686.rpmpython3.11-test-3.11.11-2.el9_6.1.x86_64.rpmpython3.11-debug-3.11.11-2.el9_6.1.x86_64.rpmpython3.11-idle-3.11.11-2.el9_6.1.i686.rpmbpython3.11-3.11.11-2.el9_6.1.i686.rpmpython3.11-idle-3.11.11-2.el9_6.1.x86_64.rpmÔow IBqBBBBBBBBBsecurityImportant: python3.12 security update=g https://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189 %0python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm#0python3.12-debug-3.12.9-1.el9_6.1.i686.rpm0python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm%0python3.12-test-3.12.9-1.el9_6.1.i686.rpm$0python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm0python3.12-3.12.9-1.el9_6.1.i686.rpm$0python3.12-idle-3.12.9-1.el9_6.1.i686.rpm#0python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm%0python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm#0python3.12-debug-3.12.9-1.el9_6.1.i686.rpm0python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm%0python3.12-test-3.12.9-1.el9_6.1.i686.rpm$0python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm0python3.12-3.12.9-1.el9_6.1.i686.rpm$0python3.12-idle-3.12.9-1.el9_6.1.i686.rpm#0python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpmÔdx EBBBBsecurityImportant: kernel security update$] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379 kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpmlibperf-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpmlibperf-5.14.0-570.25.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpmÿ}y ,KBsecurityModerate: jq security update  https://access.redhat.com/errata/RHSA-2025:10585RHSA-2025:10585RHSA-2025:10585 https://access.redhat.com/security/cve/CVE-2024-23337CVE-2024-23337CVE-2024-23337https://access.redhat.com/security/cve/CVE-2025-48060CVE-2025-48060CVE-2025-48060https://bugzilla.redhat.com/23678072367807https://bugzilla.redhat.com/23678422367842https://errata.almalinux.org/9/ALSA-2025-10585.htmlALSA-2025:10585ALSA-2025:10585 {@jq-devel-1.6-17.el9_6.2.i686.rpm{@jq-devel-1.6-17.el9_6.2.x86_64.rpm{@jq-devel-1.6-17.el9_6.2.i686.rpm{@jq-devel-1.6-17.el9_6.2.x86_64.rpmþDz NBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837  kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm libperf-5.14.0-570.26.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm libperf-5.14.0-570.26.1.el9_6.x86_64.rpmQ{ TBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862  _java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm  _java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm _java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm_java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm+| hBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867 h6java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmo6java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpml6java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms6java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmg6java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn6java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr6java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmm6java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmk6java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq6java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmi6java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmj6java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp6java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt6java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmh6java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmo6java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpml6java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpms6java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmg6java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmn6java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmr6java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmm6java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmk6java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmq6java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmi6java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmj6java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmp6java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpmt6java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm޿k} DBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update qhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873 zGjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm{Gjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmxGjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmyGjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm|Gjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmuGjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm}Gjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmwGjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmvGjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm~Gjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmzGjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm{Gjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmxGjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmyGjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm|Gjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmuGjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm}Gjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmwGjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmvGjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmGjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm~Gjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpmĨp~ `BsecurityModerate: glib2 security update ~https://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140 Sglib2-static-2.68.4-16.el9_6.2.x86_64.rpmSglib2-static-2.68.4-16.el9_6.2.i686.rpmSglib2-static-2.68.4-16.el9_6.2.x86_64.rpmSglib2-static-2.68.4-16.el9_6.2.i686.rpm޽/ cBBBBsecurityImportant: kernel security updateVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411 !kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm!libperf-5.14.0-570.28.1.el9_6.x86_64.rpm!kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm!kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm!libperf-5.14.0-570.28.1.el9_6.x86_64.rpm!kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpmĂ* iBsecurityImportant: unbound security updateXhhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849 https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849 Y.unbound-devel-1.16.2-19.el9_6.1.x86_64.rpmY.unbound-devel-1.16.2-19.el9_6.1.i686.rpmY.unbound-devel-1.16.2-19.el9_6.1.x86_64.rpmY.unbound-devel-1.16.2-19.el9_6.1.i686.rpmĞ] lBBBBsecurityModerate: kernel security update @https://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861 "libperf-5.14.0-570.30.1.el9_6.x86_64.rpm"kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm"kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm"libperf-5.14.0-570.30.1.el9_6.x86_64.rpm"kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm"kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpmį rBBBBsecurityImportant: kernel security updateNhttps://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262 https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262 kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpmlibperf-5.14.0-503.23.2.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpmlibperf-5.14.0-503.23.2.el9_5.x86_64.rpmu xBBBBsecurityImportant: kernel security updatekohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746 https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746 #libperf-5.14.0-570.32.1.el9_6.x86_64.rpm#kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm#kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm#libperf-5.14.0-570.32.1.el9_6.x86_64.rpm#kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm#kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpmҙi >securityModerate: python3.12-setuptools security update ZJhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834 Jpython3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpmJpython3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpms BBBBsecurityModerate: doxygen security update $ehttps://access.redhat.com/errata/RHSA-2025:1329RHSA-2025:1329RHSA-2025:1329 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1329.htmlALSA-2025:1329ALSA-2025:1329 -vdoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm,vdoxygen-1.9.1-12.el9_5.x86_64.rpm.vdoxygen-latex-1.9.1-12.el9_5.x86_64.rpm-vdoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm,vdoxygen-1.9.1-12.el9_5.x86_64.rpm.vdoxygen-latex-1.9.1-12.el9_5.x86_64.rpmf FBBBBsecurityModerate: gcc security update Khttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 zIgcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmzIgcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpmIlibstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpmIlibstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpmzIgcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmzIgcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpmIlibstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpmIlibstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm LBBBBsecurityModerate: kernel security update THhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602 $libperf-5.14.0-570.33.2.el9_6.x86_64.rpm$kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm$kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm$libperf-5.14.0-570.33.2.el9_6.x86_64.rpm$kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm$kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm RBBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 %kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm%kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm%libperf-5.14.0-570.35.1.el9_6.x86_64.rpm%kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm%kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm%libperf-5.14.0-570.35.1.el9_6.x86_64.rpmŠZ  XBBBBsecurityImportant: kernel security update-!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420 &kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm&kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm&libperf-5.14.0-570.37.1.el9_6.x86_64.rpm&kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm&kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm&libperf-5.14.0-570.37.1.el9_6.x86_64.rpmŻj  ^BBBBBBBBBBBsecurityImportant: postgresql security updateNNhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878 Mpostgresql-static-13.22-1.el9_6.x86_64.rpmMpostgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpmMpostgresql-private-devel-13.22-1.el9_6.x86_64.rpmCMpostgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpmMpostgresql-docs-13.22-1.el9_6.x86_64.rpmMpostgresql-server-devel-13.22-1.el9_6.x86_64.rpmMpostgresql-test-13.22-1.el9_6.x86_64.rpmMpostgresql-static-13.22-1.el9_6.x86_64.rpmMpostgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpmMpostgresql-private-devel-13.22-1.el9_6.x86_64.rpmCMpostgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpmMpostgresql-docs-13.22-1.el9_6.x86_64.rpmMpostgresql-server-devel-13.22-1.el9_6.x86_64.rpmMpostgresql-test-13.22-1.el9_6.x86_64.rpmŚg  ]BNBBBBBBBBBsecurityModerate: python3.12 security update ;https://access.redhat.com/errata/RHSA-2025:15007RHSA-2025:15007RHSA-2025:15007 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15007.htmlALSA-2025:15007ALSA-2025:15007 %1python3.12-test-3.12.9-1.el9_6.2.i686.rpm#1python3.12-debug-3.12.9-1.el9_6.2.i686.rpm1python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm%1python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm#1python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm$1python3.12-idle-3.12.9-1.el9_6.2.i686.rpm$1python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm1python3.12-3.12.9-1.el9_6.2.i686.rpm%1python3.12-test-3.12.9-1.el9_6.2.i686.rpm#1python3.12-debug-3.12.9-1.el9_6.2.i686.rpm1python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm%1python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm#1python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm$1python3.12-idle-3.12.9-1.el9_6.2.i686.rpm$1python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm1python3.12-3.12.9-1.el9_6.2.i686.rpm%  "`BVBBBBBBBBBsecurityModerate: python3.11 security update W;https://access.redhat.com/errata/RHSA-2025:15010RHSA-2025:15010RHSA-2025:15010 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15010.htmlALSA-2025:15010ALSA-2025:15010 python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmbpython3.11-3.11.11-2.el9_6.2.i686.rpmpython3.11-test-3.11.11-2.el9_6.2.i686.rpmpython3.11-idle-3.11.11-2.el9_6.2.x86_64.rpmpython3.11-test-3.11.11-2.el9_6.2.x86_64.rpmpython3.11-debug-3.11.11-2.el9_6.2.i686.rpmpython3.11-idle-3.11.11-2.el9_6.2.i686.rpmcpython3.11-tkinter-3.11.11-2.el9_6.2.i686.rpmpython3.11-debug-3.11.11-2.el9_6.2.x86_64.rpmbpython3.11-3.11.11-2.el9_6.2.i686.rpmpython3.11-test-3.11.11-2.el9_6.2.i686.rpmpython3.11-idle-3.11.11-2.el9_6.2.x86_64.rpmpython3.11-test-3.11.11-2.el9_6.2.x86_64.rpmpython3.11-debug-3.11.11-2.el9_6.2.i686.rpmpython3.11-idle-3.11.11-2.el9_6.2.i686.rpmcpython3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm!  #ABBBBsecurityImportant: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:15011RHSA-2025:15011RHSA-2025:15011 https://bugzilla.redhat.com/23650242365024https://bugzilla.redhat.com/23763922376392https://bugzilla.redhat.com/23764062376406https://bugzilla.redhat.com/23820542382054https://bugzilla.redhat.com/23835092383509https://bugzilla.redhat.com/23835132383513https://bugzilla.redhat.com/23878662387866https://errata.almalinux.org/9/ALSA-2025-15011.htmlALSA-2025:15011ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.htmlCVE-2025-37823CVE-2025-37823https://www.redhat.com/security/data/cve/CVE-2025-38200.htmlCVE-2025-38200CVE-2025-38200https://www.redhat.com/security/data/cve/CVE-2025-38211.htmlCVE-2025-38211CVE-2025-38211https://www.redhat.com/security/data/cve/CVE-2025-38350.htmlCVE-2025-38350CVE-2025-38350https://www.redhat.com/security/data/cve/CVE-2025-38461.htmlCVE-2025-38461CVE-2025-38461https://www.redhat.com/security/data/cve/CVE-2025-38464.htmlCVE-2025-38464CVE-2025-38464https://www.redhat.com/security/data/cve/CVE-2025-38500.htmlCVE-2025-38500CVE-2025-38500https://www.redhat.com/security/data/cve/CVE-2025-38684.htmlCVE-2025-38684CVE-2025-38684'kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm'kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm'libperf-5.14.0-570.39.1.el9_6.x86_64.rpm'kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm'kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm'libperf-5.14.0-570.39.1.el9_6.x86_64.rpm $GBsecurityImportant: udisks2 security update)https://access.redhat.com/errata/RHSA-2025:15018RHSA-2025:15018RHSA-2025:15018 https://access.redhat.com/security/cve/CVE-2025-8067CVE-2025-8067CVE-2025-8067https://bugzilla.redhat.com/23886232388623https://errata.almalinux.org/9/ALSA-2025-15018.htmlALSA-2025:15018ALSA-2025:15018 Vlibudisks2-devel-2.9.4-11.el9_6.1.i686.rpmVlibudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpmVlibudisks2-devel-2.9.4-11.el9_6.1.i686.rpmVlibudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpmW &eI^BBBBBBBBBsecurityModerate: python3.9 security update ?;https://access.redhat.com/errata/RHSA-2025:15019RHSA-2025:15019RHSA-2025:15019 https://access.redhat.com/security/cve/CVE-2025-8194CVE-2025-8194CVE-2025-8194https://bugzilla.redhat.com/23840432384043https://errata.almalinux.org/9/ALSA-2025-15019.htmlALSA-2025:15019ALSA-2025:15019 Bpython3-debug-3.9.21-2.el9_6.2.i686.rpmBpython3-idle-3.9.21-2.el9_6.2.x86_64.rpmPBpython3-tkinter-3.9.21-2.el9_6.2.i686.rpmBpython3-debug-3.9.21-2.el9_6.2.x86_64.rpmBpython3-idle-3.9.21-2.el9_6.2.i686.rpmOBpython3-3.9.21-2.el9_6.2.i686.rpmBpython3-test-3.9.21-2.el9_6.2.x86_64.rpmBpython3-test-3.9.21-2.el9_6.2.i686.rpmBpython3-debug-3.9.21-2.el9_6.2.i686.rpmBpython3-idle-3.9.21-2.el9_6.2.x86_64.rpmPBpython3-tkinter-3.9.21-2.el9_6.2.i686.rpmBpython3-debug-3.9.21-2.el9_6.2.x86_64.rpmBpython3-idle-3.9.21-2.el9_6.2.i686.rpmOBpython3-3.9.21-2.el9_6.2.i686.rpmBpython3-test-3.9.21-2.el9_6.2.x86_64.rpmBpython3-test-3.9.21-2.el9_6.2.i686.rpm 'UBBBBsecurityImportant: kernel security updatezWhttps://access.redhat.com/errata/RHSA-2025:15429RHSA-2025:15429RHSA-2025:15429 https://access.redhat.com/security/cve/CVE-2025-37803CVE-2025-37803CVE-2025-37803https://access.redhat.com/security/cve/CVE-2025-38392CVE-2025-38392CVE-2025-38392https://bugzilla.redhat.com/23650132365013https://bugzilla.redhat.com/23834072383407https://errata.almalinux.org/9/ALSA-2025-15429.htmlALSA-2025:15429ALSA-2025:15429 (kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm(kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm(libperf-5.14.0-570.41.1.el9_6.x86_64.rpm(kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm(kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm(libperf-5.14.0-570.41.1.el9_6.x86_64.rpmƟ ([BBBBsecurityImportant: kernel security updateQ https://access.redhat.com/errata/RHSA-2025:15661RHSA-2025:15661RHSA-2025:15661 https://access.redhat.com/security/cve/CVE-2025-22097CVE-2025-22097CVE-2025-22097https://access.redhat.com/security/cve/CVE-2025-38332CVE-2025-38332CVE-2025-38332https://access.redhat.com/security/cve/CVE-2025-38352CVE-2025-38352CVE-2025-38352https://access.redhat.com/security/cve/CVE-2025-38449CVE-2025-38449CVE-2025-38449https://bugzilla.redhat.com/23602232360223https://bugzilla.redhat.com/23792462379246https://bugzilla.redhat.com/23825812382581https://bugzilla.redhat.com/23835192383519https://errata.almalinux.org/9/ALSA-2025-15661.htmlALSA-2025:15661ALSA-2025:15661 )kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm)kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm)libperf-5.14.0-570.42.2.el9_6.x86_64.rpm)kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm)kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm)libperf-5.14.0-570.42.2.el9_6.x86_64.rpmƤG )aBBBBsecurityModerate: kernel security update khttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740 https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740 *libperf-5.14.0-570.44.1.el9_6.x86_64.rpm*kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm*kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm*libperf-5.14.0-570.44.1.el9_6.x86_64.rpm*kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm*kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpmԃ ,jB}BBsecurityModerate: mysql security update khhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086 https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086 /Gmysql-devel-8.0.43-1.el9_6.x86_64.rpmRGmysql-libs-8.0.43-1.el9_6.x86_64.rpm0Gmysql-test-8.0.43-1.el9_6.x86_64.rpm/Gmysql-devel-8.0.43-1.el9_6.x86_64.rpmRGmysql-libs-8.0.43-1.el9_6.x86_64.rpm0Gmysql-test-8.0.43-1.el9_6.x86_64.rpmo -kBBBBsecurityModerate: kernel security update q https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398 https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398 +libperf-5.14.0-570.46.1.el9_6.x86_64.rpm+kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm+kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm+libperf-5.14.0-570.46.1.el9_6.x86_64.rpm+kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm+kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm^ .qBBBBsecurityModerate: kernel security update xhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659 https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659 kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpmlibperf-5.14.0-503.26.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpmlibperf-5.14.0-503.26.