| Server IP : 144.76.79.100 / Your IP : 216.73.216.103 [ Web Server : Apache System : Linux ch05.wehostwebserver.com 5.14.0-611.5.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 11 08:09:09 EST 2025 x86_64 User : razzlestore ( 1092) PHP Version : 8.2.29 Disable Function : NONE Domains : 343 Domains MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /home/razzlestore/public_html/anon_sym/anon/var/cache/dnf/ |
Upload File : |
SOLV � _ 0 dnf 1.0 1.2�VNS;�d&�f��9)�1T�0��� [� *� x86_64 noarch cve bugzilla 2.34-100.el9_4.2 25.el9_5.8.alma.1 68.el9_6.19 20 231.el9_7.10 60.el9_2.7 i686 3 final packager@almalinux.org rhsa self 1 kernel-abi-stablelists Moderate kernel -core debug -core
modules -extra modules -extra tools -libs debug-modules-core
uki-virt modules-core uki-virt 2.9.4-6.el9_4 7-4.el9_7.1 kernel-uki-virt-addons Copyright 2025 AlmaLinux OS 4.17.5-102.el9 3.el9_2.alma 8.6-100.el9 1.el9_3.alma.1 Important Copyright 2024 AlmaLinux OS python3-libs 5.14.0-70.17.1.el9_0
22.1.el9_0 Copyright 2023 AlmaLinux OS bpftool python3-perf 5.14.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_5 4.16.4-101.el9 3.el9_1 5.14.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_2 427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4 570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6 611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 6.1.el9_7 8.1.el9_7 41.1.el9_7 5.1.el9_7 5.1.el9_7 libcurl -minimal 5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1 70.26.1.el9_0
30.1.el9_0 openssl-libs 2.37.4-21.el9_7 python3 1:2.06-114.el9_7.1.alma.1 27.el9_0.7.alma 46.el9_1.3.alma 70.el9_3.2.alma.1 94.el9_5.alma.1 252-32.el9_4.alma.1 55.el9_7.7.alma.1 libxml2 11.5.0-5.el9_5.alma.1 :1.48.10-2.el9_5.alma.1
5.el9_5 4.16.1.3-27.el9_3 1:2.06-104.el9_6.alma.1 14.el9_7.alma.1 77.el9.alma.1 250-12.el9_1.1
3 1.19.1-24.el9_1 20.1-8.el9 1.1-1.el9 2.el9_4 3.el9 4.el9_5 6.el9 8.el9_6 Copyright 2022 AlmaLinux OS expat gnutls krb5-libs pkinit server -ldap libkadm5 Copyright 2026 AlmaLinux OS curl -minimal ps-libs glibc -gconv-extra libnsl smbclient wbclient python3-samba samba-client-libs ommon-libs libs winbind-modules 7.76.1-14.el9_0.5 Low openssl 1.46.5-3.el9 grub2-common efi-aa64-modules
x64-modules pc-modules vim-filesystem 3.25.0-4.el9_7.2 libarchive ssh pam 7.76.1-19.el9
_1.1 2 23.el9
_2.1 2 4 6.el9
_3.2 3 9.el9_4.1 35.el9_7.3 python3-libxml2 1.29.33.1-2.el9_2.alma.1 3.90.0-6.el9_3 1:3.0.1-41.el9_0 2:8.2.2637-16.el9_0.2 3 3.21.0-9.el9_3.alma.1 glib2 libnetapi samba-dc-libs qlite-libs ystemd -container libs 18.168.6.1-135.el9_2.alma.1 40.el9_3
3.1.el9_4 3.el9_4 :1.12.20-7.el9_1 2.1 2.5.2-1.el9 311.2-1.el9_4 23.1-1.el9_5 grub2-efi-x64
-cdboot pc tools -efi
xtra minimal krb5-workstation openssh -clients keycat server samba-common vim-minimal 8.7p1-29.el9_2 30.el9_2 4.el9_3.3 8.el9_4.1 4 45.el9 7.el9_7.alma.1 8.el9_7.alma.1 0.8.7-20.el9 7.el9_0.1 12:4.4.2-17.b1.el9
8.b1.el9 3.5.3-2.el9_0 avahi -libs c-ares grub2-ppc64le-modules libnghttp2 ssh-config ua-libs opensc 0.8-15.el9 20.el9 2.el9_6 6.2-10.20210508.el9 glibc-all-langpacks common langpack-aa f gr k m n p r s t yc z be m r g hb o i n o r x s yn ca e hr kb mn rh s b v y da e oi sb v z el n o s t u fa f i l o r ur y ga d ez l u v ha k e i f ne r sb t u y ia d g k s t u ja ka b k l m n o k s u w y lb g i j n o t v zh mag i fe g hr i q jw k l n i w r s t y nan b ds e hn iu l n r so oc m r s pa p l s t quz raj o u w sa h t c d e gs hn s i d k l m o q r s t v w zl ta cy e g h e i g k l n o pi r s t ug k nm r z ve i wa e l o xh yi o ue w zh u minimal-langpack nscd samba -common-tools winbind 20230310-135.el9_2.alma.1 814-140.el9_3 40603-143.1.el9_4 905-143.3.el9_4 iwl100-firmware 0-firmware 5-firmware 35-firmware 2000-firmware 30-firmware 3160-firmware 5000-firmware 150-firmware 6000g2a-firmware b-firmware 50-firmware 7260-firmware libertas-sd8787-firmware nux-firmware -whence netronome-firmware systemd-rpm-macros 1.0.8-10.el9_5 :2.5.4-38.el9_7.3 3.0.1-43.el9_0 7.el9_1 7-16.el9_2 25.el9_3 7.el9 8.el9_4 6.el9_2 2.2-6.el9_5 .1 5.1-4.el9_7 7.el9_7 2.2.10-12.el9_0.2 35.2-42.el9 67.el9_7.1 9.13-10.el9_6 1.el9_6 2.el9_6 4.el9_7 3.el9_1
2.1 5.el9_3 6.el9_4
5.1 2 :4.9-15.el9 8.el9 3.9.14-1.el9 _1.1 2 6-1.el9_2.1 2 8-1.el9_3 .1 3.el9_4.1 3 5 6 9-8.el9 _5.1 21-1.el9_5 2.el9 _6.1 2 5-2.el9_7 3.el9_7 .1 2 5.2.5-8.el9_0 39-16.el9 72-2.el9 NetworkManager-libnm binutils dbus-libs evice-mapper-multipath-libs harfbuzz libipa_hbac ksba png sss_certmap idmap nss_idmap simpleifp tasn1 opencryptoki-libs repokey:type:id shadow-utils-subid ssd-client 0.10.4-11.el9 3.el9 5.el9_6 7 7.el9_7 3.3.17-13.el9 python3-samba-dc rsync samba-dcerpc ldb-ldap-modules tools usershares ystemd-oomd pam resolved udev python3-requests setuptools -wheel urllib3 15.6-1.el9.alma 3.9.10-3.el9_0 device-mapper-multipath less sudo 0.23.0-2.el9 3.el9_3 4.el9_3 4.1-3.el9_2 1.0.9-9.el9_7 10.0-11.el9 7.1-5.el9_2.1 9.1-1.el9 2.el9_4 3.3-0.el9 13.el9 43.0-5.el9_2.1
3.1
4.3 5.1-19.el9 21.el9_5 2.el9_5 5.el9_6 6.el9_6 5.el9_0 6.el9_1 6-17.el9_6.2 8-6.el9_4.alma.1 :2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.2 6.2.0-13.el9 2.10.4-9.el9 4.9-1.el9_1.1 8-9.el9_2 5.0-1.el9_3.1 2.el9_4.1 3.el9_5.1 3 5.el9_6 7.1 68.4-11.el9 4.el9_4.1 6.el9_6.2 8.el9_7.1 7.4-10.el9 8.el9 :1.6.37-12.el9_7.1 2 8.2.2637-20.el9_1 1.el9 2.el9_6 .1 3.el9_7 .1 3.2.2-2.el9 34.1-6.el9_1 7.el9_3 8.el9_6 9.el9_7 5.3-4.el9 5.el9_6 6.el9_6 7.el9_7 7.6-12.el9_0 8.el9_1 23.el9_3.3 4 8.3-10.el9_7 4.el9_4 6.el9 _6.2 4.16.0-8.el9_1 9.el9 5.14.0-611.9.1.el9_7 4.2-4.el9_0.3 4-2.el9_1 3.el9 67.1-10.el9_6 bluez-libs zip2-libs e2fsprogs-libs file-libs reetype gmp jq libatomic blkid rotli cap om_err econf fdisk gcc rypt fortran omp icu ldb mount ndp fsidmap quadmath smartcols s tdc++ tirpc uuid ncurses-libs procps-ng tobuf-c ython3-ldb repokey:type:str pm-build-libs libs sign-libs tpm2-tss xz-libs 1:25.30.13.0-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 2.24.0-2.el9_5.alma.1 53.0.0-10.el9_1.1 2.el9_4.1 3.el9_6.1 NetworkManager -adsl bluetooth config-server initscripts-updown team ui wifi wan binutils-gold ubblewrap cockpit -bridge doc system ws dbus -common tools hcp-client ommon relay server gnupg2 iputils kernel-cross-headers debug-devel -matched vel -matched oc headers tools-libs-devel partx libsss_autofs sudo microcode_ctl opencryptoki -icsftok
swtok perf ython3-cryptography libipa_hbac sss_nss_idmap sss -murmur dconfig rhel-net-naming-sysattrs shadow-utils im-x64 ssd -ad common -pac dbus ipa kcm rb5 -common ldap nfs-idmap passkey olkit-rules roxy tools winbind-idmap tar vim-X11 common enhanced 0.4.1-7.el9_4.alma.1 8.el9_5 8.7-12.el9_1.1 1.2.11-32.el9_0 2-1.el9 2.el9 8.10-2.el9.alma 9.5p2-10.el9_3 6.1 7.el9_1.1 5.8-4.el9_3.alma.1 :2.10-5.el9 3.3-7.el9_2.1 2.2.10-12.el9_0.3 3.3-2.el9_0 5.el9_7 0210202-11.el9_6.1 3 8-5.1.el9_0 :1.34-6.el9_1 9.el9_7 3.18.0-7.el9 2.3-18.el9 20.el9_5.1 5-3.el9 _7.2 6.0.1-4.el9 5.el9_6 :2.1.0-18.el9 4.35.0-6.el9_3 4-10.git1.el9 5.1.8-6.el9_1 2-4.el9 6.1-6.el9 90-2.el9_2 3.el9_3 4.el9_4 7.0.0-284.11.1.el9_2 8.1.el9_2
25.1.el9_2
30.1.el9_2 3.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4
20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4
31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4
40.1.el9_4 2.1.el9_4 4.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5
21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5
31.1.el9_5 8.1.el9_5 bash luez sdtar zip2 dbus-broker midecode e2fsprogs xfatprogs pat-devel file wupd iptraf-ng ldb-tools ibarchive-devel curl-devel dnf-plugin-subscription-manager ogrotate nano curses fs-utils spr s -softokn -freebl ysinit util opencryptoki-ccatok ssl-devel perl python3-cloud-what rpm subscription-manager-rhsm repokey:type:flexarray pm -plugin-audit selinux sign shim-unsigned-x64 quashfs-tools ubscription-manager -plugin-ostree tpm2-tools raceroute util-linux
-core user wpa_supplicant xz zlib 1.26.5-3.el9_3.1 5.el9_4.1 6.el9_7.1 :39.31.5.1-135.el9_2.alma.1
40.el9_3 3.1.el9_4 3.el9_4 2.10-7.el9_4.1 25.1-10.el9_6 7.el9_2 9.el9 6.1-3.el9 1.2.3-7.el9 39.31.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 41.28.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 :20240910-1.el9_5 50211-1.el9_6 8.24.2.2-135.el9_2.alma.1
40.el9_3 3.1.el9_4
3.el9_4 83.5.1_1-135.el9_2.alma.1 40.el9_3
3.1.el9_4 3.el9_4 ncurses-base procps-ng-i18n ython3-dns idna pip-wheel tuned -profiles-cpu-partitioning patch:ALSA-2022:4940 5099 242 4 9 52 942 6003 157 224 602 8 10 838 54 7090 185 288 314 8 23 9 8267 91 9 317 8 40 53 61 84 5 93 400 53 93 637 3:0282 333 4 5 6 7 8 9 40 3 626 752 946 51 2 3 4 7 8 9 1141 470 701 3 2127 458 9 78 87 502 19 23 32 70 82 645 50 3559 95 722 3 5 4325 47 9 50 4 77 412 569 708 838 5061 8 9 71 453 62 763 838 6587 93 5 6 615 21 31 2 5 43 59 61 7 79 85 94 8 9 705 7 44 5 6 7747 879 4:0310 463 4 5 6 8 533 790 811 966 10244 74 384 939 83 1250 9 30 486 239 530 692 879 903 2394 6 410 33 7 8 47 56 63 83 504 12 7 70 1 679 758 3306 39 501 13 619 842 3 6 4078 312 49 457 583 636 774 6 9 928 5363 529 34 928 6162 3 6 356 464 567 754 83 997 7484 8162 446 617 9317 25 31 3 71 401 4 5 13 23 4 30 49 68 70 4 541 605 5:0059 324 77 578 925 10136 379 407 585 699 837 1140 411 861 992 2083 447 519 62 746 330 428 6 50 602 962 4130 420 5011 9 99 429 661 700 40 874 6116 398 59 880 7377 558 742 60 8275 81 9409 930 20518 32 59 936 43 5 54 1255 926 2175 376 405 660 865 3241 342 3 480 3 627 79 867 3531 937 4244 6977 90 3 7043 9 50 64 7 76 7 423 37 40 4 903 8142 333 643 55 9080 302 430 1 2 526 877 80 978 6:0067 238 312 445 719 93 936 1087 143 350 473 8 617 913 2042 212 722 86 3066 405 88 940 66 4168 88 759 60 5080 602 3 6153 390 462 766 repokey:type:relidarray
num sitory:solvables solvable:arch buildtime conflicts description evr name patchcategory
rovides summary vendor update:collection :arch evr filename name list reference :href id title ype ights severity tatus ���
�
���r�r�W�W� � �h�h�c�c�b�b�i�i�e�e�f�f11�d�d�q�q22�?�?�Q�Q�\�\�]zz{{�]�)�)�(�(�j���k�k�j�7�7�c�e�d�g�g�h�h�f�f�c�d�e�@�@�~�~�@�t�t�k�k�e�e�f�f�i�i�h�h�j�j�g�g�z�z� �?{z��`�`�S�S�!�!�!�)�)�)�&�&�j�j�&�J�J��--������;�;�X�X�W�W�.�.�4�4�3�3�1�1�/�/�/�3�2�2�1�.�0�0�V�V�4�0�2�:�:�-�-�[�[�-�:���-���3�3��%�%�%�3�U�U�'�'�'�_�_�\�\�^�^�_�_�5�5�5�#�#�%�%�"�"�$�$�%�&�&�"�l�l�$�&�#�L�L�Y�Y�%�%�[�[�%�Z�Z�[�[�[�@�@�B�B�Z�Y�Y�C�C�A�A�Y�
�
�
�N�N�X�X�X�O�O�/�/�/��""!! �Y�Y�W�W�>�>�?�?�<�<�V�V�:�:�=�=�V�W�o�o�m�m�n�n�p�p����K�K�&�&�&�v�v�^�^�l�l�w�w�n�n�*�*�*�T�T�$�$�$�g�g�:�:���!�!�"�"�Z�Z�!�!�T�T�A�A�?�?�G�G�-�-�,�,�V�V�~�~�7�7�)�)���9�9���}�}�'�'�3�3�
�
�^�^�U�U�;�;�*�*�i�i�f�f�����L�L���,�,�H�H�E�E�����6�6�6�6���$�$�J�J�1�1�G�G�u�u�1�1�>�>�3�3�l�l�'�'�`�`�<�<�X�X���<�<�,�,�/�/���:�:�J�J�b�b���;�;�N�N�+�+�&�&�]�]�.�.�4�4���������\�\�a�a�����U�U�D�D�r�r�5�5�A�A�H�H���Q�Q�z�z�(�(���Y�Y�s�s�5�5�R�R�0�0�%�%��������� � �n�n�#�#�/�/�j�j�K�K���e�e���C�C�8�8�����h�h�����S�S�v�v���
�
�I�I�p�p���W�W���k�k�|�|�d�d�����=�=�4�4�$�$���F�F�y�y�D�D���B�B� � �O�O���7�7�-�,�S�S�����2�2�*�*�Q�Q�P�P�[�[�@�@�M�M���+�+�B�B�>�>�E�E�?�?�K�K�x�x�&�&� � �F�F�{�{�@�@�+���%�%� � �8�8�2�2�O�O�T�T�������w�w�o�o�m�m�(�(�M�M�"�"�)�)���_�_�L�L�t�t�R�R�.�.�#�#�-�-�I�I�9�9���c�c�P�P�
�
�-�-�+�+�C�C�0�0�q�q���=�=�N�N�������$�$�$�R�R�r�r�9�9�9�U�U�U�y�y�2�2�2�@�@�@����?�?�?�a�a�7�7�7�8�8�8��� � � ��s�s�>�>�q�q�m�m�r�r�=�=�<�<�>�p�p�=�<�A�A�A%%�0�0�0�p�p�o�o�n�n�u�u�V�V�y�y���X�X��}�}�(�(�3�3�t�t�}�}�{�{�v�v�.�.�|�|�����.��� � �-�-���(�+�+�~�~�s�s�����,�,�l�l�
�
���k�k� � ���+���3�,�u�u�-�X�X�T�T�U�U�/�/�/�S�S�Q�Q�K�K�P�P�#�#�I�I�#�J�J�N�N�O�O�)�)�)���P�P��x�x�`�`�R�R���� � � �,�,�,�+�+�4�4�+�*�*�(�(�*�!�!�(�4�!�1�1�1�a�a�Z�Z�*�*�*�|�|�{�{�2�2�2�.�.�6�6�z�z�.�"�"�'�'�6�'�"�#�#�#�0�0�0�b�b�i�i�&� �R�!�R�"�R�#�R�$�R�%�R�&�R�'�R�=�R�(�(�|�)�|�*�|�+�|�)�,.�-.�..�/..�0.�1.�2.�3.�4.�5.�6.�7.�g.�8.�9.�:.�;.�<.�=.�>.�?.�@.�A.�B.�C.�D.�E.�F.�G.�H.�I.�J.�K.�L.�M.�N.�O.�P.�Q.�R.�S.�*�T��U��V��W��X��Y��+�"�S�#�S�$�S�%�S�&�S�'�S�=�S� �S�!�S�,�J/�K/�,/�-/�g/�./�//�F/�G/�P/�Q/�H/�I/�D/�E/�2/�3/�@/�A/�6/�7/�8/�9/�L/�M//�</�=/�>/�?/�B/�C/�:/�;/�0/�1/�N/�O/�4/�5/�R/�S/�-�Z�5�[�5�\�5�]�5�^�5�_�5�`�5�a�5�b�5�c�5�.�d�Q�e�Q�f�Q�g�Q�h�Q�i�Q�j�Q�k�Q�/�0�2�3�4�7�8�9�:�;�<�=�>�?�A�B�C�D�I�J�K�L�M�N�O�P�Q�R�T�W�X�Z�[�\�]�_�`�a�b�c�d�f�g�i�j�k�l�m�n�o�p�q�r�s�u�w�x�y�z�{�|�~�������
�
�������������
�
�!
�#
�$
�&
�q�P�r�P�s�P�t�P�u�,�l�,�n�P�o�P�p�P�v�P�m�P�w�P�'
�(
�*
�+
�,
�-
�.
�/
�0
�1
�2
�4
�6
�8
�:
�;
�=
�>
�@
�B
�C
�E
�F
�G
�H
�I
�J
�M
�N
�O
�Q
�R
�S
�T
�U
�X
�Y
�Z
�[
�\
�^
�`
�a
�b
�c
�d
�e
�f
�g
�i
�j
�k
�l
�m
�n
�o
�p
�r
�s
�t
�x
�y
�z
�{
�|
�}
�~
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�
�"
�#
�$
�%
�&
�'
�(
�)
�*
�+
�,
�-
�.
�1
�2
�3
�4
�5
�6
�7
�8
�9
�:
�;
�<
�=
�>
�?
�@
�A
�B
�D
�N<�O<�E
�F
�G
�I
�K
�L
�N
�O
�P
�Q
�R
�S
�T
�U
�V
�W
�X
�Y
�Z
�[
�\
�]
�^
�_
�`
�a
�b
�d
�e
�f
�g
�h
�i
�k
�l
�m
�n
�o
�p
�q
�r
�s
�t
�u
�v
�w
�x
�y
�z
�{
�|
�~
�
�
�
�
�
�x� �y� �z� �{� �|� �}�H�~�H��� ������������������;��:���� ��
������<��
�H��H�9��'��|����5��5��Q������!��!�1�P��Q��N��O��,��-��0��1���L��M��B��C��F��G��J��K��D��E��R��S��>��?��2��3��*��+���������`��`��`�5��|��|� �|�!�|�"�|�#�|�$�|�6�j�q�k�q�e�q�f�q��q�%��&��L��M��J��K��P��Q��N��O��B��C��0��1��,��-��R��S��2��3��>��?��D��E���F��G��'�I�(�I�)�I�*�I�+��,��-��B� �C� �D� �E� �>� �?� �N� �O� �F� �G� � �2� �3� �R� �S� �L� �M� �,� �-� �P� �Q� �J� �K� �0� �1� �.�%�/�%�]�B�^�B�[�B�\�B��B��B�b�B�c�B�`�B�a�B�0=�1=�2=�3=�4=�5=�q=�6=�7=�8=�9=�:=�;=�<=�==�>=�?=�@=�A=�B=�C=�D=�E=�F=�G=�H=�I=�J=�K�b�L�b�M�b�N�b�O�b�P�b�Q�b�R�b�@�S�k�T�k�U�k�)��*��V��(��'��W�8�X�8�Y�8�Z�8�[�8�\�8�]�8�^�8�_�8�`�8�a�8�b�y�c�y�d�y�]�}�e�}�f�}�g�}�h�}�i�}�j�}�E�k�$�l�$�F�m�V�n�V�o�V�G�#��$��H�V��(��)��*��'��p��q��r��s��t��u��v��w��x��y��z��{��|��}��~���� ������b�C�c�C�]�C�^�C�[�C�\�C��C��C�`�C�a�C�,|�-|�L|�M|�D|�E|�B|�C|�J|�K|�N|�O|�>|�?|�2|�3||�P|�Q|�R|�S|�F|�G|�0|�1|��`��`��`��`�Z�`��`��`� �`�
������
����n���������������������������l�+�l�*�l����������� ��!��"��#�.�$�.�S�%��&��'���a��a��a�U���������9�� ��
���� ��:��������<��;����������V��r�f�r�j�r�k�r�e�r}�0}�1}�D}�E}�J}�K}�,}�-}�R}�S}�F}�G}�>}�?}�N}�O}�P}�Q}�2}�3}�L}�M}�B}�C}�F�F�E�F�Y�)�
�*�
�V�
�(�
�'�
���
������������������
����������n������-��,��+��&�|�'�|�=�|�(�"�)�"�^�������D~�E~�>~�?~�P~�Q~�L~�M~�F~�G~�N~�O~~�2~�3~�J~�K~�B~�C~�R~�S~�0~�1~�,~�-~�[�D�\�D��D��D�^�D�b�D�c�D�]�D�`�D�a�D�>�?�R�S�L�M�,�-�P�Q�B�C�N�O�F�G�2�3�J�K�D�E�0�1�H>�7>�B>�;>�<>�=>�2>�3>�6>�?>�9>�4>�5>�:>�D>�E>�@>�A>�F>�G>�I>�8>�J>�>>�q>�C>�0>�1>�,?�-?�0?�1?�J?�K?�P?�Q?�*?�+?�B?�C??�F?�G?�,?�-?�L?�M?�>�4�?�4�N?�O?�2?�3?�R?�S?�.?�/?�0?�1?�D?�E?� �{�!�{�#�{�$�{��{��{�"�{�e��E�\�E�b�E�c�E��E�^�E�[�E�]�E�`�E�a�E�2��3��]�~�g�~�h�~�i�~�j�~�e�~�f�~�h�4'�5'�6'�7'�q'�8'�9'�<'�='�C'�5'�2'�3'�B'�;'�?'�9'�:'�;'�6'�7'�<'�='�>'�?'�@'�A'�4'�J'�A'�>'�:'�B'�H'�8'�D'�E'�0'�1'�C'�F'�G'�I'�@'�e�w�f�w��w�j�w�k�w���U��T��x��s��t��u��{��v��w��|��}����z�� ��q��~��y��p��r��-��,��+��D�s�E�s�F�s�G�s�H�s�I�s�J�s�K�s�b�F�c�F�[�F�\�F�`�F�a�F�]�F�^�F��F��F�L�S�M�S�N�S�'��(��V��)��*���s�f�s�e�s�j�s�k�s�L@�M@�D@�E@�P@�Q@�B@�C@�2@�3@�F@�G@�J@�K@�,@�-@�.@�/@�N@�O@�0@�1@�>�5�?�5�,@�-@�R@�S@@�0@�1@�*@�+@�O�1�P�1�t�>(�?(�2(�3(�B(�=(�4(�5(�6(�7(�:(�;(�@(�A(�B(�;(�C(�5(�<(�=(�<(�:(�F(�G(�I(�E(�6(�7(�@(�A(�8(�9(�?(�9(�4(�8(�>(�0(�1(�q(�H(�D(�C(�J(�Q�P�R�P�S�P�v�����������D� �b�G�c�G��G�^�G�]�G��G�\�G�`�G�a�G�[�G�NA�OA�,A�-A�FA�GA�BA�CA�2A�3A�JA�KA�LA�MA�DA�EA�.A�/A�RA�SA�0A�1A�,A�-A�>�6�?�6�0A�1A�PA�QA�*A�+AA�D�t�E�t�F�t�G�t�H�t�I�t�J�t�K�t��a��a��a��a�Z�a��a��a� �a�T�O�U�O�V�O�W�O�X�O�Y�O�Z�O�[�O�\�O�]�O�}�^�d�_�d�`�d�a��b���c�A�g�\�d��e��a�\�m�Y�f�\�_�\�`�\�]�
�b�\�l�Y�i�A�^��j�Y�k�Y�h�� �NB�OB�,B�-B�DB�EB�2B�3B�BB�CB�*B�+B�FB�GB�JB�KB�.B�/B�>�7�?�7�0B�1B�RB�SB�,B�-B�0B�1BB�LB�MB�PB�QB�c�m�d�m�e�m�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� �
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� �
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� �
���
������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ���'��(��V��)��*��`�H�a�H��H�^�H�]�H�[�H�\�H�b�H�c�H��H��X��X��X���M��M��M�� �}�
�}��}��}�
�}�`�]�k�Z�m�Z�^��l�Z�b�]�d��_�]�]��c�B�f�]�g�]�a�]�j�Z�h��i�B�e�� �`�e�_�e�^�e��)��)���W��W��W���t��t��t��
��
��
��
��
��N�T�M�T�L�T��4��4��4��4�V��(��)��*��'���j��j� �j�F)�G)�2)�3)�H)�7)�B)�;)�:)�0)�1)�@)�A)�C)�5)�<)�=)�4)�>)�?)�8)�9)�@)�A)�I)�E)�>)�=)�:)�;)�<)�?)�8)�9)�6)�D)�C)�5)�6)�7)�4)�J)�B)�q)�[�I�\�I��I�^�I�`�I�a�I��I�b�I�c�I�]�I�!��"��#���#��$��%��&��'��(����{��u����z��p��q��r��s��y��v��w��~��t��|��}��x�� ��)�9�*�9� �9�+�9��,��-��.��/��0��1��:*�;*�B*�;*�>*�=*�C*�5*�C*�5*�B*�=*�8*�9*�6*�7*�<*�:*�?*�9*�J*�A*�@*�A*�8*�D*�E*�4*�6*�7*�>*�?*�0*�1*�4*�<*�2*�3*�q*�F*�G*�H*�I*�@*�`�J�a�J�[�J�\�J�b�J�c�J��J�^�J��J�]�J��Y��Y��Y�������������N��N��N�
�j�t�k�t��t�f�t�e�t�2��3��4��5��6��7��8��9��:��;��<��=��>��?��@��A��B��C��D��G� �"
� ��!��"��'��(��)��*��V��:� �;� �� �� �� �� �9� �� �<� �� �� �� � � � � �
� �� �� �� �� �%
��
��
��
������O��O��O�)
�E�]�F�]�G�]�F4�G44�.4�/4�04�14�H4�I4�*4�+4�L4�M4�R4�S4�>�F�?�F�J4�K4�B4�C4�,4�-4�,4�-4�24�34�04�14�P4�Q4�D4�E4�N4�O4�%�E�$�E�H5�I5�>�G�?�G�R5�S5�P5�Q5�05�15�*5�+5�F5�G5�,5�-5�B5�C5�25�35�N5�O55�.5�/5�05�15�J5�K5�,5�-5�L5�M5�D5�E5�'��(��)��*��V��G�\�F�\�E�\��K�^�K�]�K�`�K�a�K�[�K�\�K��K�b�K�c�K�D�u�E�u�F�u�G�u�H�u�I�u�J�u�K�u6�>�H�?�H�L6�M6�,6�-6�.6�/6�*6�+6�F6�G6�J6�K6�N6�O6�H6�I6�P6�Q6�26�36�D6�E6�06�16�R6�S6�B6�C6�,6�-6�06�16�J�T�K�T�L�T�M�T�N�T�O�T�P�T�Q�T�R�T�3
�*�n�+�n��n�O�2�P�2�5
�������
����7
�DC�EC�,C�-CC�BC�CC�0C�1C�.C�/C�0C�1C�RC�SC�JC�KC�NC�OC�LC�MC�,C�-C�2C�3C�FC�GC�*C�+C�PC�QC�>�8�?�8�S�-�T�-�9
�b�x�c�x�d�x�1� �-� �0� �/� �,� �.� �U��V��<
�E�[�F�[�G�[��u�f�u�e�u�j�u�k�u�<���������� ��
��������������;��:��9���� ��?