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm5 0oIBBBsecurityImportant: bind9.18 security update rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670 `bind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpmI`bind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm`bind9.18-devel-9.18.29-1.el9_5.1.i686.rpm`bind9.18-libs-9.18.29-1.el9_5.1.i686.rpm`bind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpmI`bind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm`bind9.18-devel-9.18.29-1.el9_5.1.i686.rpm`bind9.18-libs-9.18.29-1.el9_5.1.i686.rpm3 1|BBBBsecurityImportant: mysql security update{*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671 https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671 /Fmysql-devel-8.0.41-2.el9_5.x86_64.rpmRFmysql-libs-8.0.41-2.el9_5.x86_64.rpm0Fmysql-test-8.0.41-2.el9_5.x86_64.rpm/Fmysql-devel-8.0.41-2.el9_5.x86_64.rpmRFmysql-libs-8.0.41-2.el9_5.x86_64.rpm0Fmysql-test-8.0.41-2.el9_5.x86_64.rpm݄c 3rQBBBsecurityImportant: bind security update%Xhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681 \bind-doc-9.16.23-24.el9_5.3.noarch.rpmQ\bind-devel-9.16.23-24.el9_5.3.i686.rpmQ\bind-devel-9.16.23-24.el9_5.3.x86_64.rpmd\bind-libs-9.16.23-24.el9_5.3.i686.rpm\bind-doc-9.16.23-24.el9_5.3.noarch.rpmQ\bind-devel-9.16.23-24.el9_5.3.i686.rpmQ\bind-devel-9.16.23-24.el9_5.3.x86_64.rpmd\bind-libs-9.16.23-24.el9_5.3.i686.rpmܴ 4GBBBBsecurityModerate: kernel security update }i https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880 https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880 ,kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm,libperf-5.14.0-570.49.1.el9_6.x86_64.rpm,kernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm,kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm,libperf-5.14.0-570.49.1.el9_6.x86_64.rpm,kernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpmh 5 securityImportant: ipa security updatefghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084  python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm8 NsecurityModerate: perl-JSON-XS security update Mshttps://access.redhat.com/errata/RHSA-2025:17162RHSA-2025:17162RHSA-2025:17162 https://access.redhat.com/security/cve/CVE-2025-40928CVE-2025-40928CVE-2025-40928https://bugzilla.redhat.com/23938782393878https://errata.almalinux.org/9/ALSA-2025-17162.htmlALSA-2025:17162ALSA-2025:17162 rUperl-JSON-XS-4.04-1.el9_6.x86_64.rpmrUperl-JSON-XS-4.04-1.el9_6.x86_64.rpm 6QBBBBsecurityModerate: kernel security update @Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377 https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377 -kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm-kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm-libperf-5.14.0-570.51.1.el9_6.x86_64.rpm-kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm-kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm-libperf-5.14.0-570.51.1.el9_6.x86_64.rpmǝ= 7WBBBBBBBBBBBsecurityImportant: postgresql security update'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742 Lpostgresql-server-devel-13.20-1.el9_5.x86_64.rpmCLpostgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpmLpostgresql-private-devel-13.20-1.el9_5.x86_64.rpmLpostgresql-test-13.20-1.el9_5.x86_64.rpmLpostgresql-static-13.20-1.el9_5.x86_64.rpmLpostgresql-docs-13.20-1.el9_5.x86_64.rpmLpostgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpmLpostgresql-server-devel-13.20-1.el9_5.x86_64.rpmCLpostgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpmLpostgresql-private-devel-13.20-1.el9_5.x86_64.rpmLpostgresql-test-13.20-1.el9_5.x86_64.rpmLpostgresql-static-13.20-1.el9_5.x86_64.rpmLpostgresql-docs-13.20-1.el9_5.x86_64.rpmLpostgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpms 8dBBBBsecurityModerate: kernel security update -d https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760 https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760 .kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm.libperf-5.14.0-570.52.1.el9_6.x86_64.rpm.kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm.kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm.libperf-5.14.0-570.52.1.el9_6.x86_64.rpm.kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm¿ 9jsecurityImportant: .NET 8.0 security updateMhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149 dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm\  :lsecurityImportant: .NET 9.0 security update^Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151 edotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpmedotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpmȡh! ;nBBBBsecurityModerate: kernel security update +https://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281 https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281 /kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm/kernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm/libperf-5.14.0-570.55.1.el9_6.x86_64.rpm/kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm/kernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm/libperf-5.14.0-570.55.1.el9_6.x86_64.rpmc" dBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update !lhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824 |Hjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmuHjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm{Hjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmvHjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmwHjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmzHjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmxHjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmyHjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm}Hjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm~Hjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm|Hjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmuHjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm{Hjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmvHjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmwHjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmzHjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmxHjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmHjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmyHjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm}Hjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm~Hjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpmȌW% ?@securityImportant: libtiff security update <https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113 flibtiff-tools-4.4.0-13.el9_6.2.x86_64.rpmflibtiff-tools-4.4.0-13.el9_6.2.x86_64.rpmȁ1& BBBBBsecurityModerate: kernel security update Ihttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409 https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409 0kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpm0kernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpm0libperf-5.14.0-570.60.1.el9_6.x86_64.rpm0kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpm0kernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpm0libperf-5.14.0-570.60.1.el9_6.x86_64.rpmȷH' HBBBBsecurityModerate: galera and mariadb security update M! https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584 L~mariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpmM~mariadb-test-10.5.29-2.el9_6.x86_64.rpmK~mariadb-devel-10.5.29-2.el9_6.x86_64.rpmL~mariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpmM~mariadb-test-10.5.29-2.el9_6.x86_64.rpmK~mariadb-devel-10.5.29-2.el9_6.x86_64.rpmȶ9( NBBBBsecurityModerate: kernel security update n9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930 https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930 1kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpm1kernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpm1libperf-5.14.0-570.62.1.el9_6.x86_64.rpm1kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpm1kernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpm1libperf-5.14.0-570.62.1.el9_6.x86_64.rpmѲA) CRBBBsecurityImportant: bind9.18 security update'phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950 abind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpmIabind9.18-doc-9.18.29-4.el9_6.2.noarch.rpmabind9.18-libs-9.18.29-4.el9_6.2.i686.rpmabind9.18-devel-9.18.29-4.el9_6.2.i686.rpmabind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpmIabind9.18-doc-9.18.29-4.el9_6.2.noarch.rpmabind9.18-libs-9.18.29-4.el9_6.2.i686.rpmabind9.18-devel-9.18.29-4.el9_6.2.i686.rpm1* YBBBBsecurityModerate: kernel security update Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518 https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396Blibperf-5.14.0-611.5.1.el9_7.x86_64.rpmBkernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpmBkernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpmBlibperf-5.14.0-611.5.1.el9_7.x86_64.rpmBkernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpmBkernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm7+ ._BsecurityLow: shadow-utils security update\ohttps://access.redhat.com/errata/RHSA-2025:20559RHSA-2025:20559RHSA-2025:20559 https://access.redhat.com/security/cve/CVE-2024-56433CVE-2024-56433CVE-2024-56433https://bugzilla.redhat.com/23341652334165https://errata.almalinux.org/9/ALSA-2025-20559.htmlALSA-2025:20559ALSA-2025:20559 r\shadow-utils-subid-devel-4.9-15.el9.i686.rpmr\shadow-utils-subid-devel-4.9-15.el9.x86_64.rpmr\shadow-utils-subid-devel-4.9-15.el9.i686.rpmr\shadow-utils-subid-devel-4.9-15.el9.x86_64.rpm, bBsecurityModerate: zziplib security update vhttps://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838 https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838 u#zziplib-devel-0.13.71-12.el9.i686.rpmu#zziplib-devel-0.13.71-12.el9.x86_64.rpmu#zziplib-devel-0.13.71-12.el9.i686.rpmu#zziplib-devel-0.13.71-12.el9.x86_64.rpmt- %securityImportant: ipa security updateghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928  python3-ipatests-4.12.2-22.el9_7.1.noarch.rpm python3-ipatests-4.12.2-22.el9_7.1.noarch.rpmɵV. fBsecurityImportant: sssd security updateo/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954 https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954 mXlibsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpmmXlibsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpmmXlibsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpmmXlibsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpmɵ/ isecurityImportant: libtiff security update<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956 glibtiff-tools-4.4.0-15.el9_7.2.x86_64.rpmglibtiff-tools-4.4.0-15.el9_7.2.x86_64.rpm/0 JbBBsecurityModerate: xorg-x11-server-Xwayland security update Z https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960 f_xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpmf_xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpmS_xorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpmf_xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpmf_xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpmS_xorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpm71 oBBsecurityModerate: xorg-x11-server security update dyhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961 d}xorg-x11-server-devel-1.20.11-32.el9_7.i686.rpmZ}xorg-x11-server-source-1.20.11-32.el9_7.noarch.rpmd}xorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpmd}xorg-x11-server-devel-1.20.11-32.el9_7.i686.rpmZ}xorg-x11-server-source-1.20.11-32.el9_7.noarch.rpmd}xorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpm2 MgBBBsecurityImportant: bind security update]~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110 Q]bind-devel-9.16.23-34.el9_7.1.x86_64.rpmQ]bind-devel-9.16.23-34.el9_7.1.i686.rpm]bind-doc-9.16.23-34.el9_7.1.noarch.rpmd]bind-libs-9.16.23-34.el9_7.1.i686.rpmQ]bind-devel-9.16.23-34.el9_7.1.x86_64.rpmQ]bind-devel-9.16.23-34.el9_7.1.i686.rpm]bind-doc-9.16.23-34.el9_7.1.noarch.rpmd]bind-libs-9.16.23-34.el9_7.1.i686.rpm<3 OjBBBsecurityImportant: bind9.18 security update[phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111 bbind9.18-devel-9.18.29-5.el9_7.2.i686.rpmbbind9.18-libs-9.18.29-5.el9_7.2.i686.rpmIbbind9.18-doc-9.18.29-5.el9_7.2.noarch.rpmbbind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpmbbind9.18-devel-9.18.29-5.el9_7.2.i686.rpmbbind9.18-libs-9.18.29-5.el9_7.2.i686.rpmIbbind9.18-doc-9.18.29-5.el9_7.2.noarch.rpmbbind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpmɵ4 }BsecurityCritical: lasso security update6K$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462 https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462 |Ulasso-devel-2.7.0-11.el9_7.3.i686.rpm|Ulasso-devel-2.7.0-11.el9_7.3.x86_64.rpm|Ulasso-devel-2.7.0-11.el9_7.3.i686.rpm|Ulasso-devel-2.7.0-11.el9_7.3.x86_64.rpm 5 @BBBBsecurityModerate: kernel security update o;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405 https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405 2kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpm2kernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpm2libperf-5.14.0-611.11.1.el9_7.x86_64.rpm2kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpm2kernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpm2libperf-5.14.0-611.11.1.el9_7.x86_64.rpmۅ]6 FBBBBsecurityModerate: kernel security update *Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865 https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865 3kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpm3kernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpm3libperf-5.14.0-611.13.1.el9_7.x86_64.rpm3kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpm3kernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpm3libperf-5.14.0-611.13.1.el9_7.x86_64.rpmʊz7 LBBsecurityModerate: mysql security update }[https://access.redhat.com/errata/RHSA-2025:23109RHSA-2025:23109RHSA-2025:23109 https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23109.htmlALSA-2025:23109ALSA-2025:23109 0mysql-test-8.0.44-1.el9_7.x86_64.rpm/mysql-devel-8.0.44-1.el9_7.x86_64.rpm0mysql-test-8.0.44-1.el9_7.x86_64.rpm/mysql-devel-8.0.44-1.el9_7.x86_64.rpmD8 PBsecurityImportant: wireshark security updateX&https://access.redhat.com/errata/RHSA-2025:23142RHSA-2025:23142RHSA-2025:23142 https://access.redhat.com/security/cve/CVE-2025-13499CVE-2025-13499CVE-2025-13499https://bugzilla.redhat.com/24162932416293https://errata.almalinux.org/9/ALSA-2025-23142.htmlALSA-2025:23142ALSA-2025:23142 GLwireshark-devel-3.4.10-8.el9_7.1.i686.rpmGLwireshark-devel-3.4.10-8.el9_7.1.x86_64.rpmGLwireshark-devel-3.4.10-8.el9_7.1.i686.rpmGLwireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm#9 SBBBBsecurityImportant: kernel security update~Mhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241 https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241 4kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpm4kernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpm4libperf-5.14.0-611.16.1.el9_7.x86_64.rpm4kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpm4kernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpm4libperf-5.14.0-611.16.1.el9_7.x86_64.rpm: WBBBBBBBBBBBsecurityModerate: python3.12 security update Kghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323 https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323 $&python3.12-idle-3.12.12-1.el9_7.x86_64.rpm&python3.12-3.12.12-1.el9_7.i686.rpm&python3.12-tkinter-3.12.12-1.el9_7.i686.rpm%&python3.12-test-3.12.12-1.el9_7.i686.rpm$&python3.12-idle-3.12.12-1.el9_7.i686.rpm%&python3.12-test-3.12.12-1.el9_7.x86_64.rpm#&python3.12-debug-3.12.12-1.el9_7.x86_64.rpm#&python3.12-debug-3.12.12-1.el9_7.i686.rpm$&python3.12-idle-3.12.12-1.el9_7.x86_64.rpm&python3.12-3.12.12-1.el9_7.i686.rpm&python3.12-tkinter-3.12.12-1.el9_7.i686.rpm%&python3.12-test-3.12.12-1.el9_7.i686.rpm$&python3.12-idle-3.12.12-1.el9_7.i686.rpm%&python3.12-test-3.12.12-1.el9_7.x86_64.rpm#&python3.12-debug-3.12.12-1.el9_7.x86_64.rpm#&python3.12-debug-3.12.12-1.el9_7.i686.rpmʥ; ZVvBBBBBBBBBsecurityModerate: python3.9 security update 2x https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342 https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342 Cpython3-test-3.9.25-2.el9_7.x86_64.rpmCpython3-idle-3.9.25-2.el9_7.x86_64.rpmPCpython3-tkinter-3.9.25-2.el9_7.i686.rpmCpython3-debug-3.9.25-2.el9_7.x86_64.rpmCpython3-test-3.9.25-2.el9_7.i686.rpmCpython3-idle-3.9.25-2.el9_7.i686.rpmCpython3-debug-3.9.25-2.el9_7.i686.rpmOCpython3-3.9.25-2.el9_7.i686.rpmCpython3-test-3.9.25-2.el9_7.x86_64.rpmCpython3-idle-3.9.25-2.el9_7.x86_64.rpmPCpython3-tkinter-3.9.25-2.el9_7.i686.rpmCpython3-debug-3.9.25-2.el9_7.x86_64.rpmCpython3-test-3.9.25-2.el9_7.i686.rpmCpython3-idle-3.9.25-2.el9_7.i686.rpmCpython3-debug-3.9.25-2.el9_7.i686.rpmOCpython3-3.9.25-2.el9_7.i686.rpmʥu< oBBBBsecurityImportant: kernel security update*9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627 https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627 libperf-5.14.0-503.31.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpmlibperf-5.14.0-503.31.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm= usecurityImportant: .NET 9.0 security, bug fix, and enhancement updatec|https://access.redhat.com/errata/RHSA-2025:2668RHSA-2025:2668RHSA-2025:2668 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2668.htmlALSA-2025:2668ALSA-2025:2668 edotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpmedotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpmY> wsecurityImportant: .NET 8.0 security, bug fix, and enhancement update_}https://access.redhat.com/errata/RHSA-2025:2669RHSA-2025:2669RHSA-2025:2669 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2669.htmlALSA-2025:2669ALSA-2025:2669 dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpmP? !_BZBBBBBBBBBsecurityLow: python3.12 security update\\Xhttps://access.redhat.com/errata/RHSA-2025:3631RHSA-2025:3631RHSA-2025:3631 https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3631.htmlALSA-2025:3631ALSA-2025:3631 .python3.12-3.12.5-2.el9_5.3.i686.rpm$.python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm#.python3.12-debug-3.12.5-2.el9_5.3.i686.rpm.python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm%.python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm$.python3.12-idle-3.12.5-2.el9_5.3.i686.rpm#.python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm%.python3.12-test-3.12.5-2.el9_5.3.i686.rpm.python3.12-3.12.5-2.el9_5.3.i686.rpm$.python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm#.python3.12-debug-3.12.5-2.el9_5.3.i686.rpm.python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm%.python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm$.python3.12-idle-3.12.5-2.el9_5.3.i686.rpm#.python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm%.python3.12-test-3.12.5-2.el9_5.3.i686.rpm;@ $bBbBBBBBBBBBsecurityLow: python3.11 security update\4Xhttps://access.redhat.com/errata/RHSA-2025:3634RHSA-2025:3634RHSA-2025:3634 https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3634.htmlALSA-2025:3634ALSA-2025:3634 #python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm#python3.11-debug-3.11.9-7.el9_5.3.i686.rpm#python3.11-test-3.11.9-7.el9_5.3.i686.rpm#python3.11-idle-3.11.9-7.el9_5.3.i686.rpmb#python3.11-3.11.9-7.el9_5.3.i686.rpm#python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm#python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpmc#python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm#python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm#python3.11-debug-3.11.9-7.el9_5.3.i686.rpm#python3.11-test-3.11.9-7.el9_5.3.i686.rpm#python3.11-idle-3.11.9-7.el9_5.3.i686.rpmb#python3.11-3.11.9-7.el9_5.3.i686.rpm#python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm#python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpmc#python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpmCA %OBBBBBBBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update https://access.redhat.com/errata/RHSA-2025:3845RHSA-2025:3845RHSA-2025:3845 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3845.htmlALSA-2025:3845ALSA-2025:3845 ^java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm^java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm ^java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpmTB &cBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update https://access.redhat.com/errata/RHSA-2025:3852RHSA-2025:3852RHSA-2025:3852 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3852.htmlALSA-2025:3852ALSA-2025:3852 j5java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmg5java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmo5java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmr5java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpms5java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpml5java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmt5java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmk5java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmm5java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmn5java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmh5java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmq5java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmi5java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmp5java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmj5java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmg5java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmo5java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmr5java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpms5java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpml5java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmt5java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmk5java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmm5java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmn5java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmh5java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmq5java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmi5java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpmp5java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm"C 'BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update https://access.redhat.com/errata/RHSA-2025:3855RHSA-2025:3855RHSA-2025:3855 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3855.htmlALSA-2025:3855ALSA-2025:3855 