�x��������������������
����������
������n��W�+�X�+�A
��5��5��5��5�Y�!�Z�!�[�!�\�!�]�!�^��_��D
�������w#�`#�a#�b#�c#�d#�e#�f#�g#�h#�i#�j#�k#�l#�m#�n#�o#�p#�q#�r#�s#�t#�u#�v#�w#�x#�y#�z#�{#�|#�}#�~#�#� #�#�#�#�#�#�#�#�#� #�
#�#�#�
#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�#�����������BD�CD�,D�-DD�DD�ED�ND�OD�>�9�?�9�2D�3D�PD�QD�FD�GD�,D�-D�JD�KD�0D�1D�LD�MD�*D�+D�.D�/D�RD�SD�0D�1D�FE�GE�JE�KE�.E�/E�*E�+E�,E�-EE�RE�SE�PE�QE�2E�3E�0E�1E�LE�ME�BE�CE�,E�-E�0E�1E�DE�EE�NE�OE�>�:�?�:� ��2�3�9�:�Y�Z�w�x�x�y�j�k�Z�[�"�#�\�]����
�
��G�H�<�=�u�v�Z�[�� �f�g�~��{�|�4�5�X�Y���S�T���(�)�H�I���&�'���l�m�,�-�k�l���$�%�*�+�������z�{�T�U�F�G���T�U�[�\�d�e�����C�D�t�u�����`�a���J�K�n�o�6�7�b�c�@�A�V�W�"�#�z�{�s�t�
��*�+�j�k�P�Q�l�m���\�]�h�i�~��|�}�8�9�W�X�E�F�o�p�B�C�0�1�r�s���n�o�F�G�N�O�}�~�>�?�K�L� �!�L�M�v�w�c�d�=�>�m�n�0�1�P�Q�h�i�p�q�^�_�H�I�$�%�r�s�.�/�;�<�&�'��
�U�V�r�s�N�O�2�3�^�_�<�=���t�u�R�S���y�z�$�%�J�K�� �a�b�O�P�����x�y�R�S�A�B���e�f�?�@�v�w�I�J���,�-� �!�j�k�L�M�d�e� �!���"�#�D�E���q�r�t�u�����7�8�4�l�m��
���+�z�{�� �0�1���V�W�g�h�.�/�]�^�X�Y�B�C�@�A�i�j�h�i���v�w�:�;���n�o� ��*�M�N�4�5�p�q�_�`�|�}�(�)�&�'�(�)���� �|�}�D�E�x�y�
��~��>�?��� ��5�6�`�a�8�9�Q�R�p�q���2�3�f�g�����b�c�6�7�f�g�,�-�:�;�.�/����Z��Z��Z�K
�O�3�P�3�L
�0F�1F�DF�EF�JF�KF�NF�OF�2F�3F�.F�/F�RF�SF�>�;�?�;�0F�1F�*F�+F�,F�-F�BF�CF�FF�GF�LF�MFF�PF�QF�,F�-F�N�U�M�U�L�U�W�c��c��c� �c�!�c�V�c�"�c�#�c�"��P
�'��(��)��*��V��J�v�K�v�F�v�G�v�H�v�I�v�D�v�E�v�0G�1G�,G�-G�0G�1G�,G�-G�2G�3G�DG�EG�*G�+G�>�<�?�<�PG�QG�.G�/G�RG�SG�FG�GG�JG�KGG�NG�OG�LG�MG�BG�CG�D�w�E�w�H�w�I�w�J�w�K�w�F�w�G�w�,H�-H�JH�KH�0H�1HH�RH�SH�BH�CH�PH�QH�LH�MH�0H�1H�DH�EH�>�=�?�=�2H�3H�NH�OH�FH�GH�,H�-H�.H�/H�*H�+H�$�c�%�c�&�c�V
�b�^�h��c�C�g�^�e��m�[�]��`�^�_�^�j�[�^��k�[�f�^�d��i�C�l�[�a�^�W
�^�f�_�f�`�f�)��*��'��(��V��LI�MI�RI�SI�FI�GI�,I�-I�NI�OI�.I�/I�0I�1I�*I�+I�,I�-I�DI�EI�BI�CI�0I�1I�PI�QI�2I�3I�>�>�?�>I�JI�KI�.J�/J�>�?�?�?�NJ�OJ�PJ�QJ�DJ�EJ�0J�1J�BJ�CJ�0J�1J�,J�-J�FJ�GJ�,J�-J�RJ�SJJ�2J�3J�JJ�KJ�*J�+J�LJ�MJ��L�^�L��L�\�L�]�L�`�L�a�L�b�L�c�L�[�L�E�G�F�G�]
�RK�SK�LK�MK�2K�3KK�.K�/K�NK�OK�BK�CK�DK�EK�0K�1K�PK�QK�*K�+K�FK�GK�0K�1K�,K�-K�,K�-K�>�@�?�@�JK�KK�G��_
�V��(��)��*��'��{��u��|��}��v��w����z��~��t��x��s��p��q��y�� ��r��'��(���u��u��u�JL�KL�0L�1L�FL�GL�2L�3L�PL�QL�.L�/L�LL�ML�NL�OL�>�A�?�A�,L�-L�DL�EL�,L�-L�RL�SL�*L�+LL�0L�1L�BL�CL��o�+�o�*�o��v�f�v�j�v�k�v�e�v�PM�QM�.M�/M�RM�SM�BM�CM�JM�KM�DM�EM�,M�-M�2M�3M�*M�+M�,M�-M�0M�1M�NM�OM�LM�MM�>�B�?�B�0M�1M�FM�GMM�f�_�a�_�_�_�i�D�^��c�D�d��l�\�e��b�_�h��j�\�g�_�m�\�k�\�]��`�_�h
�*N�+N�2N�3N�NN�ON�PN�QN�DN�EN�,N�-N�>�C�?�C�FN�GN�0N�1N�LN�MN�JN�KN�.N�/N�BN�CN�,N�-NN�RN�SN�0N�1N�)��*��V��(��'��2O�3O�NO�OO�DO�EOO�,O�-O�BO�CO�0O�1O�*O�+O�RO�SO�.O�/O�JO�KO�FO�GO�0O�1O�PO�QO�>�D�?�D�LO�MO�,O�-O�M��)��*��+��,��L��-��.��/��0��1��2��3��4��5��6��7��8��9��"�d�#�d��d��d� �d�!�d�W�d�V�d�{��u��y��z��~��w��x��s��t��p��q��v��r�� ����|��}��j�x�k�x�e�x�f�x��x�V��(��'��)��*��m��q
�:�R�;�R�<�R�=�}�&�}�'�}�=�"�>�"�?�"�@�"�A�"�!��u
�B�/�C�/�v
�D�0�E�0�w
�'��(��V��(��)��*��'��^�g�_�g�`�g�r��s�� ��q��x��~��w��t��u��v��{��p����z��|��}��y��*�p�+�p��p�03�13�H3�I3�N3�O3�03�13�,3�-3�D3�E3�F3�G3�J3�K3�23�33�>�E�?�E�L3�M3�B3�C3�.3�/3�R3�S3�*3�+3�,3�-33�P3�Q3�D7�E77�>�I�?�I�07�17�07�17�N7�O7�R7�S7�,7�-7�F7�G7�L7�M7�,7�-7�P7�Q7�*7�+7�.7�/7�J7�K7�B7�C7�27�37�H7�I7�.�&�/�&�)��*��-��.��6��7��4��5��+��,��/��0��8��9��3��M��L��1��2��.8�/8�28�38�J8�K8�L8�M8�08�18�F8�G88�*8�+8�,8�-8�B8�C8�P8�Q8�08�18�R8�S8�>�J�?�J�,8�-8�H8�I8�N8�O8�D8�E8�F�o�G�o�H�o�I�o�J�o�)��*��V��(��'��,X�-X�*X�+X�HX�IX�RX�SX�DX�EX�,X�-X�FX�GXX�0X�1X�LX�MX�0X�1X�BX�CX�2X�3X�JX�KX�.X�/X�PX�QX�F�H�E�H�
�K�b�L�b�M�b�
�����������DY�EY�FY�GY�0Y�1Y�*Y�+Y�0Y�1Y�HY�IY�2Y�3Y�BY�CY�LY�MY�RY�SY�,Y�-Y�,Y�-Y�JY�KY�PY�QYY�.Y�/Y��v��v��v�HZ�IZ�LZ�MZ�BZ�CZ�PZ�QZ�FZ�GZ�RZ�SZ�DZ�EZZ�0Z�1Z�.Z�/Z�,Z�-Z�0Z�1Z�*Z�+Z�,Z�-Z�2Z�3Z�JZ�KZ�R[�S[�H[�I[[�,[�-[�F[�G[�B[�C[�0[�1[�*[�+[�2[�3[�P[�Q[�D[�E[�,[�-[�.[�/[�0[�1[�L[�M[�J[�K[�"��!�� ��N��O��P��� �� �� �� �� �D��*9�+9�P9�Q9�B9�C9�>�K�?�K�,9�-9�09�19�N9�O9�.9�/9�J9�K9�H9�I9�09�19�,9�-9�29�39�R9�S9�L9�M9�F9�G9�D9�E99�B\�C\�H\�I\�*\�+\�,\�-\�0\�1\�,\�-\�2\�3\�P\�Q\�D\�E\�R\�S\�J\�K\�L\�M\�F\�G\�.\�/\\�0\�1\��y�f�y�j�y�k�y�e�y�����������Q��R��S��T��U��V��W��X��Y��Z��[��\��]��^��_��`��a��b������������,]�-]�,]�-]�2]�3]�P]�Q]]�0]�1]�0]�1]�H]�I]�J]�K]�*]�+]�L]�M]�D]�E]�F]�G]�B]�C]�R]�S]�.]�/]�0^�1^�B^�C^�R^�S^�P^�Q^�J^�K^�0^�1^�D^�E^�H^�I^�.^�/^�,^�-^�L^�M^^�*^�+^�F^�G^�2^�3^�,^�-^�T� �U� �� �R_�S_�H_�I_�L_�M_�0_�1_�0_�1_�*_�+_�B_�C_�F_�G_�,_�-_�D_�E_�2_�3_�P_�Q_�J_�K_�._�/__�,_�-_�0`�1`�,`�-`�F`�G`�P`�Q`�.`�/`�B`�C`�,`�-`�L`�M`�J`�K`�*`�+`�2`�3``�H`�I`�0`�1`�R`�S`�D`�E`�)��*��V��(��'��E�_�F�_�G�_�Da�Ea�Fa�Gaa�Ra�Sa�,a�-a�0a�1a�*a�+a�,a�-a�Ha�Ia�Ja�Ka�Pa�Qa�.a�/a�La�Ma�0a�1a�2a�3a�Ba�Ca�,b�-b�Rb�Sb�*b�+b�Hb�Ib�.b�/b�,b�-b�0b�1b�2b�3b�Lb�Mb�0b�1b�Db�Eb�Fb�Gb�Pb�Qb�Bb�Cb�Jb�Kbb�`�h�_�h�^�h�Hc�Ic�.c�/c�Bc�Ccc�*c�+c�Lc�Mc�Jc�Kc�,c�-c�Dc�Ec�Fc�Gc�0c�1c�2c�3c�,c�-c�Pc�Qc�Rc�Sc�0c�1c��*��*�!
�������Pd�Qd�0d�1d�,d�-d�0d�1d�Dd�Ed�2d�3d�Hd�Id�.d�/d�Bd�Cd�Jd�Kd�,d�-dd�Fd�Gd�Rd�Sd�Ld�Md�*d�+d�N:�O:�H:�I:�P:�Q::�>�L�?�L�2:�3:�J:�K:�,:�-:�L:�M:�B:�C:�0:�1:�.:�/:�*:�+:�0:�1:�R:�S:�D:�E:�,:�-:�F:�G:e�,e�-e�*e�+e�He�Ie�0e�1e�Je�Ke�0e�1e�Le�Me�De�Ee�Fe�Ge�2e�3e�Pe�Qe�Be�Ce�.e�/e�Re�Se�,e�-e�0f�1f�Hf�If�0f�1f�Jf�Kf�Rf�Sf�2f�3f�*f�+f�Lf�Mf�,f�-f�,f�-f�Ff�Gf�.f�/f�Bf�Cf�Pf�Qf�Df�Eff�c� �d� �&��'��=��Dg�Eg�0g�1g�Jg�Kg�2g�3g�0g�1gg�,g�-g�Hg�Ig�.g�/g�Pg�Qg�Lg�Mg�Rg�Sg�,g�-g�Bg�Cg�Fg�Gg�*g�+g��6��6��6��6�0h�1h�Bh�Ch�,h�-h�.h�/h�Ph�Qh�Dh�Eh�Hh�Ih�Jh�Kh�2h�3h�0h�1h�Lh�Mh�,h�-h�Rh�Sh�*h�+hh�Fh�Gh�Fi�Gi�Bi�Ci�Hi�Ii�0i�1i�Ri�Si�Ji�Ki�,i�-i�*i�+i�.i�/i�Li�Mi�2i�3i�Di�Ei�0i�1i�,i�-ii�Pi�Qi�Fj�Gj�Dj�Ej�Rj�Sj�2j�3j�Pj�Qj�0j�1jj�*j�+j�.j�/j�Jj�Kj�,j�-j�0j�1j�Hj�Ij�Bj�Cj�,j�-j�Lj�Mj�,y�-y�Hy�Iyy�0y�1y�Dy�Ey�,y�-y�*y�+y�Jy�Ky�2y�3y�Ly�My�.y�/y�Fy�Gy�Ry�Sy�0y�1y�By�Cy�Py�Qy�:������;��9��������������<�������� �� ��
��/
�� �� �� �� �� �0
�"��!�� ���7��7��7��7�&� �'� �=� �h$�i$�u$�v$�$�$�{$�|$�w$�x$�p$�q$�$�$�$�$�$�c$�$�$�d$�e$�$�$�$�$�f$�g$� $�$�
$�$�w$�}$�a$�$�$�`$�j$�k$�$�$�$� $�l$�m$�$�
$�t$�r$�s$�n$�o$�$�$�y$�z$�b$�$�$�$�~$�$�e�z�f�z�j�z�k�z��z��D��E���s�+�s�*�s�����������,k�-k�*k�+k�Dk�Ekk�Lk�Mk�.k�/k�Pk�Qk�Bk�Ck�Rk�Sk�,k�-k�2k�3k�0k�1k�Hk�Ik�Jk�Kk�0k�1k�Fk�Gk�������
��������
������n����x��������������Jl�Kl�0l�1l�Ll�Ml�,l�-ll�Bl�Cl�Hl�Il�,l�-l�Fl�Gl�2l�3l�Dl�El�Rl�Sl�*l�+l�.l�/l�Pl�Ql�0l�1l�Hm�Im�2m�3m�Bm�Cm�Jm�Km�,m�-m�Fm�Gm�.m�/m�*m�+m�0m�1mm�0m�1m�Dm�Em�Pm�Qm�Rm�Sm�,m�-m�Lm�Mm�)��*��V��(��'���~�
�~��~�
�~� �~�H�y�I�y�J�y�K�y�F�y�G�y�D�y�E�y��8��8��8��8�,;�-;�0;�1;�.;�/;�F;�G;�B;�C;�P;�Q;�>�M�?�M�2;�3;;�D;�E;�H;�I;�J;�K;�,;�-;�0;�1;�L;�M;�*;�+;�N;�O;�R;�S;������������
��
�<�
��
��
��
�;�
��
��
��
��
��
��
� �
�
�
�9�
��
� �
�:�
�C
�*�q�+�q��q�>�N�?�N�0<�1<�D<�E<�F<�G<�B<�C<�.<�/<�0<�1<�P<�Q<�J<�K<�R<�S<�2<�3<�,<�-<�,<�-<�L<�M<<�*<�+<�H<�I<��
�l�m�=�>�X�Y�:�;���c�d�J�K�D�E�T�U���2�3�f�g�.�/�J�K�Z�[�F�G�2�3�j�k�b�c�d�e���.�/�v�w�B�C�_�`�.�/���,�-�,�-���s�t�$�%�4�5���f�g�4�7�8�&�'�h�i���k�l� �� �!�@�A�$�%�a�b�N�O�p�q�o�p�<�=�>�?�Q�R�O�P�������0�1�[�\�G�H�4�5�(�)�V�W�*�+�����$�%�t�u�F�G�`�a�*�+�v�w�D�E���z�{�
��U�V�R�S�M�N�T�U�Z�[�� �A�B�&�'�W�X�V�W���6�7�^�_�v�w�u�v�r�s�m�n�n�o�x�y�5�6�P�Q��
�\�]�*�+�����g�h�b�c�?�@���|�}�L�M�~��;�<�0�1���
�N�O�:�;�q�r�(�)�r�s�����n�o�i�j�C�D�B�C�� ���d�e�8�9�8�9�H�I�l�m�2�3�\�]���@�A�>�?�r�s�z�{�l�m�p�q������ �
������I�J����x�y�z�{�n�o�"�#�(�)�K�L�e�f���x�y�"�#���`�a�]�^�9�:�h�i�y�z���^�_���t�u�w�x�j�k�E�F�p�q�{�|�L�M� �!� ��"�#�
��Y�Z�|�}�H�I�h�i� �!���<�=�&�'�������R�S���t�u�0�1�X�Y�~��� �|�}�P�Q�,�-�j�k�S�T�}�~� ��f�g���~��6�7�V��(��)��*��'��9���������������� ��:������ ��
��;������<��H
�F�x�G�x�J�x�K�x�H�x�I�x�D�x�E�x�m��J
�D�
�.�'�/�'�e��f��M
�y��z����~��w��p��q��v�� ��{��u��t��x��s��r��|��}��������%��&��'��HP�IP�LP�MP�PP�QP�BP�CP�2P�3P�DP�EPP�,P�-P�FP�GP�,P�-P�*P�+P�RP�SP�0P�1P�.P�/P�JP�KP�0P�1P�,�
�-�
�0�
�/�
�1�
�.�
�=�~�&�~�'�~��r�+�r�*�r�HQ�IQ�.Q�/Q�RQ�SQ�FQ�GQ�,Q�-Q�BQ�CQ�*Q�+Q�LQ�MQ�0Q�1Q�PQ�QQ�2Q�3Q�,Q�-Q�0Q�1Q�JQ�KQQ�DQ�EQ�2R�3R�RR�SR�,R�-R�*R�+R�FR�GR�LR�MRR�PR�QR�DR�ER�0R�1R�0R�1R�BR�CR�.R�/R�HR�IR�JR�KR�,R�-R�0S�1S�HS�IS�,S�-S�0S�1SS�.S�/S�FS�GS�RS�SS�LS�MS�2S�3S�BS�CS�*S�+S�,S�-S�PS�QS�JS�KS�DS�ES�.T�/T�,T�-T�,T�-TT�BT�CT�PT�QT�0T�1T�RT�ST�0T�1T�*T�+T�LT�MT�JT�KT�2T�3T�HT�IT�DT�ET�FT�GT�f�g�L�M�D�E�_�`�t�u�X�Y�P�Q�V�W�g�h�T�U�x�y���F�G���8�9�Q�R�l�m�
��� �*�+�0�1�e�f���j�k��
�,�-�P�Q�(�)�6�7�b�c���(�)�|�}�J�K���D�E�m�n��
���h�i�A�B�?�@�4�5�}�~�F�G�o�p� �!�~��$�%�|�}�f�g��� ��`�a�z�{�4�5���$�%�"�#�8�9�(�)�n�o�y�z���C�D�
��u�v��}�j�k�c�d�b�c���4�k�� �{�|�]�^�Z�[�;�<�x�y�i�j�G�H���5�6� ��d�e���p�q���J�K���l�m� �!�f�g�[�\�$�%�2�3�x�y�Y�Z�r�s�z�{�*�+�&�'�`�a�� �q�r�&�'�0�1�H�I����"�#�h�i�R�S���,�-�0�1�I�J�6�7� �!���^�_�
����p�q���.�/���\�]���@�A�� �t�u�*�+�&�'�z�{�L�M�S�T�"�#�2�3���B�C�s�t�<�=�2�3���v�w�.�/�O�P�K�L�t�u�:�;���p�q�M�N�|���d�e�~��,�-�N�O�n�o�w�x�r�s�9�:� ��l�m�@�A�7�8���k�l�U�V�~������X�Y������
�^�_�.�/���:�;�r�s���N�O�E�F�h�i�W�X�a�b�����Z�[�B�C�v�w�j�>�?�V�W�n�o�T�U�<�=�=�>�R�S�v�w�H�I�>�?�\�]�����.U�/U�JU�KU�0U�1U�HU�IU�LU�MU�*U�+U�,U�-U�BU�CUU�RU�SU�DU�EU�PU�QU�FU�GU�,U�-U�0U�1U�2U�3U�PV�QV�,V�-V�DV�EVV�LV�MV�*V�+V�JV�KV�0V�1V�HV�IV�2V�3V�FV�GV�,V�-V�.V�/V�BV�CV�0V�1V�RV�SV���z��~��w��r��s��{��u��x��t��p��q��v��|��}��y�� ��T��U����c��d��G�^�F�^�E�^�^ �_ �W �X �, �- �f �g �& �' �y �z �v �w �H �I �
� �| �} � � �" �# �E �F �\ �] � �
�| �} � � �s �t �h �i �$ �% �i �j �U �V � � �K �L �j �k �t �u �r �s �@ �A �l �m �~ � �k �l �Y �Z �r �s �A �B �: �; �, �- �B �C � �! �R �S �= �> �* �+ �. �/ �. �/ �p �q �` �a �@ �A �, �- �l �m � �
�* �+ �J �K �z �{ � � �B �C �q �r �t �u �& �' �] �^ �D �E �F �G �* �+ � � �6 �7 � �} �D �E �& �' �Q �R �X �Y � � �( �) �" �# �\ �] � � �b �c �Z �[ �n �o �f �g �o �p �p �q � � �j �k �H �I � �! � � �l �m �: �; �8 �9 �0 �1 � �[ �\ �~ � �h �i �L �M �b �c �z �{ � � �x �y � � � � � � �n �o �h �i �( �) �
� � � �7 �8 � � �^ �_ �m �n �L �M �0 �1 �N �O �O �P �{ �| �z �{ � � � � � � �r �s �F �G � � �_ �` �2 �3 �p �q � � �V �W �t �u �2 �3 �> �? �w �x �` �a � �! � � �G �H �N �O �Z �[ �v �w � � � � �I �J �5 �6 �~ � � � �" �# � � �
� �; �< � � �. �/ � �
�d �e �0 �1 � � �( �) �X �Y �P �Q �? �@ �n �o �u �v � � �4 � � �V �W �< �= �< �= �x �y � � � � �4 �5 �2 �3 � � � � �6 �7 �S �T � � �| �f �g �e �f �M �N �8 �9 �4 �5 � � �g �h �C �D � � � � �} �~ � � � � �9 �: �$ �% �$ �% �v �w �P �Q � � � � �x �y �j �k �J �K �T �U �R �S �a �b �c �d �> �? �d �e �T �U � � � � �0W�1W�DW�EW�,W�-WW�RW�SW�.W�/W�LW�MW�,W�-W�FW�GW�*W�+W�0W�1W�JW�KW�PW�QW�2W�3W�HW�IW�BW�CW�����(�#�)�#�c
�g�z�h�z�i�z�^�i�_�i�`�i�Bn�Cn�Ln�Mn�Pn�Qn�,n�-n�Jn�Kn�Fn�Gnn�0n�1n�Hn�In�2n�3n�.n�/n�,n�-n�Dn�En�0n�1n�Rn�Sn�*n�+n�����,o�-o�Lo�Mo�Po�Qo�Jo�Koo�Ro�So�0o�1o�Ho�Io�*o�+o�2o�3o�Bo�Co�,o�-o�Do�Eo�Fo�Go�.o�/o�0o�1o��w��w��w�G��j
�Hp�Ip�Fp�Gp�Dp�Ep�2p�3p�Jp�Kp�Bp�Cp�0p�1p�,p�-p�,p�-p�*p�+pp�Lp�Mp�Rp�Sp�Pp�Qp�0p�1p�.p�/p�b�M�c�M�[�M�\�M��M�^�M�`�M�a�M��M�]�M��{�f�{�e�{�j�{�k�{�)��*��'��(��V��Dq�Eqq�0q�1q�Pq�Qq�Bq�Cq�*q�+q�Hq�Iq�2q�3q�Jq�Kq�0q�1q�,q�-q�,q�-q�Lq�Mq�.q�/q�Fq�Gq�Rq�Sq�j��k��l��m��n��o��p��q��r��s��t��u��v��w��x��y��z��{��|��}��~���Q� �Q��Q�*r�+r�Fr�Gr�,r�-rr�,r�-r�Br�Cr�Lr�Mr�Pr�Qr�.r�/r�Rr�Sr�Hr�Ir�0r�1r�Jr�Kr�2r�3r�Dr�Er�0r�1rs�Fs�Gs�*s�+s�,s�-s�2s�3s�0s�1s�.s�/s�Ls�Ms�Ds�Es�Bs�Cs�Js�Ks�Hs�Is�,s�-s�Rs�Ss�Ps�Qs�0s�1s�I
�J
�Q
�R
�(
�)
�
�
�`
�a
�
�
�f
�g
�4
�k
�A
�B
�U
�V
�
�
�
�
�C
�D
�
�
�W
�X
�X
�Y
�O
�P
�^
�_
�p
�q
�c
�d
�*
�+
�J
�K
�r
�s
�8
�9
�r
�s
�
�
�V
�W
�;
�<
�
�
�E
�F
�
�
�0
�1
�T
�U
�6
�7
�~
�
�\
�]
�,
�-
�
�
�
�
�4
�5
�:
�;
�m
�n
�t
�u
�
�!
�H
�I
�2
�3
�
�
�
�
�7
�8
�n
�o
�w
�x
�Z
�[
�v
�w
�=
�>
�_
�`
�{
�|
�v
�w
�
�
�(
�)
�?
�@
�
�
�x
�y
�
�
�N
�O
�j
�k
�
�
�
�
�^
�_
�j
�l
�m
�$
�%
�
�
�"
�#
�
�
�~
�
�V
�W
�,
�-
�
�
�
�
�i
�j
�
�
�>
�?
�l
�m
�"
�#
�8
�9
�
�
�@
�A
�K
�L
�5
�6
�|
�}
�0
�1
�s
�t
�P
�Q
�0
�1
�
�
�
�
�
�
�a
�b
�l
�m
�p
�q
�S
�T
�<
�=
�B
�C
�6
�7
�
�!
�L
�M
�Z
�[
�z
�{
�$
�%
�z
�{
�
�
�
�}
�X
�Y
�"
�#
�h
�i
�
�
�<
�=
�
�
�
�
�Y
�Z
�
�
�g
�h
�,
�-
�N
�O
�
�
�T
�U
�x
�y
�\
�]
�j
�k
�.
�/
�D
�E
�
�
�
�
�B
�C
�*
�+
�d
�e
�]
�^
�h
�i
�}
�~
�G
�H
�v
�w
�M
�N
�k
�l
�2
�3
�e
�f
�.
�/
�z
�{
�
�
�
�
�q
�r
�p
�q
�
�
�
�
�y
�z
�
�f
�g
�
�
�$
�%
�>
�?
�(
�)
�F
�G
�&
�'
�
�
�P
�Q
�*
�+
�&
�'
�
�
�@
�A
�
�!
�J
�K
�x
�y
�t
�u
�D
�E
�F
�G
�9
�:
�L
�M
�H
�I
�2
�3
�d
�e
�R
�S
�.
�/
�b
�c
�
�
�
�
�|
�n
�o
�
�
�&
�'
�
�
�n
�o
�
�
�[
�\
�4
�5
�|
�}
�f
�g
�o
�p
�
�
�h
�i
�t
�u
�u
�v
�b
�c
�R
�S
�:
�;
�
�
�`
�a
�~
�
�r
�s
�
�
�Ft�Gt�Bt�Ct�Dt�Et�*t�+t�.t�/t�Pt�Qt�,t�-t�2t�3t�Jt�Kt�Ht�It�0t�1t�0t�1t�Rt�Stt�,t�-t�Lt�Mt�g�{�h�{�i�{�,u�-u�.u�/u�0u�1u�Ju�Ku�,u�-u�Hu�Iu�*u�+u�Bu�Cu�Fu�Gu�Pu�Qu�Du�Eu�Lu�Mu�0u�1u�2u�3u�Ru�Suu��p��p��p��p��pv�,v�-v�Fv�Gv�*v�+v�,v�-v�0v�1v�.v�/v�Jv�Kv�Bv�Cv�0v�1v�Lv�Mv�Dv�Ev�Hv�Iv�Pv�Qv�Rv�Sv�2v�3v�)��*��'��(��V��������Lw�Mw�Fw�Gw�0w�1w�Pw�Qww�Rw�Sw�,w�-w�2w�3w�*w�+w�Dw�Ew�Hw�Iw�,w�-w�.w�/w�Jw�Kw�Bw�Cw�0w�1w� ��
��<��;���� ��������������9��:������������}
�T�
�U�
��
�&��'��=��J�>�K�>�O�>�P�>�M�>�N�>�L�>��>��>�Q�>�R�>�
�,x�-x�Bx�Cxx�Dx�Ex�Fx�Gx�0x�1x�0x�1x�Rx�Sx�*x�+x�Hx�Ix�Lx�Mx�Px�Qx�,x�-x�.x�/x�2x�3x�Jx�Kx�.�(�/�(�D�z�E�z�H�z�I�z�J�z�K�z�F�z�G�z�V��(��'��)��*��
�1 ��1 ��1 ��1 ���>�
����o��; ��1 ��; ��1 ��1 ��;��/��; ��; ��; ��1 ��o ��1 ��1 ��1 ��; ��o ��o � � NOPSTUABCDEFHIJKLMRWX��B��W�_�&�
�vBBBsecurity Important: xz security update �+ �https://access.redhat.com/errata/RHSA-2022:4940 RHSA-2022:4940 RHSA-2022:4940 https://access.redhat.com/security/cve/CVE-2022-1271 CVE-2022-1271 CVE-2022-1271 https://bugzilla.redhat.com/2073310 2073310 https://errata.almalinux.org/9/ALSA-2022-4940.html ALSA-2022:4940 ALSA-2022:4940 �@� xz-libs-5.2.5-8.el9_0.i686.rpm �~� xz-5.2.5-8.el9_0.x86_64.rpm �@� xz-libs-5.2.5-8.el9_0.x86_64.rpm �@� xz-libs-5.2.5-8.el9_0.i686.rpm �~� xz-5.2.5-8.el9_0.x86_64.rpm �@� xz-libs-5.2.5-8.el9_0.x86_64.rpm ���� �'��{BBBBBBBBBBBBBBBBBBBBBsecurity Important: grub2, mokutil, shim, and shim-unsigned-x64 security update �+��|https://access.redhat.com/errata/RHSA-2022:5099 RHSA-2022:5099 RHSA-2022:5099 https://access.redhat.com/security/cve/CVE-2021-3695 CVE-2021-3695 CVE-2021-3695 https://access.redhat.com/security/cve/CVE-2021-3696 CVE-2021-3696 CVE-2021-3696 https://access.redhat.com/security/cve/CVE-2021-3697 CVE-2021-3697 CVE-2021-3697 https://access.redhat.com/security/cve/CVE-2022-28733 CVE-2022-28733 CVE-2022-28733 https://access.redhat.com/security/cve/CVE-2022-28734 CVE-2022-28734 CVE-2022-28734 https://access.redhat.com/security/cve/CVE-2022-28735 CVE-2022-28735 CVE-2022-28735 https://access.redhat.com/security/cve/CVE-2022-28736 CVE-2022-28736 CVE-2022-28736 https://access.redhat.com/security/cve/CVE-2022-28737 CVE-2022-28737 CVE-2022-28737 https://bugzilla.redhat.com/1991685 1991685 https://bugzilla.redhat.com/1991686 1991686 https://bugzilla.redhat.com/1991687 1991687 https://bugzilla.redhat.com/2083339 2083339 https://bugzilla.redhat.com/2090463 2090463 https://bugzilla.redhat.com/2090857 2090857 https://bugzilla.redhat.com/2090899 2090899 https://bugzilla.redhat.com/2092613 2092613 https://errata.almalinux.org/9/ALSA-2022-5099.html ALSA-2022:5099 ALSA-2022:5099 �t�Hshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �k�grub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �e�grub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �f�grub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �i�grub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �h�grub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �;�grub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �:�grub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm ��grub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �j�grub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �g�grub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �<�grub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm �z�Hshim-x64-15.6-1.el9.alma.x86_64.rpm �9�grub2-common-2.06-27.el9_0.7.alma.noarch.rpm �t�Hshim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �k�grub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �e�grub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �f�grub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �i�grub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �h�grub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �;�grub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �:�grub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm ��grub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �j�grub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �g�grub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �<�grub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm �z�Hshim-x64-15.6-1.el9.alma.x86_64.rpm �9�grub2-common-2.06-27.el9_0.7.alma.noarch.rpm ����f�(��KBBBBBBBsecurity Moderate: vim security update ���Thttps://access.redhat.com/errata/RHSA-2022:5242 RHSA-2022:5242 RHSA-2022:5242 https://access.redhat.com/security/cve/CVE-2022-0554 CVE-2022-0554 CVE-2022-0554 https://access.redhat.com/security/cve/CVE-2022-0943 CVE-2022-0943 CVE-2022-0943 https://access.redhat.com/security/cve/CVE-2022-1154 CVE-2022-1154 CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1420 CVE-2022-1420 CVE-2022-1420 https://access.redhat.com/security/cve/CVE-2022-1621 CVE-2022-1621 CVE-2022-1621 https://access.redhat.com/security/cve/CVE-2022-1629 CVE-2022-1629 CVE-2022-1629 https://bugzilla.redhat.com/2058483 2058483 https://bugzilla.redhat.com/2064064 2064064 https://bugzilla.redhat.com/2073013 2073013 https://bugzilla.redhat.com/2077734 2077734 https://bugzilla.redhat.com/2083924 2083924 https://bugzilla.redhat.com/2083931 2083931 https://errata.almalinux.org/9/ALSA-2022-5242.html ALSA-2022:5242 ALSA-2022:5242 ��Rvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm �
�Rvim-common-8.2.2637-16.el9_0.2.x86_64.rpm ��Rvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm �r�Rvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm �=�Rvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm ��Rvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm �
�Rvim-common-8.2.2637-16.el9_0.2.x86_64.rpm ��Rvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm �r�Rvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm �=�Rvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm ���_�)��UBBB�<security Moderate: expat security update ��e�xhttps://access.redhat.com/errata/RHSA-2022:5244 RHSA-2022:5244 RHSA-2022:5244 https://access.redhat.com/security/cve/CVE-2022-25313 CVE-2022-25313 CVE-2022-25313 https://access.redhat.com/security/cve/CVE-2022-25314 CVE-2022-25314 CVE-2022-25314 https://bugzilla.redhat.com/2056350 2056350 https://bugzilla.redhat.com/2056354 2056354 https://errata.almalinux.org/9/ALSA-2022-5244.html ALSA-2022:5244 ALSA-2022:5244 �W�|expat-devel-2.2.10-12.el9_0.2.x86_64.rpm � �|expat-2.2.10-12.el9_0.2.i686.rpm � �|expat-2.2.10-12.el9_0.2.x86_64.rpm �W�|expat-devel-2.2.10-12.el9_0.2.x86_64.rpm � �|expat-2.2.10-12.el9_0.2.i686.rpm � �|expat-2.2.10-12.el9_0.2.x86_64.rpm ���%�*��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update �+�]�
https://access.redhat.com/errata/RHSA-2022:5249 RHSA-2022:5249 RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 CVE-2022-1012 CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 CVE-2022-1729 CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 CVE-2022-1966 CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 CVE-2022-27666 CVE-2022-27666 https://bugzilla.redhat.com/2061633 2061633 https://bugzilla.redhat.com/2064604 2064604 https://bugzilla.redhat.com/2086753 2086753 https://bugzilla.redhat.com/2092427 2092427 https://errata.almalinux.org/9/ALSA-2022-5249.html ALSA-2022:5249 ALSA-2022:5249 .kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �h.kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm .kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �c.kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �b.kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �g.kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm �i.kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �e.kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �f.kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm 1.bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �d.kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �q.perf-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm 2.python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �h.kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm .kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �c.kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �b.kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �g.kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm �i.kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �e.kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �f.kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm 1.bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �d.kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �q.perf-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm 2.python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm .kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm �����+��EBBBBB�security Moderate: libarchive security update ��r�Xhttps://access.redhat.com/errata/RHSA-2022:5252 RHSA-2022:5252 RHSA-2022:5252 https://access.redhat.com/security/cve/CVE-2022-26280 CVE-2022-26280 CVE-2022-26280 https://bugzilla.redhat.com/2071931 2071931 https://errata.almalinux.org/9/ALSA-2022-5252.html ALSA-2022:5252 ALSA-2022:5252 �?�libarchive-3.5.3-2.el9_0.x86_64.rpm �Q�bsdtar-3.5.3-2.el9_0.x86_64.rpm �?�libarchive-3.5.3-2.el9_0.i686.rpm �\�libarchive-devel-3.5.3-2.el9_0.x86_64.rpm �?�libarchive-3.5.3-2.el9_0.x86_64.rpm �Q�bsdtar-3.5.3-2.el9_0.x86_64.rpm �?�libarchive-3.5.3-2.el9_0.i686.rpm �\�libarchive-devel-3.5.3-2.el9_0.x86_64.rpm ���t�,��LBBBBBBBsecurity Moderate: vim security update ��J�Rhttps://access.redhat.com/errata/RHSA-2022:5942 RHSA-2022:5942 RHSA-2022:5942 https://access.redhat.com/security/cve/CVE-2022-1785 CVE-2022-1785 CVE-2022-1785 https://access.redhat.com/security/cve/CVE-2022-1897 CVE-2022-1897 CVE-2022-1897 https://access.redhat.com/security/cve/CVE-2022-1927 CVE-2022-1927 CVE-2022-1927 https://bugzilla.redhat.com/2088689 2088689 https://bugzilla.redhat.com/2091682 2091682 https://bugzilla.redhat.com/2091687 2091687 https://errata.almalinux.org/9/ALSA-2022-5942.html ALSA-2022:5942 ALSA-2022:5942 �
�Svim-common-8.2.2637-16.el9_0.3.x86_64.rpm ��Svim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm �r�Svim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm �=�Svim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm ��Svim-X11-8.2.2637-16.el9_0.3.x86_64.rpm �
�Svim-common-8.2.2637-16.el9_0.3.x86_64.rpm ��Svim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm �r�Svim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm �=�Svim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm ��Svim-X11-8.2.2637-16.el9_0.3.x86_64.rpm ����U�-� �VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security, bug fix, and enhancement update ���qhttps://access.redhat.com/errata/RHSA-2022:6003 RHSA-2022:6003 RHSA-2022:6003 https://access.redhat.com/security/cve/CVE-2022-0494 CVE-2022-0494 CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1055 CVE-2022-1055 CVE-2022-1055 https://bugzilla.redhat.com/2039448 2039448 https://bugzilla.redhat.com/2070220 2070220 https://errata.almalinux.org/9/ALSA-2022-6003.html ALSA-2022:6003 ALSA-2022:6003 /kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �g/kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �h/kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �q/perf-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �d/kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �b/kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �i/kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �f/kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm 1/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �e/kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm 2/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �c/kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �g/kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �h/kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �q/perf-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �d/kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �b/kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �i/kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �f/kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm 1/bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �e/kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm 2/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �c/kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm /kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm ��о}�.��ABBBBBBBBB�Lsecurity Moderate: curl security update ��
�https://access.redhat.com/errata/RHSA-2022:6157 RHSA-2022:6157 RHSA-2022:6157 https://access.redhat.com/security/cve/CVE-2022-32206 CVE-2022-32206 CVE-2022-32206 https://access.redhat.com/security/cve/CVE-2022-32207 CVE-2022-32207 CVE-2022-32207 https://access.redhat.com/security/cve/CVE-2022-32208 CVE-2022-32208 CVE-2022-32208 https://bugzilla.redhat.com/2099300 2099300 https://bugzilla.redhat.com/2099305 2099305 https://bugzilla.redhat.com/2099306 2099306 https://errata.almalinux.org/9/ALSA-2022-6157.html ALSA-2022:6157 ALSA-2022:6157 {�5libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm z�5libcurl-7.76.1-14.el9_0.5.i686.rpm z�5libcurl-7.76.1-14.el9_0.5.x86_64.rpm {�5libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm �]�5libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm �)�5curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm �(�5curl-7.76.1-14.el9_0.5.x86_64.rpm {�5libcurl-minimal-7.76.1-14.el9_0.5.i686.rpm z�5libcurl-7.76.1-14.el9_0.5.i686.rpm z�5libcurl-7.76.1-14.el9_0.5.x86_64.rpm {�5libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm �]�5libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm �)�5curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm �(�5curl-7.76.1-14.el9_0.5.x86_64.rpm �����/��LBBBBBBB�security Moderate: openssl security and bug fix update ��&�/https://access.redhat.com/errata/RHSA-2022:6224 RHSA-2022:6224 RHSA-2022:6224 https://access.redhat.com/security/cve/CVE-2022-1292 CVE-2022-1292 CVE-2022-1292 https://access.redhat.com/security/cve/CVE-2022-1343 CVE-2022-1343 CVE-2022-1343 https://access.redhat.com/security/cve/CVE-2022-1473 CVE-2022-1473 CVE-2022-1473 https://access.redhat.com/security/cve/CVE-2022-2068 CVE-2022-2068 CVE-2022-2068 https://access.redhat.com/security/cve/CVE-2022-2097 CVE-2022-2097 CVE-2022-2097 https://bugzilla.redhat.com/2081494 2081494 https://bugzilla.redhat.com/2087911 2087911 https://bugzilla.redhat.com/2087913 2087913 https://bugzilla.redhat.com/2097310 2097310 https://bugzilla.redhat.com/2104905 2104905 https://errata.almalinux.org/9/ALSA-2022-6224.html ALSA-2022:6224 ALSA-2022:6224 ��Qopenssl-libs-3.0.1-41.el9_0.x86_64.rpm �k�Qopenssl-perl-3.0.1-41.el9_0.x86_64.rpm ��Qopenssl-libs-3.0.1-41.el9_0.i686.rpm �j�Qopenssl-devel-3.0.1-41.el9_0.x86_64.rpm �7�Qopenssl-3.0.1-41.el9_0.x86_64.rpm ��Qopenssl-libs-3.0.1-41.el9_0.x86_64.rpm �k�Qopenssl-perl-3.0.1-41.el9_0.x86_64.rpm ��Qopenssl-libs-3.0.1-41.el9_0.i686.rpm �j�Qopenssl-devel-3.0.1-41.el9_0.x86_64.rpm �7�Qopenssl-3.0.1-41.el9_0.x86_64.rpm �����0��Xsecurity Moderate: gnupg2 security update ��U�(https://access.redhat.com/errata/RHSA-2022:6602 RHSA-2022:6602 RHSA-2022:6602 https://access.redhat.com/security/cve/CVE-2022-34903 CVE-2022-34903 CVE-2022-34903 https://bugzilla.redhat.com/2102868 2102868 https://errata.almalinux.org/9/ALSA-2022-6602.html ALSA-2022:6602 ALSA-2022:6602 �`�gnupg2-2.3.3-2.el9_0.x86_64.rpm �`�gnupg2-2.3.3-2.el9_0.x86_64.rpm ����'�1��Zsecurity Moderate: dbus-broker security update ��}�chttps://access.redhat.com/errata/RHSA-2022:6608 RHSA-2022:6608 RHSA-2022:6608 https://access.redhat.com/security/cve/CVE-2022-31212 CVE-2022-31212 CVE-2022-31212 https://access.redhat.com/security/cve/CVE-2022-31213 CVE-2022-31213 CVE-2022-31213 https://bugzilla.redhat.com/2094718 2094718 https://bugzilla.redhat.com/2094722 2094722 https://errata.almalinux.org/9/ALSA-2022-6608.html ALSA-2022:6608 ALSA-2022:6608 �S�!dbus-broker-28-5.1.el9_0.x86_64.rpm �S�!dbus-broker-28-5.1.el9_0.x86_64.rpm �����2��]BBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update �+�`�=https://access.redhat.com/errata/RHSA-2022:6610 RHSA-2022:6610 RHSA-2022:6610 https://access.redhat.com/security/cve/CVE-2022-2078 CVE-2022-2078 CVE-2022-2078 https://access.redhat.com/security/cve/CVE-2022-34918 CVE-2022-34918 CVE-2022-34918 https://bugzilla.redhat.com/2096178 2096178 https://bugzilla.redhat.com/2104423 2104423 https://errata.almalinux.org/9/ALSA-2022-6610.html ALSA-2022:6610 ALSA-2022:6610
�kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm 2�python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm �kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm 1�bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm
�kernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm 2�python3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm �kernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm 1�bpftool-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm ����+�3��vsecurity Important: expat security update �+��Uhttps://access.redhat.com/errata/RHSA-2022:6838 RHSA-2022:6838 RHSA-2022:6838 https://access.redhat.com/security/cve/CVE-2022-40674 CVE-2022-40674 CVE-2022-40674 https://bugzilla.redhat.com/2130769 2130769 https://errata.almalinux.org/9/ALSA-2022-6838.html ALSA-2022:6838 ALSA-2022:6838 � �expat-2.2.10-12.el9_0.3.x86_64.rpm � �expat-2.2.10-12.el9_0.3.x86_64.rpm �����4��xBsecurity Moderate: gnutls and nettle security, bug fix, and enhancement update ��r�2https://access.redhat.com/errata/RHSA-2022:6854 RHSA-2022:6854 RHSA-2022:6854 https://access.redhat.com/security/cve/CVE-2022-2509 CVE-2022-2509 CVE-2022-2509 https://bugzilla.redhat.com/2108977 2108977 https://errata.almalinux.org/9/ALSA-2022-6854.html ALSA-2022:6854 ALSA-2022:6854 �!�gnutls-3.7.6-12.el9_0.i686.rpm �!�gnutls-3.7.6-12.el9_0.x86_64.rpm �!�gnutls-3.7.6-12.el9_0.i686.rpm �!�gnutls-3.7.6-12.el9_0.x86_64.rpm ����~�5�>�{Bsecurity Important: libksba security update �+�$�Yhttps://access.redhat.com/errata/RHSA-2022:7090 RHSA-2022:7090 RHSA-2022:7090 https://access.redhat.com/security/cve/CVE-2022-3515 CVE-2022-3515 CVE-2022-3515 https://bugzilla.redhat.com/2135610 2135610 https://errata.almalinux.org/9/ALSA-2022-7090.html ALSA-2022:7090 ALSA-2022:7090 �)�`libksba-1.5.1-5.el9_0.x86_64.rpm �)�`libksba-1.5.1-5.el9_0.i686.rpm �)�`libksba-1.5.1-5.el9_0.x86_64.rpm �)�`libksba-1.5.1-5.el9_0.i686.rpm ����^�6��BBBBBsecurity Important: device-mapper-multipath security update �+�}�chttps://access.redhat.com/errata/RHSA-2022:7185 RHSA-2022:7185 RHSA-2022:7185 https://access.redhat.com/security/cve/CVE-2022-41974 CVE-2022-41974 CVE-2022-41974 https://bugzilla.redhat.com/2133988 2133988 https://errata.almalinux.org/9/ALSA-2022-7185.html ALSA-2022:7185 ALSA-2022:7185 �&�|device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm �j�|kpartx-0.8.7-7.el9_0.1.x86_64.rpm �&�|device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm �J�|device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm �&�|device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm �j�|kpartx-0.8.7-7.el9_0.1.x86_64.rpm �&�|device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm �J�|device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm ����d�7��GBBBsecurity Important: openssl security update �+�`�https://access.redhat.com/errata/RHSA-2022:7288 RHSA-2022:7288 RHSA-2022:7288 https://access.redhat.com/security/cve/CVE-2022-3602 CVE-2022-3602 CVE-2022-3602 https://access.redhat.com/security/cve/CVE-2022-3786 CVE-2022-3786 CVE-2022-3786 https://bugzilla.redhat.com/2137723 2137723 https://bugzilla.redhat.com/2139104 2139104 https://errata.almalinux.org/9/ALSA-2022-7288.html ALSA-2022:7288 ALSA-2022:7288 �7�qopenssl-3.0.1-43.el9_0.x86_64.rpm ��qopenssl-libs-3.0.1-43.el9_0.x86_64.rpm ��qopenssl-libs-3.0.1-43.el9_0.i686.rpm �7�qopenssl-3.0.1-43.el9_0.x86_64.rpm ��qopenssl-libs-3.0.1-43.el9_0.x86_64.rpm ��qopenssl-libs-3.0.1-43.el9_0.i686.rpm ����h�8��Lsecurity Moderate: zlib security update ��s�Ohttps://access.redhat.com/errata/RHSA-2022:7314 RHSA-2022:7314 RHSA-2022:7314 https://access.redhat.com/security/cve/CVE-2022-37434 CVE-2022-37434 CVE-2022-37434 https://bugzilla.redhat.com/2116639 2116639 https://errata.almalinux.org/9/ALSA-2022-7314.html ALSA-2022:7314 ALSA-2022:7314 ��zlib-1.2.11-32.el9_0.x86_64.rpm ��zlib-1.2.11-32.el9_0.x86_64.rpm ����S�9��NBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update �+�B�https://access.redhat.com/errata/RHSA-2022:7318 RHSA-2022:7318 RHSA-2022:7318 https://access.redhat.com/security/cve/CVE-2022-2585 CVE-2022-2585 CVE-2022-2585 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://bugzilla.redhat.com/2085300 2085300 https://bugzilla.redhat.com/2114874 2114874 https://errata.almalinux.org/9/ALSA-2022-7318.html ALSA-2022:7318 ALSA-2022:7318
�kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm 2�python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm 1�bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm �kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm
�kernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm 2�python3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm 1�bpftool-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm �kernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm ����j�:��gBBsecurity Moderate: python3.9 security update ��E�nhttps://access.redhat.com/errata/RHSA-2022:7323 RHSA-2022:7323 RHSA-2022:7323 https://access.redhat.com/security/cve/CVE-2020-10735 CVE-2020-10735 CVE-2020-10735 https://bugzilla.redhat.com/1834423 1834423 https://errata.almalinux.org/9/ALSA-2022-7323.html ALSA-2022:7323 ALSA-2022:7323 -�Ipython3-libs-3.9.10-3.el9_0.x86_64.rpm ��Ipython3-3.9.10-3.el9_0.x86_64.rpm -�Ipython3-libs-3.9.10-3.el9_0.x86_64.rpm ��Ipython3-3.9.10-3.el9_0.x86_64.rpm �����;��kBsecurity Moderate: lua security update ���3�https://access.redhat.com/errata/RHSA-2022:7329 RHSA-2022:7329 RHSA-2022:7329 https://access.redhat.com/security/cve/CVE-2022-33099 CVE-2022-33099 CVE-2022-33099 https://bugzilla.redhat.com/2104427 2104427 https://errata.almalinux.org/9/ALSA-2022-7329.html ALSA-2022:7329 ALSA-2022:7329 ��lua-libs-5.4.2-4.el9_0.3.i686.rpm ��lua-libs-5.4.2-4.el9_0.3.x86_64.rpm ��lua-libs-5.4.2-4.el9_0.3.i686.rpm ��lua-libs-5.4.2-4.el9_0.3.x86_64.rpm ����t�<��nBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security, bug fix, and enhancement update ���E�?https://access.redhat.com/errata/RHSA-2022:8267 RHSA-2022:8267 RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516 CVE-2020-36516 CVE-2020-36516 https://access.redhat.com/security/cve/CVE-2021-3640 CVE-2021-3640 CVE-2021-3640 https://access.redhat.com/security/cve/CVE-2022-0168 CVE-2022-0168 CVE-2022-0168 https://access.redhat.com/security/cve/CVE-2022-0617 CVE-2022-0617 CVE-2022-0617 https://access.redhat.com/security/cve/CVE-2022-0854 CVE-2022-0854 CVE-2022-0854 https://access.redhat.com/security/cve/CVE-2022-1016 CVE-2022-1016 CVE-2022-1016 https://access.redhat.com/security/cve/CVE-2022-1048 CVE-2022-1048 CVE-2022-1048 https://access.redhat.com/security/cve/CVE-2022-1184 CVE-2022-1184 CVE-2022-1184 https://access.redhat.com/security/cve/CVE-2022-1280 CVE-2022-1280 CVE-2022-1280 https://access.redhat.com/security/cve/CVE-2022-1353 CVE-2022-1353 CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-1679 CVE-2022-1679 CVE-2022-1679 https://access.redhat.com/security/cve/CVE-2022-1852 CVE-2022-1852 CVE-2022-1852 https://access.redhat.com/security/cve/CVE-2022-1998 CVE-2022-1998 CVE-2022-1998 https://access.redhat.com/security/cve/CVE-2022-20368 CVE-2022-20368 CVE-2022-20368 https://access.redhat.com/security/cve/CVE-2022-21123 CVE-2022-21123 CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 CVE-2022-21125 CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 CVE-2022-21166 CVE-2022-21166 https://access.redhat.com/security/cve/CVE-2022-21499 CVE-2022-21499 CVE-2022-21499 https://access.redhat.com/security/cve/CVE-2022-23816 CVE-2022-23816 CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 CVE-2022-23825 CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-24448 CVE-2022-24448 CVE-2022-24448 https://access.redhat.com/security/cve/CVE-2022-2586 CVE-2022-2586 CVE-2022-2586 https://access.redhat.com/security/cve/CVE-2022-26373 CVE-2022-26373 CVE-2022-26373 https://access.redhat.com/security/cve/CVE-2022-2639 CVE-2022-2639 CVE-2022-2639 https://access.redhat.com/security/cve/CVE-2022-28390 CVE-2022-28390 CVE-2022-28390 https://access.redhat.com/security/cve/CVE-2022-28893 CVE-2022-28893 CVE-2022-28893 https://access.redhat.com/security/cve/CVE-2022-29581 CVE-2022-29581 CVE-2022-29581 https://access.redhat.com/security/cve/CVE-2022-29900 CVE-2022-29900 CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 CVE-2022-29901 CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-36946 CVE-2022-36946 CVE-2022-36946 https://access.redhat.com/security/cve/CVE-2022-39190 CVE-2022-39190 CVE-2022-39190 https://bugzilla.redhat.com/1980646 1980646 https://bugzilla.redhat.com/2037386 2037386 https://bugzilla.redhat.com/2051444 2051444 https://bugzilla.redhat.com/2052312 2052312 https://bugzilla.redhat.com/2053632 2053632 https://bugzilla.redhat.com/2058395 2058395 https://bugzilla.redhat.com/2059928 2059928 https://bugzilla.redhat.com/2066614 2066614 https://bugzilla.redhat.com/2066706 2066706 https://bugzilla.redhat.com/2066819 2066819 https://bugzilla.redhat.com/2070205 2070205 https://bugzilla.redhat.com/2071022 2071022 https://bugzilla.redhat.com/2073064 2073064 https://bugzilla.redhat.com/2074208 2074208 https://bugzilla.redhat.com/2084125 2084125 https://bugzilla.redhat.com/2084183 2084183 https://bugzilla.redhat.com/2084479 2084479 https://bugzilla.redhat.com/2088021 2088021 https://bugzilla.redhat.com/2089815 2089815 https://bugzilla.redhat.com/2090226 2090226 https://bugzilla.redhat.com/2090237 2090237 https://bugzilla.redhat.com/2090240 2090240 https://bugzilla.redhat.com/2090241 2090241 https://bugzilla.redhat.com/2103148 2103148 https://bugzilla.redhat.com/2103153 2103153 https://bugzilla.redhat.com/2114878 2114878 https://bugzilla.redhat.com/2115065 2115065 https://bugzilla.redhat.com/2115278 2115278 https://bugzilla.redhat.com/2123695 2123695 https://bugzilla.redhat.com/2129152 2129152 https://errata.almalinux.org/9/ALSA-2022-8267.html ALSA-2022:8267 ALSA-2022:8267
� kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-5.14.0-162.6.1.el9_1.x86_64.rpm 1� bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm 2� python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm � kernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm
� kernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-5.14.0-162.6.1.el9_1.x86_64.rpm 1� bpftool-5.14.0-162.6.1.el9_1.x86_64.rpm 2� python3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm � kernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm � kernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm ��۰Q�=��Gsecurity Moderate: rsync security and bug fix update ���H�zhttps://access.redhat.com/errata/RHSA-2022:8291 RHSA-2022:8291 RHSA-2022:8291 https://access.redhat.com/security/cve/CVE-2022-37434 CVE-2022-37434 CVE-2022-37434 https://bugzilla.redhat.com/2116639 2116639 https://errata.almalinux.org/9/ALSA-2022-8291.html ALSA-2022:8291 ALSA-2022:8291 �;�%rsync-3.2.3-18.el9.x86_64.rpm �;�%rsync-3.2.3-18.el9.x86_64.rpm ��ۨ3�>� �IBBBBBBBBsecurity Low: curl security update ��6��B�8https://access.redhat.com/errata/RHSA-2022:8299 RHSA-2022:8299 RHSA-2022:8299 https://access.redhat.com/security/cve/CVE-2022-27775 CVE-2022-27775 CVE-2022-27775 https://bugzilla.redhat.com/2078388 2078388 https://errata.almalinux.org/9/ALSA-2022-8299.html ALSA-2022:8299 ALSA-2022:8299 {�Blibcurl-minimal-7.76.1-19.el9.x86_64.rpm z�Blibcurl-7.76.1-19.el9.x86_64.rpm z�Blibcurl-7.76.1-19.el9.i686.rpm {�Blibcurl-minimal-7.76.1-19.el9.i686.rpm �(�Bcurl-7.76.1-19.el9.x86_64.rpm �)�Bcurl-minimal-7.76.1-19.el9.x86_64.rpm {�Blibcurl-minimal-7.76.1-19.el9.x86_64.rpm z�Blibcurl-7.76.1-19.el9.x86_64.rpm z�Blibcurl-7.76.1-19.el9.i686.rpm {�Blibcurl-minimal-7.76.1-19.el9.i686.rpm �(�Bcurl-7.76.1-19.el9.x86_64.rpm �)�Bcurl-minimal-7.76.1-19.el9.x86_64.rpm ��ދ�?�!�SBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update ���z�mhttps://access.redhat.com/errata/RHSA-2022:8317 RHSA-2022:8317 RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742 CVE-2022-32742 CVE-2022-32742 https://bugzilla.redhat.com/2108196 2108196 https://errata.almalinux.org/9/ALSA-2022-8317.html ALSA-2022:8317 ALSA-2022:8317 �X=samba-winbind-4.16.4-101.el9.x86_64.rpm �W=samba-common-tools-4.16.4-101.el9.x86_64.rpm �.=libsmbclient-4.16.4-101.el9.x86_64.rpm �q=samba-common-4.16.4-101.el9.noarch.rpm �4=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm �3=samba-libs-4.16.4-101.el9.x86_64.rpm �1=samba-client-libs-4.16.4-101.el9.i686.rpm �/=libwbclient-4.16.4-101.el9.x86_64.rpm �/=libwbclient-4.16.4-101.el9.i686.rpm �3=samba-libs-4.16.4-101.el9.i686.rpm �2=samba-common-libs-4.16.4-101.el9.i686.rpm �1=samba-client-libs-4.16.4-101.el9.x86_64.rpm �.=libsmbclient-4.16.4-101.el9.i686.rpm �0=python3-samba-4.16.4-101.el9.i686.rpm �V=samba-4.16.4-101.el9.x86_64.rpm �4=samba-winbind-modules-4.16.4-101.el9.i686.rpm �0=python3-samba-4.16.4-101.el9.x86_64.rpm �2=samba-common-libs-4.16.4-101.el9.x86_64.rpm �X=samba-winbind-4.16.4-101.el9.x86_64.rpm �W=samba-common-tools-4.16.4-101.el9.x86_64.rpm �.=libsmbclient-4.16.4-101.el9.x86_64.rpm �q=samba-common-4.16.4-101.el9.noarch.rpm �4=samba-winbind-modules-4.16.4-101.el9.x86_64.rpm �3=samba-libs-4.16.4-101.el9.x86_64.rpm �1=samba-client-libs-4.16.4-101.el9.i686.rpm �/=libwbclient-4.16.4-101.el9.x86_64.rpm �/=libwbclient-4.16.4-101.el9.i686.rpm �3=samba-libs-4.16.4-101.el9.i686.rpm �2=samba-common-libs-4.16.4-101.el9.i686.rpm �1=samba-client-libs-4.16.4-101.el9.x86_64.rpm �.=libsmbclient-4.16.4-101.el9.i686.rpm �0=python3-samba-4.16.4-101.el9.i686.rpm �V=samba-4.16.4-101.el9.x86_64.rpm �4=samba-winbind-modules-4.16.4-101.el9.i686.rpm �0=python3-samba-4.16.4-101.el9.x86_64.rpm �2=samba-common-libs-4.16.4-101.el9.x86_64.rpm ��ދN�@�7�oBBBBBBsecurity Moderate: libldb security, bug fix, and enhancement update ���g�Lhttps://access.redhat.com/errata/RHSA-2022:8318 RHSA-2022:8318 RHSA-2022:8318 https://access.redhat.com/security/cve/CVE-2022-32746 CVE-2022-32746 CVE-2022-32746 https://bugzilla.redhat.com/2108215 2108215 https://errata.almalinux.org/9/ALSA-2022-8318.html ALSA-2022:8318 ALSA-2022:8318 �:�bpython3-ldb-2.5.2-1.el9.i686.rpm �-�blibldb-2.5.2-1.el9.i686.rpm �[�bldb-tools-2.5.2-1.el9.x86_64.rpm �-�blibldb-2.5.2-1.el9.x86_64.rpm �:�bpython3-ldb-2.5.2-1.el9.x86_64.rpm �:�bpython3-ldb-2.5.2-1.el9.i686.rpm �-�blibldb-2.5.2-1.el9.i686.rpm �[�bldb-tools-2.5.2-1.el9.x86_64.rpm �-�blibldb-2.5.2-1.el9.x86_64.rpm �:�bpython3-ldb-2.5.2-1.el9.x86_64.rpm ��ތ�A�"�xBsecurity Moderate: freetype security update ���3�Ohttps://access.redhat.com/errata/RHSA-2022:8340 RHSA-2022:8340 RHSA-2022:8340 https://access.redhat.com/security/cve/CVE-2022-27404 CVE-2022-27404 CVE-2022-27404 https://access.redhat.com/security/cve/CVE-2022-27405 CVE-2022-27405 CVE-2022-27405 https://access.redhat.com/security/cve/CVE-2022-27406 CVE-2022-27406 CVE-2022-27406 https://bugzilla.redhat.com/2077985 2077985 https://bugzilla.redhat.com/2077989 2077989 https://bugzilla.redhat.com/2077991 2077991 https://errata.almalinux.org/9/ALSA-2022-8340.html ALSA-2022:8340 ALSA-2022:8340 ��kfreetype-2.10.4-9.el9.i686.rpm ��kfreetype-2.10.4-9.el9.x86_64.rpm ��kfreetype-2.10.4-9.el9.i686.rpm ��kfreetype-2.10.4-9.el9.x86_64.rpm ��ތ*�B�#�{BBBsecurity Moderate: python3.9 security, bug fix, and enhancement update ����5https://access.redhat.com/errata/RHSA-2022:8353 RHSA-2022:8353 RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107 CVE-2015-20107 CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2021-28861 CVE-2021-28861 CVE-2021-28861 https://bugzilla.redhat.com/2075390 2075390 https://bugzilla.redhat.com/2120642 2120642 https://errata.almalinux.org/9/ALSA-2022-8353.html ALSA-2022:8353 ALSA-2022:8353 ��python3-3.9.14-1.el9.x86_64.rpm -�python3-libs-3.9.14-1.el9.i686.rpm -�python3-libs-3.9.14-1.el9.x86_64.rpm ��python3-3.9.14-1.el9.x86_64.rpm -�python3-libs-3.9.14-1.el9.i686.rpm -�python3-libs-3.9.14-1.el9.x86_64.rpm ��ތ_�C�$�@BBBBBBBBBsecurity Moderate: e2fsprogs security update ���7�<https://access.redhat.com/errata/RHSA-2022:8361 RHSA-2022:8361 RHSA-2022:8361 https://access.redhat.com/security/cve/CVE-2022-1304 CVE-2022-1304 CVE-2022-1304 https://bugzilla.redhat.com/2069726 2069726 https://errata.almalinux.org/9/ALSA-2022-8361.html ALSA-2022:8361 ALSA-2022:8361 ��8e2fsprogs-libs-1.46.5-3.el9.x86_64.rpm �3�8libss-1.46.5-3.el9.x86_64.rpm ��8e2fsprogs-libs-1.46.5-3.el9.i686.rpm �%�8libcom_err-1.46.5-3.el9.i686.rpm �%�8libcom_err-1.46.5-3.el9.x86_64.rpm �3�8libss-1.46.5-3.el9.i686.rpm �U�8e2fsprogs-1.46.5-3.el9.x86_64.rpm ��8e2fsprogs-libs-1.46.5-3.el9.x86_64.rpm �3�8libss-1.46.5-3.el9.x86_64.rpm ��8e2fsprogs-libs-1.46.5-3.el9.i686.rpm �%�8libcom_err-1.46.5-3.el9.i686.rpm �%�8libcom_err-1.46.5-3.el9.x86_64.rpm �3�8libss-1.46.5-3.el9.i686.rpm �U�8e2fsprogs-1.46.5-3.el9.x86_64.rpm ����p�D�%�KBsecurity Moderate: harfbuzz security update ���s�uhttps://access.redhat.com/errata/RHSA-2022:8384 RHSA-2022:8384 RHSA-2022:8384 https://access.redhat.com/security/cve/CVE-2022-33068 CVE-2022-33068 CVE-2022-33068 https://bugzilla.redhat.com/2102608 2102608 https://errata.almalinux.org/9/ALSA-2022-8384.html ALSA-2022:8384 ALSA-2022:8384 �'�yharfbuzz-2.7.4-8.el9.x86_64.rpm �'�yharfbuzz-2.7.4-8.el9.i686.rpm �'�yharfbuzz-2.7.4-8.el9.x86_64.rpm �'�yharfbuzz-2.7.4-8.el9.i686.rpm ��ލ
�E��NBBBBBsecurity Moderate: dhcp security and enhancement update ���h�}https://access.redhat.com/errata/RHSA-2022:8385 RHSA-2022:8385 RHSA-2022:8385 https://access.redhat.com/security/cve/CVE-2021-25220 CVE-2021-25220 CVE-2021-25220 https://bugzilla.redhat.com/2064512 2064512 https://errata.almalinux.org/9/ALSA-2022-8385.html ALSA-2022:8385 ALSA-2022:8385 �]�}dhcp-common-4.4.2-17.b1.el9.noarch.rpm �_�}dhcp-server-4.4.2-17.b1.el9.x86_64.rpm �\�}dhcp-client-4.4.2-17.b1.el9.x86_64.rpm �^�}dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm �]�}dhcp-common-4.4.2-17.b1.el9.noarch.rpm �_�}dhcp-server-4.4.2-17.b1.el9.x86_64.rpm �\�}dhcp-client-4.4.2-17.b1.el9.x86_64.rpm �^�}dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm �����F��Vsecurity Moderate: logrotate security update ���e�Jhttps://access.redhat.com/errata/RHSA-2022:8393 RHSA-2022:8393 RHSA-2022:8393 https://access.redhat.com/security/cve/CVE-2022-1348 CVE-2022-1348 CVE-2022-1348 https://bugzilla.redhat.com/2075074 2075074 https://errata.almalinux.org/9/ALSA-2022-8393.html ALSA-2022:8393 ALSA-2022:8393 �_�$logrotate-3.18.0-7.el9.x86_64.rpm �_�$logrotate-3.18.0-7.el9.x86_64.rpm ����K�G��YBsecurity Moderate: libtirpc security update ���/�{https://access.redhat.com/errata/RHSA-2022:8400 RHSA-2022:8400 RHSA-2022:8400 https://access.redhat.com/security/cve/CVE-2021-46828 CVE-2021-46828 CVE-2021-46828 https://bugzilla.redhat.com/2109352 2109352 https://errata.almalinux.org/9/ALSA-2022-8400.html ALSA-2022:8400 ALSA-2022:8400 �5�Vlibtirpc-1.3.3-0.el9.i686.rpm �5�Vlibtirpc-1.3.3-0.el9.x86_64.rpm �5�Vlibtirpc-1.3.3-0.el9.i686.rpm �5�Vlibtirpc-1.3.3-0.el9.x86_64.rpm ��ލR�H��]security Important: device-mapper-multipath security update �+��*�.https://access.redhat.com/errata/RHSA-2022:8453 RHSA-2022:8453 RHSA-2022:8453 https://access.redhat.com/security/cve/CVE-2022-3787 CVE-2022-3787 CVE-2022-3787 https://bugzilla.redhat.com/2138959 2138959 https://errata.almalinux.org/9/ALSA-2022-8453.html ALSA-2022:8453 ALSA-2022:8453 �J�device-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm �J�device-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm ����`�I�&�`BBBsecurity Important: python3.9 security update �+��X�Qhttps://access.redhat.com/errata/RHSA-2022:8493 RHSA-2022:8493 RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919 CVE-2022-42919 CVE-2022-42919 https://bugzilla.redhat.com/2138705 2138705 https://errata.almalinux.org/9/ALSA-2022-8493.html ALSA-2022:8493 ALSA-2022:8493 -�python3-libs-3.9.14-1.el9_1.1.i686.rpm ��python3-3.9.14-1.el9_1.1.x86_64.rpm -�python3-libs-3.9.14-1.el9_1.1.x86_64.rpm -�python3-libs-3.9.14-1.el9_1.1.i686.rpm ��python3-3.9.14-1.el9_1.1.x86_64.rpm -�python3-libs-3.9.14-1.el9_1.1.x86_64.rpm ����|�J�'�eBBBBBBBBBBBBBBBsecurity Important: krb5 security update �+��)�ghttps://access.redhat.com/errata/RHSA-2022:8637 RHSA-2022:8637 RHSA-2022:8637 https://access.redhat.com/security/cve/CVE-2022-42898 CVE-2022-42898 CVE-2022-42898 https://bugzilla.redhat.com/2140960 2140960 https://errata.almalinux.org/9/ALSA-2022-8637.html ALSA-2022:8637 ALSA-2022:8637 �#�krb5-pkinit-1.19.1-24.el9_1.i686.rpm �%�krb5-server-ldap-1.19.1-24.el9_1.i686.rpm �"�krb5-libs-1.19.1-24.el9_1.x86_64.rpm �$�krb5-server-1.19.1-24.el9_1.x86_64.rpm �%�krb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm �&�libkadm5-1.19.1-24.el9_1.x86_64.rpm �"�krb5-libs-1.19.1-24.el9_1.i686.rpm �l�krb5-workstation-1.19.1-24.el9_1.x86_64.rpm �$�krb5-server-1.19.1-24.el9_1.i686.rpm �&�libkadm5-1.19.1-24.el9_1.i686.rpm �#�krb5-pkinit-1.19.1-24.el9_1.x86_64.rpm �#�krb5-pkinit-1.19.1-24.el9_1.i686.rpm �%�krb5-server-ldap-1.19.1-24.el9_1.i686.rpm �"�krb5-libs-1.19.1-24.el9_1.x86_64.rpm �$�krb5-server-1.19.1-24.el9_1.x86_64.rpm �%�krb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm �&�libkadm5-1.19.1-24.el9_1.x86_64.rpm �"�krb5-libs-1.19.1-24.el9_1.i686.rpm �l�krb5-workstation-1.19.1-24.el9_1.x86_64.rpm �$�krb5-server-1.19.1-24.el9_1.i686.rpm �&�libkadm5-1.19.1-24.el9_1.i686.rpm �#�krb5-pkinit-1.19.1-24.el9_1.x86_64.rpm �����K�(�vsecurity Important: sudo security update 0+���https://access.redhat.com/errata/RHSA-2023:0282 RHSA-2023:0282 RHSA-2023:0282 https://access.redhat.com/security/cve/CVE-2023-22809 CVE-2023-22809 CVE-2023-22809 https://bugzilla.redhat.com/2161142 2161142 https://errata.almalinux.org/9/ALSA-2023-0282.html ALSA-2023:0282 ALSA-2023:0282 �L�sudo-1.9.5p2-7.el9_1.1.x86_64.rpm �L�sudo-1.9.5p2-7.el9_1.1.x86_64.rpm ����O�L�)�xBBBBBBBBsecurity Moderate: curl security update 0���&https://access.redhat.com/errata/RHSA-2023:0333 RHSA-2023:0333 RHSA-2023:0333 https://access.redhat.com/security/cve/CVE-2022-32221 CVE-2022-32221 CVE-2022-32221 https://bugzilla.redhat.com/2135411 2135411 https://errata.almalinux.org/9/ALSA-2023-0333.html ALSA-2023:0333 ALSA-2023:0333 �(�Ccurl-7.76.1-19.el9_1.1.x86_64.rpm {�Clibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm z�Clibcurl-7.76.1-19.el9_1.1.x86_64.rpm z�Clibcurl-7.76.1-19.el9_1.1.i686.rpm {�Clibcurl-minimal-7.76.1-19.el9_1.1.i686.rpm �)�Ccurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm �(�Ccurl-7.76.1-19.el9_1.1.x86_64.rpm {�Clibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm z�Clibcurl-7.76.1-19.el9_1.1.x86_64.rpm z�Clibcurl-7.76.1-19.el9_1.1.i686.rpm {�Clibcurl-minimal-7.76.1-19.el9_1.1.i686.rpm �)�Ccurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm �����M�*�BBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update 0+��D�;https://access.redhat.com/errata/RHSA-2023:0334 RHSA-2023:0334 RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959 CVE-2022-2959 CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 CVE-2022-2964 CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://access.redhat.com/security/cve/CVE-2022-3077 CVE-2022-3077 CVE-2022-3077 https://access.redhat.com/security/cve/CVE-2022-4139 CVE-2022-4139 CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945 CVE-2022-43945 CVE-2022-43945 https://bugzilla.redhat.com/2067482 2067482 https://bugzilla.redhat.com/2085300 2085300 https://bugzilla.redhat.com/2103681 2103681 https://bugzilla.redhat.com/2123309 2123309 https://bugzilla.redhat.com/2141752 2141752 https://bugzilla.redhat.com/2147572 2147572 https://errata.almalinux.org/9/ALSA-2023-0334.html ALSA-2023:0334 ALSA-2023:0334
|kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm 2|python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm 1|bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm |kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm
|kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm 2|python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm 1|bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm |kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm |kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm ����f�N�+�[BBBBBBsecurity Moderate: dbus security update 0���^https://access.redhat.com/errata/RHSA-2023:0335 RHSA-2023:0335 RHSA-2023:0335 https://access.redhat.com/security/cve/CVE-2022-42010 CVE-2022-42010 CVE-2022-42010 https://access.redhat.com/security/cve/CVE-2022-42011 CVE-2022-42011 CVE-2022-42011 https://access.redhat.com/security/cve/CVE-2022-42012 CVE-2022-42012 CVE-2022-42012 https://bugzilla.redhat.com/2133616 2133616 https://bugzilla.redhat.com/2133617 2133617 https://bugzilla.redhat.com/2133618 2133618 https://errata.almalinux.org/9/ALSA-2023-0335.html ALSA-2023:0335 ALSA-2023:0335 �Y�`dbus-1.12.20-7.el9_1.x86_64.rpm �%�`dbus-libs-1.12.20-7.el9_1.x86_64.rpm �Z�`dbus-common-1.12.20-7.el9_1.noarch.rpm �[�`dbus-tools-1.12.20-7.el9_1.x86_64.rpm �%�`dbus-libs-1.12.20-7.el9_1.i686.rpm �Y�`dbus-1.12.20-7.el9_1.x86_64.rpm �%�`dbus-libs-1.12.20-7.el9_1.x86_64.rpm �Z�`dbus-common-1.12.20-7.el9_1.noarch.rpm �[�`dbus-tools-1.12.20-7.el9_1.x86_64.rpm �%�`dbus-libs-1.12.20-7.el9_1.i686.rpm ����}�O�,�cBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update 0��]�Qhttps://access.redhat.com/errata/RHSA-2023:0336 RHSA-2023:0336 RHSA-2023:0336 https://access.redhat.com/security/cve/CVE-2022-3821 CVE-2022-3821 CVE-2022-3821 https://bugzilla.redhat.com/2139327 2139327 https://errata.almalinux.org/9/ALSA-2023-0336.html ALSA-2023:0336 ALSA-2023:0336 �Z�systemd-container-250-12.el9_1.1.x86_64.rpm �[�systemd-libs-250-12.el9_1.1.i686.rpm �[�systemd-libs-250-12.el9_1.1.x86_64.rpm �n�systemd-rpm-macros-250-12.el9_1.1.noarch.rpm �@�systemd-oomd-250-12.el9_1.1.x86_64.rpm �B�systemd-resolved-250-12.el9_1.1.x86_64.rpm �Z�systemd-container-250-12.el9_1.1.i686.rpm �Y�systemd-250-12.el9_1.1.i686.rpm �C�systemd-udev-250-12.el9_1.1.x86_64.rpm �A�systemd-pam-250-12.el9_1.1.x86_64.rpm �Y�systemd-250-12.el9_1.1.x86_64.rpm �Z�systemd-container-250-12.el9_1.1.x86_64.rpm �[�systemd-libs-250-12.el9_1.1.i686.rpm �[�systemd-libs-250-12.el9_1.1.x86_64.rpm �n�systemd-rpm-macros-250-12.el9_1.1.noarch.rpm �@�systemd-oomd-250-12.el9_1.1.x86_64.rpm �B�systemd-resolved-250-12.el9_1.1.x86_64.rpm �Z�systemd-container-250-12.el9_1.1.i686.rpm �Y�systemd-250-12.el9_1.1.i686.rpm �C�systemd-udev-250-12.el9_1.1.x86_64.rpm �A�systemd-pam-250-12.el9_1.1.x86_64.rpm �Y�systemd-250-12.el9_1.1.x86_64.rpm �����P�-�uBsecurity Moderate: expat security update 0��.�}https://access.redhat.com/errata/RHSA-2023:0337 RHSA-2023:0337 RHSA-2023:0337 https://access.redhat.com/security/cve/CVE-2022-43680 CVE-2022-43680 CVE-2022-43680 https://bugzilla.redhat.com/2140059 2140059 https://errata.almalinux.org/9/ALSA-2023-0337.html ALSA-2023:0337 ALSA-2023:0337 � �lexpat-2.4.9-1.el9_1.1.i686.rpm � �lexpat-2.4.9-1.el9_1.1.x86_64.rpm � �lexpat-2.4.9-1.el9_1.1.i686.rpm � �lexpat-2.4.9-1.el9_1.1.x86_64.rpm �����Q�.�xBBBsecurity Moderate: libxml2 security update 0��+�Fhttps://access.redhat.com/errata/RHSA-2023:0338 RHSA-2023:0338 RHSA-2023:0338 https://access.redhat.com/security/cve/CVE-2022-40303 CVE-2022-40303 CVE-2022-40303 https://access.redhat.com/security/cve/CVE-2022-40304 CVE-2022-40304 CVE-2022-40304 https://bugzilla.redhat.com/2136266 2136266 https://bugzilla.redhat.com/2136288 2136288 https://errata.almalinux.org/9/ALSA-2023-0338.html ALSA-2023:0338 ALSA-2023:0338 �
�libxml2-2.9.13-3.el9_1.i686.rpm �
�libxml2-2.9.13-3.el9_1.x86_64.rpm �N�python3-libxml2-2.9.13-3.el9_1.x86_64.rpm �
�libxml2-2.9.13-3.el9_1.i686.rpm �
�libxml2-2.9.13-3.el9_1.x86_64.rpm �N�python3-libxml2-2.9.13-3.el9_1.x86_64.rpm �����R�/�}Bsecurity Moderate: sqlite security update 0��q�<https://access.redhat.com/errata/RHSA-2023:0339 RHSA-2023:0339 RHSA-2023:0339 https://access.redhat.com/security/cve/CVE-2022-35737 CVE-2022-35737 CVE-2022-35737 https://bugzilla.redhat.com/2110291 2110291 https://errata.almalinux.org/9/ALSA-2023-0339.html ALSA-2023:0339 ALSA-2023:0339 �X�sqlite-libs-3.34.1-6.el9_1.i686.rpm �X�sqlite-libs-3.34.1-6.el9_1.x86_64.rpm �X�sqlite-libs-3.34.1-6.el9_1.i686.rpm �X�sqlite-libs-3.34.1-6.el9_1.x86_64.rpm ����~�S��@security Moderate: bash security update 0��-�}https://access.redhat.com/errata/RHSA-2023:0340 RHSA-2023:0340 RHSA-2023:0340 https://access.redhat.com/security/cve/CVE-2022-3715 CVE-2022-3715 CVE-2022-3715 https://bugzilla.redhat.com/2126720 2126720 https://errata.almalinux.org/9/ALSA-2023-0340.html ALSA-2023:0340 ALSA-2023:0340 �O�.bash-5.1.8-6.el9_1.x86_64.rpm �O�.bash-5.1.8-6.el9_1.x86_64.rpm �����T�0�CBsecurity Moderate: libtasn1 security update 0��*�uhttps://access.redhat.com/errata/RHSA-2023:0343 RHSA-2023:0343 RHSA-2023:0343 https://access.redhat.com/security/cve/CVE-2021-46848 CVE-2021-46848 CVE-2021-46848 https://bugzilla.redhat.com/2140058 2140058 https://errata.almalinux.org/9/ALSA-2023-0343.html ALSA-2023:0343 ALSA-2023:0343 �/�libtasn1-4.16.0-8.el9_1.x86_64.rpm �/�libtasn1-4.16.0-8.el9_1.i686.rpm �/�libtasn1-4.16.0-8.el9_1.x86_64.rpm �/�libtasn1-4.16.0-8.el9_1.i686.rpm ����O�U� �FBsecurity Important: libksba security update 0+���Jhttps://access.redhat.com/errata/RHSA-2023:0626 RHSA-2023:0626 RHSA-2023:0626 https://access.redhat.com/security/cve/CVE-2022-47629 CVE-2022-47629 CVE-2022-47629 https://bugzilla.redhat.com/2161571 2161571 https://errata.almalinux.org/9/ALSA-2023-0626.html ALSA-2023:0626 ALSA-2023:0626 �)�alibksba-1.5.1-6.el9_1.x86_64.rpm �)�alibksba-1.5.1-6.el9_1.i686.rpm �)�alibksba-1.5.1-6.el9_1.x86_64.rpm �)�alibksba-1.5.1-6.el9_1.i686.rpm ����s�V��JBBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update 0��i�Chttps://access.redhat.com/errata/RHSA-2023:0752 RHSA-2023:0752 RHSA-2023:0752 https://access.redhat.com/security/cve/CVE-2022-2601 CVE-2022-2601 CVE-2022-2601 https://access.redhat.com/security/cve/CVE-2022-3775 CVE-2022-3775 CVE-2022-3775 https://bugzilla.redhat.com/2112975 2112975 https://bugzilla.redhat.com/2138880 2138880 https://errata.almalinux.org/9/ALSA-2023-0752.html ALSA-2023:0752 ALSA-2023:0752 �i�grub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm �h�grub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm �9�grub2-common-2.06-46.el9_1.3.alma.noarch.rpm �j�grub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm �k�grub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm �:�grub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm ��grub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm �g�grub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm �<�grub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm �;�grub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm �f�grub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm �e�grub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm �i�grub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm �h�grub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm �9�grub2-common-2.06-46.el9_1.3.alma.noarch.rpm �j�grub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm �k�grub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm �:�grub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm ��grub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm �g�grub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm �<�grub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm �;�grub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm �f�grub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm �e�grub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm ����#�W�1�^BBBsecurity Moderate: openssl security and bug fix update 0��,�"https://access.redhat.com/errata/RHSA-2023:0946 RHSA-2023:0946 RHSA-2023:0946 https://access.redhat.com/security/cve/CVE-2022-4203 CVE-2022-4203 CVE-2022-4203 https://access.redhat.com/security/cve/CVE-2022-4304 CVE-2022-4304 CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 CVE-2022-4450 CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 CVE-2023-0215 CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0216 CVE-2023-0216 CVE-2023-0216 https://access.redhat.com/security/cve/CVE-2023-0217 CVE-2023-0217 CVE-2023-0217 https://access.redhat.com/security/cve/CVE-2023-0286 CVE-2023-0286 CVE-2023-0286 https://access.redhat.com/security/cve/CVE-2023-0401 CVE-2023-0401 CVE-2023-0401 https://bugzilla.redhat.com/2164440 2164440 https://bugzilla.redhat.com/2164487 2164487 https://bugzilla.redhat.com/2164488 2164488 https://bugzilla.redhat.com/2164492 2164492 https://bugzilla.redhat.com/2164494 2164494 https://bugzilla.redhat.com/2164497 2164497 https://bugzilla.redhat.com/2164499 2164499 https://bugzilla.redhat.com/2164500 2164500 https://errata.almalinux.org/9/ALSA-2023-0946.html ALSA-2023:0946 ALSA-2023:0946 ��ropenssl-libs-3.0.1-47.el9_1.i686.rpm �7�ropenssl-3.0.1-47.el9_1.x86_64.rpm ��ropenssl-libs-3.0.1-47.el9_1.x86_64.rpm ��ropenssl-libs-3.0.1-47.el9_1.i686.rpm �7�ropenssl-3.0.1-47.el9_1.x86_64.rpm ��ropenssl-libs-3.0.1-47.el9_1.x86_64.rpm ����r�X�2�cBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update 0+��N�~https://access.redhat.com/errata/RHSA-2023:0951 RHSA-2023:0951 RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873 CVE-2022-2873 CVE-2022-2873 https://access.redhat.com/security/cve/CVE-2022-3564 CVE-2022-3564 CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-4378 CVE-2022-4378 CVE-2022-4378 https://access.redhat.com/security/cve/CVE-2022-4379 CVE-2022-4379 CVE-2022-4379 https://access.redhat.com/security/cve/CVE-2023-0179 CVE-2023-0179 CVE-2023-0179 https://bugzilla.redhat.com/2119048 2119048 https://bugzilla.redhat.com/2150999 2150999 https://bugzilla.redhat.com/2152548 2152548 https://bugzilla.redhat.com/2152807 2152807 https://bugzilla.redhat.com/2161713 2161713 https://errata.almalinux.org/9/ALSA-2023-0951.html ALSA-2023:0951 ALSA-2023:0951
}kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm }kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm 1}bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm 2}python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm
}kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm }kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm 1}bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm 2}python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm }kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm �����Y�>�|security Moderate: python-setuptools security update 0��L�^https://access.redhat.com/errata/RHSA-2023:0952 RHSA-2023:0952 RHSA-2023:0952 https://access.redhat.com/security/cve/CVE-2022-40897 CVE-2022-40897 CVE-2022-40897 https://bugzilla.redhat.com/2158559 2158559 https://errata.almalinux.org/9/ALSA-2023-0952.html ALSA-2023:0952 ALSA-2023:0952 �F�Fpython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm �E�Fpython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm �F�Fpython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm �E�Fpython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm ����l�Z�3�BBBsecurity Moderate: python3.9 security update 0��*�9https://access.redhat.com/errata/RHSA-2023:0953 RHSA-2023:0953 RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061 CVE-2022-45061 CVE-2022-45061 https://bugzilla.redhat.com/2144072 2144072 https://errata.almalinux.org/9/ALSA-2023-0953.html ALSA-2023:0953 ALSA-2023:0953 ��
python3-3.9.14-1.el9_1.2.x86_64.rpm -�
python3-libs-3.9.14-1.el9_1.2.i686.rpm -�
python3-libs-3.9.14-1.el9_1.2.x86_64.rpm ��
python3-3.9.14-1.el9_1.2.x86_64.rpm -�
python3-libs-3.9.14-1.el9_1.2.i686.rpm -�
python3-libs-3.9.14-1.el9_1.2.x86_64.rpm ����I�[�4�DBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update 0��c�]https://access.redhat.com/errata/RHSA-2023:0954 RHSA-2023:0954 RHSA-2023:0954 https://access.redhat.com/security/cve/CVE-2022-4415 CVE-2022-4415 CVE-2022-4415 https://access.redhat.com/security/cve/CVE-2022-45873 CVE-2022-45873 CVE-2022-45873 https://bugzilla.redhat.com/2149063 2149063 https://bugzilla.redhat.com/2155515 2155515 https://errata.almalinux.org/9/ALSA-2023-0954.html ALSA-2023:0954 ALSA-2023:0954 �[�systemd-libs-250-12.el9_1.3.x86_64.rpm �B�systemd-resolved-250-12.el9_1.3.x86_64.rpm �C�systemd-udev-250-12.el9_1.3.x86_64.rpm �Y�systemd-250-12.el9_1.3.i686.rpm �@�systemd-oomd-250-12.el9_1.3.x86_64.rpm �Z�systemd-container-250-12.el9_1.3.x86_64.rpm �Y�systemd-250-12.el9_1.3.x86_64.rpm �[�systemd-libs-250-12.el9_1.3.i686.rpm �Z�systemd-container-250-12.el9_1.3.i686.rpm �n�systemd-rpm-macros-250-12.el9_1.3.noarch.rpm �A�systemd-pam-250-12.el9_1.3.x86_64.rpm �[�systemd-libs-250-12.el9_1.3.x86_64.rpm �B�systemd-resolved-250-12.el9_1.3.x86_64.rpm �C�systemd-udev-250-12.el9_1.3.x86_64.rpm �Y�systemd-250-12.el9_1.3.i686.rpm �@�systemd-oomd-250-12.el9_1.3.x86_64.rpm �Z�systemd-container-250-12.el9_1.3.x86_64.rpm �Y�systemd-250-12.el9_1.3.x86_64.rpm �[�systemd-libs-250-12.el9_1.3.i686.rpm �Z�systemd-container-250-12.el9_1.3.i686.rpm �n�systemd-rpm-macros-250-12.el9_1.3.noarch.rpm �A�systemd-pam-250-12.el9_1.3.x86_64.rpm ����|�\�5�VBsecurity Moderate: lua security update 0��@�8https://access.redhat.com/errata/RHSA-2023:0957 RHSA-2023:0957 RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519 CVE-2021-43519 CVE-2021-43519 https://access.redhat.com/security/cve/CVE-2021-44964 CVE-2021-44964 CVE-2021-44964 https://bugzilla.redhat.com/2047672 2047672 https://bugzilla.redhat.com/2064772 2064772 https://errata.almalinux.org/9/ALSA-2023-0957.html ALSA-2023:0957 ALSA-2023:0957 ��lua-libs-5.4.4-2.el9_1.x86_64.rpm ��lua-libs-5.4.4-2.el9_1.i686.rpm ��lua-libs-5.4.4-2.el9_1.x86_64.rpm ��lua-libs-5.4.4-2.el9_1.i686.rpm ����b�]�6�YBsecurity Moderate: vim security update 0��x�ehttps://access.redhat.com/errata/RHSA-2023:0958 RHSA-2023:0958 RHSA-2023:0958 https://access.redhat.com/security/cve/CVE-2022-47024 CVE-2022-47024 CVE-2022-47024 https://bugzilla.redhat.com/2163613 2163613 https://errata.almalinux.org/9/ALSA-2023-0958.html ALSA-2023:0958 ALSA-2023:0958 �r�|vim-minimal-8.2.2637-20.el9_1.x86_64.rpm �=�|vim-filesystem-8.2.2637-20.el9_1.noarch.rpm �r�|vim-minimal-8.2.2637-20.el9_1.x86_64.rpm �=�|vim-filesystem-8.2.2637-20.el9_1.noarch.rpm ����A�^��\security Moderate: tar security update 0��]�https://access.redhat.com/errata/RHSA-2023:0959 RHSA-2023:0959 RHSA-2023:0959 https://access.redhat.com/security/cve/CVE-2022-48303 CVE-2022-48303 CVE-2022-48303 https://bugzilla.redhat.com/2149722 2149722 https://errata.almalinux.org/9/ALSA-2023-0959.html ALSA-2023:0959 ALSA-2023:0959 ��"tar-1.34-6.el9_1.x86_64.rpm ��"tar-1.34-6.el9_1.x86_64.rpm ����r�_�7�_Bsecurity Moderate: gnutls security and bug fix update 0��s�https://access.redhat.com/errata/RHSA-2023:1141 RHSA-2023:1141 RHSA-2023:1141 https://access.redhat.com/security/cve/CVE-2023-0361 CVE-2023-0361 CVE-2023-0361 https://bugzilla.redhat.com/2162596 2162596 https://errata.almalinux.org/9/ALSA-2023-1141.html ALSA-2023:1141 ALSA-2023:1141 �!�gnutls-3.7.6-18.el9_1.x86_64.rpm �!�gnutls-3.7.6-18.el9_1.i686.rpm �!�gnutls-3.7.6-18.el9_1.x86_64.rpm �!�gnutls-3.7.6-18.el9_1.i686.rpm �����`�8�bBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update 0+���Yhttps://access.redhat.com/errata/RHSA-2023:1470 RHSA-2023:1470 RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269 CVE-2022-4269 CVE-2022-4269 https://access.redhat.com/security/cve/CVE-2022-4744 CVE-2022-4744 CVE-2022-4744 https://access.redhat.com/security/cve/CVE-2023-0266 CVE-2023-0266 CVE-2023-0266 https://bugzilla.redhat.com/2150272 2150272 https://bugzilla.redhat.com/2156322 2156322 https://bugzilla.redhat.com/2163379 2163379 https://errata.almalinux.org/9/ALSA-2023-1470.html ALSA-2023:1470 ALSA-2023:1470