Fjava-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmwFjava-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmzFjava-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm}Fjava-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm|Fjava-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmuFjava-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmxFjava-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmyFjava-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm~Fjava-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm{Fjava-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmvFjava-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmwFjava-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmzFjava-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm}Fjava-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm|Fjava-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmuFjava-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmxFjava-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmyFjava-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm~Fjava-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm{Fjava-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmFjava-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmvFjava-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpmD ([BBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:3937RHSA-2025:3937RHSA-2025:3937 https://access.redhat.com/security/cve/CVE-2024-53150CVE-2024-53150CVE-2024-53150https://bugzilla.redhat.com/23339712333971https://errata.almalinux.org/9/ALSA-2025-3937.htmlALSA-2025:3937ALSA-2025:3937 kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpmlibperf-5.14.0-503.38.1.el9_5.x86_64.rpmkernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpmkernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpmlibperf-5.14.0-503.38.1.el9_5.x86_64.rpmXE )aBBBBBBBBBBBBsecurityModerate: glibc security update #;https://access.redhat.com/errata/RHSA-2025:4244RHSA-2025:4244RHSA-2025:4244 https://access.redhat.com/security/cve/CVE-2025-0395CVE-2025-0395CVE-2025-0395https://bugzilla.redhat.com/23394602339460https://errata.almalinux.org/9/ALSA-2025-4244.htmlALSA-2025:4244ALSA-2025:4244 Rwglibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpmfwglibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpmVwnss_db-2.34-125.el9_5.8.alma.1.i686.rpmSwglibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpmSwglibc-static-2.34-125.el9_5.8.alma.1.i686.rpmWwnss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpmRwglibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpmVwnss_db-2.34-125.el9_5.8.alma.1.x86_64.rpmWwnss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm Rwglibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpmfwglibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpmVwnss_db-2.34-125.el9_5.8.alma.1.i686.rpmSwglibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpmSwglibc-static-2.34-125.el9_5.8.alma.1.i686.rpmWwnss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpmRwglibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpmVwnss_db-2.34-125.el9_5.8.alma.1.x86_64.rpmWwnss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm?F *osecurityModerate: 389-ds-base security update ^zhttps://access.redhat.com/errata/RHSA-2025:4491RHSA-2025:4491RHSA-2025:4491 https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-4491.htmlALSA-2025:4491ALSA-2025:4491 {Z389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm{Z389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpmiG ,kFBBBBBBBBBBsecurityModerate: python3.9 security update X[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977 @python3-idle-3.9.21-2.el9.i686.rpm@python3-debug-3.9.21-2.el9.x86_64.rpm@python3-idle-3.9.21-2.el9.x86_64.rpm@python3-test-3.9.21-2.el9.x86_64.rpmP@python3-tkinter-3.9.21-2.el9.i686.rpm@python3-test-3.9.21-2.el9.i686.rpmO@python3-3.9.21-2.el9.i686.rpm@python3-debug-3.9.21-2.el9.i686.rpm@python3-idle-3.9.21-2.el9.i686.rpm@python3-debug-3.9.21-2.el9.x86_64.rpm@python3-idle-3.9.21-2.el9.x86_64.rpm@python3-test-3.9.21-2.el9.x86_64.rpmP@python3-tkinter-3.9.21-2.el9.i686.rpm@python3-test-3.9.21-2.el9.i686.rpmO@python3-3.9.21-2.el9.i686.rpm@python3-debug-3.9.21-2.el9.i686.rpmÔtH /mBOBBBBBBBBBsecurityModerate: python3.12 security update 3[https://access.redhat.com/errata/RHSA-2025:7107RHSA-2025:7107RHSA-2025:7107 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7107.htmlALSA-2025:7107ALSA-2025:7107 #/python3.12-debug-3.12.9-1.el9.i686.rpm/python3.12-tkinter-3.12.9-1.el9.i686.rpm$/python3.12-idle-3.12.9-1.el9.i686.rpm%/python3.12-test-3.12.9-1.el9.x86_64.rpm/python3.12-3.12.9-1.el9.i686.rpm#/python3.12-debug-3.12.9-1.el9.x86_64.rpm$/python3.12-idle-3.12.9-1.el9.x86_64.rpm%/python3.12-test-3.12.9-1.el9.i686.rpm#/python3.12-debug-3.12.9-1.el9.i686.rpm/python3.12-tkinter-3.12.9-1.el9.i686.rpm$/python3.12-idle-3.12.9-1.el9.i686.rpm%/python3.12-test-3.12.9-1.el9.x86_64.rpm/python3.12-3.12.9-1.el9.i686.rpm#/python3.12-debug-3.12.9-1.el9.x86_64.rpm$/python3.12-idle-3.12.9-1.el9.x86_64.rpm%/python3.12-test-3.12.9-1.el9.i686.rpmÔ!I 2pBWBBBBBBBBBsecurityModerate: python3.11 security update [https://access.redhat.com/errata/RHSA-2025:7109RHSA-2025:7109RHSA-2025:7109 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7109.htmlALSA-2025:7109ALSA-2025:7109 python3.11-idle-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.i686.rpmcpython3.11-tkinter-3.11.11-2.el9.i686.rpmpython3.11-idle-3.11.11-2.el9.x86_64.rpmpython3.11-debug-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.x86_64.rpmbpython3.11-3.11.11-2.el9.i686.rpmpython3.11-debug-3.11.11-2.el9.x86_64.rpmpython3.11-idle-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.i686.rpmcpython3.11-tkinter-3.11.11-2.el9.i686.rpmpython3.11-idle-3.11.11-2.el9.x86_64.rpmpython3.11-debug-3.11.11-2.el9.i686.rpmpython3.11-test-3.11.11-2.el9.x86_64.rpmbpython3.11-3.11.11-2.el9.i686.rpmpython3.11-debug-3.11.11-2.el9.x86_64.rpmÔPJ 3RBBBBBBBsecurityModerate: protobuf security update i:https://access.redhat.com/errata/RHSA-2025:7138RHSA-2025:7138RHSA-2025:7138 https://access.redhat.com/security/cve/CVE-2022-1941CVE-2022-1941CVE-2022-1941https://bugzilla.redhat.com/22914702291470https://errata.almalinux.org/9/ALSA-2025-7138.htmlALSA-2025:7138ALSA-2025:7138 F protobuf-lite-devel-3.14.0-16.el9.x86_64.rpmD protobuf-compiler-3.14.0-16.el9.i686.rpmE protobuf-devel-3.14.0-16.el9.i686.rpmE protobuf-devel-3.14.0-16.el9.x86_64.rpmD protobuf-compiler-3.14.0-16.el9.x86_64.rpmF protobuf-lite-devel-3.14.0-16.el9.i686.rpmF protobuf-lite-devel-3.14.0-16.el9.x86_64.rpmD protobuf-compiler-3.14.0-16.el9.i686.rpmE protobuf-devel-3.14.0-16.el9.i686.rpmE protobuf-devel-3.14.0-16.el9.x86_64.rpmD protobuf-compiler-3.14.0-16.el9.x86_64.rpmF protobuf-lite-devel-3.14.0-16.el9.i686.rpmÔCK 4[BBsecurityModerate: xorg-x11-server security update #shttps://access.redhat.com/errata/RHSA-2025:7163RHSA-2025:7163RHSA-2025:7163 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7163.htmlALSA-2025:7163ALSA-2025:7163 Z{xorg-x11-server-source-1.20.11-28.el9_6.noarch.rpmd{xorg-x11-server-devel-1.20.11-28.el9_6.i686.rpmd{xorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpmZ{xorg-x11-server-source-1.20.11-28.el9_6.noarch.rpmd{xorg-x11-server-devel-1.20.11-28.el9_6.i686.rpmd{xorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpmÔ-L 6ukBBsecurityModerate: xorg-x11-server-Xwayland security update https://access.redhat.com/errata/RHSA-2025:7165RHSA-2025:7165RHSA-2025:7165 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7165.htmlALSA-2025:7165ALSA-2025:7165 f]xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpmS]xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpmf]xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpmf]xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpmS]xorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpmf]xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpmÔM 7cBsecurityModerate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update shttps://access.redhat.com/errata/RHSA-2025:7178RHSA-2025:7178RHSA-2025:7178 https://access.redhat.com/security/cve/CVE-2024-0444CVE-2024-0444CVE-2024-0444https://access.redhat.com/security/cve/CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/22829992282999https://bugzilla.redhat.com/22923352292335https://errata.almalinux.org/9/ALSA-2025-7178.htmlALSA-2025:7178ALSA-2025:7178 e7gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpme7gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpme7gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpme7gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpmÔ/N 8fsecurityModerate: corosync security update $https://access.redhat.com/errata/RHSA-2025:7201RHSA-2025:7201RHSA-2025:7201 https://access.redhat.com/security/cve/CVE-2025-30472CVE-2025-30472CVE-2025-30472https://bugzilla.redhat.com/23542292354229https://errata.almalinux.org/9/ALSA-2025-7201.htmlALSA-2025:7201ALSA-2025:7201 #acorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm#acorosync-vqsim-3.1.9-2.el9_6.x86_64.rpmÔ:O 9hBBBBsecurityModerate: openjpeg2 security update 1Xhttps://access.redhat.com/errata/RHSA-2025:7309RHSA-2025:7309RHSA-2025:7309 https://access.redhat.com/security/cve/CVE-2024-56826CVE-2024-56826CVE-2024-56826https://access.redhat.com/security/cve/CVE-2024-56827CVE-2024-56827CVE-2024-56827https://bugzilla.redhat.com/23351722335172https://bugzilla.redhat.com/23351742335174https://errata.almalinux.org/9/ALSA-2025-7309.htmlALSA-2025:7309ALSA-2025:7309 pNopenjpeg2-tools-2.4.0-8.el9.i686.rpmoNopenjpeg2-devel-2.4.0-8.el9.x86_64.rpmoNopenjpeg2-devel-2.4.0-8.el9.i686.rpmpNopenjpeg2-tools-2.4.0-8.el9.x86_64.rpmpNopenjpeg2-tools-2.4.0-8.el9.i686.rpmoNopenjpeg2-devel-2.4.0-8.el9.x86_64.rpmoNopenjpeg2-devel-2.4.0-8.el9.i686.rpmpNopenjpeg2-tools-2.4.0-8.el9.x86_64.rpmÔ<P /.securityModerate: perl-Module-ScanDeps security update https://access.redhat.com/errata/RHSA-2025:7350RHSA-2025:7350RHSA-2025:7350 https://access.redhat.com/security/cve/CVE-2024-10224CVE-2024-10224CVE-2024-10224https://bugzilla.redhat.com/23273292327329https://errata.almalinux.org/9/ALSA-2025-7350.htmlALSA-2025:7350ALSA-2025:7350 $perl-Module-ScanDeps-1.30-6.el9.noarch.rpm$perl-Module-ScanDeps-1.30-6.el9.noarch.rpmÔKQ :psecurityModerate: 389-ds-base security update zhttps://access.redhat.com/errata/RHSA-2025:7395RHSA-2025:7395RHSA-2025:7395 https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-7395.htmlALSA-2025:7395ALSA-2025:7395 {[389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm{[389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpmR ;rsecurityModerate: nginx security update Ghttps://access.redhat.com/errata/RHSA-2025:7402RHSA-2025:7402RHSA-2025:7402 https://access.redhat.com/security/cve/CVE-2022-41741CVE-2022-41741CVE-2022-41741https://access.redhat.com/security/cve/CVE-2022-41742CVE-2022-41742CVE-2022-41742https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://bugzilla.redhat.com/21414952141495https://bugzilla.redhat.com/21414962141496https://errata.almalinux.org/9/ALSA-2025-7402.htmlALSA-2025:7402ALSA-2025:7402 ^nginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm^nginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm^S ?|BBwBBBBsecurityModerate: ghostscript security update Nhhttps://access.redhat.com/errata/RHSA-2025:7422RHSA-2025:7422RHSA-2025:7422 https://access.redhat.com/security/cve/CVE-2023-46751CVE-2023-46751CVE-2023-46751https://access.redhat.com/security/cve/CVE-2024-46951CVE-2024-46951CVE-2024-46951https://access.redhat.com/security/cve/CVE-2024-46952CVE-2024-46952CVE-2024-46952https://access.redhat.com/security/cve/CVE-2024-46953CVE-2024-46953CVE-2024-46953https://access.redhat.com/security/cve/CVE-2024-46954CVE-2024-46954CVE-2024-46954https://access.redhat.com/security/cve/CVE-2024-46956CVE-2024-46956CVE-2024-46956https://bugzilla.redhat.com/22533652253365https://bugzilla.redhat.com/23250412325041https://bugzilla.redhat.com/23250432325043https://bugzilla.redhat.com/23250442325044https://bugzilla.redhat.com/23250452325045https://bugzilla.redhat.com/23250472325047https://errata.almalinux.org/9/ALSA-2025-7422.htmlALSA-2025:7422ALSA-2025:7422 'ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpmflibgs-devel-9.54.0-18.el9_6.i686.rpmflibgs-devel-9.54.0-18.el9_6.x86_64.rpm(ghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm&ghostscript-9.54.0-18.el9_6.i686.rpm'ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpmflibgs-devel-9.54.0-18.el9_6.i686.rpmflibgs-devel-9.54.0-18.el9_6.x86_64.rpm(ghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm&ghostscript-9.54.0-18.el9_6.i686.rpm^T zBBBBsecurityImportant: kernel security update6@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423 https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423 libperf-5.14.0-570.16.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpmlibperf-5.14.0-570.16.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpmɐ#U @BsecurityImportant: yelp security updatevdhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430 https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430 ^yelp-devel-40.3-2.el9_6.1.x86_64.rpm^yelp-devel-40.3-2.el9_6.1.i686.rpm^yelp-devel-40.3-2.el9_6.1.x86_64.rpm^yelp-devel-40.3-2.el9_6.1.i686.rpm5V CBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: avahi security update Z*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437 >&avahi-devel-0.8-22.el9_6.x86_64.rpm:&avahi-compat-howl-0.8-22.el9_6.i686.rpm?&avahi-glib-devel-0.8-22.el9_6.i686.rpm<&avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm=&avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpmv&avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm<&avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpmv&avahi-gobject-devel-0.8-22.el9_6.i686.rpm:&avahi-compat-howl-0.8-22.el9_6.x86_64.rpmu&avahi-gobject-0.8-22.el9_6.i686.rpm=&avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm?&avahi-glib-devel-0.8-22.el9_6.x86_64.rpm;&avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpmu&avahi-gobject-0.8-22.el9_6.x86_64.rpm>&avahi-devel-0.8-22.el9_6.i686.rpm;&avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm>&avahi-devel-0.8-22.el9_6.x86_64.rpm:&avahi-compat-howl-0.8-22.el9_6.i686.rpm?&avahi-glib-devel-0.8-22.el9_6.i686.rpm<&avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm=&avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpmv&avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm<&avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpmv&avahi-gobject-devel-0.8-22.el9_6.i686.rpm:&avahi-compat-howl-0.8-22.el9_6.x86_64.rpmu&avahi-gobject-0.8-22.el9_6.i686.rpm=&avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm?&avahi-glib-devel-0.8-22.el9_6.x86_64.rpm;&avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpmu&avahi-gobject-0.8-22.el9_6.x86_64.rpm>&avahi-devel-0.8-22.el9_6.i686.rpm;&avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm~W CBBWBBBBsecurityModerate: ghostscript security update fhttps://access.redhat.com/errata/RHSA-2025:7586RHSA-2025:7586RHSA-2025:7586 https://access.redhat.com/security/cve/CVE-2025-27832CVE-2025-27832CVE-2025-27832https://bugzilla.redhat.com/23549492354949https://errata.almalinux.org/9/ALSA-2025-7586.htmlALSA-2025:7586ALSA-2025:7586 (ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpmflibgs-devel-9.54.0-19.el9_6.x86_64.rpm'ghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm&ghostscript-9.54.0-19.el9_6.i686.rpmflibgs-devel-9.54.0-19.el9_6.i686.rpm(ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpmflibgs-devel-9.54.0-19.el9_6.x86_64.rpm'ghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm&ghostscript-9.54.0-19.el9_6.i686.rpmflibgs-devel-9.54.0-19.el9_6.i686.rpmÔvX asecurityImportant: .NET 8.0 security updatejGhttps://access.redhat.com/errata/RHSA-2025:7598RHSA-2025:7598RHSA-2025:7598 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7598.htmlALSA-2025:7598ALSA-2025:7598 dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpmHY csecurityImportant: .NET 9.0 security update1Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600 edotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpmedotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpmÔ;Z eBBBBsecurityImportant: kernel security updatew9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903 https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903 kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpmlibperf-5.14.0-570.17.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpmlibperf-5.14.0-570.17.1.el9_6.x86_64.rpmV[ kBBBBsecurityModerate: kernel security update 0 https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142 https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142 libperf-5.14.0-570.18.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpmlibperf-5.14.0-570.18.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpmܣf\ qBsecurityImportant: gstreamer1-plugins-bad-free security update=https://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183 https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183 e8gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpme8gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpme8gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpme8gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm] tBBBBsecurityModerate: kernel security update KWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333 https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333 kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpmlibperf-5.14.0-570.19.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpmlibperf-5.14.0-570.19.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpmÔH^ zBsecurityImportant: varnish security update"Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337 https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337 $rvarnish-devel-6.6.2-6.el9_6.1.i686.rpm$rvarnish-devel-6.6.2-6.el9_6.1.x86_64.rpm$rvarnish-devel-6.6.2-6.el9_6.1.i686.rpm$rvarnish-devel-6.6.2-6.el9_6.1.x86_64.rpm[_ }BBBBsecurityImportant: kernel security update|https://access.redhat.com/errata/RHSA-2025:8643RHSA-2025:8643RHSA-2025:8643 https://access.redhat.com/security/cve/CVE-2025-21920CVE-2025-21920CVE-2025-21920https://access.redhat.com/security/cve/CVE-2025-21926CVE-2025-21926CVE-2025-21926https://access.redhat.com/security/cve/CVE-2025-21997CVE-2025-21997CVE-2025-21997https://access.redhat.com/security/cve/CVE-2025-22055CVE-2025-22055CVE-2025-22055https://access.redhat.com/security/cve/CVE-2025-37785CVE-2025-37785CVE-2025-37785https://access.redhat.com/security/cve/CVE-2025-37943CVE-2025-37943CVE-2025-37943https://bugzilla.redhat.com/23565872356587https://bugzilla.redhat.com/23566392356639https://bugzilla.redhat.com/23571432357143https://bugzilla.redhat.com/23603002360300https://bugzilla.redhat.com/23609212360921https://bugzilla.redhat.com/23677482367748https://errata.almalinux.org/9/ALSA-2025-8643.htmlALSA-2025:8643ALSA-2025:8643 kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpmlibperf-5.14.0-570.21.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpmlibperf-5.14.0-570.21.1.el9_6.x86_64.rpm«]` CBBBBBBBBBBBBsecurityModerate: glibc security update Nhttps://access.redhat.com/errata/RHSA-2025:8655RHSA-2025:8655RHSA-2025:8655 https://access.redhat.com/security/cve/CVE-2025-4802CVE-2025-4802CVE-2025-4802https://bugzilla.redhat.com/23674682367468https://errata.almalinux.org/9/ALSA-2025-8655.htmlALSA-2025:8655ALSA-2025:8655 Vxnss_db-2.34-168.el9_6.19.i686.rpmWxnss_hesiod-2.34-168.el9_6.19.i686.rpmfxglibc-benchtests-2.34-168.el9_6.19.x86_64.rpmSxglibc-static-2.34-168.el9_6.19.x86_64.rpmRxglibc-nss-devel-2.34-168.el9_6.19.i686.rpmSxglibc-static-2.34-168.el9_6.19.i686.rpmWxnss_hesiod-2.34-168.el9_6.19.x86_64.rpmVxnss_db-2.34-168.el9_6.19.x86_64.rpmRxglibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm Vxnss_db-2.34-168.el9_6.19.i686.rpmWxnss_hesiod-2.34-168.el9_6.19.i686.rpmfxglibc-benchtests-2.34-168.el9_6.19.x86_64.rpmSxglibc-static-2.34-168.el9_6.19.x86_64.rpmRxglibc-nss-devel-2.34-168.el9_6.19.i686.rpmSxglibc-static-2.34-168.el9_6.19.i686.rpmWxnss_hesiod-2.34-168.el9_6.19.x86_64.rpmVxnss_db-2.34-168.el9_6.19.x86_64.rpmRxglibc-nss-devel-2.34-168.el9_6.19.x86_64.rpmŸ a QsecurityImportant: .NET 8.0 security updateR8https://access.redhat.com/errata/RHSA-2025:8813RHSA-2025:8813RHSA-2025:8813 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8813.htmlALSA-2025:8813ALSA-2025:8813 dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm°qb SsecurityImportant: .NET 9.0 security update 7https://access.redhat.com/errata/RHSA-2025:8817RHSA-2025:8817RHSA-2025:8817 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8817.htmlALSA-2025:8817ALSA-2025:8817 edotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpmedotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpmªBc UBBBBsecurityImportant: kernel security updateAihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080 https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080 kernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpmlibperf-5.14.0-570.22.