~kernel-5.14.0-162.22.2.el9_1.x86_64.rpm 1~bpftool-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-core-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm 2~python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpm ~kernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm
~kernel-5.14.0-162.22.2.el9_1.x86_64.rpm 1~bpftool-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-core-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm 2~python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpm ~kernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpm ~kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm ����C�a�9�{BBBBBBBBsecurity Moderate: curl security update 0��k�9https://access.redhat.com/errata/RHSA-2023:1701 RHSA-2023:1701 RHSA-2023:1701 https://access.redhat.com/security/cve/CVE-2023-23916 CVE-2023-23916 CVE-2023-23916 https://bugzilla.redhat.com/2167815 2167815 https://errata.almalinux.org/9/ALSA-2023-1701.html ALSA-2023:1701 ALSA-2023:1701 z�Dlibcurl-7.76.1-19.el9_1.2.x86_64.rpm z�Dlibcurl-7.76.1-19.el9_1.2.i686.rpm {�Dlibcurl-minimal-7.76.1-19.el9_1.2.i686.rpm �(�Dcurl-7.76.1-19.el9_1.2.x86_64.rpm {�Dlibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm �)�Dcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm z�Dlibcurl-7.76.1-19.el9_1.2.x86_64.rpm z�Dlibcurl-7.76.1-19.el9_1.2.i686.rpm {�Dlibcurl-minimal-7.76.1-19.el9_1.2.i686.rpm �(�Dcurl-7.76.1-19.el9_1.2.x86_64.rpm {�Dlibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm �)�Dcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm �����b�:�EBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update 0+��$�4https://access.redhat.com/errata/RHSA-2023:1703 RHSA-2023:1703 RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386 CVE-2023-0386 CVE-2023-0386 https://bugzilla.redhat.com/2159505 2159505 https://errata.almalinux.org/9/ALSA-2023-1703.html ALSA-2023:1703 ALSA-2023:1703
1bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm 2python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm kernel-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm
1bpftool-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm 2python3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm kernel-5.14.0-162.23.1.el9_1.x86_64.rpm kernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm �����c�;�^BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: samba security update 0+��X�https://access.redhat.com/errata/RHSA-2023:2127 RHSA-2023:2127 RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023 CVE-2022-38023 CVE-2022-38023 https://bugzilla.redhat.com/2154362 2154362 https://errata.almalinux.org/9/ALSA-2023-2127.html ALSA-2023:2127 ALSA-2023:2127 �4>samba-winbind-modules-4.16.4-103.el9_1.i686.rpm �1>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm �/>libwbclient-4.16.4-103.el9_1.x86_64.rpm �W>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm �4>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm �3>samba-libs-4.16.4-103.el9_1.i686.rpm �.>libsmbclient-4.16.4-103.el9_1.x86_64.rpm �1>samba-client-libs-4.16.4-103.el9_1.i686.rpm �0>python3-samba-4.16.4-103.el9_1.i686.rpm �2>samba-common-libs-4.16.4-103.el9_1.i686.rpm �V>samba-4.16.4-103.el9_1.x86_64.rpm �0>python3-samba-4.16.4-103.el9_1.x86_64.rpm �3>samba-libs-4.16.4-103.el9_1.x86_64.rpm �2>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm �/>libwbclient-4.16.4-103.el9_1.i686.rpm �q>samba-common-4.16.4-103.el9_1.noarch.rpm �.>libsmbclient-4.16.4-103.el9_1.i686.rpm �X>samba-winbind-4.16.4-103.el9_1.x86_64.rpm �4>samba-winbind-modules-4.16.4-103.el9_1.i686.rpm �1>samba-client-libs-4.16.4-103.el9_1.x86_64.rpm �/>libwbclient-4.16.4-103.el9_1.x86_64.rpm �W>samba-common-tools-4.16.4-103.el9_1.x86_64.rpm �4>samba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm �3>samba-libs-4.16.4-103.el9_1.i686.rpm �.>libsmbclient-4.16.4-103.el9_1.x86_64.rpm �1>samba-client-libs-4.16.4-103.el9_1.i686.rpm �0>python3-samba-4.16.4-103.el9_1.i686.rpm �2>samba-common-libs-4.16.4-103.el9_1.i686.rpm �V>samba-4.16.4-103.el9_1.x86_64.rpm �0>python3-samba-4.16.4-103.el9_1.x86_64.rpm �3>samba-libs-4.16.4-103.el9_1.x86_64.rpm �2>samba-common-libs-4.16.4-103.el9_1.x86_64.rpm �/>libwbclient-4.16.4-103.el9_1.i686.rpm �q>samba-common-4.16.4-103.el9_1.noarch.rpm �.>libsmbclient-4.16.4-103.el9_1.i686.rpm �X>samba-winbind-4.16.4-103.el9_1.x86_64.rpm ��ӿ/�d�<�zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update 0+��l�SRhttps://access.redhat.com/errata/RHSA-2023:2458 RHSA-2023:2458 RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341 CVE-2021-26341 CVE-2021-26341 https://access.redhat.com/security/cve/CVE-2021-33655 CVE-2021-33655 CVE-2021-33655 https://access.redhat.com/security/cve/CVE-2022-1462 CVE-2022-1462 CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-1789 CVE-2022-1789 CVE-2022-1789 https://access.redhat.com/security/cve/CVE-2022-1882 CVE-2022-1882 CVE-2022-1882 https://access.redhat.com/security/cve/CVE-2022-20141 CVE-2022-20141 CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-21505 CVE-2022-21505 CVE-2022-21505 https://access.redhat.com/security/cve/CVE-2022-2196 CVE-2022-2196 CVE-2022-2196 https://access.redhat.com/security/cve/CVE-2022-2663 CVE-2022-2663 CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-28388 CVE-2022-28388 CVE-2022-28388 https://access.redhat.com/security/cve/CVE-2022-3028 CVE-2022-3028 CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-33743 CVE-2022-33743 CVE-2022-33743 https://access.redhat.com/security/cve/CVE-2022-3435 CVE-2022-3435 CVE-2022-3435 https://access.redhat.com/security/cve/CVE-2022-3522 CVE-2022-3522 CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3524 CVE-2022-3524 CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3566 CVE-2022-3566 CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3567 CVE-2022-3567 CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3619 CVE-2022-3619 CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 CVE-2022-3623 CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3625 CVE-2022-3625 CVE-2022-3625 https://access.redhat.com/security/cve/CVE-2022-3628 CVE-2022-3628 CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-3640 CVE-2022-3640 CVE-2022-3640 https://access.redhat.com/security/cve/CVE-2022-3707 CVE-2022-3707 CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-39188 CVE-2022-39188 CVE-2022-39188 https://access.redhat.com/security/cve/CVE-2022-39189 CVE-2022-39189 CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-4128 CVE-2022-4128 CVE-2022-4128 https://access.redhat.com/security/cve/CVE-2022-4129 CVE-2022-4129 CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-41674 CVE-2022-41674 CVE-2022-41674 https://access.redhat.com/security/cve/CVE-2022-42703 CVE-2022-42703 CVE-2022-42703 https://access.redhat.com/security/cve/CVE-2022-42720 CVE-2022-42720 CVE-2022-42720 https://access.redhat.com/security/cve/CVE-2022-42721 CVE-2022-42721 CVE-2022-42721 https://access.redhat.com/security/cve/CVE-2022-42722 CVE-2022-42722 CVE-2022-42722 https://access.redhat.com/security/cve/CVE-2022-42896 CVE-2022-42896 CVE-2022-42896 https://access.redhat.com/security/cve/CVE-2022-43750 CVE-2022-43750 CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 CVE-2022-47929 CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 CVE-2023-0394 CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-0461 CVE-2023-0461 CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-0590 CVE-2023-0590 CVE-2023-0590 https://access.redhat.com/security/cve/CVE-2023-1195 CVE-2023-1195 CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1382 CVE-2023-1382 CVE-2023-1382 https://bugzilla.redhat.com/2061703 2061703 https://bugzilla.redhat.com/2073091 2073091 https://bugzilla.redhat.com/2078466 2078466 https://bugzilla.redhat.com/2089701 2089701 https://bugzilla.redhat.com/2090723 2090723 https://bugzilla.redhat.com/2106830 2106830 https://bugzilla.redhat.com/2107924 2107924 https://bugzilla.redhat.com/2108691 2108691 https://bugzilla.redhat.com/2114937 2114937 https://bugzilla.redhat.com/2122228 2122228 https://bugzilla.redhat.com/2123056 2123056 https://bugzilla.redhat.com/2124788 2124788 https://bugzilla.redhat.com/2130141 2130141 https://bugzilla.redhat.com/2133483 2133483 https://bugzilla.redhat.com/2133490 2133490 https://bugzilla.redhat.com/2134377 2134377 https://bugzilla.redhat.com/2134380 2134380 https://bugzilla.redhat.com/2134451 2134451 https://bugzilla.redhat.com/2134506 2134506 https://bugzilla.redhat.com/2134517 2134517 https://bugzilla.redhat.com/2134528 2134528 https://bugzilla.redhat.com/2137979 2137979 https://bugzilla.redhat.com/2139610 2139610 https://bugzilla.redhat.com/2143893 2143893 https://bugzilla.redhat.com/2143943 2143943 https://bugzilla.redhat.com/2144720 2144720 https://bugzilla.redhat.com/2147364 2147364 https://bugzilla.redhat.com/2150947 2150947 https://bugzilla.redhat.com/2150960 2150960 https://bugzilla.redhat.com/2150979 2150979 https://bugzilla.redhat.com/2151270 2151270 https://bugzilla.redhat.com/2154171 2154171 https://bugzilla.redhat.com/2154235 2154235 https://bugzilla.redhat.com/2160023 2160023 https://bugzilla.redhat.com/2162120 2162120 https://bugzilla.redhat.com/2165721 2165721 https://bugzilla.redhat.com/2165741 2165741 https://bugzilla.redhat.com/2168246 2168246 https://bugzilla.redhat.com/2176192 2176192 https://bugzilla.redhat.com/2177371 2177371 https://errata.almalinux.org/9/ALSA-2023-2458.html ALSA-2023:2458 ALSA-2023:2458 ?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm "?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm ?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm !?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm 1�4bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm 2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm "?kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm ?kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm !?kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm 1�4bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm 2?python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm ?kernel-5.14.0-284.11.1.el9_2.x86_64.rpm ����[�e�"�[BBBBBsecurity Moderate: device-mapper-multipath security and bug fix update 0��?�]https://access.redhat.com/errata/RHSA-2023:2459 RHSA-2023:2459 RHSA-2023:2459 https://access.redhat.com/security/cve/CVE-2022-41973 CVE-2022-41973 CVE-2022-41973 https://bugzilla.redhat.com/2123894 2123894 https://errata.almalinux.org/9/ALSA-2023-2459.html ALSA-2023:2459 ALSA-2023:2459 �j�{kpartx-0.8.7-20.el9.x86_64.rpm �J�{device-mapper-multipath-0.8.7-20.el9.x86_64.rpm �&�{device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm �&�{device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm �j�{kpartx-0.8.7-20.el9.x86_64.rpm �J�{device-mapper-multipath-0.8.7-20.el9.x86_64.rpm �&�{device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm �&�{device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm �����f�=�cBBBBBBBBsecurity Low: curl security update 0�6���"https://access.redhat.com/errata/RHSA-2023:2478 RHSA-2023:2478 RHSA-2023:2478 https://access.redhat.com/security/cve/CVE-2022-35252 CVE-2022-35252 CVE-2022-35252 https://access.redhat.com/security/cve/CVE-2022-43552 CVE-2022-43552 CVE-2022-43552 https://bugzilla.redhat.com/2120718 2120718 https://bugzilla.redhat.com/2152652 2152652 https://errata.almalinux.org/9/ALSA-2023-2478.html ALSA-2023:2478 ALSA-2023:2478 z�Elibcurl-7.76.1-23.el9.i686.rpm �(�Ecurl-7.76.1-23.el9.x86_64.rpm {�Elibcurl-minimal-7.76.1-23.el9.i686.rpm z�Elibcurl-7.76.1-23.el9.x86_64.rpm {�Elibcurl-minimal-7.76.1-23.el9.x86_64.rpm �)�Ecurl-minimal-7.76.1-23.el9.x86_64.rpm z�Elibcurl-7.76.1-23.el9.i686.rpm �(�Ecurl-7.76.1-23.el9.x86_64.rpm {�Elibcurl-minimal-7.76.1-23.el9.i686.rpm z�Elibcurl-7.76.1-23.el9.x86_64.rpm {�Elibcurl-minimal-7.76.1-23.el9.x86_64.rpm �)�Ecurl-minimal-7.76.1-23.el9.x86_64.rpm ����c�g�>�msecurity Moderate: fwupd security and bug fix update 0��>�M
https://access.redhat.com/errata/RHSA-2023:2487 RHSA-2023:2487 RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287 CVE-2022-3287 CVE-2022-3287 https://access.redhat.com/security/cve/CVE-2022-34301 CVE-2022-34301 CVE-2022-34301 https://access.redhat.com/security/cve/CVE-2022-34302 CVE-2022-34302 CVE-2022-34302 https://access.redhat.com/security/cve/CVE-2022-34303 CVE-2022-34303 CVE-2022-34303 https://bugzilla.redhat.com/2120687 2120687 https://bugzilla.redhat.com/2120699 2120699 https://bugzilla.redhat.com/2120701 2120701 https://bugzilla.redhat.com/2129904 2129904 https://errata.almalinux.org/9/ALSA-2023-2487.html ALSA-2023:2487 ALSA-2023:2487 �Y�fwupd-1.8.10-2.el9.alma.x86_64.rpm �Y�fwupd-1.8.10-2.el9.alma.x86_64.rpm ����}�h�6�oBBBBBsecurity Moderate: dhcp security and enhancement update 0���Ahttps://access.redhat.com/errata/RHSA-2023:2502 RHSA-2023:2502 RHSA-2023:2502 https://access.redhat.com/security/cve/CVE-2022-2928 CVE-2022-2928 CVE-2022-2928 https://access.redhat.com/security/cve/CVE-2022-2929 CVE-2022-2929 CVE-2022-2929 https://bugzilla.redhat.com/2132001 2132001 https://bugzilla.redhat.com/2132002 2132002 https://errata.almalinux.org/9/ALSA-2023-2502.html ALSA-2023:2502 ALSA-2023:2502 �]�~dhcp-common-4.4.2-18.b1.el9.noarch.rpm �\�~dhcp-client-4.4.2-18.b1.el9.x86_64.rpm �^�~dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm �_�~dhcp-server-4.4.2-18.b1.el9.x86_64.rpm �]�~dhcp-common-4.4.2-18.b1.el9.noarch.rpm �\�~dhcp-client-4.4.2-18.b1.el9.x86_64.rpm �^�~dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm �_�~dhcp-server-4.4.2-18.b1.el9.x86_64.rpm �����i�?�wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Low: samba security, bug fix, and enhancement update 0�6��L�https://access.redhat.com/errata/RHSA-2023:2519 RHSA-2023:2519 RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615 CVE-2022-1615 CVE-2022-1615 https://bugzilla.redhat.com/2122649 2122649 https://errata.almalinux.org/9/ALSA-2023-2519.html ALSA-2023:2519 ALSA-2023:2519 �W'samba-dc-libs-4.17.5-102.el9.i686.rpm �>'samba-tools-4.17.5-102.el9.x86_64.rpm �q'samba-common-4.17.5-102.el9.noarch.rpm �?'samba-usershares-4.17.5-102.el9.x86_64.rpm �/'libwbclient-4.17.5-102.el9.x86_64.rpm �.'libsmbclient-4.17.5-102.el9.i686.rpm �W'samba-common-tools-4.17.5-102.el9.x86_64.rpm �1'samba-client-libs-4.17.5-102.el9.x86_64.rpm �3'samba-libs-4.17.5-102.el9.i686.rpm �<'samba-dcerpc-4.17.5-102.el9.x86_64.rpm �4'samba-winbind-modules-4.17.5-102.el9.x86_64.rpm �V'libnetapi-4.17.5-102.el9.x86_64.rpm �:'python3-samba-dc-4.17.5-102.el9.x86_64.rpm �='samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm �.'libsmbclient-4.17.5-102.el9.x86_64.rpm �2'samba-common-libs-4.17.5-102.el9.x86_64.rpm �/'libwbclient-4.17.5-102.el9.i686.rpm �1'samba-client-libs-4.17.5-102.el9.i686.rpm �V'libnetapi-4.17.5-102.el9.i686.rpm �4'samba-winbind-modules-4.17.5-102.el9.i686.rpm �3'samba-libs-4.17.5-102.el9.x86_64.rpm �0'python3-samba-4.17.5-102.el9.i686.rpm �X'samba-winbind-4.17.5-102.el9.x86_64.rpm �W'samba-dc-libs-4.17.5-102.el9.x86_64.rpm �V'samba-4.17.5-102.el9.x86_64.rpm �0'python3-samba-4.17.5-102.el9.x86_64.rpm �2'samba-common-libs-4.17.5-102.el9.i686.rpm �W'samba-dc-libs-4.17.5-102.el9.i686.rpm �>'samba-tools-4.17.5-102.el9.x86_64.rpm �q'samba-common-4.17.5-102.el9.noarch.rpm �?'samba-usershares-4.17.5-102.el9.x86_64.rpm �/'libwbclient-4.17.5-102.el9.x86_64.rpm �.'libsmbclient-4.17.5-102.el9.i686.rpm �W'samba-common-tools-4.17.5-102.el9.x86_64.rpm �1'samba-client-libs-4.17.5-102.el9.x86_64.rpm �3'samba-libs-4.17.5-102.el9.i686.rpm �<'samba-dcerpc-4.17.5-102.el9.x86_64.rpm �4'samba-winbind-modules-4.17.5-102.el9.x86_64.rpm �V'libnetapi-4.17.5-102.el9.x86_64.rpm �:'python3-samba-dc-4.17.5-102.el9.x86_64.rpm �='samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm �.'libsmbclient-4.17.5-102.el9.x86_64.rpm �2'samba-common-libs-4.17.5-102.el9.x86_64.rpm �/'libwbclient-4.17.5-102.el9.i686.rpm �1'samba-client-libs-4.17.5-102.el9.i686.rpm �V'libnetapi-4.17.5-102.el9.i686.rpm �4'samba-winbind-modules-4.17.5-102.el9.i686.rpm �3'samba-libs-4.17.5-102.el9.x86_64.rpm �0'python3-samba-4.17.5-102.el9.i686.rpm �X'samba-winbind-4.17.5-102.el9.x86_64.rpm �W'samba-dc-libs-4.17.5-102.el9.x86_64.rpm �V'samba-4.17.5-102.el9.x86_64.rpm �0'python3-samba-4.17.5-102.el9.x86_64.rpm �2'samba-common-libs-4.17.5-102.el9.i686.rpm ����l�j� �cBBBsecurity Low: openssl security and bug fix update 0�6��P�phttps://access.redhat.com/errata/RHSA-2023:2523 RHSA-2023:2523 RHSA-2023:2523 https://access.redhat.com/security/cve/CVE-2022-3358 CVE-2022-3358 CVE-2022-3358 https://bugzilla.redhat.com/2134740 2134740 https://errata.almalinux.org/9/ALSA-2023-2523.html ALSA-2023:2523 ALSA-2023:2523 ��wopenssl-libs-3.0.7-6.el9_2.x86_64.rpm ��wopenssl-libs-3.0.7-6.el9_2.i686.rpm �7�wopenssl-3.0.7-6.el9_2.x86_64.rpm ��wopenssl-libs-3.0.7-6.el9_2.x86_64.rpm ��wopenssl-libs-3.0.7-6.el9_2.i686.rpm �7�wopenssl-3.0.7-6.el9_2.x86_64.rpm ����B�k��hBsecurity Low: libarchive security update 0�6��@�Yhttps://access.redhat.com/errata/RHSA-2023:2532 RHSA-2023:2532 RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227 CVE-2022-36227 CVE-2022-36227 https://bugzilla.redhat.com/2144972 2144972 https://errata.almalinux.org/9/ALSA-2023-2532.html ALSA-2023:2532 ALSA-2023:2532 �?�libarchive-3.5.3-4.el9.i686.rpm �?�libarchive-3.5.3-4.el9.x86_64.rpm �?�libarchive-3.5.3-4.el9.i686.rpm �?�libarchive-3.5.3-4.el9.x86_64.rpm �����l��kBBBBBBBBBBBBBBBsecurity Moderate: krb5 security, bug fix, and enhancement update 0���Whttps://access.redhat.com/errata/RHSA-2023:2570 RHSA-2023:2570 RHSA-2023:2570 https://access.redhat.com/security/cve/CVE-2020-17049 CVE-2020-17049 CVE-2020-17049 https://bugzilla.redhat.com/2025721 2025721 https://errata.almalinux.org/9/ALSA-2023-2570.html ALSA-2023:2570 ALSA-2023:2570 �%�krb5-server-ldap-1.20.1-8.el9.x86_64.rpm �"�krb5-libs-1.20.1-8.el9.x86_64.rpm �"�krb5-libs-1.20.1-8.el9.i686.rpm �$�krb5-server-1.20.1-8.el9.x86_64.rpm �l�krb5-workstation-1.20.1-8.el9.x86_64.rpm �&�libkadm5-1.20.1-8.el9.i686.rpm �#�krb5-pkinit-1.20.1-8.el9.x86_64.rpm �$�krb5-server-1.20.1-8.el9.i686.rpm �&�libkadm5-1.20.1-8.el9.x86_64.rpm �#�krb5-pkinit-1.20.1-8.el9.i686.rpm �%�krb5-server-ldap-1.20.1-8.el9.i686.rpm �%�krb5-server-ldap-1.20.1-8.el9.x86_64.rpm �"�krb5-libs-1.20.1-8.el9.x86_64.rpm �"�krb5-libs-1.20.1-8.el9.i686.rpm �$�krb5-server-1.20.1-8.el9.x86_64.rpm �l�krb5-workstation-1.20.1-8.el9.x86_64.rpm �&�libkadm5-1.20.1-8.el9.i686.rpm �#�krb5-pkinit-1.20.1-8.el9.x86_64.rpm �$�krb5-server-1.20.1-8.el9.i686.rpm �&�libkadm5-1.20.1-8.el9.x86_64.rpm �#�krb5-pkinit-1.20.1-8.el9.i686.rpm �%�krb5-server-ldap-1.20.1-8.el9.i686.rpm ����-�m��|Bsecurity Low: lua security update 0�6��p�Rhttps://access.redhat.com/errata/RHSA-2023:2582 RHSA-2023:2582 RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805 CVE-2022-28805 CVE-2022-28805 https://bugzilla.redhat.com/2073884 2073884 https://errata.almalinux.org/9/ALSA-2023-2582.html ALSA-2023:2582 ALSA-2023:2582 ��lua-libs-5.4.4-3.el9.x86_64.rpm ��lua-libs-5.4.4-3.el9.i686.rpm ��lua-libs-5.4.4-3.el9.x86_64.rpm ��lua-libs-5.4.4-3.el9.i686.rpm ����n�n��BBBBBBsecurity Moderate: openssh security update 0��B�https://access.redhat.com/errata/RHSA-2023:2645 RHSA-2023:2645 RHSA-2023:2645 https://access.redhat.com/security/cve/CVE-2023-25136 CVE-2023-25136 CVE-2023-25136 https://bugzilla.redhat.com/2167636 2167636 https://errata.almalinux.org/9/ALSA-2023-2645.html ALSA-2023:2645 ALSA-2023:2645 �o�sopenssh-keycat-8.7p1-29.el9_2.x86_64.rpm �m�sopenssh-8.7p1-29.el9_2.x86_64.rpm �n�sopenssh-clients-8.7p1-29.el9_2.x86_64.rpm �p�sopenssh-server-8.7p1-29.el9_2.x86_64.rpm �o�sopenssh-keycat-8.7p1-29.el9_2.x86_64.rpm �m�sopenssh-8.7p1-29.el9_2.x86_64.rpm �n�sopenssh-clients-8.7p1-29.el9_2.x86_64.rpm �p�sopenssh-server-8.7p1-29.el9_2.x86_64.rpm ����I�o��GBBBBBBBBsecurity Moderate: curl security update 0��J�(https://access.redhat.com/errata/RHSA-2023:2650 RHSA-2023:2650 RHSA-2023:2650 https://access.redhat.com/security/cve/CVE-2023-27535 CVE-2023-27535 CVE-2023-27535 https://bugzilla.redhat.com/2179073 2179073 https://errata.almalinux.org/9/ALSA-2023-2650.html ALSA-2023:2650 ALSA-2023:2650 �(�Fcurl-7.76.1-23.el9_2.1.x86_64.rpm z�Flibcurl-7.76.1-23.el9_2.1.x86_64.rpm �)�Fcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm {�Flibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm z�Flibcurl-7.76.1-23.el9_2.1.i686.rpm {�Flibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm �(�Fcurl-7.76.1-23.el9_2.1.x86_64.rpm z�Flibcurl-7.76.1-23.el9_2.1.x86_64.rpm �)�Fcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm {�Flibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm z�Flibcurl-7.76.1-23.el9_2.1.i686.rpm {�Flibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm ����C�p��QBsecurity Important: c-ares security update 0+��r�https://access.redhat.com/errata/RHSA-2023:3559 RHSA-2023:3559 RHSA-2023:3559 https://access.redhat.com/security/cve/CVE-2023-32067 CVE-2023-32067 CVE-2023-32067 https://bugzilla.redhat.com/2209502 2209502 https://errata.almalinux.org/9/ALSA-2023-3559.html ALSA-2023:3559 ALSA-2023:3559 ��Sc-ares-1.17.1-5.el9_2.1.x86_64.rpm ��Sc-ares-1.17.1-5.el9_2.1.i686.rpm ��Sc-ares-1.17.1-5.el9_2.1.x86_64.rpm ��Sc-ares-1.17.1-5.el9_2.1.i686.rpm ����|�q��TBBBsecurity Important: python3.9 security update 0+��q�+https://access.redhat.com/errata/RHSA-2023:3595 RHSA-2023:3595 RHSA-2023:3595 https://access.redhat.com/security/cve/CVE-2023-24329 CVE-2023-24329 CVE-2023-24329 https://bugzilla.redhat.com/2173917 2173917 https://errata.almalinux.org/9/ALSA-2023-3595.html ALSA-2023:3595 ALSA-2023:3595 -�python3-libs-3.9.16-1.el9_2.1.x86_64.rpm -�python3-libs-3.9.16-1.el9_2.1.i686.rpm ��python3-3.9.16-1.el9_2.1.x86_64.rpm -�python3-libs-3.9.16-1.el9_2.1.x86_64.rpm -�python3-libs-3.9.16-1.el9_2.1.i686.rpm ��python3-3.9.16-1.el9_2.1.x86_64.rpm ����u�r��YBBBsecurity Moderate: openssl security and bug fix update 0���Vhttps://access.redhat.com/errata/RHSA-2023:3722 RHSA-2023:3722 RHSA-2023:3722 https://access.redhat.com/security/cve/CVE-2023-0464 CVE-2023-0464 CVE-2023-0464 https://access.redhat.com/security/cve/CVE-2023-0465 CVE-2023-0465 CVE-2023-0465 https://access.redhat.com/security/cve/CVE-2023-0466 CVE-2023-0466 CVE-2023-0466 https://access.redhat.com/security/cve/CVE-2023-1255 CVE-2023-1255 CVE-2023-1255 https://access.redhat.com/security/cve/CVE-2023-2650 CVE-2023-2650 CVE-2023-2650 https://bugzilla.redhat.com/2181082 2181082 https://bugzilla.redhat.com/2182561 2182561 https://bugzilla.redhat.com/2182565 2182565 https://bugzilla.redhat.com/2188461 2188461 https://bugzilla.redhat.com/2207947 2207947 https://errata.almalinux.org/9/ALSA-2023-3722.html ALSA-2023:3722 ALSA-2023:3722 ��sopenssl-libs-3.0.7-16.el9_2.i686.rpm ��sopenssl-libs-3.0.7-16.el9_2.x86_64.rpm �7�sopenssl-3.0.7-16.el9_2.x86_64.rpm ��sopenssl-libs-3.0.7-16.el9_2.i686.rpm ��sopenssl-libs-3.0.7-16.el9_2.x86_64.rpm �7�sopenssl-3.0.7-16.el9_2.x86_64.rpm ����z�s� �^BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update 0+��r�https://access.redhat.com/errata/RHSA-2023:3723 RHSA-2023:3723 RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002 CVE-2023-2002 CVE-2023-2002 https://access.redhat.com/security/cve/CVE-2023-2124 CVE-2023-2124 CVE-2023-2124 https://access.redhat.com/security/cve/CVE-2023-2194 CVE-2023-2194 CVE-2023-2194 https://access.redhat.com/security/cve/CVE-2023-2235 CVE-2023-2235 CVE-2023-2235 https://access.redhat.com/security/cve/CVE-2023-28466 CVE-2023-28466 CVE-2023-28466 https://access.redhat.com/security/cve/CVE-2023-32233 CVE-2023-32233 CVE-2023-32233 https://bugzilla.redhat.com/2179000 2179000 https://bugzilla.redhat.com/2187308 2187308 https://bugzilla.redhat.com/2187439 2187439 https://bugzilla.redhat.com/2188396 2188396 https://bugzilla.redhat.com/2192589 2192589 https://bugzilla.redhat.com/2196105 2196105 https://errata.almalinux.org/9/ALSA-2023-3723.html ALSA-2023:3723 ALSA-2023:3723 @kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm !@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm 2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm 1�5bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm @kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm "@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm !@kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm 2@python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm 1�5bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm @kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm @kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm "@kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm ����_�t��security Moderate: less security update 0�� �Chttps://access.redhat.com/errata/RHSA-2023:3725 RHSA-2023:3725 RHSA-2023:3725 https://access.redhat.com/security/cve/CVE-2022-46663 CVE-2022-46663 CVE-2022-46663 https://bugzilla.redhat.com/2169621 2169621 https://errata.almalinux.org/9/ALSA-2023-3725.html ALSA-2023:3725 ALSA-2023:3725 �K�1less-590-2.el9_2.x86_64.rpm �K�1less-590-2.el9_2.x86_64.rpm ����/�u�
�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security and bug fix update 0��C�https://access.redhat.com/errata/RHSA-2023:4325 RHSA-2023:4325 RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347 CVE-2023-3347 CVE-2023-3347 https://bugzilla.redhat.com/2222792 2222792 https://errata.almalinux.org/9/ALSA-2023-4325.html ALSA-2023:4325 ALSA-2023:4325 �:(python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm �W(samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm �V(libnetapi-4.17.5-103.el9_2.alma.i686.rpm �W(samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm �4(samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm �<(samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm �=(samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm �1(samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm �.(libsmbclient-4.17.5-103.el9_2.alma.i686.rpm �/(libwbclient-4.17.5-103.el9_2.alma.x86_64.rpm �V(libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm �1(samba-client-libs-4.17.5-103.el9_2.alma.i686.rpm �V(samba-4.17.5-103.el9_2.alma.x86_64.rpm �0(python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm �>(samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm �2(samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm �?(samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm �3(samba-libs-4.17.5-103.el9_2.alma.i686.rpm �.(libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm �3(samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm �/(libwbclient-4.17.5-103.el9_2.alma.i686.rpm �X(samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm �q(samba-common-4.17.5-103.el9_2.alma.noarch.rpm �4(samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm �0(python3-samba-4.17.5-103.el9_2.alma.i686.rpm �W(samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm �2(samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm �:(python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm �W(samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm �V(libnetapi-4.17.5-103.el9_2.alma.i686.rpm �W(samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm �4(samba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm �<(samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm �=(samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm �1(samba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm �.(libsmbclient-4.17.5-103.el9_2.alma.i686.rpm �/(libwbclient-4.17.5-103.el9_2.alma.x86_64.rpm �V(libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm �1(samba-client-libs-4.17.5-103.el9_2.alma.i686.rpm �V(samba-4.17.5-103.el9_2.alma.x86_64.rpm �0(python3-samba-4.17.5-103.el9_2.alma.x86_64.rpm �>(samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm �2(samba-common-libs-4.17.5-103.el9_2.alma.i686.rpm �?(samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm �3(samba-libs-4.17.5-103.el9_2.alma.i686.rpm �.(libsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm �3(samba-libs-4.17.5-103.el9_2.alma.x86_64.rpm �/(libwbclient-4.17.5-103.el9_2.alma.i686.rpm �X(samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm �q(samba-common-4.17.5-103.el9_2.alma.noarch.rpm �4(samba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm �0(python3-samba-4.17.5-103.el9_2.alma.i686.rpm �W(samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm �2(samba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm ����@�v�1�nBsecurity Moderate: libeconf security update 0��K�https://access.redhat.com/errata/RHSA-2023:4347 RHSA-2023:4347 RHSA-2023:4347 https://access.redhat.com/security/cve/CVE-2023-22652 CVE-2023-22652 CVE-2023-22652 https://bugzilla.redhat.com/2212463 2212463 https://errata.almalinux.org/9/ALSA-2023-4347.html ALSA-2023:4347 ALSA-2023:4347 �&�Plibeconf-0.4.1-3.el9_2.x86_64.rpm �&�Plibeconf-0.4.1-3.el9_2.i686.rpm �&�Plibeconf-0.4.1-3.el9_2.x86_64.rpm �&�Plibeconf-0.4.1-3.el9_2.i686.rpm ����T�w��rBBBsecurity Moderate: libxml2 security update 0��Y�Nhttps://access.redhat.com/errata/RHSA-2023:4349 RHSA-2023:4349 RHSA-2023:4349 https://access.redhat.com/security/cve/CVE-2023-28484 CVE-2023-28484 CVE-2023-28484 https://access.redhat.com/security/cve/CVE-2023-29469 CVE-2023-29469 CVE-2023-29469 https://bugzilla.redhat.com/2185984 2185984 https://bugzilla.redhat.com/2185994 2185994 https://errata.almalinux.org/9/ALSA-2023-4349.html ALSA-2023:4349 ALSA-2023:4349 �
�libxml2-2.9.13-3.el9_2.1.i686.rpm �N�python3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm �
�libxml2-2.9.13-3.el9_2.1.x86_64.rpm �
�libxml2-2.9.13-3.el9_2.1.i686.rpm �N�python3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm �
�libxml2-2.9.13-3.el9_2.1.x86_64.rpm �����x��7security Moderate: python-requests security update 0��'�https://access.redhat.com/errata/RHSA-2023:4350 RHSA-2023:4350 RHSA-2023:4350 https://access.redhat.com/security/cve/CVE-2023-32681 CVE-2023-32681 CVE-2023-32681 https://bugzilla.redhat.com/2209469 2209469 https://errata.almalinux.org/9/ALSA-2023-4350.html ALSA-2023:4350 ALSA-2023:4350 �D� python3-requests-2.25.1-7.el9_2.noarch.rpm �D� python3-requests-2.25.1-7.el9_2.noarch.rpm ����J�y�
�xBBBBBBBBsecurity Moderate: curl security update 0��.�~https://access.redhat.com/errata/RHSA-2023:4354 RHSA-2023:4354 RHSA-2023:4354 https://access.redhat.com/security/cve/CVE-2023-28321 CVE-2023-28321 CVE-2023-28321 https://access.redhat.com/security/cve/CVE-2023-28322 CVE-2023-28322 CVE-2023-28322 https://bugzilla.redhat.com/2196786 2196786 https://bugzilla.redhat.com/2196793 2196793 https://errata.almalinux.org/9/ALSA-2023-4354.html ALSA-2023:4354 ALSA-2023:4354 �(�Gcurl-7.76.1-23.el9_2.2.x86_64.rpm {�Glibcurl-minimal-7.76.1-23.el9_2.2.i686.rpm {�Glibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm z�Glibcurl-7.76.1-23.el9_2.2.i686.rpm �)�Gcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm z�Glibcurl-7.76.1-23.el9_2.2.x86_64.rpm �(�Gcurl-7.76.1-23.el9_2.2.x86_64.rpm {�Glibcurl-minimal-7.76.1-23.el9_2.2.i686.rpm {�Glibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm z�Glibcurl-7.76.1-23.el9_2.2.i686.rpm �)�Gcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm z�Glibcurl-7.76.1-23.el9_2.2.x86_64.rpm ����j�z��BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update 0+��,�0https://access.redhat.com/errata/RHSA-2023:4377 RHSA-2023:4377 RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869 CVE-2022-45869 CVE-2022-45869 https://access.redhat.com/security/cve/CVE-2023-0458 CVE-2023-0458 CVE-2023-0458 https://access.redhat.com/security/cve/CVE-2023-1998 CVE-2023-1998 CVE-2023-1998 https://access.redhat.com/security/cve/CVE-2023-3090 CVE-2023-3090 CVE-2023-3090 https://access.redhat.com/security/cve/CVE-2023-35788 CVE-2023-35788 CVE-2023-35788 https://bugzilla.redhat.com/2151317 2151317 https://bugzilla.redhat.com/2187257 2187257 https://bugzilla.redhat.com/2193219 2193219 https://bugzilla.redhat.com/2215768 2215768 https://bugzilla.redhat.com/2218672 2218672 https://errata.almalinux.org/9/ALSA-2023-4377.html ALSA-2023:4377 ALSA-2023:4377 2Apython3-perf-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm !Akernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm 1�6bpftool-7.0.0-284.25.1.el9_2.x86_64.rpm Akernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm "Akernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm 2Apython3-perf-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm !Akernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm 1�6bpftool-7.0.0-284.25.1.el9_2.x86_64.rpm Akernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm "Akernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm Akernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm ���:�{��cBBBBBBsecurity Important: openssh security update 0+��\�]https://access.redhat.com/errata/RHSA-2023:4412 RHSA-2023:4412 RHSA-2023:4412 https://access.redhat.com/security/cve/CVE-2023-38408 CVE-2023-38408 CVE-2023-38408 https://bugzilla.redhat.com/2224173 2224173 https://errata.almalinux.org/9/ALSA-2023-4412.html ALSA-2023:4412 ALSA-2023:4412 �o�topenssh-keycat-8.7p1-30.el9_2.x86_64.rpm �m�topenssh-8.7p1-30.el9_2.x86_64.rpm �n�topenssh-clients-8.7p1-30.el9_2.x86_64.rpm �p�topenssh-server-8.7p1-30.el9_2.x86_64.rpm �o�topenssh-keycat-8.7p1-30.el9_2.x86_64.rpm �m�topenssh-8.7p1-30.el9_2.x86_64.rpm �n�topenssh-clients-8.7p1-30.el9_2.x86_64.rpm �p�topenssh-server-8.7p1-30.el9_2.x86_64.rpm ����
�|��kBBBBBBsecurity Moderate: dbus security update 0��9�https://access.redhat.com/errata/RHSA-2023:4569 RHSA-2023:4569 RHSA-2023:4569 https://access.redhat.com/security/cve/CVE-2023-34969 CVE-2023-34969 CVE-2023-34969 https://bugzilla.redhat.com/2213166 2213166 https://errata.almalinux.org/9/ALSA-2023-4569.html ALSA-2023:4569 ALSA-2023:4569 �[�adbus-tools-1.12.20-7.el9_2.1.x86_64.rpm �%�adbus-libs-1.12.20-7.el9_2.1.x86_64.rpm �Z�adbus-common-1.12.20-7.el9_2.1.noarch.rpm �Y�adbus-1.12.20-7.el9_2.1.x86_64.rpm �%�adbus-libs-1.12.20-7.el9_2.1.i686.rpm �[�adbus-tools-1.12.20-7.el9_2.1.x86_64.rpm �%�adbus-libs-1.12.20-7.el9_2.1.x86_64.rpm �Z�adbus-common-1.12.20-7.el9_2.1.noarch.rpm �Y�adbus-1.12.20-7.el9_2.1.x86_64.rpm �%�adbus-libs-1.12.20-7.el9_2.1.i686.rpm �����}�=�sBBBBBBBBsecurity Important: subscription-manager security update 0+��8�https://access.redhat.com/errata/RHSA-2023:4708 RHSA-2023:4708 RHSA-2023:4708 https://access.redhat.com/security/cve/CVE-2023-3899 CVE-2023-3899 CVE-2023-3899 https://bugzilla.redhat.com/2225407 2225407 https://errata.almalinux.org/9/ALSA-2023-4708.html ALSA-2023:4708 ALSA-2023:4708 �v�Osubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �^�Olibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �l�Opython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �w�Osubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �n�Opython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �v�Osubscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �^�Olibdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �l�Opython3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �w�Osubscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �n�Opython3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm ����e�~��~Bsecurity Important: cups security update 0+��C�https://access.redhat.com/errata/RHSA-2023:4838 RHSA-2023:4838 RHSA-2023:4838 https://access.redhat.com/security/cve/CVE-2023-32360 CVE-2023-32360 CVE-2023-32360 https://bugzilla.redhat.com/2230495 2230495 https://errata.almalinux.org/9/ALSA-2023-4838.html ALSA-2023:4838 ALSA-2023:4838 �*�dcups-libs-2.3.3op2-16.el9_2.1.i686.rpm �*�dcups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm �*�dcups-libs-2.3.3op2-16.el9_2.1.i686.rpm �*�dcups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm ����E���Asecurity Moderate: dmidecode security update 0��]�https://access.redhat.com/errata/RHSA-2023:5061 RHSA-2023:5061 RHSA-2023:5061 https://access.redhat.com/security/cve/CVE-2023-30630 CVE-2023-30630 CVE-2023-30630 https://bugzilla.redhat.com/2186669 2186669 https://errata.almalinux.org/9/ALSA-2023-5061.html ALSA-2023:5061 ALSA-2023:5061 �T�dmidecode-3.3-7.el9_2.1.x86_64.rpm �T�dmidecode-3.3-7.el9_2.1.x86_64.rpm ����O� ��DBBBBBBBBBBBBBBBsecurity Moderate: linux-firmware security update 0��e�|https://access.redhat.com/errata/RHSA-2023:5068 RHSA-2023:5068 RHSA-2023:5068 https://access.redhat.com/security/cve/CVE-2023-20593 CVE-2023-20593 CVE-2023-20593 https://bugzilla.redhat.com/2217845 2217845 https://errata.almalinux.org/9/ALSA-2023-5068.html ALSA-2023:5068 ALSA-2023:5068 �c�Aiwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �g�\iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm �e�iwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm �a�\iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �m�Ynetronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm �f�\iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �_�\iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �`�\iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �]�
iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �b�\iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �l�Ylinux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm �i�Aiwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �^�iwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �j�Ylibertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm �k�Ylinux-firmware-20230310-135.el9_2.alma.1.noarch.rpm �h�iwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm �c�Aiwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �g�\iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm �e�iwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm �a�\iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �m�Ynetronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm �f�\iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �_�\iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �`�\iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �]�
iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �b�\iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �l�Ylinux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm �i�Aiwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �^�iwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �j�Ylibertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm �k�Ylinux-firmware-20230310-135.el9_2.alma.1.noarch.rpm �h�iwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm ����S���VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update 0+��a�_https://access.redhat.com/errata/RHSA-2023:5069 RHSA-2023:5069 RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637 CVE-2023-1637 CVE-2023-1637 https://access.redhat.com/security/cve/CVE-2023-20593 CVE-2023-20593 CVE-2023-20593 https://access.redhat.com/security/cve/CVE-2023-21102 CVE-2023-21102 CVE-2023-21102 https://access.redhat.com/security/cve/CVE-2023-31248 CVE-2023-31248 CVE-2023-31248 https://access.redhat.com/security/cve/CVE-2023-3390 CVE-2023-3390 CVE-2023-3390 https://access.redhat.com/security/cve/CVE-2023-35001 CVE-2023-35001 CVE-2023-35001 https://access.redhat.com/security/cve/CVE-2023-3610 CVE-2023-3610 CVE-2023-3610 https://access.redhat.com/security/cve/CVE-2023-3776 CVE-2023-3776 CVE-2023-3776 https://access.redhat.com/security/cve/CVE-2023-4004 CVE-2023-4004 CVE-2023-4004 https://access.redhat.com/security/cve/CVE-2023-4147 CVE-2023-4147 CVE-2023-4147 https://bugzilla.redhat.com/2181891 2181891 https://bugzilla.redhat.com/2213260 2213260 https://bugzilla.redhat.com/2213455 2213455 https://bugzilla.redhat.com/2217845 2217845 https://bugzilla.redhat.com/2220892 2220892 https://bugzilla.redhat.com/2220893 2220893 https://bugzilla.redhat.com/2225097 2225097 https://bugzilla.redhat.com/2225198 2225198 https://bugzilla.redhat.com/2225239 2225239 https://bugzilla.redhat.com/2225275 2225275 https://errata.almalinux.org/9/ALSA-2023-5069.html ALSA-2023:5069 ALSA-2023:5069 2Bpython3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm "Bkernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm 1�7bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm !Bkernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpm Bkernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm 2Bpython3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm "Bkernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm 1�7bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm !Bkernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpm Bkernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm Bkernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm ����
���wBsecurity Moderate: libcap security update 0��@�0https://access.redhat.com/errata/RHSA-2023:5071 RHSA-2023:5071 RHSA-2023:5071 https://access.redhat.com/security/cve/CVE-2023-2602 CVE-2023-2602 CVE-2023-2602 https://access.redhat.com/security/cve/CVE-2023-2603 CVE-2023-2603 CVE-2023-2603 https://bugzilla.redhat.com/2209113 2209113 https://bugzilla.redhat.com/2209114 2209114 https://errata.almalinux.org/9/ALSA-2023-5071.html ALSA-2023:5071 ALSA-2023:5071 �$�mlibcap-2.48-9.el9_2.i686.rpm �$�mlibcap-2.48-9.el9_2.x86_64.rpm �$�mlibcap-2.48-9.el9_2.i686.rpm �$�mlibcap-2.48-9.el9_2.x86_64.rpm �������zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: glibc security update 0+��p�
https://access.redhat.com/errata/RHSA-2023:5453 RHSA-2023:5453 RHSA-2023:5453 https://access.redhat.com/security/cve/CVE-2023-4527 CVE-2023-4527 CVE-2023-4527 https://access.redhat.com/security/cve/CVE-2023-4806 CVE-2023-4806 CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-4813 CVE-2023-4813 CVE-2023-4813 https://access.redhat.com/security/cve/CVE-2023-4911 CVE-2023-4911 CVE-2023-4911 https://bugzilla.redhat.com/2234712 2234712 https://bugzilla.redhat.com/2237782 2237782 https://bugzilla.redhat.com/2237798 2237798 https://bugzilla.redhat.com/2238352 2238352 https://errata.almalinux.org/9/ALSA-2023-5453.html ALSA-2023:5453 ALSA-2023:5453 �P�gglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm �Zglibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm �Tglibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm �Aglibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm �Gglibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm �-libnsl-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm �Vglibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm �~glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm �}glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm �
glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm �^glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm �Unscd-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm �iglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm �fglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm �Lglibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm �,glibc-gconv-extra-2.34-60.el9_2.7.i686.rpm �Hglibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm �Eglibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm �Jglibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm �Gglibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm �uglibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm �lglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm �`glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm �Xglibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm �Jglibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm �bglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm �Nglibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm �+glibc-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm �]glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm �4glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm �\glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm �aglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm �Uglibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm �Dglibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm �rglibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm �Aglibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm �Hglibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm �Qglibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm �zglibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm �Yglibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm �sglibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm �Rglibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm �nglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm �jglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm �Kglibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm �eglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm �Cglibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm �hglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm �Sglibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm �vglibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm �
glibc-common-2.34-60.el9_2.7.x86_64.rpm �Iglibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm �pglibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm �Wglibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm �glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm �kglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm �|glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm �dglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm �4glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm �Fglibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm �yglibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm �Dglibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm �Bglibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm �Oglibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm �-libnsl-2.34-60.el9_2.7.i686.rpm �,glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm �Sglibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm �Qglibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm �Pglibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm �[glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm �@glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm �Mglibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm �Bglibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm �Eglibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm �Kglibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm �xglibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm �Fglibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm �{glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm �@glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm �+glibc-2.34-60.el9_2.7.i686.rpm �glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm �Oglibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm �Tglibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm �wglibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm �oglibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm �mglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm �Mglibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm �_glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm �Lglibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm �tglibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm �Rglibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm �Iglibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm �cglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm �Pglibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm �
glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm �Cglibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm �qglibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm �Nglibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm �P�gglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm �Zglibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm �Tglibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm �Aglibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm �Gglibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm �-libnsl-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm �Vglibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm �~glibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm �}glibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm �
glibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm �^glibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm �Unscd-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm �iglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm �fglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm �Lglibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm �,glibc-gconv-extra-2.34-60.el9_2.7.i686.rpm �Hglibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm �Eglibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm �Jglibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm �Gglibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm �uglibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm �lglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm �`glibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm �Xglibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm �Jglibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm �bglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm �Nglibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm �+glibc-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm �]glibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm �4glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm �\glibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm �aglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm �Uglibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm �Dglibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm �rglibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm �Aglibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm �Hglibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm �Qglibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm �zglibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm �Yglibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm �sglibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm �Rglibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm �nglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm �jglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm �Kglibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm �eglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm �Cglibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm �hglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm �Sglibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm �vglibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm �
glibc-common-2.34-60.el9_2.7.x86_64.rpm �Iglibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm �pglibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm �Wglibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm �glibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm �kglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm �|glibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm �dglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm �4glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm �Fglibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm �yglibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm �Dglibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm �Bglibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm �Oglibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm �-libnsl-2.34-60.el9_2.7.i686.rpm �,glibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm �Sglibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm �Qglibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm �Pglibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm �[glibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm �@glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm �Mglibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm �Bglibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm �Eglibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm �Kglibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm �xglibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm �Fglibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm �{glibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm �@glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm �+glibc-2.34-60.el9_2.7.i686.rpm �glibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm �Oglibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm �Tglibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm �wglibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm �oglibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm �mglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm �Mglibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm �_glibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm �Lglibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm �tglibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm �Rglibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm �Iglibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm �cglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm �Pglibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm �
glibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm �Cglibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm �qglibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm �Nglibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm ����&���WBBBsecurity Important: python3.9 security update 0+��|�https://access.redhat.com/errata/RHSA-2023:5462 RHSA-2023:5462 RHSA-2023:5462 https://access.redhat.com/security/cve/CVE-2023-40217 CVE-2023-40217 CVE-2023-40217 https://bugzilla.redhat.com/2235789 2235789 https://errata.almalinux.org/9/ALSA-2023-5462.html ALSA-2023:5462 ALSA-2023:5462 -�python3-libs-3.9.16-1.el9_2.2.x86_64.rpm -�python3-libs-3.9.16-1.el9_2.2.i686.rpm ��python3-3.9.16-1.el9_2.2.x86_64.rpm -�python3-libs-3.9.16-1.el9_2.2.x86_64.rpm -�python3-libs-3.9.16-1.el9_2.2.i686.rpm ��python3-3.9.16-1.el9_2.2.x86_64.rpm ����E���\BBBBBBBBsecurity Important: curl security update 0+���}https://access.redhat.com/errata/RHSA-2023:5763 RHSA-2023:5763 RHSA-2023:5763 https://access.redhat.com/security/cve/CVE-2023-38545 CVE-2023-38545 CVE-2023-38545 https://access.redhat.com/security/cve/CVE-2023-38546 CVE-2023-38546 CVE-2023-38546 https://bugzilla.redhat.com/2241933 2241933 https://bugzilla.redhat.com/2241938 2241938 https://errata.almalinux.org/9/ALSA-2023-5763.html ALSA-2023:5763 ALSA-2023:5763 �)�Hcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm {�Hlibcurl-minimal-7.76.1-23.el9_2.4.i686.rpm {�Hlibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm z�Hlibcurl-7.76.1-23.el9_2.4.x86_64.rpm �(�Hcurl-7.76.1-23.el9_2.4.x86_64.rpm z�Hlibcurl-7.76.1-23.el9_2.4.i686.rpm �)�Hcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm {�Hlibcurl-minimal-7.76.1-23.el9_2.4.i686.rpm {�Hlibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm z�Hlibcurl-7.76.1-23.el9_2.4.x86_64.rpm �(�Hcurl-7.76.1-23.el9_2.4.x86_64.rpm z�Hlibcurl-7.76.1-23.el9_2.4.i686.rpm ����g��)�fBsecurity Important: nghttp2 security update 0+���-https://access.redhat.com/errata/RHSA-2023:5838 RHSA-2023:5838 RHSA-2023:5838 https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5838.html ALSA-2023:5838 ALSA-2023:5838 ��Xlibnghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��Xlibnghttp2-1.43.0-5.el9_2.1.i686.rpm ��Xlibnghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��Xlibnghttp2-1.43.0-5.el9_2.1.i686.rpm ��Ù0��-�jBsecurity Low: opensc security update 0�6��A�(https://access.redhat.com/errata/RHSA-2023:6587 RHSA-2023:6587 RHSA-2023:6587 https://access.redhat.com/security/cve/CVE-2023-2977 CVE-2023-2977 CVE-2023-2977 https://bugzilla.redhat.com/2211088 2211088 https://errata.almalinux.org/9/ALSA-2023-6587.html ALSA-2023:6587 ALSA-2023:6587 ��Mopensc-0.23.0-2.el9.i686.rpm ��Mopensc-0.23.0-2.el9.x86_64.rpm ��Mopensc-0.23.0-2.el9.i686.rpm ��Mopensc-0.23.0-2.el9.x86_64.rpm �������nBBBsecurity Moderate: binutils security update 0��i�Jhttps://access.redhat.com/errata/RHSA-2023:6593 RHSA-2023:6593 RHSA-2023:6593 https://access.redhat.com/security/cve/CVE-2022-4285 CVE-2022-4285 CVE-2022-4285 https://bugzilla.redhat.com/2150768 2150768 https://errata.almalinux.org/9/ALSA-2023-6593.html ALSA-2023:6593 ALSA-2023:6593 �$�}binutils-2.35.2-42.el9.x86_64.rpm �$�}binutils-2.35.2-42.el9.i686.rpm �R�}binutils-gold-2.35.2-42.el9.x86_64.rpm �$�}binutils-2.35.2-42.el9.x86_64.rpm �$�}binutils-2.35.2-42.el9.i686.rpm �R�}binutils-gold-2.35.2-42.el9.x86_64.rpm ����<� ��sBBBBBBBBBBBBBBBsecurity Important: linux-firmware security, bug fix, and enhancement update 0+��3�https://access.redhat.com/errata/RHSA-2023:6595 RHSA-2023:6595 RHSA-2023:6595 https://access.redhat.com/security/cve/CVE-2022-27635 CVE-2022-27635 CVE-2022-27635 https://access.redhat.com/security/cve/CVE-2022-36351 CVE-2022-36351 CVE-2022-36351 https://access.redhat.com/security/cve/CVE-2022-38076 CVE-2022-38076 CVE-2022-38076 https://access.redhat.com/security/cve/CVE-2022-40964 CVE-2022-40964 CVE-2022-40964 https://access.redhat.com/security/cve/CVE-2022-46329 CVE-2022-46329 CVE-2022-46329 https://access.redhat.com/security/cve/CVE-2023-20569 CVE-2023-20569 CVE-2023-20569 https://bugzilla.redhat.com/2207625 2207625 https://bugzilla.redhat.com/2238960 2238960 https://bugzilla.redhat.com/2238961 2238961 https://bugzilla.redhat.com/2238962 2238962 https://bugzilla.redhat.com/2238963 2238963 https://bugzilla.redhat.com/2238964 2238964 https://errata.almalinux.org/9/ALSA-2023-6595.html ALSA-2023:6595 ALSA-2023:6595 �`�]iwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm �k�Zlinux-firmware-20230814-140.el9_3.noarch.rpm �m�Znetronome-firmware-20230814-140.el9_3.noarch.rpm �^�iwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm �l�Zlinux-firmware-whence-20230814-140.el9_3.noarch.rpm �b�]iwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm �_�]iwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm �]�iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm �c�Biwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm �f�]iwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm �g�]iwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm �a�]iwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm �j�Zlibertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm �h�iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm �i�Biwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm �e�iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm �`�]iwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm �k�Zlinux-firmware-20230814-140.el9_3.noarch.rpm �m�Znetronome-firmware-20230814-140.el9_3.noarch.rpm �^�iwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm �l�Zlinux-firmware-whence-20230814-140.el9_3.noarch.rpm �b�]iwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm �_�]iwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm �]�iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm �c�Biwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm �f�]iwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm �g�]iwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm �a�]iwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm �j�Zlibertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm �h�iwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm �i�Biwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm �e�iwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm ����c�
��EBsecurity Moderate: cups security and bug fix update 0��?�nhttps://access.redhat.com/errata/RHSA-2023:6596 RHSA-2023:6596 RHSA-2023:6596 https://access.redhat.com/security/cve/CVE-2023-32324 CVE-2023-32324 CVE-2023-32324 https://access.redhat.com/security/cve/CVE-2023-34241 CVE-2023-34241 CVE-2023-34241 https://bugzilla.redhat.com/2209603 2209603 https://bugzilla.redhat.com/2214914 2214914 https://errata.almalinux.org/9/ALSA-2023-6596.html ALSA-2023:6596 ALSA-2023:6596 �*�ecups-libs-2.3.3op2-21.el9.x86_64.rpm �*�ecups-libs-2.3.3op2-21.el9.i686.rpm �*�ecups-libs-2.3.3op2-21.el9.x86_64.rpm �*�ecups-libs-2.3.3op2-21.el9.i686.rpm ������
�Hsecurity Moderate: python-cryptography security update 0��-�fhttps://access.redhat.com/errata/RHSA-2023:6615 RHSA-2023:6615 RHSA-2023:6615 https://access.redhat.com/security/cve/CVE-2023-23931 CVE-2023-23931 CVE-2023-23931 https://bugzilla.redhat.com/2171817 2171817 https://errata.almalinux.org/9/ALSA-2023-6615.html ALSA-2023:6615 ALSA-2023:6615 �r�)python3-cryptography-36.0.1-4.el9.x86_64.rpm �r�)python3-cryptography-36.0.1-4.el9.x86_64.rpm �������KBsecurity Moderate: protobuf-c security update 0���}https://access.redhat.com/errata/RHSA-2023:6621 RHSA-2023:6621 RHSA-2023:6621 https://access.redhat.com/security/cve/CVE-2022-48468 CVE-2022-48468 CVE-2022-48468 https://bugzilla.redhat.com/2186673 2186673 https://errata.almalinux.org/9/ALSA-2023-6621.html ALSA-2023:6621 ALSA-2023:6621 �9�Wprotobuf-c-1.3.3-13.el9.x86_64.rpm �9�Wprotobuf-c-1.3.3-13.el9.i686.rpm �9�Wprotobuf-c-1.3.3-13.el9.x86_64.rpm �9�Wprotobuf-c-1.3.3-13.el9.i686.rpm �����
��OBsecurity Low: glib2 security and bug fix update 0�6���ohttps://access.redhat.com/errata/RHSA-2023:6631 RHSA-2023:6631 RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499 CVE-2023-29499 CVE-2023-29499 https://access.redhat.com/security/cve/CVE-2023-32611 CVE-2023-32611 CVE-2023-32611 https://access.redhat.com/security/cve/CVE-2023-32665 CVE-2023-32665 CVE-2023-32665 https://bugzilla.redhat.com/2211827 2211827 https://bugzilla.redhat.com/2211828 2211828 https://bugzilla.redhat.com/2211829 2211829 https://errata.almalinux.org/9/ALSA-2023-6631.html ALSA-2023:6631 ALSA-2023:6631 �U�tglib2-2.68.4-11.el9.x86_64.rpm �U�tglib2-2.68.4-11.el9.i686.rpm �U�tglib2-2.68.4-11.el9.x86_64.rpm �U�tglib2-2.68.4-11.el9.i686.rpm �������RBBBsecurity Low: shadow-utils security and bug fix update 0�6���Yhttps://access.redhat.com/errata/RHSA-2023:6632 RHSA-2023:6632 RHSA-2023:6632 https://access.redhat.com/security/cve/CVE-2023-4641 CVE-2023-4641 CVE-2023-4641 https://bugzilla.redhat.com/2215945 2215945 https://errata.almalinux.org/9/ALSA-2023-6632.html ALSA-2023:6632 ALSA-2023:6632 �y�
shadow-utils-4.9-8.el9.x86_64.rpm �2�
shadow-utils-subid-4.9-8.el9.i686.rpm �2�
shadow-utils-subid-4.9-8.el9.x86_64.rpm �y�
shadow-utils-4.9-8.el9.x86_64.rpm �2�
shadow-utils-subid-4.9-8.el9.i686.rpm �2�
shadow-utils-subid-4.9-8.el9.x86_64.rpm ����@���XBsecurity Moderate: c-ares security, bug fix, and enhancement update 0��X�
https://access.redhat.com/errata/RHSA-2023:6635 RHSA-2023:6635 RHSA-2023:6635 https://access.redhat.com/security/cve/CVE-2022-4904 CVE-2022-4904 CVE-2022-4904 https://access.redhat.com/security/cve/CVE-2023-31124 CVE-2023-31124 CVE-2023-31124 https://access.redhat.com/security/cve/CVE-2023-31130 CVE-2023-31130 CVE-2023-31130 https://access.redhat.com/security/cve/CVE-2023-31147 CVE-2023-31147 CVE-2023-31147 https://bugzilla.redhat.com/2168631 2168631 https://bugzilla.redhat.com/2209494 2209494 https://bugzilla.redhat.com/2209497 2209497 https://bugzilla.redhat.com/2209501 2209501 https://errata.almalinux.org/9/ALSA-2023-6635.html ALSA-2023:6635 ALSA-2023:6635 ��Tc-ares-1.19.1-1.el9.i686.rpm ��Tc-ares-1.19.1-1.el9.x86_64.rpm ��Tc-ares-1.19.1-1.el9.i686.rpm ��Tc-ares-1.19.1-1.el9.x86_64.rpm �������[BBsecurity Moderate: libssh security update 0��b�{https://access.redhat.com/errata/RHSA-2023:6643 RHSA-2023:6643 RHSA-2023:6643 https://access.redhat.com/security/cve/CVE-2023-1667 CVE-2023-1667 CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 CVE-2023-2283 CVE-2023-2283 https://bugzilla.redhat.com/2182199 2182199 https://bugzilla.redhat.com/2189736 2189736 https://errata.almalinux.org/9/ALSA-2023-6643.html ALSA-2023:6643 ALSA-2023:6643 �@�4libssh-0.10.4-11.el9.i686.rpm ��4libssh-config-0.10.4-11.el9.noarch.rpm �@�4libssh-0.10.4-11.el9.x86_64.rpm �@�4libssh-0.10.4-11.el9.i686.rpm ��4libssh-config-0.10.4-11.el9.noarch.rpm �@�4libssh-0.10.4-11.el9.x86_64.rpm ����X���_BBBsecurity Moderate: python3.9 security update 0��]� https://access.redhat.com/errata/RHSA-2023:6659 RHSA-2023:6659 RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://bugzilla.redhat.com/263261 263261 https://errata.almalinux.org/9/ALSA-2023-6659.html ALSA-2023:6659 ALSA-2023:6659 -�python3-libs-3.9.18-1.el9_3.i686.rpm ��python3-3.9.18-1.el9_3.x86_64.rpm -�python3-libs-3.9.18-1.el9_3.x86_64.rpm -�python3-libs-3.9.18-1.el9_3.i686.rpm ��python3-3.9.18-1.el9_3.x86_64.rpm -�python3-libs-3.9.18-1.el9_3.x86_64.rpm ����B���dBsecurity Low: gmp security and enhancement update 0�6��}�Uhttps://access.redhat.com/errata/RHSA-2023:6661 RHSA-2023:6661 RHSA-2023:6661 https://access.redhat.com/security/cve/CVE-2021-43618 CVE-2021-43618 CVE-2021-43618 https://bugzilla.redhat.com/2024904 2024904 https://errata.almalinux.org/9/ALSA-2023-6661.html ALSA-2023:6661 ALSA-2023:6661 ��jgmp-6.2.0-13.el9.x86_64.rpm ��jgmp-6.2.0-13.el9.i686.rpm ��jgmp-6.2.0-13.el9.x86_64.rpm ��jgmp-6.2.0-13.el9.i686.rpm ����B���gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update 0��R�K
https://access.redhat.com/errata/RHSA-2023:6667 RHSA-2023:6667 RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127 CVE-2022-2127 CVE-2022-2127 https://access.redhat.com/security/cve/CVE-2023-34966 CVE-2023-34966 CVE-2023-34966 https://access.redhat.com/security/cve/CVE-2023-34967 CVE-2023-34967 CVE-2023-34967 https://access.redhat.com/security/cve/CVE-2023-34968 CVE-2023-34968 CVE-2023-34968 https://bugzilla.redhat.com/2222791 2222791 https://bugzilla.redhat.com/2222793 2222793 https://bugzilla.redhat.com/2222794 2222794 https://bugzilla.redhat.com/2222795 2222795 https://errata.almalinux.org/9/ALSA-2023-6667.html ALSA-2023:6667 ALSA-2023:6667 �V)samba-4.18.6-100.el9.x86_64.rpm �W)samba-common-tools-4.18.6-100.el9.x86_64.rpm �4)samba-winbind-modules-4.18.6-100.el9.i686.rpm �1)samba-client-libs-4.18.6-100.el9.x86_64.rpm �1)samba-client-libs-4.18.6-100.el9.i686.rpm �X)samba-winbind-4.18.6-100.el9.x86_64.rpm �2)samba-common-libs-4.18.6-100.el9.i686.rpm �.)libsmbclient-4.18.6-100.el9.i686.rpm �V)libnetapi-4.18.6-100.el9.x86_64.rpm �.)libsmbclient-4.18.6-100.el9.x86_64.rpm �:)python3-samba-dc-4.18.6-100.el9.x86_64.rpm �3)samba-libs-4.18.6-100.el9.x86_64.rpm �=)samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm �0)python3-samba-4.18.6-100.el9.x86_64.rpm �/)libwbclient-4.18.6-100.el9.i686.rpm �<)samba-dcerpc-4.18.6-100.el9.x86_64.rpm �/)libwbclient-4.18.6-100.el9.x86_64.rpm �3)samba-libs-4.18.6-100.el9.i686.rpm �?)samba-usershares-4.18.6-100.el9.x86_64.rpm �4)samba-winbind-modules-4.18.6-100.el9.x86_64.rpm �0)python3-samba-4.18.6-100.el9.i686.rpm �W)samba-dc-libs-4.18.6-100.el9.x86_64.rpm �>)samba-tools-4.18.6-100.el9.x86_64.rpm �W)samba-dc-libs-4.18.6-100.el9.i686.rpm �2)samba-common-libs-4.18.6-100.el9.x86_64.rpm �V)libnetapi-4.18.6-100.el9.i686.rpm �q)samba-common-4.18.6-100.el9.noarch.rpm �V)samba-4.18.6-100.el9.x86_64.rpm �W)samba-common-tools-4.18.6-100.el9.x86_64.rpm �4)samba-winbind-modules-4.18.6-100.el9.i686.rpm �1)samba-client-libs-4.18.6-100.el9.x86_64.rpm �1)samba-client-libs-4.18.6-100.el9.i686.rpm �X)samba-winbind-4.18.6-100.el9.x86_64.rpm �2)samba-common-libs-4.18.6-100.el9.i686.rpm �.)libsmbclient-4.18.6-100.el9.i686.rpm �V)libnetapi-4.18.6-100.el9.x86_64.rpm �.)libsmbclient-4.18.6-100.el9.x86_64.rpm �:)python3-samba-dc-4.18.6-100.el9.x86_64.rpm �3)samba-libs-4.18.6-100.el9.x86_64.rpm �=)samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm �0)python3-samba-4.18.6-100.el9.x86_64.rpm �/)libwbclient-4.18.6-100.el9.i686.rpm �<)samba-dcerpc-4.18.6-100.el9.x86_64.rpm �/)libwbclient-4.18.6-100.el9.x86_64.rpm �3)samba-libs-4.18.6-100.el9.i686.rpm �?)samba-usershares-4.18.6-100.el9.x86_64.rpm �4)samba-winbind-modules-4.18.6-100.el9.x86_64.rpm �0)python3-samba-4.18.6-100.el9.i686.rpm �W)samba-dc-libs-4.18.6-100.el9.x86_64.rpm �>)samba-tools-4.18.6-100.el9.x86_64.rpm �W)samba-dc-libs-4.18.6-100.el9.i686.rpm �2)samba-common-libs-4.18.6-100.el9.x86_64.rpm �V)libnetapi-4.18.6-100.el9.i686.rpm �q)samba-common-4.18.6-100.el9.noarch.rpm ����8���SBBBBBBBBsecurity Moderate: curl security update 0���q
https://access.redhat.com/errata/RHSA-2023:6679 RHSA-2023:6679 RHSA-2023:6679 https://access.redhat.com/security/cve/CVE-2023-27533 CVE-2023-27533 CVE-2023-27533 https://access.redhat.com/security/cve/CVE-2023-27534 CVE-2023-27534 CVE-2023-27534 https://access.redhat.com/security/cve/CVE-2023-27536 CVE-2023-27536 CVE-2023-27536 https://access.redhat.com/security/cve/CVE-2023-27538 CVE-2023-27538 CVE-2023-27538 https://bugzilla.redhat.com/2179062 2179062 https://bugzilla.redhat.com/2179069 2179069 https://bugzilla.redhat.com/2179092 2179092 https://bugzilla.redhat.com/2179103 2179103 https://errata.almalinux.org/9/ALSA-2023-6679.html ALSA-2023:6679 ALSA-2023:6679 z�Ilibcurl-7.76.1-26.el9.x86_64.rpm {�Ilibcurl-minimal-7.76.1-26.el9.i686.rpm �)�Icurl-minimal-7.76.1-26.el9.x86_64.rpm z�Ilibcurl-7.76.1-26.el9.i686.rpm �(�Icurl-7.76.1-26.el9.x86_64.rpm {�Ilibcurl-minimal-7.76.1-26.el9.x86_64.rpm z�Ilibcurl-7.76.1-26.el9.x86_64.rpm {�Ilibcurl-minimal-7.76.1-26.el9.i686.rpm �)�Icurl-minimal-7.76.1-26.el9.x86_64.rpm z�Ilibcurl-7.76.1-26.el9.i686.rpm �(�Icurl-7.76.1-26.el9.x86_64.rpm {�Ilibcurl-minimal-7.76.1-26.el9.x86_64.rpm ����Y�� �]Bsecurity Low: tpm2-tss security and enhancement update 0�6���Rhttps://access.redhat.com/errata/RHSA-2023:6685 RHSA-2023:6685 RHSA-2023:6685 https://access.redhat.com/security/cve/CVE-2023-22745 CVE-2023-22745 CVE-2023-22745 https://bugzilla.redhat.com/2162610 2162610 https://errata.almalinux.org/9/ALSA-2023-6685.html ALSA-2023:6685 ALSA-2023:6685 �?�tpm2-tss-3.2.2-2.el9.i686.rpm �?�tpm2-tss-3.2.2-2.el9.x86_64.rpm �?�tpm2-tss-3.2.2-2.el9.i686.rpm �?�tpm2-tss-3.2.2-2.el9.x86_64.rpm ���� �� �!security Moderate: python-pip security update 0��`�(https://access.redhat.com/errata/RHSA-2023:6694 RHSA-2023:6694 RHSA-2023:6694 https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://bugzilla.redhat.com/263261 263261 https://errata.almalinux.org/9/ALSA-2023-6694.html ALSA-2023:6694 ALSA-2023:6694 �#�python3-pip-wheel-21.2.3-7.el9.noarch.rpm �#�python3-pip-wheel-21.2.3-7.el9.noarch.rpm ����C��!�bBBBBsecurity Moderate: ncurses security and bug fix update 0���xhttps://access.redhat.com/errata/RHSA-2023:6698 RHSA-2023:6698 RHSA-2023:6698 https://access.redhat.com/security/cve/CVE-2023-29491 CVE-2023-29491 CVE-2023-29491 https://bugzilla.redhat.com/2191704 2191704 https://errata.almalinux.org/9/ALSA-2023-6698.html ALSA-2023:6698 ALSA-2023:6698 �a�ncurses-6.2-10.20210508.el9.x86_64.rpm �7�ncurses-libs-6.2-10.20210508.el9.i686.rpm �7�ncurses-libs-6.2-10.20210508.el9.x86_64.rpm ��ncurses-base-6.2-10.20210508.el9.noarch.rpm �a�ncurses-6.2-10.20210508.el9.x86_64.rpm �7�ncurses-libs-6.2-10.20210508.el9.i686.rpm �7�ncurses-libs-6.2-10.20210508.el9.x86_64.rpm ��ncurses-base-6.2-10.20210508.el9.noarch.rpm ����b��"�hBBBBBBBBBBBBBBBsecurity Moderate: krb5 security and bug fix update 0�� �9https://access.redhat.com/errata/RHSA-2023:6699 RHSA-2023:6699 RHSA-2023:6699 https://access.redhat.com/security/cve/CVE-2023-36054 CVE-2023-36054 CVE-2023-36054 https://access.redhat.com/security/cve/CVE-2023-39975 CVE-2023-39975 CVE-2023-39975 https://bugzilla.redhat.com/2230178 2230178 https://bugzilla.redhat.com/2232682 2232682 https://errata.almalinux.org/9/ALSA-2023-6699.html ALSA-2023:6699 ALSA-2023:6699 �"�krb5-libs-1.21.1-1.el9.i686.rpm �&�libkadm5-1.21.1-1.el9.i686.rpm �#�krb5-pkinit-1.21.1-1.el9.i686.rpm �%�krb5-server-ldap-1.21.1-1.el9.i686.rpm �&�libkadm5-1.21.1-1.el9.x86_64.rpm �$�krb5-server-1.21.1-1.el9.x86_64.rpm �$�krb5-server-1.21.1-1.el9.i686.rpm �"�krb5-libs-1.21.1-1.el9.x86_64.rpm �l�krb5-workstation-1.21.1-1.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-1.el9.x86_64.rpm �#�krb5-pkinit-1.21.1-1.el9.x86_64.rpm �"�krb5-libs-1.21.1-1.el9.i686.rpm �&�libkadm5-1.21.1-1.el9.i686.rpm �#�krb5-pkinit-1.21.1-1.el9.i686.rpm �%�krb5-server-ldap-1.21.1-1.el9.i686.rpm �&�libkadm5-1.21.1-1.el9.x86_64.rpm �$�krb5-server-1.21.1-1.el9.x86_64.rpm �$�krb5-server-1.21.1-1.el9.i686.rpm �"�krb5-libs-1.21.1-1.el9.x86_64.rpm �l�krb5-workstation-1.21.1-1.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-1.el9.x86_64.rpm �#�krb5-pkinit-1.21.1-1.el9.x86_64.rpm ����u��=�yBBsecurity Low: procps-ng security and bug fix update 0�6��9�Hhttps://access.redhat.com/errata/RHSA-2023:6705 RHSA-2023:6705 RHSA-2023:6705 https://access.redhat.com/security/cve/CVE-2023-4016 CVE-2023-4016 CVE-2023-4016 https://bugzilla.redhat.com/2228494 2228494 https://errata.almalinux.org/9/ALSA-2023-6705.html ALSA-2023:6705 ALSA-2023:6705 �8�9procps-ng-3.3.17-13.el9.x86_64.rpm � �9procps-ng-i18n-3.3.17-13.el9.noarch.rpm �8�9procps-ng-3.3.17-13.el9.i686.rpm �8�9procps-ng-3.3.17-13.el9.x86_64.rpm � �9procps-ng-i18n-3.3.17-13.el9.noarch.rpm �8�9procps-ng-3.3.17-13.el9.i686.rpm ����Z��#�~BBBBsecurity Moderate: avahi security update 0���https://access.redhat.com/errata/RHSA-2023:6707 RHSA-2023:6707 RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468 CVE-2021-3468 CVE-2021-3468 https://access.redhat.com/security/cve/CVE-2021-3502 CVE-2021-3502 CVE-2021-3502 https://access.redhat.com/security/cve/CVE-2023-1981 CVE-2023-1981 CVE-2023-1981 https://bugzilla.redhat.com/1939614 1939614 https://bugzilla.redhat.com/1946914 1946914 https://bugzilla.redhat.com/2185911 2185911 https://errata.almalinux.org/9/ALSA-2023-6707.html ALSA-2023:6707 ALSA-2023:6707 ��avahi-libs-0.8-15.el9.i686.rpm � �avahi-0.8-15.el9.i686.rpm � �avahi-0.8-15.el9.x86_64.rpm ��avahi-libs-0.8-15.el9.x86_64.rpm ��avahi-libs-0.8-15.el9.i686.rpm � �avahi-0.8-15.el9.i686.rpm � �avahi-0.8-15.el9.x86_64.rpm ��avahi-libs-0.8-15.el9.x86_64.rpm ����h��$�DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security update 0���Yhttps://access.redhat.com/errata/RHSA-2023:6744 RHSA-2023:6744 RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961 CVE-2023-3961 CVE-2023-3961 https://access.redhat.com/security/cve/CVE-2023-4091 CVE-2023-4091 CVE-2023-4091 https://access.redhat.com/security/cve/CVE-2023-42669 CVE-2023-42669 CVE-2023-42669 https://bugzilla.redhat.com/2241881 2241881 https://bugzilla.redhat.com/2241882 2241882 https://bugzilla.redhat.com/2241884 2241884 https://errata.almalinux.org/9/ALSA-2023-6744.html ALSA-2023:6744 ALSA-2023:6744 �<*samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm �1*samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �/*libwbclient-4.18.6-101.el9_3.alma.1.i686.rpm �W*samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �.*libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm �V*libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm �?*samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm �4*samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm �/*libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm �1*samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm �3*samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm �2*samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �=*samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm �3*samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �0*python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm �.*libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm �>*samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm �:*python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm �X*samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm �W*samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm �V*libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm �W*samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm �q*samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm �V*samba-4.18.6-101.el9_3.alma.1.x86_64.rpm �4*samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm �0*python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm �2*samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm �<*samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm �1*samba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �/*libwbclient-4.18.6-101.el9_3.alma.1.i686.rpm �W*samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �.*libsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm �V*libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm �?*samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm �4*samba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm �/*libwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm �1*samba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm �3*samba-libs-4.18.6-101.el9_3.alma.1.i686.rpm �2*samba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �=*samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm �3*samba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �0*python3-samba-4.18.6-101.el9_3.alma.1.i686.rpm �.*libsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm �>*samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm �:*python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm �X*samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm �W*samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm �V*libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm �W*samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm �q*samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm �V*samba-4.18.6-101.el9_3.alma.1.x86_64.rpm �4*samba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm �0*python3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm �2*samba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm ����0��%�pBBBBBBBBsecurity Important: curl security update 0+��k�}https://access.redhat.com/errata/RHSA-2023:6745 RHSA-2023:6745 RHSA-2023:6745 https://access.redhat.com/security/cve/CVE-2023-38545 CVE-2023-38545 CVE-2023-38545 https://access.redhat.com/security/cve/CVE-2023-38546 CVE-2023-38546 CVE-2023-38546 https://bugzilla.redhat.com/2241933 2241933 https://bugzilla.redhat.com/2241938 2241938 https://errata.almalinux.org/9/ALSA-2023-6745.html ALSA-2023:6745 ALSA-2023:6745 �)�Jcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm z�Jlibcurl-7.76.1-26.el9_3.2.x86_64.rpm �(�Jcurl-7.76.1-26.el9_3.2.x86_64.rpm {�Jlibcurl-minimal-7.76.1-26.el9_3.2.i686.rpm z�Jlibcurl-7.76.1-26.el9_3.2.i686.rpm {�Jlibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm �)�Jcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm z�Jlibcurl-7.76.1-26.el9_3.2.x86_64.rpm �(�Jcurl-7.76.1-26.el9_3.2.x86_64.rpm {�Jlibcurl-minimal-7.76.1-26.el9_3.2.i686.rpm z�Jlibcurl-7.76.1-26.el9_3.2.i686.rpm {�Jlibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm ����!��=�zBsecurity Important: nghttp2 security update 0+��h�-https://access.redhat.com/errata/RHSA-2023:6746 RHSA-2023:6746 RHSA-2023:6746 https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-6746.html ALSA-2023:6746 ALSA-2023:6746 ��Ylibnghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��Ylibnghttp2-1.43.0-5.el9_3.1.i686.rpm ��Ylibnghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��Ylibnghttp2-1.43.0-5.el9_3.1.i686.rpm ����J�
�&�~BBBsecurity Moderate: libxml2 security update 0���https://access.redhat.com/errata/RHSA-2023:7747 RHSA-2023:7747 RHSA-2023:7747 https://access.redhat.com/security/cve/CVE-2023-39615 CVE-2023-39615 CVE-2023-39615 https://bugzilla.redhat.com/2235864 2235864 https://errata.almalinux.org/9/ALSA-2023-7747.html ALSA-2023:7747 ALSA-2023:7747 �N�python3-libxml2-2.9.13-5.el9_3.x86_64.rpm �
�libxml2-2.9.13-5.el9_3.i686.rpm �
�libxml2-2.9.13-5.el9_3.x86_64.rpm �N�python3-libxml2-2.9.13-5.el9_3.x86_64.rpm �
�libxml2-2.9.13-5.el9_3.i686.rpm �
�libxml2-2.9.13-5.el9_3.x86_64.rpm ���N�
��CBsecurity Moderate: opensc security update 0���Khttps://access.redhat.com/errata/RHSA-2023:7879 RHSA-2023:7879 RHSA-2023:7879 https://access.redhat.com/security/cve/CVE-2023-40660 CVE-2023-40660 CVE-2023-40660 https://access.redhat.com/security/cve/CVE-2023-40661 CVE-2023-40661 CVE-2023-40661 https://access.redhat.com/security/cve/CVE-2023-4535 CVE-2023-4535 CVE-2023-4535 https://bugzilla.redhat.com/2240912 2240912 https://bugzilla.redhat.com/2240913 2240913 https://bugzilla.redhat.com/2240914 2240914 https://errata.almalinux.org/9/ALSA-2023-7879.html ALSA-2023:7879 ALSA-2023:7879 ��Nopensc-0.23.0-3.el9_3.x86_64.rpm ��Nopensc-0.23.0-3.el9_3.i686.rpm ��Nopensc-0.23.0-3.el9_3.x86_64.rpm ��Nopensc-0.23.0-3.el9_3.i686.rpm �����
�'�GBBBsecurity Moderate: openssl security update ,��_�Nhttps://access.redhat.com/errata/RHSA-2024:0310 RHSA-2024:0310 RHSA-2024:0310 https://access.redhat.com/security/cve/CVE-2023-5363 CVE-2023-5363 CVE-2023-5363 https://bugzilla.redhat.com/2243839 2243839 https://errata.almalinux.org/9/ALSA-2024-0310.html ALSA-2024:0310 ALSA-2024:0310 �7�topenssl-3.0.7-25.el9_3.x86_64.rpm ��topenssl-libs-3.0.7-25.el9_3.i686.rpm ��topenssl-libs-3.0.7-25.el9_3.x86_64.rpm �7�topenssl-3.0.7-25.el9_3.x86_64.rpm ��topenssl-libs-3.0.7-25.el9_3.i686.rpm ��topenssl-libs-3.0.7-25.el9_3.x86_64.rpm ����[�!