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpmlibperf-5.14.0-570.22.1.el9_6.x86_64.rpmÔd securityImportant: apache-commons-beanutils security update*ihttps://access.redhat.com/errata/RHSA-2025:9114RHSA-2025:9114RHSA-2025:9114 https://access.redhat.com/security/cve/CVE-2025-48734CVE-2025-48734CVE-2025-48734https://bugzilla.redhat.com/23689562368956https://errata.almalinux.org/9/ALSA-2025-9114.htmlALSA-2025:9114ALSA-2025:9114 apache-commons-beanutils-1.9.4-10.el9_6.noarch.rpmapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpmÔ3e ]BsecurityImportant: libvpx security update8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118 https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118 Dlibvpx-devel-1.9.0-9.el9_6.x86_64.rpmDlibvpx-devel-1.9.0-9.el9_6.i686.rpmDlibvpx-devel-1.9.0-9.el9_6.x86_64.rpmDlibvpx-devel-1.9.0-9.el9_6.i686.rpmÔ@f  securityImportant: ipa security updateKghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184 https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184  python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm python3-ipatests-4.12.2-14.el9_6.1.noarch.rpmÊEg aBBBBsecurityModerate: kernel security update 2 https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302 libperf-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpmlibperf-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpmÙ;h VRBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security updateLz https://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303 f^xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpmf^xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpmd|xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpmZ|xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpmS^xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpmd|xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpmf^xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpmf^xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpmd|xorg-x11-server-devel-1.20.11-31.el9_6.i686.rpmZ|xorg-x11-server-source-1.20.11-31.el9_6.noarch.rpmS^xorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpmd|xorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpmÊi 1osecurityImportant: perl-YAML-LibYAML security updateFnhttps://access.redhat.com/errata/RHSA-2025:9330RHSA-2025:9330RHSA-2025:9330 https://access.redhat.com/security/cve/CVE-2025-40908CVE-2025-40908CVE-2025-40908https://bugzilla.redhat.com/23696302369630https://errata.almalinux.org/9/ALSA-2025-9330.htmlALSA-2025:9330ALSA-2025:9330 sRperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpmsRperl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpmØyj rBsecurityModerate: qt5-qtbase security update 4.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462 https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462 #iqt5-qtbase-static-5.15.9-11.el9_6.i686.rpm#iqt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm#iqt5-qtbase-static-5.15.9-11.el9_6.i686.rpm#iqt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpmÊk 65securityImportant: perl-File-Find-Rule security updateb4https://access.redhat.com/errata/RHSA-2025:9517RHSA-2025:9517RHSA-2025:9517 https://access.redhat.com/security/cve/CVE-2011-10007CVE-2011-10007CVE-2011-10007https://bugzilla.redhat.com/23704242370424https://errata.almalinux.org/9/ALSA-2025-9517.htmlALSA-2025:9517ALSA-2025:9517 #~perl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm#~perl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpmÊl wBBBBBBBBBBBBsecurityModerate: glibc security update 2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877 fyglibc-benchtests-2.34-168.el9_6.20.x86_64.rpmSyglibc-static-2.34-168.el9_6.20.x86_64.rpmVynss_db-2.34-168.el9_6.20.x86_64.rpmSyglibc-static-2.34-168.el9_6.20.i686.rpmVynss_db-2.34-168.el9_6.20.i686.rpmWynss_hesiod-2.34-168.el9_6.20.i686.rpmRyglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpmRyglibc-nss-devel-2.34-168.el9_6.20.i686.rpmWynss_hesiod-2.34-168.el9_6.20.x86_64.rpm fyglibc-benchtests-2.34-168.el9_6.20.x86_64.rpmSyglibc-static-2.34-168.el9_6.20.x86_64.rpmVynss_db-2.34-168.el9_6.20.x86_64.rpmSyglibc-static-2.34-168.el9_6.20.i686.rpmVynss_db-2.34-168.el9_6.20.i686.rpmWynss_hesiod-2.34-168.el9_6.20.i686.rpmRyglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpmRyglibc-nss-devel-2.34-168.el9_6.20.i686.rpmWynss_hesiod-2.34-168.el9_6.20.x86_64.rpmÊtm EBBBBsecurityModerate: kernel security update H https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 libperf-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpmlibperf-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpmkernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpmÓbn KBBBBBBBBBBBsecurityModerate: poppler security update Qxhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126 https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126 poppler-cpp-devel-21.01.0-23.el9_7.i686.rpmpoppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpmHpoppler-glib-doc-21.01.0-23.el9_7.noarch.rpm!poppler-qt5-devel-21.01.0-23.el9_7.i686.rpmpoppler-devel-21.01.0-23.el9_7.x86_64.rpm!poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpmpoppler-devel-21.01.0-23.el9_7.i686.rpm poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm poppler-glib-devel-21.01.0-23.el9_7.i686.rpm poppler-cpp-devel-21.01.0-23.el9_7.i686.rpmpoppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpmHpoppler-glib-doc-21.01.0-23.el9_7.noarch.rpm!poppler-qt5-devel-21.01.0-23.el9_7.i686.rpmpoppler-devel-21.01.0-23.el9_7.x86_64.rpm!poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpmpoppler-devel-21.01.0-23.el9_7.i686.rpm poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm poppler-glib-devel-21.01.0-23.el9_7.i686.rpmqo XBBBBsecurityImportant: mariadb security updateI8https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137 https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137 Kmariadb-devel-10.5.29-3.el9_7.x86_64.rpmLmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpmMmariadb-test-10.5.29-3.el9_7.x86_64.rpmKmariadb-devel-10.5.29-3.el9_7.x86_64.rpmLmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpmMmariadb-test-10.5.29-3.el9_7.x86_64.rpmp ^BBBBsecurityModerate: kernel security update 0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445 5libperf-5.14.0-611.20.1.el9_7.x86_64.rpm5kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm5kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm5libperf-5.14.0-611.20.1.el9_7.x86_64.rpm5kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm5kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm˩Fq dBBBBBBBBBBBsecurityModerate: postgresql security update 1[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491 Npostgresql-docs-13.23-1.el9_7.x86_64.rpmNpostgresql-test-13.23-1.el9_7.x86_64.rpmNpostgresql-static-13.23-1.el9_7.x86_64.rpmNpostgresql-server-devel-13.23-1.el9_7.x86_64.rpmCNpostgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpmNpostgresql-private-devel-13.23-1.el9_7.x86_64.rpmNpostgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpmNpostgresql-docs-13.23-1.el9_7.x86_64.rpmNpostgresql-test-13.23-1.el9_7.x86_64.rpmNpostgresql-static-13.23-1.el9_7.x86_64.rpmNpostgresql-server-devel-13.23-1.el9_7.x86_64.rpmCNpostgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpmNpostgresql-private-devel-13.23-1.el9_7.x86_64.rpmNpostgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm˩Wr 3qsecurityModerate: transfig security update Phttps://access.redhat.com/errata/RHSA-2026:0700RHSA-2026:0700RHSA-2026:0700 https://access.redhat.com/security/cve/CVE-2025-46397CVE-2025-46397CVE-2025-46397https://bugzilla.redhat.com/23620582362058https://errata.almalinux.org/9/ALSA-2026-0700.htmlALSA-2026:0700ALSA-2026:0700 |Ttransfig-3.2.7b-11.el9_7.x86_64.rpm|Ttransfig-3.2.7b-11.el9_7.x86_64.rpm˩Qs 6tsecurityImportant: jmc security update\"https://access.redhat.com/errata/RHSA-2026:0752RHSA-2026:0752RHSA-2026:0752 https://access.redhat.com/security/cve/CVE-2025-66566CVE-2025-66566CVE-2025-66566https://bugzilla.redhat.com/24195002419500https://errata.almalinux.org/9/ALSA-2026-0752.htmlALSA-2026:0752ALSA-2026:0752 Pjmc-8.2.0-18.el9_7.2.x86_64.rpmPjmc-8.2.0-18.el9_7.2.x86_64.rpm˽t wBBBBsecurityImportant: kernel security update~+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793 6libperf-5.14.0-611.24.1.el9_7.x86_64.rpm6kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm6kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm6libperf-5.14.0-611.24.1.el9_7.x86_64.rpm6kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm6kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpmtu }BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update)dhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927 k8java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo8java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmj8java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmg8java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq8java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmr8java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmi8java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmm8java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp8java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmh8java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms8java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn8java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt8java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpml8java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmk8java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmo8java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmj8java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmg8java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmq8java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmr8java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmi8java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmm8java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmp8java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmh8java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpms8java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmn8java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpmt8java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpml8java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm2v !YBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update )https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928 {@java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm|@java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm}@java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm~@java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmv@java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmu@java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmz@java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmx@java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmw@java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmy@java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm{@java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm|@java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm}@java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm~@java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmv@java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmu@java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmz@java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmx@java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm@java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmw@java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpmy@java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm&w "uBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update6whttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932  ajava-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm  ajava-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ajava-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmajava-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmx #IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update-fhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933 '!java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm(!java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm#!java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm*!java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm&!java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm.!java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm/!java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm-!java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm%!java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm"!java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm1!java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm+!java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm0!java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm$!java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm,!java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm)!java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm'!java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm(!java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm#!java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm*!java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm&!java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm.!java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm/!java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm-!java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm%!java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm"!java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm1!java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm+!java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm0!java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm$!java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm,!java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm)!java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpmy $iBsecurityModerate: glib2 security update https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936 Tglib2-static-2.68.4-18.el9_7.1.i686.rpmTglib2-static-2.68.4-18.el9_7.1.x86_64.rpmTglib2-static-2.68.4-18.el9_7.1.i686.rpmTglib2-static-2.68.4-18.el9_7.1.x86_64.rpmez 'eBGBBBBBBBBBsecurityImportant: python3.12 security update0ihttps://access.redhat.com/errata/RHSA-2026:10745RHSA-2026:10745RHSA-2026:10745 https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10745.htmlALSA-2026:10745ALSA-2026:10745 $*python3.12-idle-3.12.12-4.el9_7.3.i686.rpm#*python3.12-debug-3.12.12-4.el9_7.3.x86_64.rpm#*python3.12-debug-3.12.12-4.el9_7.3.i686.rpm$*python3.12-idle-3.12.12-4.el9_7.3.x86_64.rpm%*python3.12-test-3.12.12-4.el9_7.3.x86_64.rpm%*python3.12-test-3.12.12-4.el9_7.3.i686.rpm*python3.12-tkinter-3.12.12-4.el9_7.3.i686.rpm*python3.12-3.12.12-4.el9_7.3.i686.rpm$*python3.12-idle-3.12.12-4.el9_7.3.i686.rpm#*python3.12-debug-3.12.12-4.el9_7.3.x86_64.rpm#*python3.12-debug-3.12.12-4.el9_7.3.i686.rpm$*python3.12-idle-3.12.12-4.el9_7.3.x86_64.rpm%*python3.12-test-3.12.12-4.el9_7.3.x86_64.rpm%*python3.12-test-3.12.12-4.el9_7.3.i686.rpm*python3.12-tkinter-3.12.12-4.el9_7.3.i686.rpm*python3.12-3.12.12-4.el9_7.3.i686.rpmb{ *hBOBBBBBBBBBsecurityImportant: python3.11 security updateihttps://access.redhat.com/errata/RHSA-2026:10774RHSA-2026:10774RHSA-2026:10774 https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10774.htmlALSA-2026:10774ALSA-2026:10774 python3.11-debug-3.11.13-5.3.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.3.el9_7.i686.rpmpython3.11-test-3.11.13-5.3.el9_7.i686.rpmbpython3.11-3.11.13-5.3.el9_7.i686.rpmpython3.11-test-3.11.13-5.3.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.3.el9_7.x86_64.rpmcpython3.11-tkinter-3.11.13-5.3.el9_7.i686.rpmpython3.11-debug-3.11.13-5.3.el9_7.i686.rpmpython3.11-debug-3.11.13-5.3.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.3.el9_7.i686.rpmpython3.11-test-3.11.13-5.3.el9_7.i686.rpmbpython3.11-3.11.13-5.3.el9_7.i686.rpmpython3.11-test-3.11.13-5.3.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.3.el9_7.x86_64.rpmcpython3.11-tkinter-3.11.13-5.3.el9_7.i686.rpmpython3.11-debug-3.11.13-5.3.el9_7.i686.rpm:| ,kGRBBBBBBBBBsecurityImportant: python3.9 security updateihttps://access.redhat.com/errata/RHSA-2026:10949RHSA-2026:10949RHSA-2026:10949 https://access.redhat.com/security/cve/CVE-2026-4786CVE-2026-4786CVE-2026-4786https://access.redhat.com/security/cve/CVE-2026-6100CVE-2026-6100CVE-2026-6100https://bugzilla.redhat.com/24579322457932https://bugzilla.redhat.com/24580492458049https://errata.almalinux.org/9/ALSA-2026-10949.htmlALSA-2026:10949ALSA-2026:10949 PGpython3-tkinter-3.9.25-3.el9_7.3.i686.rpmGpython3-test-3.9.25-3.el9_7.3.i686.rpmGpython3-idle-3.9.25-3.el9_7.3.i686.rpmGpython3-debug-3.9.25-3.el9_7.3.i686.rpmGpython3-debug-3.9.25-3.el9_7.3.x86_64.rpmGpython3-idle-3.9.25-3.el9_7.3.x86_64.rpmGpython3-test-3.9.25-3.el9_7.3.x86_64.rpmOGpython3-3.9.25-3.el9_7.3.i686.rpmPGpython3-tkinter-3.9.25-3.el9_7.3.i686.rpmGpython3-test-3.9.25-3.el9_7.3.i686.rpmGpython3-idle-3.9.25-3.el9_7.3.i686.rpmGpython3-debug-3.9.25-3.el9_7.3.i686.rpmGpython3-debug-3.9.25-3.el9_7.3.x86_64.rpmGpython3-idle-3.9.25-3.el9_7.3.x86_64.rpmGpython3-test-3.9.25-3.el9_7.3.x86_64.rpmOGpython3-3.9.25-3.el9_7.3.i686.rpm@} -MBsecurityImportant: LibRaw security updatek'https://access.redhat.com/errata/RHSA-2026:11360RHSA-2026:11360RHSA-2026:11360 https://access.redhat.com/security/cve/CVE-2026-21413CVE-2026-21413CVE-2026-21413https://access.redhat.com/security/cve/CVE-2026-24450CVE-2026-24450CVE-2026-24450https://bugzilla.redhat.com/24559252455925https://bugzilla.redhat.com/24559292455929https://errata.almalinux.org/9/ALSA-2026-11360.htmlALSA-2026:11360ALSA-2026:11360 9&LibRaw-devel-0.21.1-2.el9_7.i686.rpm9&LibRaw-devel-0.21.1-2.el9_7.x86_64.rpm9&LibRaw-devel-0.21.1-2.el9_7.i686.rpm9&LibRaw-devel-0.21.1-2.el9_7.x86_64.rpmNj)~ /ncBBsecurityImportant: xorg-x11-server-Xwayland security updatehttps://access.redhat.com/errata/RHSA-2026:11369RHSA-2026:11369RHSA-2026:11369 https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://errata.almalinux.org/9/ALSA-2026-11369.htmlALSA-2026:11369ALSA-2026:11369 f`xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.i686.rpmf`xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.x86_64.rpmS`xorg-x11-server-Xwayland-23.2.7-6.el9_7.i686.rpmf`xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.i686.rpmf`xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.x86_64.rpmS`xorg-x11-server-Xwayland-23.2.7-6.el9_7.i686.rpmNJG 0TBBsecurityImportant: xorg-x11-server security update. https://access.redhat.com/errata/RHSA-2026:11388RHSA-2026:11388RHSA-2026:11388 https://access.redhat.com/security/cve/CVE-2026-33999CVE-2026-33999CVE-2026-33999https://access.redhat.com/security/cve/CVE-2026-34001CVE-2026-34001CVE-2026-34001https://access.redhat.com/security/cve/CVE-2026-34003CVE-2026-34003CVE-2026-34003https://bugzilla.redhat.com/24511062451106https://bugzilla.redhat.com/24511092451109https://bugzilla.redhat.com/24511132451113https://errata.almalinux.org/9/ALSA-2026-11388.htmlALSA-2026:11388ALSA-2026:11388 d~xorg-x11-server-devel-1.20.11-33.el9_7.i686.rpmZ~xorg-x11-server-source-1.20.11-33.el9_7.noarch.rpmd~xorg-x11-server-devel-1.20.11-33.el9_7.x86_64.rpmd~xorg-x11-server-devel-1.20.11-33.el9_7.i686.rpmZ~xorg-x11-server-source-1.20.11-33.el9_7.noarch.rpmd~xorg-x11-server-devel-1.20.11-33.el9_7.x86_64.rpmljM 1XBBBBsecurityImportant: kernel security update9https://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143 7kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm7kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm7libperf-5.14.0-611.26.1.el9_7.x86_64.rpm7kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm7kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm7libperf-5.14.0-611.26.1.el9_7.x86_64.rpm/ 4rBlBBBBBBBBBsecurityModerate: python3.12 security update V,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408 #'python3.12-debug-3.12.12-4.el9_7.x86_64.rpm'python3.12-tkinter-3.12.12-4.el9_7.i686.rpm%'python3.12-test-3.12.12-4.el9_7.x86_64.rpm'python3.12-3.12.12-4.el9_7.i686.rpm$'python3.12-idle-3.12.12-4.el9_7.x86_64.rpm%'python3.12-test-3.12.12-4.el9_7.i686.rpm$'python3.12-idle-3.12.12-4.el9_7.i686.rpm#'python3.12-debug-3.12.12-4.el9_7.i686.rpm#'python3.12-debug-3.12.12-4.el9_7.x86_64.rpm'python3.12-tkinter-3.12.12-4.el9_7.i686.rpm%'python3.12-test-3.12.12-4.el9_7.x86_64.rpm'python3.12-3.12.12-4.el9_7.i686.rpm$'python3.12-idle-3.12.12-4.el9_7.x86_64.rpm%'python3.12-test-3.12.12-4.el9_7.i686.rpm$'python3.12-idle-3.12.12-4.el9_7.i686.rpm#'python3.12-debug-3.12.12-4.el9_7.i686.rpm 7uBtBBBBBBBBBsecurityModerate: python3.11 security update ,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410 python3.11-idle-3.11.13-5.el9_7.x86_64.rpmpython3.11-test-3.11.13-5.el9_7.x86_64.rpmbpython3.11-3.11.13-5.el9_7.i686.rpmpython3.11-test-3.11.13-5.el9_7.i686.rpmpython3.11-debug-3.11.13-5.el9_7.i686.rpmcpython3.11-tkinter-3.11.13-5.el9_7.i686.rpmpython3.11-idle-3.11.13-5.el9_7.i686.rpmpython3.11-debug-3.11.13-5.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.el9_7.x86_64.rpmpython3.11-test-3.11.13-5.el9_7.x86_64.rpmbpython3.11-3.11.13-5.el9_7.i686.rpmpython3.11-test-3.11.13-5.el9_7.i686.rpmpython3.11-debug-3.11.13-5.el9_7.i686.rpmcpython3.11-tkinter-3.11.13-5.el9_7.i686.rpmpython3.11-idle-3.11.13-5.el9_7.i686.rpmpython3.11-debug-3.11.13-5.el9_7.x86_64.rpmJ 9x{CBBBBBBBBBsecurityModerate: python3.9 security update .bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 Dpython3-debug-3.9.25-3.el9_7.i686.rpmODpython3-3.9.25-3.el9_7.i686.rpmDpython3-test-3.9.25-3.el9_7.x86_64.rpmDpython3-idle-3.9.25-3.el9_7.i686.rpmDpython3-debug-3.9.25-3.el9_7.x86_64.rpmPDpython3-tkinter-3.9.25-3.el9_7.i686.rpmDpython3-test-3.9.25-3.el9_7.i686.rpmDpython3-idle-3.9.25-3.el9_7.x86_64.rpmDpython3-debug-3.9.25-3.el9_7.i686.rpmODpython3-3.9.25-3.el9_7.i686.rpmDpython3-test-3.9.25-3.el9_7.x86_64.rpmDpython3-idle-3.9.25-3.el9_7.i686.rpmDpython3-debug-3.9.25-3.el9_7.x86_64.rpmPDpython3-tkinter-3.9.25-3.el9_7.i686.rpmDpython3-test-3.9.25-3.el9_7.i686.rpmDpython3-idle-3.9.25-3.el9_7.x86_64.rpmu :BBBBsecurityModerate: kernel security update Dhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617 https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617 8libperf-5.14.0-611.27.1.el9_7.x86_64.rpm8kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm8kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm8libperf-5.14.0-611.27.1.el9_7.x86_64.rpm8kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm8kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm̖4 ;EBBBBsecurityModerate: util-linux security update Thttps://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 Llibsmartcols-devel-2.37.4-21.el9_7.i686.rpm}Llibfdisk-devel-2.37.4-21.el9_7.x86_64.rpmLlibsmartcols-devel-2.37.4-21.el9_7.x86_64.rpm}Llibfdisk-devel-2.37.4-21.el9_7.i686.rpmLlibsmartcols-devel-2.37.4-21.el9_7.i686.rpm}Llibfdisk-devel-2.37.4-21.el9_7.x86_64.rpmLlibsmartcols-devel-2.37.4-21.el9_7.x86_64.rpm}Llibfdisk-devel-2.37.4-21.el9_7.i686.rpm̫E < securityImportant: python3.12-wheel security updatephhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939 https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939 'python3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm'python3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm̫! LBsecurityImportant: fontforge security updateXthttps://access.redhat.com/errata/RHSA-2026:2039RHSA-2026:2039RHSA-2026:2039 https://access.redhat.com/security/cve/CVE-2025-15269CVE-2025-15269CVE-2025-15269https://access.redhat.com/security/cve/CVE-2025-15275CVE-2025-15275CVE-2025-15275https://access.redhat.com/security/cve/CVE-2025-15279CVE-2025-15279CVE-2025-15279https://bugzilla.redhat.com/24264212426421https://bugzilla.redhat.com/24264232426423https://bugzilla.redhat.com/24264292426429https://errata.almalinux.org/9/ALSA-2026-2039.htmlALSA-2026:2039ALSA-2026:2039 @Zfontforge-20201107-7.el9_7.x86_64.rpm@Zfontforge-20201107-7.el9_7.i686.rpm@Zfontforge-20201107-7.el9_7.x86_64.rpm@Zfontforge-20201107-7.el9_7.i686.rpm̙J =PBBBBsecurityImportant: freerdp security updateLhttps://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048 https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048 Pfreerdp-devel-2.11.7-1.el9_7.1.i686.rpmPlibwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpmPlibwinpr-devel-2.11.7-1.el9_7.1.i686.rpmPfreerdp-devel-2.11.7-1.el9_7.1.x86_64.rpmPfreerdp-devel-2.11.7-1.el9_7.1.i686.rpmPlibwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpmPlibwinpr-devel-2.11.7-1.el9_7.1.i686.rpmPfreerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm̫u  >VBBBBsecurityModerate: kernel security update ju"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212 https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212 9libperf-5.14.0-611.30.1.el9_7.x86_64.rpm9kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm9kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm9libperf-5.14.0-611.30.1.el9_7.x86_64.rpm9kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm9kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm̶#  ?\BBBBsecurityModerate: kernel security update _https://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722 https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722 :kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm:kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm:libperf-5.14.0-611.34.1.el9_7.x86_64.rpm:kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm:kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm:libperf-5.14.0-611.34.1.el9_7.x86_64.rpm,  @BbBsecurityModerate: edk2 security update vGhttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776 Qpedk2-tools-doc-20241117-4.el9_7.3.noarch.rpmpedk2-tools-20241117-4.el9_7.3.x86_64.rpm%pedk2-ovmf-20241117-4.el9_7.3.noarch.rpmPpedk2-aarch64-20241117-4.el9_7.3.noarch.rpmQpedk2-tools-doc-20241117-4.el9_7.3.noarch.rpmpedk2-tools-20241117-4.el9_7.3.x86_64.rpm%pedk2-ovmf-20241117-4.el9_7.3.noarch.rpmPpedk2-aarch64-20241117-4.el9_7.3.noarch.rpm׆=  eBBBBBBBBBBBBsecurityModerate: glibc security update =|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786 https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786 Szglibc-static-2.34-231.el9_7.10.x86_64.rpmfzglibc-benchtests-2.34-231.el9_7.10.x86_64.rpmRzglibc-nss-devel-2.34-231.el9_7.10.i686.rpmVznss_db-2.34-231.el9_7.10.x86_64.rpmWznss_hesiod-2.34-231.el9_7.10.i686.rpmRzglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpmVznss_db-2.34-231.el9_7.10.i686.rpmSzglibc-static-2.34-231.el9_7.10.i686.rpmWznss_hesiod-2.34-231.el9_7.10.x86_64.rpm Szglibc-static-2.34-231.el9_7.10.x86_64.rpmfzglibc-benchtests-2.34-231.el9_7.10.x86_64.rpmRzglibc-nss-devel-2.34-231.el9_7.10.i686.rpmVznss_db-2.34-231.el9_7.10.x86_64.rpmWznss_hesiod-2.34-231.el9_7.10.i686.rpmRzglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpmVznss_db-2.34-231.el9_7.10.i686.rpmSzglibc-static-2.34-231.el9_7.10.i686.rpmWznss_hesiod-2.34-231.el9_7.10.x86_64.rpmׄ   sBsecurityImportant: munge security update9}https://access.redhat.com/errata/RHSA-2026:3034RHSA-2026:3034RHSA-2026:3034 https://access.redhat.com/security/cve/CVE-2026-25506CVE-2026-25506CVE-2026-25506https://bugzilla.redhat.com/24387152438715https://errata.almalinux.org/9/ALSA-2026-3034.htmlALSA-2026:3034ALSA-2026:3034  )munge-devel-0.5.13-14.el9_7.x86_64.rpm )munge-devel-0.5.13-14.el9_7.i686.rpm )munge-devel-0.5.13-14.el9_7.x86_64.rpm )munge-devel-0.5.13-14.el9_7.i686.rpm̀; vBBBBsecurityModerate: kernel security update 6whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066 https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066 ;kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm;libperf-5.14.0-611.35.1.el9_7.x86_64.rpm;kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm;kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm;libperf-5.14.0-611.35.1.el9_7.x86_64.rpm;kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm̀ |BBBBsecurityImportant: freerdp security update-^https://access.redhat.com/errata/RHSA-2026:3067RHSA-2026:3067RHSA-2026:3067 https://access.redhat.com/security/cve/CVE-2026-22855CVE-2026-22855CVE-2026-22855https://access.redhat.com/security/cve/CVE-2026-22858CVE-2026-22858CVE-2026-22858https://access.redhat.com/security/cve/CVE-2026-22859CVE-2026-22859CVE-2026-22859https://bugzilla.redhat.com/24296452429645https://bugzilla.redhat.com/24296492429649https://bugzilla.redhat.com/24296532429653https://errata.almalinux.org/9/ALSA-2026-3067.htmlALSA-2026:3067ALSA-2026:3067 Qfreerdp-devel-2.11.7-1.el9_7.2.i686.rpmQlibwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpmQfreerdp-devel-2.11.7-1.el9_7.2.x86_64.rpmQlibwinpr-devel-2.11.7-1.el9_7.2.i686.rpmQfreerdp-devel-2.11.7-1.el9_7.2.i686.rpmQlibwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpmQfreerdp-devel-2.11.7-1.el9_7.2.x86_64.rpmQlibwinpr-devel-2.11.7-1.el9_7.2.i686.rpm̀ BBBBBBBBsecurityImportant: protobuf security update 9https://access.redhat.com/errata/RHSA-2026:3095RHSA-2026:3095RHSA-2026:3095 https://access.redhat.com/security/cve/CVE-2026-0994CVE-2026-0994CVE-2026-0994https://bugzilla.redhat.com/24323982432398https://errata.almalinux.org/9/ALSA-2026-3095.htmlALSA-2026:3095ALSA-2026:3095 E protobuf-devel-3.14.0-17.el9_7.i686.rpmF protobuf-lite-devel-3.14.0-17.el9_7.i686.rpmD protobuf-compiler-3.14.0-17.el9_7.x86_64.rpmF protobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpmE protobuf-devel-3.14.0-17.el9_7.x86_64.rpmD protobuf-compiler-3.14.0-17.el9_7.i686.rpmE protobuf-devel-3.14.0-17.el9_7.i686.rpmF protobuf-lite-devel-3.14.0-17.el9_7.i686.rpmD protobuf-compiler-3.14.0-17.el9_7.x86_64.rpmF protobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpmE protobuf-devel-3.14.0-17.el9_7.x86_64.rpmD protobuf-compiler-3.14.0-17.el9_7.i686.rpm- KsecurityModerate: 389-ds-base security update Dhttps://access.redhat.com/errata/RHSA-2026:3189RHSA-2026:3189RHSA-2026:3189 https://access.redhat.com/security/cve/CVE-2025-14905CVE-2025-14905CVE-2025-14905https://bugzilla.redhat.com/24236242423624https://errata.almalinux.org/9/ALSA-2026-3189.htmlALSA-2026:3189ALSA-2026:3189 {\389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm{\389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm̀ MBBBBsecurityModerate: kernel security update ]Zhttps://access.redhat.com/errata/RHSA-2026:3488RHSA-2026:3488RHSA-2026:3488 https://access.redhat.com/security/cve/CVE-2025-40168CVE-2025-40168CVE-2025-40168https://access.redhat.com/security/cve/CVE-2025-71085CVE-2025-71085CVE-2025-71085https://access.redhat.com/security/cve/CVE-2026-23097CVE-2026-23097CVE-2026-23097https://bugzilla.redhat.com/24144822414482https://bugzilla.redhat.com/24290262429026https://bugzilla.redhat.com/24368022436802https://errata.almalinux.org/9/ALSA-2026-3488.htmlALSA-2026:3488ALSA-2026:3488 <libperf-5.14.0-611.36.1.el9_7.x86_64.rpm<kernel-cross-headers-5.14.0-611.36.1.el9_7.x86_64.rpm<kernel-tools-libs-devel-5.14.0-611.36.1.el9_7.x86_64.rpm<libperf-5.14.0-611.36.1.el9_7.x86_64.rpm<kernel-cross-headers-5.14.0-611.36.1.el9_7.x86_64.rpm<kernel-tools-libs-devel-5.14.0-611.36.1.el9_7.x86_64.rpm͠F SBBBBBBBBBBBsecurityImportant: postgresql security update7https://access.redhat.com/errata/RHSA-2026:3730RHSA-2026:3730RHSA-2026:3730 https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-3730.htmlALSA-2026:3730ALSA-2026:3730 Opostgresql-upgrade-devel-13.23-2.el9_7.x86_64.rpmOpostgresql-server-devel-13.23-2.el9_7.x86_64.rpmCOpostgresql-test-rpm-macros-13.23-2.el9_7.noarch.rpmOpostgresql-test-13.23-2.el9_7.x86_64.rpmOpostgresql-static-13.23-2.el9_7.x86_64.rpmOpostgresql-docs-13.23-2.el9_7.x86_64.rpmOpostgresql-private-devel-13.23-2.el9_7.x86_64.rpmOpostgresql-upgrade-devel-13.23-2.el9_7.x86_64.rpmOpostgresql-server-devel-13.23-2.el9_7.x86_64.rpmCOpostgresql-test-rpm-macros-13.23-2.el9_7.noarch.rpmOpostgresql-test-13.23-2.el9_7.x86_64.rpmOpostgresql-static-13.23-2.el9_7.x86_64.rpmOpostgresql-docs-13.23-2.el9_7.x86_64.rpmOpostgresql-private-devel-13.23-2.el9_7.x86_64.rpmd `BsecurityModerate: nfs-utils security update <@https://access.redhat.com/errata/RHSA-2026:3940RHSA-2026:3940RHSA-2026:3940 https://access.redhat.com/security/cve/CVE-2025-12801CVE-2025-12801CVE-2025-12801https://bugzilla.redhat.com/24130812413081https://errata.almalinux.org/9/ALSA-2026-3940.htmlALSA-2026:3940ALSA-2026:3940 Ilibnfsidmap-devel-2.5.4-38.el9_7.3.x86_64.rpmIlibnfsidmap-devel-2.5.4-38.el9_7.3.i686.rpmIlibnfsidmap-devel-2.5.4-38.el9_7.3.x86_64.rpmIlibnfsidmap-devel-2.5.4-38.el9_7.3.i686.rpmϲ! cBBBBsecurityModerate: kernel security update |https://access.redhat.com/errata/RHSA-2026:3966RHSA-2026:3966RHSA-2026:3966 https://access.redhat.com/security/cve/CVE-2025-38106CVE-2025-38106CVE-2025-38106https://access.redhat.com/security/cve/CVE-2026-23001CVE-2026-23001CVE-2026-23001https://bugzilla.redhat.com/23760772376077https://bugzilla.redhat.com/24326642432664https://errata.almalinux.org/9/ALSA-2026-3966.htmlALSA-2026:3966ALSA-2026:3966 =kernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm=libperf-5.14.0-611.38.1.el9_7.x86_64.rpm=kernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpm=kernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm=libperf-5.14.0-611.38.1.el9_7.x86_64.rpm=kernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpmm MB\BBBBBBBBBsecurityModerate: python3.12 security update `https://access.redhat.com/errata/RHSA-2026:4165RHSA-2026:4165RHSA-2026:4165 https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4165.htmlALSA-2026:4165ALSA-2026:4165 (python3.12-tkinter-3.12.12-4.el9_7.1.i686.rpm%(python3.12-test-3.12.12-4.el9_7.1.i686.rpm$(python3.12-idle-3.12.12-4.el9_7.1.i686.rpm#(python3.12-debug-3.12.12-4.el9_7.1.x86_64.rpm(python3.12-3.12.12-4.el9_7.1.i686.rpm$(python3.12-idle-3.12.12-4.el9_7.1.x86_64.rpm%(python3.12-test-3.12.12-4.el9_7.1.x86_64.rpm#(python3.12-debug-3.12.12-4.el9_7.1.i686.rpm(python3.12-tkinter-3.12.12-4.el9_7.1.i686.rpm%(python3.12-test-3.12.12-4.el9_7.1.i686.rpm$(python3.12-idle-3.12.12-4.el9_7.1.i686.rpm#(python3.12-debug-3.12.12-4.el9_7.1.x86_64.rpm(python3.12-3.12.12-4.el9_7.1.i686.rpm$(python3.12-idle-3.12.12-4.el9_7.1.x86_64.rpm%(python3.12-test-3.12.12-4.el9_7.1.x86_64.rpm#(python3.12-debug-3.12.12-4.el9_7.1.i686.rpm\ PdBBBBBBBBBBsecurityModerate: python3.9 security update m` https://access.redhat.com/errata/RHSA-2026:4168RHSA-2026:4168RHSA-2026:4168 https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4168.htmlALSA-2026:4168ALSA-2026:4168 https://www.redhat.com/security/data/cve/CVE-2025-15366.htmlCVE-2025-15366CVE-2025-15366https://www.redhat.com/security/data/cve/CVE-2025-15367.htmlCVE-2025-15367CVE-2025-15367https://www.redhat.com/security/data/cve/CVE-2026-0865.htmlCVE-2026-0865CVE-2026-0865https://www.redhat.com/security/data/cve/CVE-2026-1299.htmlCVE-2026-1299CVE-2026-1299Epython3-debug-3.9.25-3.el9_7.1.i686.rpmEpython3-idle-3.9.25-3.el9_7.1.i686.rpmEpython3-test-3.9.25-3.el9_7.1.i686.rpmEpython3-test-3.9.25-3.el9_7.1.x86_64.rpmOEpython3-3.9.25-3.el9_7.1.i686.rpmEpython3-debug-3.9.25-3.el9_7.1.x86_64.rpmPEpython3-tkinter-3.9.25-3.el9_7.1.i686.rpmEpython3-idle-3.9.25-3.el9_7.1.x86_64.rpmEpython3-debug-3.9.25-3.el9_7.1.i686.rpmEpython3-idle-3.9.25-3.el9_7.1.i686.rpmEpython3-test-3.9.25-3.el9_7.1.i686.rpmEpython3-test-3.9.25-3.el9_7.1.x86_64.rpmOEpython3-3.9.25-3.el9_7.1.i686.rpmEpython3-debug-3.9.25-3.el9_7.1.x86_64.rpmPEpython3-tkinter-3.9.25-3.el9_7.1.i686.rpmEpython3-idle-3.9.25-3.el9_7.1.x86_64.rpmϰ* RBmBBBBBBBBBsecurityModerate: python3.11 security update M`https://access.redhat.com/errata/RHSA-2026:4216RHSA-2026:4216RHSA-2026:4216 https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4216.htmlALSA-2026:4216ALSA-2026:4216 python3.11-debug-3.11.13-5.1.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.1.el9_7.x86_64.rpmpython3.11-debug-3.11.13-5.1.el9_7.i686.rpmpython3.11-test-3.11.13-5.1.el9_7.i686.rpmcpython3.11-tkinter-3.11.13-5.1.el9_7.i686.rpmpython3.11-idle-3.11.13-5.1.el9_7.i686.rpmbpython3.11-3.11.13-5.1.el9_7.i686.rpmpython3.11-test-3.11.13-5.1.el9_7.x86_64.rpmpython3.11-debug-3.11.13-5.1.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.1.el9_7.x86_64.rpmpython3.11-debug-3.11.13-5.1.el9_7.i686.rpmpython3.11-test-3.11.13-5.1.el9_7.i686.rpmcpython3.11-tkinter-3.11.13-5.1.el9_7.i686.rpmpython3.11-idle-3.11.13-5.1.el9_7.i686.rpmbpython3.11-3.11.13-5.1.el9_7.i686.rpmpython3.11-test-3.11.13-5.1.el9_7.x86_64.rpmϭ= JsecurityImportant: .NET 10.0 security update-*https://access.redhat.com/errata/RHSA-2026:4445RHSA-2026:4445RHSA-2026:4445 https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4445.htmlALSA-2026:4445ALSA-2026:4445 (Qdotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7.x86_64.rpm(Qdotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7.x86_64.rpm< LBsecurityImportant: libvpx security updateW9https://access.redhat.com/errata/RHSA-2026:4447RHSA-2026:4447RHSA-2026:4447 https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://bugzilla.redhat.com/24402192440219https://errata.almalinux.org/9/ALSA-2026-4447.htmlALSA-2026:4447ALSA-2026:4447 Alibvpx-devel-1.9.0-10.el9_7.i686.rpmAlibvpx-devel-1.9.0-10.el9_7.x86_64.rpmAlibvpx-devel-1.9.0-10.el9_7.i686.rpmAlibvpx-devel-1.9.0-10.el9_7.x86_64.rpmH OsecurityImportant: .NET 8.0 security update_https://access.redhat.com/errata/RHSA-2026:4454RHSA-2026:4454RHSA-2026:4454 https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4454.htmlALSA-2026:4454ALSA-2026:4454 dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7.x86_64.rpmϬ$ QsecurityImportant: .NET 9.0 security updateo)https://access.redhat.com/errata/RHSA-2026:4456RHSA-2026:4456RHSA-2026:4456 https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4456.htmlALSA-2026:4456ALSA-2026:4456 edotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7.x86_64.rpmedotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7.x86_64.rpm SBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2026:4759RHSA-2026:4759RHSA-2026:4759 https://access.redhat.com/security/cve/CVE-2025-39818CVE-2025-39818CVE-2025-39818https://access.redhat.com/security/cve/CVE-2025-68800CVE-2025-68800CVE-2025-68800https://bugzilla.redhat.com/23957972395797https://bugzilla.redhat.com/24290652429065https://errata.almalinux.org/9/ALSA-2026-4759.htmlALSA-2026:4759ALSA-2026:4759 >kernel-tools-libs-devel-5.14.0-611.41.1.el9_7.x86_64.rpm>kernel-cross-headers-5.14.0-611.41.1.el9_7.x86_64.rpm>libperf-5.14.0-611.41.1.el9_7.x86_64.rpm>kernel-tools-libs-devel-5.14.0-611.41.1.el9_7.x86_64.rpm>kernel-cross-headers-5.14.0-611.41.1.el9_7.x86_64.rpm>libperf-5.14.0-611.41.1.el9_7.x86_64.rpmg YBBsecurityModerate: mysql security update Ahttps://access.redhat.com/errata/RHSA-2026:4828RHSA-2026:4828RHSA-2026:4828 https://access.redhat.com/security/cve/CVE-2026-21936CVE-2026-21936CVE-2026-21936https://access.redhat.com/security/cve/CVE-2026-21937CVE-2026-21937CVE-2026-21937https://access.redhat.com/security/cve/CVE-2026-21941CVE-2026-21941CVE-2026-21941https://access.redhat.com/security/cve/CVE-2026-21948CVE-2026-21948CVE-2026-21948https://access.redhat.com/security/cve/CVE-2026-21964CVE-2026-21964CVE-2026-21964https://access.redhat.com/security/cve/CVE-2026-21968CVE-2026-21968CVE-2026-21968https://bugzilla.redhat.com/24313842431384https://bugzilla.redhat.com/24313852431385https://bugzilla.redhat.com/24314022431402https://bugzilla.redhat.com/24314092431409https://bugzilla.redhat.com/24314132431413https://bugzilla.redhat.com/24314312431431https://errata.almalinux.org/9/ALSA-2026-4828.htmlALSA-2026:4828ALSA-2026:4828 0mysql-test-8.0.45-1.el9_7.x86_64.rpm/mysql-devel-8.0.45-1.el9_7.x86_64.rpm0mysql-test-8.0.45-1.el9_7.x86_64.rpm/mysql-devel-8.0.45-1.el9_7.x86_64.rpm> ]BBBBsecurityImportant: capstone security update]Thttps://access.redhat.com/errata/RHSA-2026:4898RHSA-2026:4898RHSA-2026:4898 https://access.redhat.com/security/cve/CVE-2025-67873CVE-2025-67873CVE-2025-67873https://access.redhat.com/security/cve/CVE-2025-68114CVE-2025-68114CVE-2025-68114https://bugzilla.redhat.com/24234162423416https://bugzilla.redhat.com/24234192423419https://errata.almalinux.org/9/ALSA-2026-4898.htmlALSA-2026:4898ALSA-2026:4898 xdcapstone-devel-4.0.2-11.el9_7.i686.rpmudpython3-capstone-4.0.2-11.el9_7.x86_64.rpmxdcapstone-devel-4.0.2-11.el9_7.x86_64.rpmdcapstone-java-4.0.2-11.el9_7.noarch.rpmxdcapstone-devel-4.0.2-11.el9_7.i686.rpmudpython3-capstone-4.0.2-11.el9_7.x86_64.rpmxdcapstone-devel-4.0.2-11.el9_7.x86_64.rpmdcapstone-java-4.0.2-11.el9_7.noarch.rpmV  csecurityModerate: nginx security update 1Lhttps://access.redhat.com/errata/RHSA-2026:5599RHSA-2026:5599RHSA-2026:5599 https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-5599.htmlALSA-2026:5599ALSA-2026:5599 _nginx-mod-devel-1.20.1-24.el9_7.1.alma.1.x86_64.rpm_nginx-mod-devel-1.20.1-24.el9_7.1.alma.1.x86_64.rpmΔ! 4eBsecurityModerate: opencryptoki security update }[https://access.redhat.com/errata/RHSA-2026:5603RHSA-2026:5603RHSA-2026:5603 https://access.redhat.com/security/cve/CVE-2026-23893CVE-2026-23893CVE-2026-23893https://bugzilla.redhat.com/24319092431909https://errata.almalinux.org/9/ALSA-2026-5603.htmlALSA-2026:5603ALSA-2026:5603 neopencryptoki-devel-3.25.0-4.el9_7.2.i686.rpmneopencryptoki-devel-3.25.0-4.el9_7.2.x86_64.rpmneopencryptoki-devel-3.25.0-4.el9_7.2.i686.rpmneopencryptoki-devel-3.25.0-4.el9_7.2.x86_64.rpmΔd" hBBBBsecurityImportant: freerdp security updateXhttps://access.redhat.com/errata/RHSA-2026:6004RHSA-2026:6004RHSA-2026:6004 https://access.redhat.com/security/cve/CVE-2026-26955CVE-2026-26955CVE-2026-26955https://access.redhat.com/security/cve/CVE-2026-26965CVE-2026-26965CVE-2026-26965https://bugzilla.redhat.com/24429592442959https://bugzilla.redhat.com/24431322443132https://errata.almalinux.org/9/ALSA-2026-6004.htmlALSA-2026:6004ALSA-2026:6004 Rlibwinpr-devel-2.11.7-1.el9_7.3.i686.rpmRfreerdp-devel-2.11.7-1.el9_7.3.x86_64.rpmRlibwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpmRfreerdp-devel-2.11.7-1.el9_7.3.i686.rpmRlibwinpr-devel-2.11.7-1.el9_7.3.i686.rpmRfreerdp-devel-2.11.7-1.el9_7.3.x86_64.rpmRlibwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpmRfreerdp-devel-2.11.7-1.el9_7.3.i686.rpmή!# nBBBBsecurityModerate: kernel security update k<https://access.redhat.com/errata/RHSA-2026:6153RHSA-2026:6153RHSA-2026:6153 https://access.redhat.com/security/cve/CVE-2025-38180CVE-2025-38180CVE-2025-38180https://access.redhat.com/security/cve/CVE-2025-40096CVE-2025-40096CVE-2025-40096https://access.redhat.com/security/cve/CVE-2026-23144CVE-2026-23144CVE-2026-23144https://access.redhat.com/security/cve/CVE-2026-23171CVE-2026-23171CVE-2026-23171https://access.redhat.com/security/cve/CVE-2026-23191CVE-2026-23191CVE-2026-23191https://access.redhat.com/security/cve/CVE-2026-23193CVE-2026-23193CVE-2026-23193https://access.redhat.com/security/cve/CVE-2026-23204CVE-2026-23204CVE-2026-23204https://access.redhat.com/security/cve/CVE-2026-23209CVE-2026-23209CVE-2026-23209https://bugzilla.redhat.com/23763762376376https://bugzilla.redhat.com/24073332407333https://bugzilla.redhat.com/24398722439872https://bugzilla.redhat.com/24398862439886https://bugzilla.redhat.com/24398872439887https://bugzilla.redhat.com/24399002439900https://bugzilla.redhat.com/24399312439931https://bugzilla.redhat.com/24399472439947https://errata.almalinux.org/9/ALSA-2026-6153.htmlALSA-2026:6153ALSA-2026:6153 ?kernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm?kernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm?libperf-5.14.0-611.45.1.el9_7.x86_64.rpm?kernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm?kernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm?libperf-5.14.0-611.45.1.el9_7.x86_64.rpmθ$ !_BUBBBBBBBBBsecurityImportant: python3.12 security update'Yhttps://access.redhat.com/errata/RHSA-2026:6285RHSA-2026:6285RHSA-2026:6285 https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6285.htmlALSA-2026:6285ALSA-2026:6285 )python3.12-tkinter-3.12.12-4.el9_7.2.i686.rpm%)python3.12-test-3.12.12-4.el9_7.2.x86_64.rpm$)python3.12-idle-3.12.12-4.el9_7.2.x86_64.rpm$)python3.12-idle-3.12.12-4.el9_7.2.i686.rpm%)python3.12-test-3.12.12-4.el9_7.2.i686.rpm#)python3.12-debug-3.12.12-4.el9_7.2.i686.rpm#)python3.12-debug-3.12.12-4.el9_7.2.x86_64.rpm)python3.12-3.12.12-4.el9_7.2.i686.rpm)python3.12-tkinter-3.12.12-4.el9_7.2.i686.rpm%)python3.12-test-3.12.12-4.el9_7.2.x86_64.rpm$)python3.12-idle-3.12.12-4.el9_7.2.x86_64.rpm$)python3.12-idle-3.12.12-4.el9_7.2.i686.rpm%)python3.12-test-3.12.12-4.el9_7.2.i686.rpm#)python3.12-debug-3.12.12-4.el9_7.2.i686.rpm#)python3.12-debug-3.12.12-4.el9_7.2.x86_64.rpm)python3.12-3.12.12-4.el9_7.2.i686.rpmγ=% $bB]BBBBBBBBBsecurityImportant: python3.11 security updateYhttps://access.redhat.com/errata/RHSA-2026:6286RHSA-2026:6286RHSA-2026:6286 https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6286.htmlALSA-2026:6286ALSA-2026:6286 python3.11-debug-3.11.13-5.2.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.2.el9_7.i686.rpmpython3.11-idle-3.11.13-5.2.el9_7.x86_64.rpmcpython3.11-tkinter-3.11.13-5.2.el9_7.i686.rpmpython3.11-test-3.11.13-5.2.el9_7.i686.rpmpython3.11-debug-3.11.13-5.2.el9_7.i686.rpmbpython3.11-3.11.13-5.2.el9_7.i686.rpmpython3.11-test-3.11.13-5.2.el9_7.x86_64.rpmpython3.11-debug-3.11.13-5.2.el9_7.x86_64.rpmpython3.11-idle-3.11.13-5.2.el9_7.i686.rpmpython3.11-idle-3.11.13-5.2.el9_7.x86_64.rpmcpython3.11-tkinter-3.11.13-5.2.el9_7.i686.rpmpython3.11-test-3.11.13-5.2.el9_7.i686.rpmpython3.11-debug-3.11.13-5.2.el9_7.i686.rpmbpython3.11-3.11.13-5.2.el9_7.i686.rpmpython3.11-test-3.11.13-5.2.el9_7.x86_64.rpmγ,& %JBsecurityImportant: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security updateY https://access.redhat.com/errata/RHSA-2026:6300RHSA-2026:6300RHSA-2026:6300 https://access.redhat.com/security/cve/CVE-2026-2920CVE-2026-2920CVE-2026-2920https://access.redhat.com/security/cve/CVE-2026-2921CVE-2026-2921CVE-2026-2921https://access.redhat.com/security/cve/CVE-2026-2922CVE-2026-2922CVE-2026-2922https://access.redhat.com/security/cve/CVE-2026-2923CVE-2026-2923CVE-2026-2923https://access.redhat.com/security/cve/CVE-2026-3082CVE-2026-3082CVE-2026-3082https://access.redhat.com/security/cve/CVE-2026-3083CVE-2026-3083CVE-2026-3083https://access.redhat.com/security/cve/CVE-2026-3085CVE-2026-3085CVE-2026-3085https://bugzilla.redhat.com/24474902447490https://bugzilla.redhat.com/24474922447492https://bugzilla.redhat.com/24474952447495https://bugzilla.redhat.com/24474962447496https://bugzilla.redhat.com/24474982447498https://bugzilla.redhat.com/24475002447500https://bugzilla.redhat.com/24475032447503https://errata.almalinux.org/9/ALSA-2026-6300.htmlALSA-2026:6300ALSA-2026:6300 e9gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.i686.rpme9gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.x86_64.rpme9gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.i686.rpme9gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.x86_64.rpmο5' &MBBBBsecurityImportant: freerdp security updatedhttps://access.redhat.com/errata/RHSA-2026:6340RHSA-2026:6340RHSA-2026:6340 https://access.redhat.com/security/cve/CVE-2026-22852CVE-2026-22852CVE-2026-22852https://access.redhat.com/security/cve/CVE-2026-22854CVE-2026-22854CVE-2026-22854https://access.redhat.com/security/cve/CVE-2026-22856CVE-2026-22856CVE-2026-22856https://access.redhat.com/security/cve/CVE-2026-23732CVE-2026-23732CVE-2026-23732https://access.redhat.com/security/cve/CVE-2026-23948CVE-2026-23948CVE-2026-23948https://access.redhat.com/security/cve/CVE-2026-24491CVE-2026-24491CVE-2026-24491https://access.redhat.com/security/cve/CVE-2026-24675CVE-2026-24675CVE-2026-24675https://access.redhat.com/security/cve/CVE-2026-24676CVE-2026-24676CVE-2026-24676https://access.redhat.com/security/cve/CVE-2026-24679CVE-2026-24679CVE-2026-24679https://access.redhat.com/security/cve/CVE-2026-24681CVE-2026-24681CVE-2026-24681https://access.redhat.com/security/cve/CVE-2026-24683CVE-2026-24683CVE-2026-24683https://access.redhat.com/security/cve/CVE-2026-24684CVE-2026-24684CVE-2026-24684https://access.redhat.com/security/cve/CVE-2026-31806CVE-2026-31806CVE-2026-31806https://bugzilla.redhat.com/24296502429650https://bugzilla.redhat.com/24296522429652https://bugzilla.redhat.com/24296542429654https://bugzilla.redhat.com/24308812430881https://bugzilla.redhat.com/24382012438201https://bugzilla.redhat.com/24382022438202https://bugzilla.redhat.com/24382072438207https://bugzilla.redhat.com/24382082438208https://bugzilla.redhat.com/24382102438210https://bugzilla.redhat.com/24382162438216https://bugzilla.redhat.com/24382172438217https://bugzilla.redhat.com/24382212438221https://bugzilla.redhat.com/24473762447376https://errata.almalinux.org/9/ALSA-2026-6340.htmlALSA-2026:6340ALSA-2026:6340 Slibwinpr-devel-2.11.7-1.el9_7.5.x86_64.rpmSfreerdp-devel-2.11.7-1.el9_7.5.x86_64.rpmSfreerdp-devel-2.11.7-1.el9_7.5.i686.rpmSlibwinpr-devel-2.11.7-1.el9_7.5.i686.rpmSlibwinpr-devel-2.11.7-1.el9_7.5.x86_64.rpmSfreerdp-devel-2.11.7-1.el9_7.5.x86_64.rpmSfreerdp-devel-2.11.7-1.el9_7.5.i686.rpmSlibwinpr-devel-2.11.7-1.el9_7.5.i686.rpmθ5( 'SBBBBsecurityModerate: kernel security update f https://access.redhat.com/errata/RHSA-2026:6570RHSA-2026:6570RHSA-2026:6570 https://access.redhat.com/security/cve/CVE-2025-38109CVE-2025-38109CVE-2025-38109https://access.redhat.com/security/cve/CVE-2026-23111CVE-2026-23111CVE-2026-23111https://access.redhat.com/security/cve/CVE-2026-23210CVE-2026-23210CVE-2026-23210https://access.redhat.com/security/cve/CVE-2026-23231CVE-2026-23231CVE-2026-23231https://bugzilla.redhat.com/23761012376101https://bugzilla.redhat.com/24396872439687https://bugzilla.redhat.com/24398952439895https://bugzilla.redhat.com/24443762444376https://errata.almalinux.org/9/ALSA-2026-6570.htmlALSA-2026:6570ALSA-2026:6570 @libperf-5.14.0-611.47.1.el9_7.x86_64.rpm@kernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm@kernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm@libperf-5.14.0-611.47.1.el9_7.x86_64.rpm@kernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm@kernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm) YBsecurityImportant: fontforge security updatexhttps://access.redhat.com/errata/RHSA-2026:6628RHSA-2026:6628RHSA-2026:6628 https://access.redhat.com/security/cve/CVE-2025-15270CVE-2025-15270CVE-2025-15270https://bugzilla.redhat.com/24264342426434https://errata.almalinux.org/9/ALSA-2026-6628.htmlALSA-2026:6628ALSA-2026:6628 @[fontforge-20201107-8.el9_7.i686.rpm@[fontforge-20201107-8.el9_7.x86_64.rpm@[fontforge-20201107-8.el9_7.i686.rpm@[fontforge-20201107-8.el9_7.x86_64.rpm4* )hNiBBBBBBBBBsecurityImportant: python3.9 security updateYhttps://access.redhat.com/errata/RHSA-2026:6766RHSA-2026:6766RHSA-2026:6766 https://access.redhat.com/security/cve/CVE-2026-4519CVE-2026-4519CVE-2026-4519https://bugzilla.redhat.com/24496492449649https://errata.almalinux.org/9/ALSA-2026-6766.htmlALSA-2026:6766ALSA-2026:6766 Fpython3-test-3.9.25-3.el9_7.2.i686.rpmFpython3-debug-3.9.25-3.el9_7.2.i686.rpmFpython3-test-3.9.25-3.el9_7.2.x86_64.rpmFpython3-debug-3.9.25-3.el9_7.2.x86_64.rpmFpython3-idle-3.9.25-3.el9_7.2.x86_64.rpmOFpython3-3.9.25-3.el9_7.2.i686.rpmPFpython3-tkinter-3.9.25-3.el9_7.2.i686.rpmFpython3-idle-3.9.25-3.el9_7.2.i686.rpmFpython3-test-3.9.25-3.el9_7.2.i686.rpmFpython3-debug-3.9.25-3.el9_7.2.i686.rpmFpython3-test-3.9.25-3.el9_7.2.x86_64.rpmFpython3-debug-3.9.25-3.el9_7.2.x86_64.rpmFpython3-idle-3.9.25-3.el9_7.2.x86_64.rpmOFpython3-3.9.25-3.el9_7.2.i686.rpmPFpython3-tkinter-3.9.25-3.el9_7.2.i686.rpmFpython3-idle-3.9.25-3.el9_7.2.i686.rpmy+ *hsecurityImportant: nginx security update` https://access.redhat.com/errata/RHSA-2026:7002RHSA-2026:7002RHSA-2026:7002 https://access.redhat.com/security/cve/CVE-2026-27651CVE-2026-27651CVE-2026-27651https://access.redhat.com/security/cve/CVE-2026-27654CVE-2026-27654CVE-2026-27654https://access.redhat.com/security/cve/CVE-2026-27784CVE-2026-27784CVE-2026-27784https://access.redhat.com/security/cve/CVE-2026-32647CVE-2026-32647CVE-2026-32647https://bugzilla.redhat.com/24495982449598https://bugzilla.redhat.com/24507762450776https://bugzilla.redhat.com/24507852450785https://bugzilla.redhat.com/24507912450791https://errata.almalinux.org/9/ALSA-2026-7002.htmlALSA-2026:7002ALSA-2026:7002 `nginx-mod-devel-1.20.1-24.el9_7.2.alma.1.x86_64.rpm`nginx-mod-devel-1.20.1-24.el9_7.2.alma.1.x86_64.rpm, 6jBBBsecurityImportant: nghttp2 security updatez.https://access.redhat.com/errata/RHSA-2026:7668RHSA-2026:7668RHSA-2026:7668 https://access.redhat.com/security/cve/CVE-2026-27135CVE-2026-27135CVE-2026-27135https://bugzilla.redhat.com/24487542448754https://errata.almalinux.org/9/ALSA-2026-7668.htmlALSA-2026:7668ALSA-2026:7668 Ylibnghttp2-devel-1.43.0-6.el9_7.1.i686.rpmYnghttp2-1.43.0-6.el9_7.1.x86_64.rpmYlibnghttp2-devel-1.43.0-6.el9_7.1.x86_64.rpmYlibnghttp2-devel-1.43.0-6.el9_7.1.i686.rpmYnghttp2-1.43.0-6.el9_7.1.x86_64.rpmYlibnghttp2-devel-1.43.0-6.el9_7.1.x86_64.rpmj- ,kEBBBsecurityImportant: bind9.18 security update(https://access.redhat.com/errata/RHSA-2026:7915RHSA-2026:7915RHSA-2026:7915 https://access.redhat.com/security/cve/CVE-2026-1519CVE-2026-1519CVE-2026-1519https://bugzilla.redhat.com/24513052451305https://errata.almalinux.org/9/ALSA-2026-7915.htmlALSA-2026:7915ALSA-2026:7915 cbind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpmcbind9.18-libs-9.18.29-5.el9_7.4.i686.rpmIcbind9.18-doc-9.18.29-5.el9_7.4.noarch.rpmcbind9.18-devel-9.18.29-5.el9_7.4.i686.rpmcbind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpmcbind9.18-libs-9.18.29-5.el9_7.4.i686.rpmIcbind9.18-doc-9.18.29-5.el9_7.4.noarch.rpmcbind9.18-devel-9.18.29-5.el9_7.4.i686.rpm3. .mHBBBsecurityImportant: bind security update(Zhttps://access.redhat.com/errata/RHSA-2026:8075RHSA-2026:8075RHSA-2026:8075 https://access.redhat.com/security/cve/CVE-2026-1519CVE-2026-1519CVE-2026-1519https://bugzilla.redhat.com/24513052451305https://errata.almalinux.org/9/ALSA-2026-8075.htmlALSA-2026:8075ALSA-2026:8075 Q^bind-devel-9.16.23-34.el9_7.2.x86_64.rpmd^bind-libs-9.16.23-34.el9_7.2.i686.rpm^bind-doc-9.16.23-34.el9_7.2.noarch.rpmQ^bind-devel-9.16.23-34.el9_7.2.i686.rpmQ^bind-devel-9.16.23-34.el9_7.2.x86_64.rpmd^bind-libs-9.16.23-34.el9_7.2.i686.rpm^bind-doc-9.16.23-34.el9_7.2.noarch.rpmQ^bind-devel-9.16.23-34.el9_7.2.i686.rpm?/ /yBBBBsecurityImportant: freerdp security updatehttps://access.redhat.com/errata/RHSA-2026:8457RHSA-2026:8457RHSA-2026:8457 https://access.redhat.com/security/cve/CVE-2026-33983CVE-2026-33983CVE-2026-33983https://access.redhat.com/security/cve/CVE-2026-33984CVE-2026-33984CVE-2026-33984https://bugzilla.redhat.com/24532192453219https://bugzilla.redhat.com/24532202453220https://errata.almalinux.org/9/ALSA-2026-8457.htmlALSA-2026:8457ALSA-2026:8457 Tlibwinpr-devel-2.11.7-1.el9_7.6.i686.rpmTfreerdp-devel-2.11.7-1.el9_7.6.i686.rpmTfreerdp-devel-2.11.7-1.el9_7.6.x86_64.rpmTlibwinpr-devel-2.11.7-1.el9_7.6.x86_64.rpmTlibwinpr-devel-2.11.7-1.el9_7.6.i686.rpmTfreerdp-devel-2.11.7-1.el9_7.6.i686.rpmTfreerdp-devel-2.11.7-1.el9_7.6.x86_64.rpmTlibwinpr-devel-2.11.7-1.el9_7.6.x86_64.rpmψD0 0securityImportant: .NET 8.0 security updateo https://access.redhat.com/errata/RHSA-2026:8469RHSA-2026:8469RHSA-2026:8469 https://access.redhat.com/security/cve/CVE-2026-26171CVE-2026-26171CVE-2026-26171https://access.redhat.com/security/cve/CVE-2026-32178CVE-2026-32178CVE-2026-32178https://access.redhat.com/security/cve/CVE-2026-32203CVE-2026-32203CVE-2026-32203https://access.redhat.com/security/cve/CVE-2026-33116CVE-2026-33116CVE-2026-33116https://bugzilla.redhat.com/24577392457739https://bugzilla.redhat.com/24577402457740https://bugzilla.redhat.com/24577412457741https://bugzilla.redhat.com/24577812457781https://errata.almalinux.org/9/ALSA-2026-8469.htmlALSA-2026:8469ALSA-2026:8469 dotnet-sdk-8.0-source-built-artifacts-8.0.126-1.el9_7.x86_64.rpmdotnet-sdk-8.0-source-built-artifacts-8.0.126-1.el9_7.x86_64.rpmψ1 1ABsecurityImportant: openexr security update]https://access.redhat.com/errata/RHSA-2026:8888RHSA-2026:8888RHSA-2026:8888 https://access.redhat.com/security/cve/CVE-2026-27622CVE-2026-27622CVE-2026-27622https://bugzilla.redhat.com/24442512444251https://errata.almalinux.org/9/ALSA-2026-8888.htmlALSA-2026:8888ALSA-2026:8888 Baopenexr-devel-3.1.1-3.el9_7.1.x86_64.rpmBaopenexr-devel-3.1.1-3.el9_7.1.i686.rpmBaopenexr-devel-3.1.1-3.el9_7.1.x86_64.rpmBaopenexr-devel-3.1.1-3.el9_7.1.i686.rpmϗ2 2DBBBBsecurityImportant: kernel security update\ahttps://access.redhat.com/errata/RHSA-2026:8921RHSA-2026:8921RHSA-2026:8921 https://access.redhat.com/security/cve/CVE-2025-39766CVE-2025-39766CVE-2025-39766https://access.redhat.com/security/cve/CVE-2025-68741CVE-2025-68741CVE-2025-68741https://bugzilla.redhat.com/23946482394648https://bugzilla.redhat.com/24250462425046https://errata.almalinux.org/9/ALSA-2026-8921.htmlALSA-2026:8921ALSA-2026:8921 Akernel-tools-libs-devel-5.14.0-611.49.1.el9_7.x86_64.rpmAkernel-cross-headers-5.14.0-611.49.1.el9_7.x86_64.rpmAlibperf-5.14.0-611.49.1.el9_7.x86_64.rpmAkernel-tools-libs-devel-5.14.0-611.49.1.el9_7.x86_64.rpmAkernel-cross-headers-5.14.0-611.49.1.el9_7.x86_64.rpmAlibperf-5.14.0-611.49.1.el9_7.x86_64.rpmϢ&3 3JBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update= https://access.redhat.com/errata/RHSA-2026:9686RHSA-2026:9686RHSA-2026:9686 https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9686.htmlALSA-2026:9686ALSA-2026:9686 o9java-17-openjdk-jmods-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpml9java-17-openjdk-headless-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmk9java-17-openjdk-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmm9java-17-openjdk-headless-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpms9java-17-openjdk-static-libs-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmr9java-17-openjdk-src-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmq9java-17-openjdk-src-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmh9java-17-openjdk-demo-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmi9java-17-openjdk-devel-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmg9java-17-openjdk-demo-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmn9java-17-openjdk-jmods-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmt9java-17-openjdk-static-libs-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmj9java-17-openjdk-devel-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmp9java-17-openjdk-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmo9java-17-openjdk-jmods-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpml9java-17-openjdk-headless-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmk9java-17-openjdk-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmm9java-17-openjdk-headless-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpms9java-17-openjdk-static-libs-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmr9java-17-openjdk-src-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmq9java-17-openjdk-src-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmh9java-17-openjdk-demo-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmi9java-17-openjdk-devel-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmg9java-17-openjdk-demo-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmn9java-17-openjdk-jmods-fastdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmt9java-17-openjdk-static-libs-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmj9java-17-openjdk-devel-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpmp9java-17-openjdk-slowdebug-17.0.19.0.10-2.el9.alma.1.x86_64.rpm~4 4fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security updateOKhttps://access.redhat.com/errata/RHSA-2026:9693RHSA-2026:9693RHSA-2026:9693 https://access.redhat.com/security/cve/CVE-2026-22007CVE-2026-22007CVE-2026-22007https://access.redhat.com/security/cve/CVE-2026-22008CVE-2026-22008CVE-2026-22008https://access.redhat.com/security/cve/CVE-2026-22013CVE-2026-22013CVE-2026-22013https://access.redhat.com/security/cve/CVE-2026-22016CVE-2026-22016CVE-2026-22016https://access.redhat.com/security/cve/CVE-2026-22018CVE-2026-22018CVE-2026-22018https://access.redhat.com/security/cve/CVE-2026-22021CVE-2026-22021CVE-2026-22021https://access.redhat.com/security/cve/CVE-2026-23865CVE-2026-23865CVE-2026-23865https://access.redhat.com/security/cve/CVE-2026-26740CVE-2026-26740CVE-2026-26740https://access.redhat.com/security/cve/CVE-2026-33416CVE-2026-33416CVE-2026-33416https://access.redhat.com/security/cve/CVE-2026-33636CVE-2026-33636CVE-2026-33636https://access.redhat.com/security/cve/CVE-2026-34268CVE-2026-34268CVE-2026-34268https://access.redhat.com/security/cve/CVE-2026-34282CVE-2026-34282CVE-2026-34282https://errata.almalinux.org/9/ALSA-2026-9693.htmlALSA-2026:9693ALSA-2026:9693 +"java-25-openjdk-jmods-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm#"java-25-openjdk-crypto-adapter-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm*"java-25-openjdk-headless-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm("java-25-openjdk-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm1"java-25-openjdk-static-libs-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm)"java-25-openjdk-headless-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm,"java-25-openjdk-jmods-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm."java-25-openjdk-src-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm$"java-25-openjdk-demo-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm%"java-25-openjdk-demo-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm0"java-25-openjdk-static-libs-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm-"java-25-openjdk-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm'"java-25-openjdk-devel-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm/"java-25-openjdk-src-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm""java-25-openjdk-crypto-adapter-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm&"java-25-openjdk-devel-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm+"java-25-openjdk-jmods-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm#"java-25-openjdk-crypto-adapter-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm*"java-25-openjdk-headless-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm("java-25-openjdk-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm1"java-25-openjdk-static-libs-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm)"java-25-openjdk-headless-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm,"java-25-openjdk-jmods-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm."java-25-openjdk-src-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm$"java-25-openjdk-demo-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm%"java-25-openjdk-demo-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm0"java-25-openjdk-static-libs-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm-"java-25-openjdk-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm'"java-25-openjdk-devel-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm/"java-25-openjdk-src-slowdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm""java-25-openjdk-crypto-adapter-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpm&"java-25-openjdk-devel-fastdebug-25.0.3.0.9-1.el9.alma.1.x86_64.rpmϬ@NFor detailed information changes this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.Tgrub2 packagprovide vers2 of?Grand UnifiVBoot Loader (GRUB), a highly configurable 5customizb:l:with modular architure. supportbvarietykernel .s, fi]system computeVs,hardwareuvi. mshimrénsrfirst-stUEFIthat hTlining to7truull3unurenvironmentSiFix(es): *: IntegBflow_net_recv_ip4_ets (CVE-2022-28733)HCrafPNGaysca=imnmay Kdout-of-bors wrJsheap^1-3695]SRQd7huffma)Vg6gJPEhc>hbN,7ZOȤwhensplit HTTPId/n4M[_lockXBls non-iDe*dQbuse-r-freӳcmd_k()B=: Bovޢ6cYH+moF+bګ[sissue(sinclu[ imt4CVSS scG cknowg o/ra,1Rgms, wf3S!,wanyoper vC: Smaڡ8b sizTCP sourcgen^algor+m*k1012){racdi-qp_evf_ƤT|privJe^Y729Yacsub$lrt966tbmIP ESPwansco76K Bug`make SHA512_.sCRYPTO_USER4-(BZ#207264SR-IOVn*> 50%d348303fix arupia d by dmgt=F98218_SC1cli$-sjpeeloffns [al(_-9]<404N#n finasymmetricV warequi~uTboh-D}HeSLPBF4=<-D..fips=f e=,ڢan{cbtr{F1l,ha} rI7fe,Ṇ-1@r=a Mae smF(!ed¶3)MaDBaF-u, th SQLFbr4pomp5My4. 5gra (2611),db0.5. ysql-sel~(C5)K=: ough M9ack/onr_co_to_i`BIGINTtypl,1-4v blengf -lfo-copym= $xed-;s-d8˒7exGLbjjp.( X,v50 abefsusa4u1uCONNECT StorapEng H1OvPkEkVp2pr3r !I_s::walk D6Dpoisqlex/"volgblobX7Xnsh0Z_tmp_)::f;&F8F]_B or:: e_r _X9Xmy_d ::uor=A80AField::s!defa=yzs cTRfx![s/updm+_map__ oSr$ca8bit` Ic*.cV3V#ɺ<ct::_5 r_c)rGW4enquery_a a$SEL?%view`d(__s8V]HAVI>#NOT EXIST d0 [a744_]f445IS NULLޡ _;BTj_MJHv l it)#oupGR4/iLz .ccA;wiw in ess ORDBYO5 ‘u˔5LWHERE h 8 eqd(˩VD/:/_ȴh K"dupue" erro; f@giqueP$)o5'*%Tun d/=bup/ds 31622XkCex VIEW ggreg\9S| 5  nfi_:dg^an mond%b(CTED 1˚ 13_,::VɹB&>|3|+ &s'_postjo=a# ă4 0sȏbe#jk Ĉ5- y~D2IN 8(m(csi_ioq!h*049[kc,w_(#(/s d/cls_api% J!ower9 - LPAR&t&Sha,cC&s[HT22H.+\&e-ss-ng`sO5RiV|nam>3 gfs,Fy0(Ll 5*en tP0tK730i/o i~ u:Kwork;jg 372.9.1.el8.x86_[82k c(tesv3SSATAM76Guestre3 migB21 -J<({Oops ~lt[ ?IRIPq +_K__labelr g+!sl1\l BUG:UH%tas (n'fs4ton ;lookuprlpaɢ: Kokada=ig:C$[# +tubontD(P10/ ibmvnic/L)3)S^vmOUmq\e') Enhf^'Bu/vt-d+DMAR_UNITS_SUPPORTED U5326).NETVd-sfrD.5 a}-eEC- API^ s(niPu CLRZ. N/_ddaT'vailD3 dU'VS%108%dot: ExtOE2"InjK2XML`natG1. 47:IZJ-9Q9L9MNDenOfS\iceASP]CMVCH0<MlS Diru.v801wRubaensp:.-or&0-he25 tYO5-,sks4Pr(3 " "Y428)JHou!( Rxp!59:5 =S-to-FPtEL f>fbiaM.daem0d)m5 2k1al"7Hw ((0J 8J2i6: r2und>%(2 Apr r#412, 43567840529678xD3NRe$V5VInno/j1512DDL/2iFTS$=27NGPlugi%5ʲPAM Au ZJulZ5/ZεLog" #R60R!` 505;52678O30153o69R "5+T3 gP= d .22vede,d$@4: cryi#_d z{,Dr logro) [wr78l92)Dd=A=nft_#9r3491 ?>3>Rd7r%06A0l"Rz/mlx5minunedly0C(sECDSASECD$("FsGdG108g! Nuget7%߱1 &orld-+A}U4r2Urh87FByp(M (JGSS}7607q8216g eex EaA ci8.5W#`Crk(h5Nh26hHttpSnoHcountmr<82 we8 M2c# c̯2MQ$NTLMhs26,9_nsj*F9QiJNDIM s0ƿ4_ SNI{ /2 (N!O9393939 PrIe 4 ,rvnr37(17;5= 329nA ob HVK718-KSB)p̱cKasbah?Rs8(wellMS eCBly;5. xZthi9 =M S/MIMETLSDkCMrU1P&O-(aqst; ;~<,!O~̔:("$Wby C,Wd!n"U2byT#?X,>-rzl 204M.gSS[5 fM4743Uix  r1, . "S$Un(dTKTPTRACE_SEIZEWO/-SPEND_COMP0D059-/Z0g0T14/G2DpV(mt7921e})0K1vjAt4e./7MabExeascr&vVGA*:iU somea]120UoaF9hU.o DRBGf1miyc] E  1\wod03+ #30G2$34s! [swq/30:0]O78\#j(D"l B}6p*qemu-kvm pfn:68a7_#0?vfioJEp0sE2M s>879VhH2)9$FNW.1 h*o?@HPE RL3 GenARMQXY34PY{ #B, aGYO,ZP,[[J3TMHy3l dynam`.sZ 4FnL _F9,nam{ddKtgv )g t`to3S0-?plua> LuapfulV-x lp2ed>/ Lwlso%.FJ| F , d-T\5/ u s#o G_!msde.c>unx}K0)?f30ibg!fM ࡖd `le8k _yein g$0As0 211! " 9C$s:ҤjRRk-v2v %7? cKV$# V-M-) hype|4sor. E iI3)*}%OUioci{+Qa.zso,)b-!%;ۢIObf` p#2P$Google'QuQ.3CenvsOQmd? dyetO6Rfl n68"autommeismser<Łc -c& ? nnchar. fbolN%ptry1-+c 9Shxa pajT e# +AchE$sM?vo(s(unw ,M-/Zx:kid@ad_saY$s E?NWAV- 23R@>  s$& n(^{il19Xs.qY,~();of~edG0885.80603<3JnwCFCoNumOfNWF7Kd=s' HF8q>Qt5 Qt 5, 5thcroFy/I)-q(QPaZLX?r%(GFosxPATHgm>8unbu2wXc`m Q ,-+Z5ZCj2a74:T'gT! dP/Z +LZPi^d4cS!6Ic1qu!4'1>YwaRRs .+: :1j"Y5r{03z: FLAC0F L A8oGM. * sOgg Vorbi2bu 8.0V^c7D'QZMr2R=, a command-line program to encode  de FLAC files,;metadata editor f2. Security Fix(es): * flac: out of bouWw$e in append_to_verify_fifo_interleaved_4stream_r.c (CVE-2021-0561) Fmoretails abpthe sissue(s),xcluding impact(CVSS scG cknowledgmento/r relatedFmation,fUR pagm lis,R&es:6AdO al Changes:Ҥj c%TiseasseefAlmaLinuxp Not0kNfromΎWavP ispletely o a7oressWviSlossl, high-qual~yVunique hybridNm. Jwavp: HeapR-of-RaeW#Sas()044269<1Popgr1Portable Docu F!(PDF) r'ibrarus`by lic\uch as Evil[py: A_gic error:Hi:: fun caudeniAaervice'2-27337<'Ttiff aiconn$scipulXTagghIm= le_TIF` }: DSvirafRIHiBNull source l"^2^Has.865.O R !cp=924=st-buf-oflow:rininK2-135Ą_memcpy>T_xp284Ĕh “extrWS[9pPd\avrgbFetchN[lsdirü0908tDi e By Zerorop89RawD StripedfÒN:O JPEGn [B iE2000= ajpeg:mfaultFopj2_ ? dueh[nvw zҶ122<DcotIMAP SݲU UNIXR khym)(tOpr*rio withind. It also7r sl POP3txsupp s e-mBeiŢ box SQL driIs u1nt plug-zrPOsub d): Pr&leescalZwhSimilasnon-db|: 30550<X.Org-i[ AX WSس!s bas -level $th f-fkphic useEtaasign&up:qxorg-x11-: SProcXkbSetGeo acc[31W7bDe Ist hI< @kben t2=Yet AnJSON(YAJL)[nt-SAX-style)7parANSI CKCvda 5generaGyajl a# ,?O Tput atc5S4795kern3W!,1anyfr(sE ff-pat't e1)j oTer8atm's TCsa0-36516h-r-fre6ulbiinI_sock_sms# N1N40Msmb2_ioctl_ry_ NULL derI 16S *udf_expaC[ _x icbd)glba[617wiotlb!k| DMA_FROM_DEVICE?8\ *i reg4 trnft_do_ui|$9,UM 0rac*nWspcm_hw_lv M4S o4bmŷarup e 8#ywbetwe`drmCt ,k_get xsb28cKYpfkey_:353 in P9k_htc_be_ Ocouldan of ß67) x86_eme_S nêGoSN85#fa- suse$d:tew. hG99nf_s ss-pot | @£lo g258uFsG= "^ _sfa_sf263`slab-~ etcv23din cn-upmhi-shp 乮 SBDRNY3Ni]archcturallTST5TpecifT RCL_DRPW_6po0debugNzochoA149AMD:+tBle@Arbitf Sp)v~ExO~2urLnuq 816, 9900nBranTyp[nfuFretb)LcInostt rriSB P iȓ637douHR_usb_rt_xmia/net//!/)839xf٦XSUNRPCw)589 impr9 dc_sched/cl32Ę958k5?ӣ`fqnl_m leC/nf hueê3694dis0bin8alyD91nfs_ _(s *aENOTDIR44: baM,Blo) SMB)toco+8C!otxtSIFS;,jPC-ma ne^{!pr*vou,Csh foUk haibT up;a7upK! xGX,(4.16.4). (BZ#207748v 287 A E1?274=xSldbp Jmc %LDAPAPI/< rZor TDBu4(2.5.2 AD(si ua lp addodh 6<Pythonpre, acFb-o n&mVluvpdu[clexcepx ve$ dynamR tD dl. hto y cCib'sell.w@7Vp3.9 (.1H24%e#6:2cap: fia() donsa zsefA150^OW reQy;/http/.py cr&ur 1 >.(#rpcSunU's| s7-i *rd9#- )dT&FC$iye - l: 9lotsonnsz46828@zgcuc ilfC++, Java,-&y, OF3Ada 95 GNUD):re&ib%y/rusTe,461>G!u*!?b=)*Cdu-GNOMEm%loop!,nse=/)stcRur: g;replaG_FILE_CREATE_REP/E STINATIc\|emptV tdm1w>zldl-pur /!x/sb` difwLR-1w FKr(- &der8. 8A03=<.NETn an#*ftwework.mWC-@sevywV CLR"N0 O `(a nfil&dU'VSDK 7.0.1)RC 2Rme&4 dot67X(} 3464 ;'7,jcach,son-zld-+Z 41W9 Cm!Yf78hodP2919PVarnish C7"6p`nVHTTP)l%)storebm"soHn't:toL aw@%g, giv*(s )ant e)vForgVP50606q133.<6s5445nParrb ppe3I)J#2(5sh3-2  j -17-;2dk <2 17Environ+S2Dop,Ki2?:*keA(DTLS:JSS#57411)83!Ysg baiURL Blo'(SI93I4BugpIn FIPSedof a1+ NwTm:  K!-only]-no PIN )edir8-ed…4e^_(Do뢏%. P"L fuwop"t-ps.nG2.@+nd-H'anffiguRF>lt.*9or to ly9LAs\~tuE (RH04747"P_5n c?rf/J01,6) [a9l0 -9]3097)G1G1G+G0j18k77{*k.8.0n8m*&li''regTFCORBA d*%6 (Sv5vE&Fv8u362t991C-solr brok~.,3"Be"io.%PE1(" "/>/pki/!/cas"ws-863594Sf AT>F'>E>2@q+057J-ԢV+Gc)0%HotFD at%?j*5s7\%1?&@^9 0^AsAfa:;20QIn60-aCl_V_cW g7eOff/.!),& un-ded o-d&,vsu b1ktO,OFo*=,ee (&xJ a-a&K. Ss68Ő6ǐW*4Keys0HZ8E:@tz/6[ l% @495USTAX88179_178A 3;USB eK-5.V64Vi915WeNGPU TLBushïralm$>413ït$;u1me{.9RgIX3945ò2n"b& e5ngtV5@Gismt_ 57YUndU+n'[PTR SEIZEe O_SUSPENDCCOMP1q0 wtW9.2:MD3avf b)fixesm)789vfMOQ5mi!t32M 7|)51>nvme-tcpCoc ro)CXm";EMCw NDU13qD4 U/5.19)-@WARNING: CPU: V6534406/8/mm/c:105_l9f}+0x3f/0x5058` ::e9ljK-:acy_scr9_095io:&or$ m np%elaroughfs3*"-EINVALIS69DE ::02i5+boo)HZ7RT~ c12"921 Nwal=2̷VGA monSt!:^. 9-acy5oee401 P>dy6"Dummyit"N kar!t9M2=ppc64lQun, oGpane's calef6zswLt/Z39fatalt:tK=G 8$g3q;rb!Mb0 AMdCLIENT: 5 ame"no:"̪ 8\ 7\zI:4I v* 9-ECI_5MA@MEMORYme0VM' S50910S z-:imes oynVMs9t gy)+  s16 9 !T0ODE R760, esobgEunessl>bashB(Bou- ll)'de8KB p:bc __,^71)KS(pd Kasbah#Et ke_G% s }MS e Hl9 4by . Both<K)omQ/MIME, ks,4>tWKde& y 762 a }5rl2N2_reW#mbl?du;blueto/';5 oAcCwL|c_skip_sp\ 78Q76__ 42_ss;i$s/n4r T~4 N<3fDpay6)py_vlas [u0AQX -* >5 8> H): Lk TeG YA f 14Shirda s Pum0+ 308L d1dNMI(dog'srLPM xFDSERVERFmdpsi#MtoT Gg a8`qla2xxx NVMe-F 0 122@scsi/=_? 70S__$e_wa2 25/ 0 [#21Reg,: 1 Lvo T480. AHp -C/4  59 S@u~M (9.2).79 < .fNx_Gzinr^{ _cr ,r#edu dlpa lD ](FW)0 / DLPAR4RMSFT, 0 A #Pp-9:{onL -CQ4(*n_i&Rf,b51k[ v W$;3o1EMLB4FBÕ D Fgs&F94'' 1oZ ?Kbs=Cx gL881HtoncW$$K613XCEE *hfs:d ;*i?BIPI9:Bs_r6Yef8]p41|%yzP!Ц25'+},^!:IDNb506ua| ILuaXSVght-weC>e  LuCVf?D 2,f#alonek ua YG_$SaWEs~ G<$y ::a^^1 7ibZ-!b$y[m;*yYGp0hmFbjMseb-V-'CasK{betEM?nc ^gL_rgb_rowo rdppm1:8[btuavoidKYQ_9 ALSAUAcmMo-rwsiuEn Re-) UAF 2M-y.TMTCGNr  -to-).H©f y- zbBx #?uesthusR ` Cgps_v28reOE*c/ , )puEf 79sk~l?QgFeTz: Adderai ) -rW>u: OcirMrR|Ac+Pe(&n->_%->&p->&  606S.AN_bal;3b86< 10 ! /kipQC1kdumpK690#gpioes3X9mKphd&*+E5 9 orvs lVolT;`,Ce V7u E"k(IBMl F= 1WQETH % .^ l' _ SPRAMXrnf~spBO8YQ)OQW`{ adv"j 3a-z# (DBMS)pdsq<Y.\ s#pseloy]# 6R_CflF<"n be7# QJ`(E7186"FUSE(&l]` W_"}3V(i_idEagle/ jn3Cstop'")buhutex p,em/()_`.4i&ա ut00(-44H_21WSHTML p6Y>y2>9>'\%oU.A$cFS'Z8191Z\Z`5 LS ?^negoM]3]67] N/jE&[l$62O KP B6e 5]8˭slZURI K4& 6Js6DcrypteiJalgorm:e"edD ;+c[i\%+6gD%$C4-Clc69Sribu. l;mf ;inhS5868e Pr(ly4X # runntoy./; e2 x+r7 b.7k-sedń18PKCS#5[d7i sF@t1ssome&( Yw]hyf{u-an#oun-.n,mrE ?)$|&dNs6 #78ҲI938) * OpenJDK: missing check for slasharacters in URI-to-patonvion (8298667) (CVE-2023-2196b FJmore details about the security {ue(s),cclud imp{, a CVSS scG cknowledgmentsnd o/r relatedFmat,ftoR pagm lis,R&ences:. Bug Fix(es): /T(SAPSSSignaturleo works wi") keys viacSun: provider. HoweIt did not fullytha/Nyuld be useyOfnattemptJo do so, lead3obilof errobe"ren_customms. validswill all!Ih"luch2wheat can. (RHBZ#2188024)Samba?[ o-sourcǐܫ~ervrMess Blo^(SMB)tocol+JCommAInnet lHys]IFS;,iPC-compb1machinesSe fHpriZvarioukSvs: RC4/HMAC-MD5 NetLog1h6el weakbsh>avoyd2-38EDK (EmbedD[lopu Kit),j/`enaUEFIxpportVirtual M;pɲ<nLpA64-bHfirmwIQEMUKVM. ssl: X.400 addr typkfuiX.509 GeneralNamet0286edk2: XgEun_fimmEntryPoingn5pot*iSMMvescalMo1/57Gtim}a[oDecryp;z4304IdoufreftcX\PEM_r_bio_exD450D!-<-GfoCBIO_new_NDEF@15Addi ges:Ҥj c%T㡑eass3fAlmaLinuxp NokNfrFxRADIUSzhigh-pn lyiguraRemi Au^cDIs$icee) s,siedFcezaRoriza rTus:Uln&REAP-PWD1859)=Cro :un*1ASIMA60Ain}inary a<1<X.OrgX WindH. It s basic -la  " -fkgraphic uRfaa߽upOxorg-x11->: bufov<_GetCounStr ()xkb/.cJ5VXkbEKbdBy283ATestSwapFakeInpsnD634͇IPa veUngp -of-bo.sc~H1HvdiS0ctVo3ify֡H2HSc)nSa SetAtabuK#IProk 4IDeepCop0erCl5ȓ?1_49emey6Qc( j=PoprP DocuH F (PDF) ;_ Ilibro,aE`s as Evilpy JBIG2coumalQ 8784<Berk8yDomaiBINDf )5JDNIl E  , (na);# olz (rh ~uw \ ~;tool=vfy Zabr"lyb:w+ar#de*may[veyg e1 279 ^&oUPDATEAqu/_DoS(0EsϢDspecif?rie@PcaSaP736;P92= DP Desktop((<),depache l nse!x dp cliAcan neW'Microsoft, , xJBox dp:z`/parel` cLl] s=mt r0unini8M 8 g`/v /h3h A*zgfx#>316>fi behavi ?7?d zero8>rleng0OG9Gheap B20ˊsaG`dr% `H47Hi N7N> fs$6EbmpuXTagdIm TIF x ~}Bc 7> wg]_= cpy./_MxQ97QextCogSsShif24% /͹98goS^leSW9s S6260eSg xXRRGBATGExϲVm W;pKI4645IBb  TAG_INKNAMESFNUMBEROF$Su30774zH32~,0Z==un`=$ng[Nc g0 SEC l: NRD M nrolSjcum4(Non-Resp LAL X2z>8wikxVwalyzelcap^!3br*fCrunn}oMhu" +5ethLiInfx *oo:-cyVyle so 190@3kOl03W!,1,anysYg2p_ le_I)c/b^th/7reb289Y-ulm rUL"et,* cpu: AMD CPU)ex౺beyonddi br7hZ1-2mar"m FPUT_VSCREENINFO ioOOB Z3365]]$?ra rty_sA146V4!ULLP der>Lkvm_mmu_pcid_gvaF785 ~_pipe_^W%eO W88nVMX IBPfexinegiSpv2G'G tnf k_im$ha>%orD669m_be_algs×U /g"N fib_nh_5ch ipv4/!seb };ȨhugetlYo_ mm/) 2T{6_re![s()5 s<k->_af;do_PsQK66KIG/3 ű\v_aclLP36/dj?h0!#Q_p SguZ dueoiso$e:$\2X]#fCdev,o!_m_getQUSB-C! brcmfR-"mul%t; ;modulumge!9͔:Ad7 i"-/C/shmsymj 00973@\fwN|,9x o 060n:b4lad% ;/etc/&/redf.cT- 328f shim: 3r (&-vbootd ?/1-@2-@=H52ha"beenv%20 rstkm&:z5 (4.17.5).&695GnuTLS gnutl_ ndvan gpics)ra"mH16>2+ araog{ 4l' $ 'kfS./7KsGNU ,ioeISO 9660 CD-ROM.Riy-$:bsdK ( 0,ri9l0u'i#_%py2n-񤄦+ula%qr L $_Yl2>?ua8Lua1p)t+.VVlso)aspg8-purpot-alonekouT Q2+<=*7oTj۶c@{! ve@4?aWtW-H?1#%?aDpbm0$23<}go-md2m+rofm s)go:gexp/syb x: +417> MySQL-usM; th]B#&b\-8cq#n0* M31dae (mysqld)Sm.Gss iD4 wD.0.32 77731, >: #:/+s0e ulaC(</r *E1_O mi#TO"&ƴtorEP2dc$[9[ICDB#I60ʥ,608511ɞ(n. Ha$^7@A0_3Re %V353AU9T0BT8@T1ʩDMLNJ 28 6%T63AT4AT5AT7ATJI357*7.EnG$_AG7+SA78ATI8*T1ATGIS%N* TT @oz A,c: -n*L$ e), #wascr4UNIX n1UPdisEbutn=@de)"UV2r<:=-_in&,; %4R.NETd-s#H1+#eɣC- APIDk+l'eICLR^NewB`DOaZav;y>adU'VS(P6 118Runt=)87zdotU (s2123})"7:KeV &: pZBX PCf 933JWC.5NuGehe-P_%$*a"v7vU@CE- SvtT.gcL%)&+BT rPilT,sB?JBSr TN?X 9 Pn }-,OLVOynQyRdƱp2V^*O*a1mphL"u) :e7ary hIvaO)@z(ird-]"Ni:7@l+.te b <"329 707 7= 7 r B E'Nof#u5-vAr$$.E >ToD6Kor%>inli:.] virtag nP ntV^Cu q S?S^v Es.aa',,* 7Y_~ed Z:2p(lwAPCIZTFLi;"nup UzGE|wX;oup_V [At{KPe#YEv42ZDnPEbE~3QbDTY 1F 2$KxB: Un{ded/Ve 0E_'s XFS=3-4Hi2cx_slrE2c_xNN9N4:Ho_5g>EZ\B3/4vE ,sn17l QAT U,:- ()*6zRPL-P IOTG/ S :HJ1cs:8i:zFIm,doeytxJto2n)RCTAPT l'6j8172jBUGiwlmvmEfi@Q.MeshF672NAz*,9 B2{Gq9b?7a0a36396f2fd6368a54a020f420c8916e9b [IIFDUYNreBcs]822blk nvme/047aE753$U-nqso clus,bee)rea"Olth hours`70 [-rt]:6sk8a*e_:-8Se3\Q5o$U8Kf8 ;GeJMkJ5JY2.w~H:los!0occձ JwRe^9234wG_wd |dog+Grigge-une0ec?58i2'"u:GNSRptp4s1v "smp<:ehersBwwob7, ٩!"nohz_hN15g})%D`Kk!FSQ[al-9]P2CFJ: [REG] NYiCQCOMMIT_.$4ERR_DELAY!p!Y3r- "ev- 2: '_layFc_}_G5'" b'_{V`4g,hximum 255'74( &DcuT2rpmi'$Ee/+s/zh_CN/G/mA c-nupr.rst82hcZD:w"smCp Jus CD9.101aefc40a7fTwro>n=/tsY)_treP908Xx86_64*d|U 2ns j*BAY=Py $38 D6DO$20DJE4 E'h'Js. s: 9@bgn Vc.Oer)8@Mj"-ndEjd[<} 11g,VEnon+Sx~ZIPAn; (830*, DfznAESD DQD\qKhaJ~30531e @fbuzz:oO(n^,gthc>co{KYǥuprnO4{?dyic dump featuschecksummouldeach%ui-olvIuuX7dgSial builH(RHf1650782852.8.08*&JD[/y8u3x066xSambaLann-sourc kServMBlock (SMB)tocol{CommAInnetlHʩIFS;, whiPPC-compbl9nes[sh,)Epvlan: -of-ndr DdIeakb->cb090)Ocls_erSl_'_ve_opt()P5788QKVM: x86/mmu: gndi]#r__fa:N2-45869Nspve6rQo_prlimiJ:/P.c0[YSpr 2OT mg bl<199<.NET6n5d8\fr . ItH+sub&MC- APIssevlwi eICLRN0rsd`thaddr aZvul bil nt&ila.upd6U'VSy1100dot: RCE und c*a/3d4Kelž3r attacf l 0on ice$i818i6}2121`FLAC D FreossNAo' dec. *N laoOgg Vorbibl8 0djecnsf ťod x libr21-l| fgrO@> ;ma e2flac:Smote" ExeLU )bbitfr_{_ fun},supplycrafp>ͭ v0-9vDT Vfo Yhave  up%deda r :(5.14.0) UAFnftS P Ukup_globOtriggeref{>dnonym) >batz e@ t nf_:x HinransQlogvBrt #jNFT_MSG_NEWRULEx61x/s7dj w`poncan4exploitMcq urecf_c1 iv'x776 -T-fdueezmovipipapo_e 4004 \_qru3]a iEBA_<_CHAIN_IDd+Űy1y3īݶibyid 1Os- -Ybyteorde4 001Vse/r MSRsS3sd*um163hwqmKCrO-ProcI{ L9205bypaskdeSaerrOQ= 2e&[l 9.3 BUG] [SPR][EMFHF] ACPI:1R wakeup2[DelT2TMonFl.lWD19TBSSUTlwi'VGA/DVIype-C nglej946rtmutex: Mbibwok)uQin2_3_adj _p1 ^A\AWS ARME3 DMichif2D23H9.x ` SEV-SNP g>Lrupfrom ne bblkush_m562 /p9 rq-x ".\70hbz20`9//lN~g-suit d #64Ps[pid]/w brd392bE(FEAT] cpuf:l_p:N<HWP IO bof@az7Y- MB,AMP C~ Mayay (ad)X896XZMDRA - Uk Ge  Add5 -uy1Xl2l2 l-C#Ci#dn,79QUQnU webpM"atool= LWebP 9 p.- geassydigitahQ=sP5$ba oVP8i+$( n chq F(RIFF)wmaste7  d#bBsera to,$%ribut Ce'ly (eap%#nJ8g@ Cie/POSIX& p$Am|%m)ڢie s= dae"(nscd)TWm`ip*s&Wseqm[ cy'): &sogpgscal ;91 QSHUgdrno-a m K527Kp n_'TP8*Baih_i@1 Py8nkac @,Qgh-l,a) ydƩ^ml u}, $ed\)mphasim!n &enLy hav~ ird-p&yp: TLS^k)n0217Gho+ treP1S+PDF cu.P 4=mapdaB)_playpry'd: ltOSwinj+misermiG.fzip6664Qlob8-orMP) 0~T.,qx y_ _-_ l. >LmKllC as ll.o)w`/+9vpx! ' B G+n/ǫe 26C ,G''x Mm 2$   vp85H sbOVP9A44M aDB&-u , BSQL pis a^-My4.6 gal (2m ),4iadC+(5 (:esTp *: nmysqgfaH15HdW Osop|/_'#l_ _`1tur0a.c 2-320 _jra Z ->g! _coun == 0`dict0\2\a_ $!"ylectK4K&Yi5_luq::0K_"M9MJO CACHE:: orfiela'N9Ep_$@r0fN87NNULL-spi db_m>::_/sl e-701{2XBerkHy1ND/(BIND)2)51DN1 EM '($); a 5r&rout1 apc{"yW,~;7v@ f '  %$"I hausntrol d2yDoS 3:W:33K;/2: MSyrR JQ?,RapidJ  nxohhxy T=,f: o | me6 . 4\;h iMed 94043?I !deserizGGCORBA:33 97Hc F+PL'G@authe c"d9966d8(Axime> t s%Ope, f.jar.-S(5S&,:?iduc[;z Yg-d/*6bde3)8!>eb72mi!soJAR(07w;92rstA&6c(w"13*f/usr//jf! aE+J w ow by_%1D1D+&9de:r "p)FZip$2E[r<F>,-'u zipA貪 b)"l.1,V)GJ*Bapk/pI3q[ )%thzsT27B'-D|..`ExFV==eB37W)I\ gXD)97u=) ei3HD6se2q,7 #d|&y12432-$^32\jcmMPE, ravtj(-#!,myƘ6)*7*$B'$=''Y ,MLl1A_iVAVX217J22ITk98$*68*M*-*651)nghttp20B1t#J"!PI =*I|5hV!C3(%DtIt*4j Om{#f8'tto{P@Z7, g(*(sh$aJ)'pep5 V 44k/!2[P`Pm~*: PDLHC`eUGY$G31!EP(Embed !+ ^I` UEFI09V%MS p Pa964-b[HfirmIQE>>P[edk2=u,1GetEfiGFV#2#8+ur=,#& DxeI3V"Ha%#19-145: yJ: ߪASN=<+ idenI D6z=C3;s:ҤjV0%Tse j=R)No2wBX.OrUaVXZ,$, *+b 1c-&3af-fked$7a2&,am1up:xorg-xS; : nWOl9$U(A(FMzP3E3Vj13 :LibRaZ 15RAWobO9mera.RW/CRNEF,<DNGOs:+&h- __",+::g Li)rc/w .cppE1-4273X>i~d=8197Un `Hv[%Gm-sPerEmC257=c 1irtcW C(&nte45n,^/%cap% 'X=aRs.$-C,Gm,,V _~ed40v1(9c10)F' 7+3aKStYJgePObjLi e>,dW> fj2 n8=O fsJSON) ]WT MMrAJ@ C8utpm7!-bE1cL# reԭaf|-c,H]d7_1XmV#0-12762@wihar&netayzjJ p%3Cmtf runcoMY4uLVHuOTHPdiso4066@1IEEE C378{nchh-?cG8GCPiMbme: 5:VMS TWOPtJb=Ne 78ƱXRA 895AFb_qH"0AdvPgQTP;(AMQP)'" youdn "8 J 0-9-I- U eeals-@w9Z>Ap)fCalcv 9vWL/yt 3- 33dloUutpromp@IFg 2 :Fp*`IfoRt4,P  s boxeE7\f(1`.8Y!9 =4eGIOCLINUXIsenda/?sU \f >C:ol81'YgMe-gH NSI Q?o~v lemia,^ ϹLyS/sbcp.ceQc/}~D)YOm [gn.c:3_pcxD_rl4rf"QB8 ;ditional Changes: For detailed informa$ c% this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.Yet Anor JSON Library (YAJL) oa small event-dri (SAX-style)7parsCwrittANSI C, andCvalidng5generator. Secu=y Fix(es)* yajl: MemokY_tree_u fun (CVE-2023-33460)X;e]boutsoissue(s),[clud impact,CVSS scG cknowgms߬@at,ftoR)gms, Ady+GNU'bmicrohttpdC9that makt cyrun) HTTP (vas5t ofAapplicaÁ:m DoS27371<T{tiff paiconn$̾s fanipulTagghIm=l (TIFF) fs}: nuppointe rLZWDecode()3/_lzw.c%$WYpaClosap16Lm[Á3574heap-bd uaffrviaecrdEoadRj26965kBufOflow9uv_<:>Mprotobuf-cPvideNbin=DGoogle's P3col+[: unsignteg@oA_required_b!2-48468=Hd s% buil?blockbiesR -sv C. It]obj sy,m]1GNOME,%mloopley largutilstr0comm aucturg: GVanafhtab"Hsizep)eckis_nl9499)Wg_vX_bywap-can`keoime with so non-Yfputs2611^pe doeXcWpec'[Y>kshadow-u m7gramUNIX-sswordP, we<#V agTu' |groupcou. º:ssiyadur[d(1)QY464= Pytho + pre, a&vjy-onmmVlu, whi"sdun, clӢexcepk, y highveEyna Mtypel. supportt aԩyc Cu.Rous2n̤;rfollohave beei pd HZ upsams죯3.9 (.18). (BZ#2210783)6:rK dct tracE07-4559<Sambaopen-sourc'_NASMess BgMB) :+8CdIn0RS(CIFS;aa PC-pKmachinnre,<"C7s,(4.6190412: -of-bFda#B AUTH_CRAP 2127)@inite n mdssvc RPC icrotltt4K|Bfu L˜#2-s hscureE= tpm2-ts? 5lTruP# M(TPM) 2.0APIpy. Tť  r Ue KJdecs3 TSS2_RC_@N 274A cps-6QiL _y#wpP=killgrepn(?,Tup` mst w pwdxq:s bYf 0%:GAvahi }DNS\yDi0= MultCst#ifSZerodgurTNetv kO h= atdddooc*n7. ~ -awyouplug mJRK,no{,7ewpeopleRcB0n fDrYPa: LbyFbusy-n o /4/C-dae /so11-3i 4 rL_s_host_ sol_stwhen edo  badly-˺?>s502®bb rashedDBuI198=Whew3t.ard,defi> PEP 427M-M:arscadeni-3)rR tpocli 4089A Gscript, twAkl=ݼ s6  hpVirtuM (JVsh r^s9Ieres& a ~+ > is@&get 4cOertIEv%)QH6 In l}:saI-leEf! sűd*inct.jsap)be yDShvve5 at ' ac>ǥu:e( !um*e,àumould"on h*<` "4l/usr//jfratisow by>519]jcmolNQ, ratth-ds)*$ e8)O smbd 2iunix #(ao"096"d"\tr w-on(Tmi 9R"rpcecho" ,slee#llAD DCh0#ng,2 ئHyextp(I e-/2{CZ,:  webs)vulDap ReA)4487.NET#ed frr+subWC-sevZ,wit CLRdot: ArNPWrXD2V':-Ftp(+604$\SP\ By$ZWBlazorsX55N0sd`N r<lZvil.upd6U' 7 144. {62525w^~SQL advanc)pi )b آ (DBMudsqB68 E1array g(?z586X8$Eggi u8)K8K en 9@tits@ ^quoH Dn5ĭ39417bRole5!_Xl_ba]  Bx u ,!79GS'er8'med 5]$phB h;on;gVer1- *-br 6aa lof2 -Pj:614;6"442m1IMXFmuxer-6FzIM(Ido6centrzedOӦ:(G.zbgeth*/\udeye!ipIn_CSRFM.57-   IDD.SqlCN(MD@&P.Y4-OaX509 Cs -  a:Az,L7LDq&M >2131e80166$o43Lr'{C mpir$4+WjRSA "i n -.(: ag3 ALS%547b52b$ Gv* fieclawun t@2C'2959g -op ܣI30Ʊ21Ilog* digit#pIukeysO6976O4'1.#8"*!aōi1/or84N6p,)I+# r #COcFh2Bu392)(RPM G8Q&-S&#PD'"  s{?fJRR8` _$$TEt>2(p!.nc 4i (exa( , "RG>6ÿ 1:.""'T'#^2@40`5-7w-?.w2w2Av^@*W7r 'REFRESH MATERIALIZED VIEW CONCURRENTLY'r098unb a'desa c gISECK rEW Q9: KeyTrXC- J>emPUH)s:SoF&038{OPHLa a53 -est en +e++exhaus8s]+M3! @ody+k .22 *K: bpf:-n@r[v *O4100iIUSB:C!:s7840:xIresumeF2244Fcxl/ +,99tcYqdrkutd8_5G+wE(Ee`dj+1^a` UEFI(Aq-sd 64-bmHfirmkIQEMUKVM>edk"9B-DHCPv6;cL+T4R5054inU`J66* 89)1044UDF#1>N@RAPIDanP4P4- 6T1S25671234^_8` : Encryp3_Privileges%_sV7* %R\UN9:N8$N  Firewa $_$Njzstd:Tb run# util.c82-489"Q3PluggAuth$Y4Y!Bug fb#33630199`8.0.32 troduC regressz--set-gtid-purged=OFF (AlmaLinuxy454)tTkernel pva?IȤ3!,c=opsyom Klueto: l2cap: fnull-ptr-deբ_chan_=eZO73Wbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type eGcegl3LINK_CREATEi385igaBٲr crashPstUsafe(45020Lnfsensu^that4_fr_args.ext!CoeiU6697͢J-after-free_u be_a_link_Ĭ7675sdiv;9888;arm64: ys?m= broktLDR (Pl) suppor500xfrmB-*leakalgo dumpO OSCOUAF on_sockH25HISHisHnKVM&SIgnnCR3[4:0]loaXPDPTEs from me yš:valid[ new SA'seSlenA[SA familyrsel.ixe42 bnewild--accto_unrXVirqchip/gic-v4Oon't a VMOVPra dyVPEO9Шhci__ed_cs\25qsched/numaWpotialfinjask_8_work5'3\-of-ndritM_get_nW_keyPVeoki2.11>PKCS#,l#jTIBM CNcardsuP/4ϡ5 u '. *\}G58ephicProo withêfirmwaed)Je MAjlMFC 4#1S pLD Exp/ 2:0863 F 7E=z)AP Ai sĔFunV3VKEbr softt[ ccaed OÓhH) Slot Dgpkcssjge l Y: -U ide- nbtRlR v1.5d$cipK-Ma&n09 .NET,ana -fe+subC-sev i" LRRN0M`i.Z nvr upd6U'VSDK 7 117RunL7fdotnet$Sb9C/ YARP HTTP 2 WebS1 21392E8,03E%DL0eOffi uZ,%mmun7 veldգ-p}tsu l ktop apiqa tdHsp shee&ula edit8  rawY. raO6,visimyrrtced#en\ 3-6186e6 riou lawJIRA:PA5 AVarniCachigh-p`N a zstore"bm DZ R!sa havecrtea:@g/ , giv*(s 9gnifi t upv:/2 B?WindAky den] O8 4 un esiveca;DNS SEC:olA{wasS}Udu*orredefamios,  | stgroupPmo%fyr figutbin " rolm$-c4 :@"$ eiexit" us  IPZf8" WcouldKrCssf Gn;Bltlhost N89fi al6~(.is ?unpJdkvanipupnin,ly wA 3,g1mrquet%.d bߣ {meseWdisrup(Ll eT{ g f "/etc/,/E.d/rt f"s>en ml, "R\vwo di“nxd-re”eչC~51V+lar Om@| yexUЪO44 *H ju-1.5-jdk ?<Jw##vamEnviron*SDI+Kit>:q(E7(831#1#10n(Mlge1C1pil 83"22XXP.,.|7 cI14IW$IC24fP"ej _n__sray"7507[9"1O+h[3\lookFO57{N77+U22+ͣGRay(3 rRAW bed'digithora RW/CR 1NEF,<DNGs)<: jeap---Z2im_exj%329 t+TCg)7j#c%Ti-_se,Sp NsVk;Ident:M(IdM centr=zeuth,b:m:B(orizxQ / ud-: snd>C YE  ^Ed%gg%AIF AU,WAV. @ src/ 47au.cO'$2-33$<%zH/ . (PMI)p+m+WMPICAascQxR 'v t7O!dard fl (J)s #e~s ` pmix: r"+7k_=@ Il3"rbitaI4=Netc,Bok NBD pn+J.hY1#ks9 -lik!)' n"nbdg^ sp1zfZzS:M%)4N=ez:87a?C&hisbe(i P.!"%Uep"!`2>F RDP@: :c D,P(<),d undp*lice8xardpF'MsMicro/ ] m$xJVirtualBox .E qy,00c<' DOSz3GK=DGN8 Der\C@in9FXL1Lin* *đOOf B#W S2S)ngS{ Ss~ gdiu CLAll s=2 <<E(E:+*. ju& UEFI>~1 /p9 64-b+H!>IQEMU~XBedk2:Vh;'*>+M0)HCPv6xyEvw's3"K523#2Tcg2Mu'GptT*67LFPeIE>mu;IA_NA/TAAjl o Bj D](O}/c@`1finyp(unnȲ73Lhea e2eaJ$dN.c]Y/:$ sp heckiDHC9},-44=QHAolki;- qt5#aA-st&, mlXn)3Qtq(F >$+Rqt:E`hKTX ] F>GStsmʹy ,m+m?on* w9h e";] gVer1-pOedle1- ji TMXFI6(un o 47IAES3A!diy5y_H.2bG[er{Mk6k3P3A t %X:XTag! ]l (T)O }&vaG? 4NA<9uV"&hClT teAI _pedic`28Flc?A258VD^R7: /in - "_hae___'shƯ78]/:o'OETH_P_1588 d ^orPaPPb: _cdskb coo g6dCIFS2DeiI(V'+CEx V`(e(e^ed_0ofe56taO^ex+KK 3L%cklog&`h;G4֔tx {u!Ԛ lxsw;!m_acl_t>cI7Ki2c801<."a“nxdH di”eed~51VPa}7OmyexЪloaO44P Buga-dyndb-ldap:.tt ABI0virt APIwPterv^Cuz/:XqVr t_~edQJ*X: -by-erro +vL5fa+ByS{us4-144Knegatng_new0ngun o Y249* Y.p[ahl8-9] (JIRA:{-2:n9515)1r\Ss DU (SSS~ }Zo uthEme,e S ()!Plugg A[Modul(PAM)war# de-ҢicSAcry u6 2eI5743 hw: amd-7rai##VC'Uat iW AMD-SN-3u,L2*ffdhe*gohm+~duc60a2e5b909z.fips_wed=1 l5pwcy t s009mm/mglru:x r }egeche235B[EMR] [TBOOT OS] SUT ld;go{S3 9.2 Tbo'OS Oy n -16 runBUSYɄ6<j  te- NMIpo pE30678E0:6f:00.0; TP e g C110.NETdd-softe a>bC-Q s5 Li CLR N0p iBd`a > rFhfn{il. updU'VSDK 8.0.105Run75dot?9Dou 4w4?;i%Oenv!n ipa lA"xyA.}ousFanstt8xz@ob"ash @L Y:5md clinrute-v318K+LicOfff &!?*mun-d lddvsuY kt!,,=%)p *orsp sheepr ԣ&$ e8t)awYo . )s OOimi'bu/c# *lt((mprx1pUVzo}bit<gstm/itec@6180hW i.macromion`w&bz(389 DRFLDAPx3 (v3)"s.* sݣvLiwejA^)R %*-Y$tor%dministg-ds:7>viW> Rr-r osZ-REQiO s365)hMal@.P,_shdo_mod*lapd/)1 8i _DRub\)" 8e=,&-n/lul?ha ea& @ +Ȣ"taskfouhavepge2" r /":by (3.0).3/cgi-: .spli/ GI 1 2n ?2 3UR33 7553&464B#>S IO7280wCE6.rdoc_o!RDocEA ɖ_RP+xarchV FNp  w*,but saz#oxed z:G $6KR)B Cal:246z~{;GB6ssr ^P1S1PDF u1 Pm3s4co]+ mC'ϡE') bep 'iaPVP zZ Dri'1Py"0)%vek m,i m",W'* v(hG veyb(32l. 06Z"y=llCcaell. -Lw0@;p}@(>-v n 5p.To' a 597/Gzi8. lD13mbs   f/mlx5eV$pedbu ~Imph:i_po]152626=Blueto>/ voi mhc> )_Kt8Y%o: qd- / rI&AER x?U974Uxe2rrܡd.akb_@_fcycl73ga`f%ny_cre__on;b ___x(9BUG:hage\ul= :&16bf752f593ff84+.4.z8+3>0[HPE & ] <gz'= l p4ex6220x+/\/_de.c:51!\68DPLL-f,D71)CNB95sd:" TCto6.y764.IPSR:*4XSCTRFE] BOt`67 ?DU825#IDsw tu(Ou8!sir_ ۈ59 )]@at]VFb9%x MDD !9083MC8)4 REGRESS] Lbob): oke10+ ,s495ybnx2x* PCI/iJR432)6.0iT'6;'32O'32 O'S%GX.509 'nPOd 8fiJ80 )9,7B7A\S T_ .Js$0,)2v)8 2640j-1.- jd}0'J J1Ea *SD+KRG>3k9C?Eli &iarradex&(8321h"114Pz UTF8?B/7B31BEZ:symbo2e62He@W9WW8W (c%e-Lt05480[P200}r>;,i)ere2106e4eOC "|2D[O \O454O1L11M+N7N7N+nN2727+uZTIPC*F sembly~AP 3688e7isil3_dsaf_Kc /NQ/ge_srseL_i vÁw>hclgevf_sYmbx_msgV9vb$l#F=.IharתR3Y R62ciPj1939j6*9bysGY#_s_t/Cw `&3?vmsfuMup_kd[Aaz5MUb>UH%bi,eBO>WQ x@+~Woccu.R5poQm4_c#858)cwe.87avmh5 +rved(gFHA5Jinc97$or e)iortcIiD_Q_$_zK+c8wsk_8/q75)98S2_hmm.c:3src_pfn  6\85E:rD9Iu CncTxRa`g!r givc#!8841^ytp82sil Pif1+*;bledf9%|2oB0x2:MYHu)2paO95blk-ZdK+oB664QtpKkiK2)qt5j.KW9,lʱ*3Qt. qt.Delay2g lP!eu(r,>-6e?E (E=d 6UUEFI`%VGM50chRisڮٳ(W 64-b%HfirmIQEMUKVM:%eXC"HobF HOB OR/W2KT*a4kRPVPcUTCPm3ip St #N?_"452A4w W8PseudoRand; Ge RDz&(!KMc6$i-N)z %promp#Bll e @bJ/t-$ȩ cMA a]0^l70vA-p_Z)$ foc)oTynch *I/Ob8iWLookup *&SSRF UaU[u2480YK) [< ()Kay#ll T<tBumerhC3UQrh^,+zf3 - 8 RuaGD9 Y$pLQtfUeTfRzH*NetC(IOELoHT8[$.'Y' prhe rs+032+ggYc+Iil.c6jBmAL9jg 5 4uncIIin5_&. c_bfE7!Lbp|;`beX?en_@r_c( l_a^pFc7 cdm:+/ umho/YDsuspqXK88/GZ00ip6_`e_mp3 >8,USquC+GGn:|Mqc  uh^98MfKd30y s [9;P;sOa^r[(sO3UicmSNULL|-_ <Hbe1Obig1 @_irq(Z N^iy R90Rs#3shut_nĚCGscsiffc_l _ptpru 8Wh_so(~2rx_krI],`M25`pdhbazef($_4_þ\24]MovPIV'1 unregi9C~.c@h5QY-xgb54aYI7e5:-bec7lifeŒ`3FRADIUS`-B{l!bfigu8R5H^DaUs^(e`E, 5e0KKaI 0Ku4org /:EG: ' v$EG5a=EGF.?gCG6#$'j'spzs|zhS :RRs `st s@namc1O *ijIG(0 'kJ975JAssi othqWve`!C=n!4074848$3I, mi+JlsS: 1.>C3MBARGOEDK58bB8Nabout the security issue(s), including impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.Tkernel pv7s conta3Linux!, ofyopersyom. SFix(es): *J: phy: (-2024-26600)!netfilter: multiple flaws6808, 706535899e5fcifs:R28"wifiԄ97Ą5243-52651ä78¤27434493794122857n6igc!53!dmaengine/idxd,182,ipv6 R74159690340961avt‚CƂe!mlxsw#52Eeprom$4<ce!91ŭpֺ/x86*+864L40M602Ÿrt%coco*c seeRRDRANDZ CoCoV80tlbmi_,Nv`"r{k!i)fFP"do s_i<'z%splhiopt_aS804'-of-bosopsê8mapH[ru#in&_' f!I%usb-sD a6 alauda: C\ag iG$izM/ 6% ms/x Ÿ9!'f:b Spiedf' Nmina55Pxh](Haj TD Ѳ=0stmO!0Hemlm_'_./sɵsolvhF')lai-as-LCP,a h e6&VL #vF)T/ng_)topfn_4_^%pN)PCI/MSI si_cap(7x /WARN8x{P!_o,lA082Js-'g ro "JƕReJ t 4;2Is10@"l$y+NBrot*g g%J3KLdou'P,i13yu079,Net)^De1 NBDmpEo28#.Ihan d!)NnE nbdgrmywM|BDaS:*` d3 certif )738 ] u6in_2k +C_mirr %'t@rTB/ w4p yskb dARe 9*/&fm %&{ i1@dno-m  $3*Gv pS/KK`ha( vp &X0XfcX E f: dV0k%vma l isHa g/ o D'n1l<.&0U&8pf,ck P(&(_'`2]-, 0 V"0_ra7Y pgpiok%w w_chHed_-(yY+>Yn*f=-:i o alA l - f.a*be j JsVi cppc_WJ2 O"P5Cfs2H=0gonPN)nl0+AOGcul8Tof 0 rradvg/I/y8 -add /os//umef. ACPICA + I\ [ BARY=K. )+v,3E ,t7V2?_@\ _ J22/9nr*ReEPERM,n , xs_=l)uo j+e cups-2<`e, #\i1S(CUPS)Z=!Aw02t+%%ws Yd'UDP7ADDR_ANY:631F:n 6] o()_ : `cfGeterA` API+ p!o5qz oIPP%47+~pp[Y3kh rot&PPD` .M4 3+d-- q)_+eC- sha-wi) CLR N0o(`m@7Zj~(avail %dU'VSDK 6.0.135R9@35 doC:.IO.A(- M>DoS ve u?SLis +,ZDSAoT*.JX2@5@ ACa$o9hfIPEe4{. 890 k<2t Z HTTP/38' cG s%Dq382NHlg#FIPMI#Q - H*toR5M™,#In1ligeP&M5, (). admj?toKtoa GD#lth GiT-g ipmo@P$? -o.LAN|#HGo429349j-1.-:jdkC?J J1En:on*S#D)J+Kit'ifHeap-B O7Im2SaD7Scr2RGB F3-481P* hG832@212,ARi]AmaxHSP2#PxAPUnied^/c-N;833144SPSIm:Wr - r,Y263&111+77+}21xTee}S<#Loc" LWu_n (R) AtJpuU287Z-nR_L&GGioG@4 ,e ,upP74M%nL:)&exXchPUfn coBsteQN#:^Hv],w]o5Srm_8[le-CPU8-9[hwm [w83792d)[WSNU&ry 5el"A\3Grmp[e+sn!x82#oCKR-,P%_9!"OOB_'!_H"ITa /)DNOh2[,0*vN+ O=%fxr=t ?Ue-9]ic1#ntHnapiL95y*xfrm67&pMst_iա8[`(uS+tM--" U%_*_J&Q20_.R'ctJke c5fd}in zR\_ht_YW27KRnon+ _J2_bZ8 @@@t5i1ReDo#sH"tra$BN7@w623B<S R UYҡL YJ Xs${L2LSL1_xhw.: NatBranHi1:yv2IBHI2. -m)y.toJ[  9=A668 hre-b)S +e#mE =e1giGhorl7sbQ()TJá-57Vec * 9gaO-_(S ^ bl20^Ue,Xh3H8r?W31'w12Oi<bl9K@4:Xr4ffCtdr(!ito cyc!`62:xAkog r b Ga_h_W18up`94 !inn`ahmeta 9#ŷUSB:[ :2c-wd8["dCa4fY;5une45<~];'rt6_pA646-\AB @-K0p2hu chg<_b71infWEHnfr__5n<^eA__<_l_g LZkp|$in_XlEBR P1f i mI\< = LNJ g $gS~&'Dgt DP :8^ t a ofMma='7TagOFIFI(TIFF)\ 3: t!k7006E(EdLdZ"! A =UEFIV}BuMasn|5Lsam+64-bmHk/IQEMU rssPhCMX.509o;61FimysMaOLY1305 MACZO1 IsM. r]PowerPC,61?]Ep x! RSA@bli sR237Rs=Is072CedkTempo(/253AC?s ֤n 'Xij, senAlma RN%ZAeM<Xw Xe#>XE W2. : Security Fix(es):  * xorg-x11-server: Heap buffer oread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080).bPassiveGrabDeviceb1bUse-after-freORenderAddGlyphƮ3) For more details about the sCissue(s),Wcluding impact, a CVSS scG cknowledgm#nd o/r relahE-spac)m5urun m.pV alsoVAPIs5nag/a with/H&opr;m;NFt"؊66v j-17-jdk= J%17AEC+SNDop,Ki A:^cedc*hal5-21BBrely--igs+a]b."Klis }beD/to,R oT=Ė E2%o %year@Ir,867, 712).\ 21 +R% /dc Don'# p)AQ(reqsk_queuo^k().< 15parm64/svE,eEst'S7t 75&40Rf rKnV CIdfA'[ute x 2 MaDB HndukQ MySQLxE. , ) d "B Cr_lD/sf %dae$((mdbd?+8 X !&| /S(S 'mysqpInnoZunO ..Or)20&\1KC:VAprV421096 +:0inu_ _ms253"!!T!'*s  bKrUor=0P 3kPBypa%OQoymk(o+1diCp2718kEdb}n~"_5+4"A7.e"t8lpathvS51K&),m tPJ'138x6Mc1:keRCUAtigmp6_s2 @75?Oovl[UAF9_ry_ v:byvdput#+_upd887d<%atmiq`HUɬ200audfR!si-o:@in*_f_X2-)46Xvmx3O!al&a+Us;in'_p\(_xd377)jqlLtwencxiHp=-lt(JSON o3=lik"^. YouE8sl,m, >, thoEYDd same4Wseawk,bYeDsimi3% yGtM jq:p5lejv.c:jvp__:2333OA#SaQ(zB -Xq_fuzz_p5Sj#y_vfm9e8060)fx86/& '/AMDp7 - NUMA. 99+&.8.0)8G*(FBet[ gQ+a 07hHuTLSDl66Is9?^B 4614˚4Y0On$r  5Q(VL w%"ES((ei$[`-D..-BSA=trueeo!I6 %X/)ceh d ^I.= Lo\ HDc Nw9reKgy /h+y8 9;H+sh/behavio+en$]SolarK"ٲi"viHW@'U> .L @wi: Ĵ_].M%04, 56789101#[HTTPR8 5005t/6ZD HdefaUc/L3yWay+7. "cau;aa5iltL*t)X11y awt.RoboQ s{ake cr#c+O,duaank 4($RPM8rev ew>2PipeW>28so Đ'f6666970 .$`8384   choomi,,tas#81O $anY i1 ga#cgoGG1A5Regionos,ac 9ato)d0u?Nob| re #c$sug, bOheP l)UK -to-T Qao93ȭ "cmid-O llO&lwaykJcLp/0<}903 81^B#$?B?U!5or23&/g.c\ gnx_r(ch^437$gv*vcg;=m}d#@80-Fsunrpleg+C_GARBAGEtsvc5 as^ 80XzB $4[\rsxg DNSSECr. 8r:s{C>soG 9,[=9nux operating system. Security Fix(es): * kernel: media: uvcvideo:( double free in error path (CVE-2024-57980)Kwifi: iwllimit printed strfrom FW fi`M5-21905MRDMA/mlx5page_size variaoverflowG2091Gext4:o!ut-of-bound readܡ_xattr_inode_dec_ref_all()Z12Zavoid journalb updatinvd pmd migntryZ958Dz: ch9200WuninitiMsXaccesSu_mii_nwaystartZ8086Z/mdiobuseoti,s } 457/wSeya11 Fmtails abO the sissue(s),clud impact,CVSS s,kknowledgmso/rlaainformV, y toR?m 4,Res:. T! pw8onɤ4Lio!, ofy4Skiprs;sgtype UVC_VS_UNDEFINEDӡ9_.e_ 3104)pa/pkord72!HID: l-ish-hiy[$tp_&^m1928+_Ycclb9bcif'ggwhproYclosetimeoluntt`62Eemstick: rtsx_usb_mqslab-n'_drv20eisc/vmw_vmcanleakU_host_doRceivg%2-4978bwiZ6em asild qd890tipa R%_a _Nrypne52]tztao_z_notm7nPytho"pre4, a'vobj2-orie *mlanguq,$chemoduleexce& Yygh levdyic dl. suppofat c ClibraJell.j oundow0s 1uptoolP6 TrasVV+*IndexI4J3IDoxygenvn eTon] e browsGIHTML)/a{TuJ#LaTeX)U aKdocuu t cem ;~ eJirlyNV>9¼also bWnfigur9Fqde uctureNF Ζ KjqueP UnOd]ex0via <\> :s DOM4ipulme$d 0- 2dgcc J 4mpmrs fC, C++, Java, F(rayOi?CAda 95 GNUd? B [A  A o:gif_hash -7_$p79P 12kN C 9G292)bpfPe run D_skb_pkt_[ 86i &( R'orgllo 4-2895r(tlb: shareMbleVMA sp$ , \ n f^ 4Ybm_fvs GUP-fast racP+ dp g !se3 E l g_S12Ť rtw88['a' buffkWoc5mBlueQ thNq flushz5li2c/ ig]OzPH3%t alH fh usockL471)Ǭk|F.205etad91esA,! 2 sc 1sxgreSQLwadva#dfq+al basa(DBMS) pjsq{v e|rbit y|t871BW N4Acp: Cjjoop%a O819:gdY;< | 8Wi40MMIO - a N in1ear_hw 0 i!iwcm( workh cm_id !uvb1,"OA   cs- eempsX  n_ 46 vy Ks_* TOCTOU:xfrm@ Đ?h]9_"=technologuF: O"%%UDD,06mgudma1`a<9"O-ef k0kdpXǡKtrolmxinl3+drm/vk#t(-8 ud+d*+~%scs+pf#U/em()BIOSs33#ix-cpu-$r~Kbetwe0*y)_)_)() f+s7 cquifrGEMs&(K(449)ipv6ec<: Dyt+c->iumldѢK!5 My ltir&r, th0 A# [. IJsc*bM (my7d.clqo K:dumpspec&d'(CPU Apr 072NOmlr#N62(NSd P=)d1##U99UUDF%1;<Re %P3PC"(nVSIi#XPI-"215747DN8Ě0DInnoDB%7;0ND$$40S%Y62G709_KsA$L:0]ĝ70le3<2)Kdwc3: gadgl>ethaYvy&'ye )vV1L9ec+: un1:ed/l*4Eu]84390al'SCCB p+'>96+}mmG;@8D"orG6pp@24:BIND (Berkeleyvt/t NBDom)gmpl( DNS((4S)toc. d`a3B(Cd)olv$<CIP*re; a&rTrout8P>v*);_9=WifCP䥰is ly b:9: Mrec?^ik#exhaus}4261 ]-O-HTTsc.plej @heavy8+oms2\`nssSSL0w#n:__ 5538rbGGnmAtok43737vuASN.11s72$" OG 2123 X Plugin#M1% ͜4C$ Sma%7Wd ͣ1$: N0!>GpGCS%ZAFT%HHealMo o%C1H-3!Κ36K$6K2PS%GHw48:3+Y%r@ssw 943!?5" 2214S6 VM>52H (Priv.'[DenLfBDpę)5I0=5]NHs$O4Bk Unau)rd8+)Modif35%P4h)͢<NP`n*3;49AlmaIde:MuA(IdM; cUEeHuth,ci:An#Abora`/4ud-P6ise viron EFIPA:es46;1dadmin'?74ni7vea7PerlCQJSON vS9imgoa]\1ituond'HRacGl^Ӥ't w7IteC -XS: =X,6a Hfa7Mf840Y'/keyXo;_task_fmicZJ 8YKVM=86/hy2-vL]non-TcHPV TLB Jx35_MDecrTIDRX pee5g V6O`97F>EoGquoAPIs %" usyx " foencoQIA1%'^L arden#2ton9g~sDw0 b%L PO$pBA#semn8e>Ncu96wKALSA %-auc: VeCC3 clVrd#ripZÜ975 IRseqivDRHe EBUSYy C%3Z.NET d-soft9O:ND e+subZXC-ӢseverawiteICLRN2^r b]n(1YilQN[fdU'VSDK 8.0.cRnN:21.1dot'4DisD_ 5K%$ Fl?@ByEG37G ĉ7910hfsAxd'gnU^ren Qesh0vegrWfirmUarmyKp E _9K,asU!hlŦd21dsunrhe}&sV_tt l-&K?WK6fivYF#g9 #_d_`81 cfg80 e:p2' UW__#zecttl9@9849CL/L Nicd2g o]1j-1.-(jdk#K@OJ[ aE*SDkIop+Kit :DKPheFaZK~90Ce t62 BugySiA8.8te0)9.2hasd bufNreedjnmaj EZ. Wot, sOiw$eobyf ]Jolܥ@8.2,46fQ OnJomw's FIPSell$XblLpi&>wprTM#Kbeha +-DQ..fips=fb-77, 89717+־88OL +6Sx1617  fb a fun4 STagImaF9QF (TIFF) :l9b4M-A  AWrQ-WweH 99Uc]Msr MAC is pnxnt- 7S xQtFc]aZgwww.g*r>NVb 'B.a~db%;(,C$D$E?[BG"$oy};"MoI_+r_view-~K7(7|O!)Ivulnerability (CPU Apr 2025)VE- -30693) For more details about the securEissue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoR pagm lis,R&ences:. Tkernel pw8s conɤ4Linux!, ofyop/tsypm. SFix(es): *K: leak via transi ex@some AMD prosors4-36350)j4U7Ux86/vmscape: Add7di\al IBPB m g8403008BIND (Berkeley Intt NaFDom@)le ;UDNS ((4S<)tocols. des3serv(n3dwhichsolv$host sIP addres;@&rbrarrou-fapplic>use_enfacwith);_tool=Wifya ( ly *bind: CacIpoison;attsuniciRRsg778)Gduew{PRNG;80;R7urce@hausAmalO|KEY hl]L8677)(can: tp: fixtidCAN fr;recepraceȣ0_rcv(2-4883soc: qcomimd-db: Map sharmey as WC, not WB46689OSquashfsYanױuckmb  izeF744FvAbetweevice_inoتf()&iput]767Ťtdx:t "in-MMIO"@72rxrpc>aĢOksupI/Orea"\986io_ng:if needdule¢& ovlow flush[5006Mm_pci:ssH_class_free_de?Nbe/r vethodl2ġnhposix-cl'dtipec64n_)_650195~V>cgllsM29o/rwsSNOWAITO_DIRECT start wrx[3052[aǢurs49vir%/vKdc_queu5 G11KVM: VMX: Bu0l PT_ualizguest/:mH)hiCONFIG_BROKENj3xePXhyt]afe ag(splvve(6Advis[)s241sRDMA/rxe"sqpwars\reqG2&buafErq^lPttags 7nfs1resvc_expkey/ o8rcu_wor216NetEdoZ? dmskiG6603k-cg [CUAF@cg_unpin_onl H7cpiivmoc--of-n,R[)_(_ctlT6Tbpfnisch_g/Fh RCUav Lj1939_ses_new( skb2 unX4XryptoZ -u  laydireyY padata_do_par+eljreturn -EBUSYp*+iowqn kill2bef:ƾ70 rtcH____T uc fulZr'73jp 's is 53b/ O \8*ig/" inv gb5Jķ2332ZpvUB9 un@iGs`p_vs kd3689etfil:Z ntrampi ximumshtableC NT_MAXZ5-C48Z2Hke bulk Nairnγsa D, bfq'wakqaf_splvR3zLKT  B7B~gejr@ f urMmmswap: nchrR ze 3 cr. s EhotQlugc9c s+D i{ c2eronUc6r uffd-wpE/PU n m ap9cpfifo_ _en: D 8 etȱj->li == 0U70Xusb| i rrcKBo 6powe /xH본Jicp_opaO4:NAPIom d 3druc99papr_scdon't{ s'0'db_353v |MimaJ!@N60 l/dimVdivid4 yL DIMD \sIDœ26a1tegnT raise_m urepî4/xrVtma>BOefb D G ce( fUEFIL e Bo) T2c 8X ta-ar$ ep->rdl#8J h)=L=In&:^ap-craenp-thgh Yl4NFSD# 4_shutdown_ bFSendgs% ousA !pm72p_:_r6Y445BluetotrtKNULLup  7982wibrcm cT rXecclc_phy_iqc}! ms_nd801ûbc@de_geWoard_Ǽq=mlx5PH ODPƟdrm/xe/PTP Uk495HIhidemas Q_G{ jrtw8 1mcel_hw_scan -/ 7X`mt76925gl n_ch:_vi `ath12(x FhOPP:ex]ert void$ fu9uıtin&_[_aseto_vi acl_/ defaultmLogico]  E:greord#d?vrf:Aul3ml_l3_oWf te beuEAM_OPTION_TYPE_STRIg] Wh'<  wmpZrt3ūvxlO _vni  uoffonlo,clcpv6ip6_ads6ASoCOF[ thda-daiDAIdge_ s®?LG @T'?b ýX let.[.weightways%next_h icemed_nd 8D +holzutexm!8hE-iCc nulf_imsg_ ǶtcAdT"4 s!as urr?-dstX6ds < r]M t:, las6 U7mm/migrX i S; f."o LRUH 5pIX6, vwopcodX6TfpFfp!rl1 8Mt_mNgeneopQf onƨ20oa @headl 8 c diay 3  H814jan$ke_k&C$(B$xim LSM Sc3 & Y&A=]jsp&֤n\ 'X ,WAlma&R NoedW'k&w-ls]')c) QUNIXw fil tP,5l)4a-$usn : ' ] |o gudL/etc/low. eldrc9i4433Ezzbq a5X^,,(nraF Y; )c,oUravz !t@b7%/-m6*c18-6T ?; Id>M%IdM.{!auth,, i:m:F(orhbo'ra/)ud-baeOs: 'on xFA IPAPrlegAs"d/admi?743S;S/i&Da SSSD) s$:d'~t+motei7)Isog"1SOcNSS!PZ"g^A[M$PA0Wowar< pJ-# c$mf[t1 # ss] Kerb\/.N w*&AD-jo#di/ 115 ?tiW0a 4/0TagggImF*F (TIFF):ob4 UA-) VE78)AW>-WhWher:0Xl_5XPer Xs un W2 xorgqm+:aXP-V_$&05-62 -XwX &valRv2ƫVKRSetComM&H1 .Orgwn-9)7X WP b c l l3la|sf-fe aph` aQi&up x> 99s9 999N9y9c'9}3< o 3L\ yli' Si5gn-On sSAML٢2ifaP {aw'a fe-cycl(e T!N _eZ3 -#id_rm72cfg+" cm/$3=e1000eDp _eepJ)%N. u'C91CC_)tY2sk(sk)->fa@ _rs*69,MGMTHK=sB.'s?&i'u/vt-Dis| O6%iScoh wal"(40058Xlj(ptrTxau/0F]W.B2 NETDEV_UNREGISTER+$*>2f'/f< WffoMu+V W$9BU_>PAW13499*Slz-at*$S7,ke "2+h?"CAP_SYS_ADMINr. 3n<$m f v5(ab$E cript)m6$ty"wai;p)8D8)i if*_p&)2, LPydnQ5e4, acF, ob.-nRm3XmT,0exK y7:dy^ic/"4'l. sup& BeZyH*,$.v: w< Scp")"Ef C kD"(EOC9L ocz%3$.-)_g:.1f]IE0OSSL nA KeJt9-19cNPNwV%'? ̥HTMLParNd&clex 6C _Qʦis...*vYs"3r=8d temp2'+ACPI`,t)?5".z3[H60sM/M-JKcocc/inAk->L202@:$7-_ d3|:I3E?6L4pr4show92KG 9 E_p_H_no_fšN1LS&.-aQA?oL %eExWyMbo7 m9.)&d-)4wNT Ia9&XC-'seveHi*LRZaaN2veQ bw ]nav&. upd9U'VSDK 9.0.104RMU3.dot:D)E&$nIn?*r. A MRS2OB0JEnh :(TBZ#2^7z.8143Un] 5r C" http@ok-$Q7592Wj-1.-UjdM#6J J1E!3*SDBop+Kit @:K)FLSnV15F7ImmpiRA50S:@/D%98717+21 +dL9o_Pu:adsIab7?50g c* C3 (/POS?ep),AmD%m)ۢi- s9$[f#nscd#by*r s Wi l ^ #Pc3i;0/:;RaGNU-L ,'s r+(03Q:389!"e.7 LDAP 3 (v3) ,Sgj%{%~- ?jV!P!^)R;P-kLB% =ist- -ds6-U'ueAC '>f948%+URL p+eure b+e?2B93B*BE p ( dGoo{7 W .3+ enaP>d? 8,/yeT 3Ra ?x,8"MFomHF !ā : m6 a䲿FT2-19o?>B-x11-_ : # n'7s:2H0q96i4rSB-r3gcso_65RBS>%T.Tq1HPMSdETsK0KnicReJY5.YOqUPCCe0Barr`CfX8XBCoTOfKeyM7MH:K`HCSymsGN/Xo?Crg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s),Ucluding impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,toR pagm lis,R&ences:. Addi al Changes:֤n c'XiseasseejAlmaLinuxR Not/linkMfromΑ X is Xrvfounn;X cli undW2StFix(es) * xorg-x11-P: tig nc: heap-bd bprivge escalvulnerabilh4-9632)lX.O^: Use-after-fr%ofroot s[4GFSyncInitTrig601HPlaydEv]K0KuJalizHpointIi/ompRedirWindowJ9YOut-of-Qnds wףCrePaBarrierCX8XTypesOfKeyM7MH?KWCSymsG6%ە_Tgstemer1 p alconn+CmaO*work, Ggraphsfilhich op;te" _Sr_kable73-4675V UX{ E H0j6952YAr CExtht xtctx erro163Msojq6 &voiEXnumbe, 8007ZtpT dkvoc"elog/acpi^ H5Hrtpcf85063:Sx OOBPCF$ NVMEMZ69Znvme-tcpU_,_,_du192Tsi_ibfLF_UBSAN shifXSarRih._x5how_nicf93?Yelpm h browse`GNOMEsktop -ignZt5you9 a 871 yao> cralFolra m#s fo a|te DocBook y" 155Avahi= i$ exDNSd DiyMulticast#\ f<; ZConfigu Net/facl * n dd/an7. ~ -awlzwvtlug^u aRK n ,ewB eopl 0A ] fish YP a:W-ArPrct k IDQR261ȵ : NPDL :@mpr i~s78Q.NET6d-8i+subsetC-severKwit9 CLRN2 _fbadd]nil|upd9U'VSDK 8.0.116Rume6.Fdot:4=VisuSto oofV 46F9-0F5Eg@v k: KeepWbinl deGu| 7Mdm-fla_ 8 o _bbyt0A#t 6b.pp5 dd' eckskb '_@_txmungT 7749)8 ss[+R"le Wacregmaxhunt4Ge$#&#$-q d1' a le1-( / &: H%c#R38CgUG) FG)gru_p_'_0ob2-34[5: RCU_g__7VCacc-lor storesO=i  \s n'tP vrX*aQ @ogX, gA +(s'1peup Jv:*ques6mugoI4790ggsmxownhip__udp_62 v+: ece.ly tG,A0Axskaxp___as[_uXgen nggH20H4I,whs T dot - 8Hw: ?12v*.d? "_d_Vcap_n@b943g&)st{ar)' (/POSIX zp),Am%m)ۢincodae(nscd)&mps &o߾W&qż#no.un ly /:t?s~&idK dl) inO$ar LD_LIBRARY_PATHV80g7g7!G = 0399X766g et. bnx0es+jmb-xdp-pass c *) 61BT,tooOL2CAPs3-u"7Rfi 2se cmd] D C"T cfg11:Pcwiphy_efrcS7ŲUUAF_giny >md ;Z\-l laX f4ݡ[i'uJ*9'faaQ<*up C-@CC./ X /&Exk%AnimzCuCZ9d)'/Bigst6(tUnB ' o DuBy&I {80ud91.1,Awas oFin6b."6Pyn"rRub -:EbP5My4 jm~d':-j llr3e=imj O"Z 136+HID:to`t<;$mt;D_*up39_<auBQin _nre_dl_X4Vmm/+-f dVM_BUG_ONX"GE(PKRso())7%unppktp:>NUL<6r%unkA%D6iIi 2stgreFadvpbj%-qigL(DBMS) jsqCREATE STATISTICS^5 ma+\J4281'] q=(s },wdar7U9fig(T2 9FIG ((x@)9PIC ;e?t<(LaTeXn&exa,0:(TM)LiMt2,O:re s(i.e.EyO:B:v tyb).7 h?fna,a2ݪ cer -^:0sZ=TMm pu63*JN$MCool pow/uNowAHotSpOJVMshah%3 enVs ef7,ysisve-23FlMeKMn?inncoLLYYzr1W ` [lyOlof=w&d 7lz4-ji: I@tKGsuE U3Clea% 665'7' drm/x7 M8a-fO safe 0 8700 -$l2/Fd=v fy_TO, /ire_ &vmwgfx* em r &22~SVGA_CMD_MAX_DATASIZE 7/usbhwcGFj r.GP Nt+_ /S2\_ ESU8oep "'&53_ma 'osd_DA? \2D-17-\jdk3WL{,?*E+SDa,Ki n#Ame JMXn6{21HgPkS5E==Enhz5CyenJh64t n2}/PNGB6:Z031X850 Bug%Wz & P11SecVK |C#5n3#\(iIPS mPKCS11 ould KR_ATTRIBUTE_VALUE_INID ahas!e&c_Gj 4'KA_ENCRYPT=* ibutH>IiU -8xe"R. ($-142862, 81#34567 2r`^^+^076789( ..48/*.36678.7123,S5 5+5peG'R,t0%bloC3D#^$VC,<-Wd0loop!7),n le)^uC#T'tRK 9#p+g_1peZ_ipG* .C2e4, a'v &]p%J@5bfs, cl6ex,<yRb/dynlJcCئi Wby'(mGw%llC,u"well(goous/̤; ':Xo(bgc6T&h61.rcߋqDin΢infGZ. R>t4786 Raw&RAW/obe.mdM3tahotoSmRW/CRyNEF,<DNG1" C: 8#bjmal/# mv%d{i| sslrlo5k 41,J|hz.:_:3x&ho7KB+gB633D~|G o crq% <40}:: X.Org X server: Information exposure and denial of*ice via out-of-bounds memory access (CVE-2026-34003) For "eMtails abA theUcurity issue(s), including impact, a CVSS scG,kknowledgments,o/r relatedF,ftoR pagm lis,R&enǢ:. +isc open-sourcle~6"BX Window SyYm. It providT basic low-level funialthatll-fݡgraphicusinterfaaQsign&up SQFix(es): * xorg: xwayl-DSogwwlة+XKB cotibimap hVl3999)~Use-af-fre{ulnera^leads- crashpot rup1܇ Tkernpw8sonɤ4Linux!,2anyBrs! K:Y+}depdueracndi͡&zonepor5-3814 r{qntpollE349Edrm/xe: vm_b_ioctl double ObuČ73ь: vsock"ma& 5-40248\mptcp: f2_schedule_work()O5OĬO!w?Blueto MGMT c] discl É94ĉnet: atticfra) ovRX hU6830: hci_: PrAIetta5Pyth2(pre4, a'vobj2-orienRmmȩguq, whes|classexceڡ y high Rdynamddata typedl. supsZC }lClibraJea.vous cp: Ex2!bufbFDoSvhttp.cl4:1q6)IQuadrc algohmQxml.dom.yic c12084ag /Z qp sta& o8 tc parsp8 56 ASoC t bytcr_rt5640 invxd quirk pD W4015Y p 3 r nsetpo򢬢&_"_nop_troy? 1Cutil-lGargeeɱ<?w 'nejaforDl/=. Amo ss-fI kfigur\ l log6 : He^ in pw$8 whedA256-e"es_410(gPrivile@EssArbitrCode Nmc{EZle6-240gFkFoej1e=ɹG5"sang@sPostScrip ASCIIRnTU 1,me 3 05True , OM(2)'CID-key꥜ %#f:moteh-edBMP$Z1527sA;F;SFDg6gcjejX5RRDP_DesktopOotoco<) 1Ahe l . xardp RnGsPchMicrosoftschxJVirtualBox s  o6Efr :.-3530)͎En[v8l vj3jps nUsf"%GFX ' dfs%18v9-si/hz hz2,:.vswitc*nengh~, () ac778[girqWp/gic-v2mVW81WRDMA/#"KASAN: slab-UR ib_regr_" bl# k8022ãyrxeԼa~4~M7qulfsUo blsize cu p415p/vmci: Ck tx s Nr{ly4izitf03+ATM CLIPB ffs59fU <' inGm io_u>/netK 0US M976pus st_rcuPsk_up_caps 17Fipv6GRCU>p6_xmit83=yISO siIUAF so_ _9Nˇ0Ɖ _mdiNpe2.Å27 ALSAaoyiv!B 'h6ynncmdqueue_onW318*ttb_hw_qte shif%_6mw_3- 32smW"__pnDf!d_n#I06 -!fbIB ,[30ӗI*wRglyphNFSv4/p/ _INO_LAYOUTCOMMITqnfs_mark_lay}_stin#g6#svcrdma rc_ofrN#> K81nvme-R#NULLder2*ua#build_pdu$veca 299EDK (Embedd)Dopv Kit)5aenaEFI) ME;ihLsa  64-b. HfirmwWIQEMUKVM f ss&RFC 3211 KEKwrc )92gc*t{ar (/POSIX&7p),Am%%m)ۢi,qcdaem nscd)d multi Ps% ZWi$nnotu ly /K+r[gE 086iPWzero-u ' {ryV9 O%d* wiWRDE_REUSEyAPPENDr(r rn6 ed(l8MUNGE (UR'N' GEmpumn thcucdis -bely 9*orii HPC -seuironKx_xPUIDG DMABy.oup1hsvomd&d+lm fiby#har crypt/ G.t Qwues>Uroog s;*frjpb-specifhod B:2mg@aȪSg25506)V _p+  _ yc&-in_'a.2s KD .i0FAT 382-285:global<8m K"fDaiysqng&* un 3 ;he;dH;nprf . 11YL@skip<ba^ # op<.‰7:SxPwebi,xyYKHTTPp$s,tGcu1c9urpy,ΪK0u-. h26GINX<Z-in--middle "TLS1n664A4 kij > 2.4HPKCS# , jIBI>Ncs,+47645/ '3 5}G58e/CoP0&(5lo3)1 Je'MX'l< M549601 pLD'p 2:33" 7E=z)AP AsĔFui4V3VK  b. #N@E-x *b0 ÓhH Slotq pkc=7ott gel( ۬k4A ME_SymQJJ( J L%9LE3n^<^a96f/vGD:Hpipe+p/'K*Ne3 EU 3CaVFain'6a_job__ v_/end':h@9 $$ # 6yDAMON,F D f= 14 ?Cbbngau2e ~Cscs : iin,c_sKUon_# D)%1h|%Uoc~%_kT205Xcls_u32N@)-@_;_caUulQD:oooND^fPCM(igU<& C 2oJ brer.Z 2WOURL 45+LXGStm? s .W'S $t+ Oe";!w gVer1-plugD5dc b c@of 1-j &: ASFW\92S Z%XJPEG M 3082#mHmDLOmrtpqdm2 2n5n 7RIFFl0.DAVIXloV1#FOf-B W 3#g} AMDemux922:lDVB SubtitlF )5 2)d)9 >4':2: FG.M \ 73^V AUDIN% rgo1i467>aq~iG&_u!rN491NCMPwDerdp__c B_v2Z aH̰pKN_J84!urbMlkgPfbW1!Wa8nN epZ3ZT9_w 9!ZW#q\ bG 3*/Gi7("5'OECVF v unM F1}MG [Vnf_t@&()RerWe) uP1Q:rYVvduVSIRs21=in_ F fb eZks to various windog systems. Security Fix(es): * python: PCommand-line option injec webbrowser.open() via crafted URLs (CVE-2026-4519) For more details about the sissue(s),eclud¢ impact, a CVSS scG cknowledgmentsnd o/r relainforma,f'R pagm lis,R&ences:. nginxiproxy vUsupportHTTP&tocolwith@focJhigh conpy, per}low me7y us : NGINX: Denial of Sicrde ExAΪspec(lyMP4 file32647)f_f=dificaibufovکrngx_http_dav_0u7t27654tdueܭ-"rupxb78bIundisclosMrequestqhem_authӥϱ7enabl21libng2raryle~Hytext TransqP s2 (>/2)7|C :malФd framers min135BIND (Berkeley Innet N Don)n KUDNS ((4Sbld]3'(na),1ichsolv$host I@ddres;@&r\(routs fapple>useifac|);_tool=Wifyais oaơ ly b~:icrsSEC-vdzo~1GT }8 ~yX#)YFreeRDPf <Rte>sktop(<)lea1Aڡlcns xardp clia c ns c s Microsoft W schk, xJVirtualBox :Heap` iarbitc e 'pixel "a 39 rN smso3.NET 6d-watwork. It+subsC- APIssev7l newitCLRNN2k sfbo]vulnhbil nQv upSU'VSDK 8.0.126Ru 26.dot:4: &Bypand{Vï 6171)Vt(A 203GInfinit Z 1XmlDecry  q116eDSMY^ MApafla178nOEXR5ourc-dyic-nge u-poina7qual"]c# torThvd%esbriefIvix?explseptsreA8 iNjpY7tab ozg B&exr:-: A &g[˫922 k lz{4Linux!,any  K: /s{ Makeeke_entretur ET_XMIT_CN !t_lim5-3976\cscsi: qla2xxx:r F purex ik N68741j-17-jdk vide=(J17 J/Environ+SDlop,Kit A:^h 6o gort mur200:Ime Kerbe~ Cedeal20138sPa Fo\Red666Zipri82ce?- h\ >21>Up"a Tc 2.14.123865qTLS ch342829kgenÝ06825  +j d 48qAsok Y numb( ird- /d z "mse|a/cby1fo9ˡlbisb not' tateitUf Rgif/ EGifGCBToExt{6740YUpng:r u۹dsss-of-ndlad/wr iXeoLlet aƀ33636Ā@ @-m-v 334 BugWcopY,,_)_ vun1 ys,f'jbU dm . How,=v % ponEOPNOTSUPP (( edca֢Uǜ* Ac S. (Alma -169939, 7