�(�LBBBBBBBBBBBBBBBBBsecurity Moderate: rpm security update ,��-�whttps://access.redhat.com/errata/RHSA-2024:0463 RHSA-2024:0463 RHSA-2024:0463 https://access.redhat.com/security/cve/CVE-2021-35937 CVE-2021-35937 CVE-2021-35937 https://access.redhat.com/security/cve/CVE-2021-35938 CVE-2021-35938 CVE-2021-35938 https://access.redhat.com/security/cve/CVE-2021-35939 CVE-2021-35939 CVE-2021-35939 https://bugzilla.redhat.com/1964114 1964114 https://bugzilla.redhat.com/1964125 1964125 https://bugzilla.redhat.com/1964129 1964129 https://errata.almalinux.org/9/ALSA-2024-0463.html ALSA-2024:0463 ALSA-2024:0463 �s�rpm-sign-4.16.1.3-27.el9_3.x86_64.rpm �>�rpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm �q�rpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm �m�python3-rpm-4.16.1.3-27.el9_3.x86_64.rpm �r�rpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm �=�rpm-libs-4.16.1.3-27.el9_3.i686.rpm �<�rpm-build-libs-4.16.1.3-27.el9_3.i686.rpm �>�rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm �p�rpm-4.16.1.3-27.el9_3.x86_64.rpm �=�rpm-libs-4.16.1.3-27.el9_3.x86_64.rpm �<�rpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm �s�rpm-sign-4.16.1.3-27.el9_3.x86_64.rpm �>�rpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm �q�rpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm �m�python3-rpm-4.16.1.3-27.el9_3.x86_64.rpm �r�rpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm �=�rpm-libs-4.16.1.3-27.el9_3.i686.rpm �<�rpm-build-libs-4.16.1.3-27.el9_3.i686.rpm �>�rpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm �p�rpm-4.16.1.3-27.el9_3.x86_64.rpm �=�rpm-libs-4.16.1.3-27.el9_3.x86_64.rpm �<�rpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm ��˰2�"
� �security Moderate: python-urllib3 security update ,��$�https://access.redhat.com/errata/RHSA-2024:0464 RHSA-2024:0464 RHSA-2024:0464 https://access.redhat.com/security/cve/CVE-2023-43804 CVE-2023-43804 CVE-2023-43804 https://access.redhat.com/security/cve/CVE-2023-45803 CVE-2023-45803 CVE-2023-45803 https://bugzilla.redhat.com/2242493 2242493 https://bugzilla.redhat.com/2246840 2246840 https://errata.almalinux.org/9/ALSA-2024-0464.html ALSA-2024:0464 ALSA-2024:0464 �G� python3-urllib3-1.26.5-3.el9_3.1.noarch.rpm �G� python3-urllib3-1.26.5-3.el9_3.1.noarch.rpm ��˭�#
�)�aBsecurity Moderate: sqlite security update ,��;�https://access.redhat.com/errata/RHSA-2024:0465 RHSA-2024:0465 RHSA-2024:0465 https://access.redhat.com/security/cve/CVE-2023-7104 CVE-2023-7104 CVE-2023-7104 https://bugzilla.redhat.com/2256194 2256194 https://errata.almalinux.org/9/ALSA-2024-0465.html ALSA-2024:0465 ALSA-2024:0465 �X�sqlite-libs-3.34.1-7.el9_3.i686.rpm �X�sqlite-libs-3.34.1-7.el9_3.x86_64.rpm �X�sqlite-libs-3.34.1-7.el9_3.i686.rpm �X�sqlite-libs-3.34.1-7.el9_3.x86_64.rpm ��˩6�$
�*�dBBBsecurity Moderate: python3.9 security update ,��C�chttps://access.redhat.com/errata/RHSA-2024:0466 RHSA-2024:0466 RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043 CVE-2023-27043 CVE-2023-27043 https://bugzilla.redhat.com/2196183 2196183 https://errata.almalinux.org/9/ALSA-2024-0466.html ALSA-2024:0466 ALSA-2024:0466 -�python3-libs-3.9.18-1.el9_3.1.x86_64.rpm ��python3-3.9.18-1.el9_3.1.x86_64.rpm -�python3-libs-3.9.18-1.el9_3.1.i686.rpm -�python3-libs-3.9.18-1.el9_3.1.x86_64.rpm ��python3-3.9.18-1.el9_3.1.x86_64.rpm -�python3-libs-3.9.18-1.el9_3.1.i686.rpm ��ˤ�%
�<�iBBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update ,��&�!https://access.redhat.com/errata/RHSA-2024:0468 RHSA-2024:0468 RHSA-2024:0468 https://access.redhat.com/security/cve/CVE-2023-4001 CVE-2023-4001 CVE-2023-4001 https://bugzilla.redhat.com/2224951 2224951 https://errata.almalinux.org/9/ALSA-2024-0468.html ALSA-2024:0468 ALSA-2024:0468 �:� grub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �;� grub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �f� grub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm �g� grub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm �9� grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm �� grub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �<� grub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �e� grub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm �k� grub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm �j� grub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm �i� grub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm �h� grub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm �:� grub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �;� grub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �f� grub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm �g� grub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm �9� grub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm �� grub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �<� grub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �e� grub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm �k� grub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm �j� grub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm �i� grub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm �h� grub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm ��Όr�&
�+�}Bsecurity Moderate: gnutls security update ,��G�Ghttps://access.redhat.com/errata/RHSA-2024:0533 RHSA-2024:0533 RHSA-2024:0533 https://access.redhat.com/security/cve/CVE-2023-5981 CVE-2023-5981 CVE-2023-5981 https://access.redhat.com/security/cve/CVE-2024-0553 CVE-2024-0553 CVE-2024-0553 https://access.redhat.com/security/cve/CVE-2024-0567 CVE-2024-0567 CVE-2024-0567 https://bugzilla.redhat.com/2248445 2248445 https://bugzilla.redhat.com/2258412 2258412 https://bugzilla.redhat.com/2258544 2258544 https://errata.almalinux.org/9/ALSA-2024-0533.html ALSA-2024:0533 ALSA-2024:0533 �!�
gnutls-3.7.6-23.el9_3.3.i686.rpm �!�
gnutls-3.7.6-23.el9_3.3.x86_64.rpm �!�
gnutls-3.7.6-23.el9_3.3.i686.rpm �!�
gnutls-3.7.6-23.el9_3.3.x86_64.rpm ��߲
�'
�8�lBBBBBBBBBBsecurity Moderate: nss security update ,���:https://access.redhat.com/errata/RHSA-2024:0790 RHSA-2024:0790 RHSA-2024:0790 https://access.redhat.com/security/cve/CVE-2023-6135 CVE-2023-6135 CVE-2023-6135 https://bugzilla.redhat.com/2249906 2249906 https://errata.almalinux.org/9/ALSA-2024-0790.html ALSA-2024:0790 ALSA-2024:0790 �h�Pnss-util-3.90.0-6.el9_3.x86_64.rpm �f�Pnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm �c�,nspr-4.35.0-6.el9_3.x86_64.rpm �g�Pnss-sysinit-3.90.0-6.el9_3.x86_64.rpm �d�Pnss-3.90.0-6.el9_3.x86_64.rpm �e�Pnss-softokn-3.90.0-6.el9_3.x86_64.rpm �h�Pnss-util-3.90.0-6.el9_3.x86_64.rpm �f�Pnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm �c�,nspr-4.35.0-6.el9_3.x86_64.rpm �g�Pnss-sysinit-3.90.0-6.el9_3.x86_64.rpm �d�Pnss-3.90.0-6.el9_3.x86_64.rpm �e�Pnss-softokn-3.90.0-6.el9_3.x86_64.rpm ����4�(
�9�@security Moderate: sudo security update ,��H�|https://access.redhat.com/errata/RHSA-2024:0811 RHSA-2024:0811 RHSA-2024:0811 https://access.redhat.com/security/cve/CVE-2023-28486 CVE-2023-28486 CVE-2023-28486 https://access.redhat.com/security/cve/CVE-2023-28487 CVE-2023-28487 CVE-2023-28487 https://access.redhat.com/security/cve/CVE-2023-42465 CVE-2023-42465 CVE-2023-42465 https://bugzilla.redhat.com/2179272 2179272 https://bugzilla.redhat.com/2179273 2179273 https://bugzilla.redhat.com/2255568 2255568 https://errata.almalinux.org/9/ALSA-2024-0811.html ALSA-2024:0811 ALSA-2024:0811 �L�sudo-1.9.5p2-10.el9_3.x86_64.rpm �L�sudo-1.9.5p2-10.el9_3.x86_64.rpm ����[�)
��BBsecurity Moderate: opensc security update ,��D�https://access.redhat.com/errata/RHSA-2024:0966 RHSA-2024:0966 RHSA-2024:0966 https://access.redhat.com/security/cve/CVE-2023-5992 CVE-2023-5992 CVE-2023-5992 https://bugzilla.redhat.com/2248685 2248685 https://errata.almalinux.org/9/ALSA-2024-0966.html ALSA-2024:0966 ALSA-2024:0966 ��Oopensc-0.23.0-4.el9_3.i686.rpm ��Oopensc-0.23.0-4.el9_3.x86_64.rpm ��Oopensc-0.23.0-4.el9_3.i686.rpm ��Oopensc-0.23.0-4.el9_3.x86_64.rpm ����E�*
�:�FBsecurity Important: pam:1.5.1 security update ,+��V�[https://access.redhat.com/errata/RHSA-2024:10244 RHSA-2024:10244 RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963 CVE-2024-10963 CVE-2024-10963 https://bugzilla.redhat.com/2324291 2324291 https://errata.almalinux.org/9/ALSA-2024-10244.html ALSA-2024:10244 ALSA-2024:10244 �A�]pam-1.5.1-22.el9_5.x86_64.rpm �A�]pam-1.5.1-22.el9_5.i686.rpm �A�]pam-1.5.1-22.el9_5.x86_64.rpm �A�]pam-1.5.1-22.el9_5.i686.rpm ����g�+
�;�IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,��1�https://access.redhat.com/errata/RHSA-2024:10274 RHSA-2024:10274 RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009 CVE-2024-41009 CVE-2024-41009 https://access.redhat.com/security/cve/CVE-2024-42244 CVE-2024-42244 CVE-2024-42244 https://access.redhat.com/security/cve/CVE-2024-50226 CVE-2024-50226 CVE-2024-50226 https://bugzilla.redhat.com/2298412 2298412 https://bugzilla.redhat.com/2324876 2324876 https://errata.almalinux.org/9/ALSA-2024-10274.html ALSA-2024:10274 ALSA-2024:10274 4kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm 4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm %4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm "4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm 1�Fbpftool-7.4.0-503.15.1.el9_5.x86_64.rpm 4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm !4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm 24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm 4kernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm %4kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm "4kernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm 1�Fbpftool-7.4.0-503.15.1.el9_5.x86_64.rpm 4kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm !4kernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-5.14.0-503.15.1.el9_5.x86_64.rpm 24python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm ���� �,
�<�lsecurity Important: tuned security update ,+��P�https://access.redhat.com/errata/RHSA-2024:10384 RHSA-2024:10384 RHSA-2024:10384 https://access.redhat.com/security/cve/CVE-2024-52336 CVE-2024-52336 CVE-2024-52336 https://access.redhat.com/security/cve/CVE-2024-52337 CVE-2024-52337 CVE-2024-52337 https://bugzilla.redhat.com/2324540 2324540 https://bugzilla.redhat.com/2324541 2324541 https://errata.almalinux.org/9/ALSA-2024-10384.html ALSA-2024:10384 ALSA-2024:10384 �%�Etuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm �$�Etuned-2.24.0-2.el9_5.alma.1.noarch.rpm �%�Etuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm �$�Etuned-2.24.0-2.el9_5.alma.1.noarch.rpm ����^�-
�=�nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,��n�Ahttps://access.redhat.com/errata/RHSA-2024:10939 RHSA-2024:10939 RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615 CVE-2024-26615 CVE-2024-26615 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-44994 CVE-2024-44994 CVE-2024-44994 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://access.redhat.com/security/cve/CVE-2024-46695 CVE-2024-46695 CVE-2024-46695 https://access.redhat.com/security/cve/CVE-2024-49949 CVE-2024-49949 CVE-2024-49949 https://access.redhat.com/security/cve/CVE-2024-50251 CVE-2024-50251 CVE-2024-50251 https://bugzilla.redhat.com/2267355 2267355 https://bugzilla.redhat.com/2309857 2309857 https://bugzilla.redhat.com/2311715 2311715 https://bugzilla.redhat.com/2312083 2312083 https://bugzilla.redhat.com/2320505 2320505 https://bugzilla.redhat.com/2324886 2324886 https://errata.almalinux.org/9/ALSA-2024-10939.html ALSA-2024:10939 ALSA-2024:10939 %5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm 1�Gbpftool-7.4.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm "5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm 25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm 5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm !5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm %5kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm 1�Gbpftool-7.4.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm "5kernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm 25python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm 5kernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm !5kernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 5kernel-5.14.0-503.16.1.el9_5.x86_64.rpm ����5�.
�>�QBBBsecurity Moderate: python3.9:3.9.21 security update ,��/�https://access.redhat.com/errata/RHSA-2024:10983 RHSA-2024:10983 RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168 CVE-2024-11168 CVE-2024-11168 https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440 https://bugzilla.redhat.com/2325776 2325776 https://errata.almalinux.org/9/ALSA-2024-10983.html ALSA-2024:10983 ALSA-2024:10983 -�python3-libs-3.9.21-1.el9_5.x86_64.rpm ��python3-3.9.21-1.el9_5.x86_64.rpm -�python3-libs-3.9.21-1.el9_5.i686.rpm -�python3-libs-3.9.21-1.el9_5.x86_64.rpm ��python3-3.9.21-1.el9_5.x86_64.rpm -�python3-libs-3.9.21-1.el9_5.i686.rpm ����E�/
�?�VBsecurity Moderate: pam security update ,��M�?https://access.redhat.com/errata/RHSA-2024:11250 RHSA-2024:11250 RHSA-2024:11250 https://access.redhat.com/security/cve/CVE-2024-10041 CVE-2024-10041 CVE-2024-10041 https://bugzilla.redhat.com/2319212 2319212 https://errata.almalinux.org/9/ALSA-2024-11250.html ALSA-2024:11250 ALSA-2024:11250 �A�\pam-1.5.1-21.el9_5.i686.rpm �A�\pam-1.5.1-21.el9_5.x86_64.rpm �A�\pam-1.5.1-21.el9_5.i686.rpm �A�\pam-1.5.1-21.el9_5.x86_64.rpm �����0
� �YBBBBBBBBsecurity Moderate: curl security update ,���@https://access.redhat.com/errata/RHSA-2024:1129 RHSA-2024:1129 RHSA-2024:1129 https://access.redhat.com/security/cve/CVE-2023-46218 CVE-2023-46218 CVE-2023-46218 https://bugzilla.redhat.com/2252030 2252030 https://errata.almalinux.org/9/ALSA-2024-1129.html ALSA-2024:1129 ALSA-2024:1129 {�Klibcurl-minimal-7.76.1-26.el9_3.3.i686.rpm {�Klibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm �)�Kcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm z�Klibcurl-7.76.1-26.el9_3.3.x86_64.rpm z�Klibcurl-7.76.1-26.el9_3.3.i686.rpm �(�Kcurl-7.76.1-26.el9_3.3.x86_64.rpm {�Klibcurl-minimal-7.76.1-26.el9_3.3.i686.rpm {�Klibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm �)�Kcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm z�Klibcurl-7.76.1-26.el9_3.3.x86_64.rpm z�Klibcurl-7.76.1-26.el9_3.3.i686.rpm �(�Kcurl-7.76.1-26.el9_3.3.x86_64.rpm ����7�1
��cBBBBBBsecurity Moderate: openssh security update ,��L�0https://access.redhat.com/errata/RHSA-2024:1130 RHSA-2024:1130 RHSA-2024:1130 https://access.redhat.com/security/cve/CVE-2023-48795 CVE-2023-48795 CVE-2023-48795 https://access.redhat.com/security/cve/CVE-2023-51385 CVE-2023-51385 CVE-2023-51385 https://bugzilla.redhat.com/2254210 2254210 https://bugzilla.redhat.com/2255271 2255271 https://errata.almalinux.org/9/ALSA-2024-1130.html ALSA-2024:1130 ALSA-2024:1130 �o�uopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm �m�uopenssh-8.7p1-34.el9_3.3.x86_64.rpm �n�uopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpm �p�uopenssh-server-8.7p1-34.el9_3.3.x86_64.rpm �o�uopenssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm �m�uopenssh-8.7p1-34.el9_3.3.x86_64.rpm �n�uopenssh-clients-8.7p1-34.el9_3.3.x86_64.rpm �p�uopenssh-server-8.7p1-34.el9_3.3.x86_64.rpm ����R�2
��kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��|�c$https://access.redhat.com/errata/RHSA-2024:11486 RHSA-2024:11486 RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399 CVE-2024-27399 CVE-2024-27399 https://access.redhat.com/security/cve/CVE-2024-38564 CVE-2024-38564 CVE-2024-38564 https://access.redhat.com/security/cve/CVE-2024-45020 CVE-2024-45020 CVE-2024-45020 https://access.redhat.com/security/cve/CVE-2024-46697 CVE-2024-46697 CVE-2024-46697 https://access.redhat.com/security/cve/CVE-2024-47675 CVE-2024-47675 CVE-2024-47675 https://access.redhat.com/security/cve/CVE-2024-49888 CVE-2024-49888 CVE-2024-49888 https://access.redhat.com/security/cve/CVE-2024-50099 CVE-2024-50099 CVE-2024-50099 https://access.redhat.com/security/cve/CVE-2024-50110 CVE-2024-50110 CVE-2024-50110 https://access.redhat.com/security/cve/CVE-2024-50115 CVE-2024-50115 CVE-2024-50115 https://access.redhat.com/security/cve/CVE-2024-50124 CVE-2024-50124 CVE-2024-50124 https://access.redhat.com/security/cve/CVE-2024-50125 CVE-2024-50125 CVE-2024-50125 https://access.redhat.com/security/cve/CVE-2024-50142 CVE-2024-50142 CVE-2024-50142 https://access.redhat.com/security/cve/CVE-2024-50148 CVE-2024-50148 CVE-2024-50148 https://access.redhat.com/security/cve/CVE-2024-50192 CVE-2024-50192 CVE-2024-50192 https://access.redhat.com/security/cve/CVE-2024-50223 CVE-2024-50223 CVE-2024-50223 https://access.redhat.com/security/cve/CVE-2024-50255 CVE-2024-50255 CVE-2024-50255 https://access.redhat.com/security/cve/CVE-2024-50262 CVE-2024-50262 CVE-2024-50262 https://bugzilla.redhat.com/2280462 2280462 https://bugzilla.redhat.com/2293429 2293429 https://bugzilla.redhat.com/2311717 2311717 https://bugzilla.redhat.com/2312085 2312085 https://bugzilla.redhat.com/2320254 2320254 https://bugzilla.redhat.com/2320517 2320517 https://bugzilla.redhat.com/2323904 2323904 https://bugzilla.redhat.com/2323930 2323930 https://bugzilla.redhat.com/2323937 2323937 https://bugzilla.redhat.com/2323944 2323944 https://bugzilla.redhat.com/2323955 2323955 https://bugzilla.redhat.com/2324315 2324315 https://bugzilla.redhat.com/2324332 2324332 https://bugzilla.redhat.com/2324612 2324612 https://bugzilla.redhat.com/2324867 2324867 https://bugzilla.redhat.com/2324868 2324868 https://bugzilla.redhat.com/2324892 2324892 https://errata.almalinux.org/9/ALSA-2024-11486.html ALSA-2024:11486 ALSA-2024:11486 6kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm 1�Hbpftool-7.4.0-503.19.1.el9_5.x86_64.rpm 6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm "6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm 26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm %6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm !6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-abi-stablelists-5.14.0-503.19.1.el9_5.noarch.rpm 1�Hbpftool-7.4.0-503.19.1.el9_5.x86_64.rpm 6kernel-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-modules-extra-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm "6kernel-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-modules-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-tools-5.14.0-503.19.1.el9_5.x86_64.rpm 26python3-perf-5.14.0-503.19.1.el9_5.x86_64.rpm %6kernel-uki-virt-addons-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-tools-libs-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.19.1.el9_5.x86_64.rpm !6kernel-modules-core-5.14.0-503.19.1.el9_5.x86_64.rpm 6kernel-debug-uki-virt-5.14.0-503.19.1.el9_5.x86_64.rpm ����m�3
��NBBBBBBBsecurity Moderate: opencryptoki security update ,��_�Whttps://access.redhat.com/errata/RHSA-2024:1239 RHSA-2024:1239 RHSA-2024:1239 https://access.redhat.com/security/cve/CVE-2024-0914 CVE-2024-0914 CVE-2024-0914 https://bugzilla.redhat.com/2260407 2260407 https://errata.almalinux.org/9/ALSA-2024-1239.html ALSA-2024:1239 ALSA-2024:1239 �0�Topencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm �0�Topencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm �p�Topencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm �o�Topencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm �n�Topencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm �0�Topencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm �0�Topencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm �p�Topencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm �o�Topencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm �n�Topencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm ����E�4
��XBsecurity Moderate: expat security update ,��6�Bhttps://access.redhat.com/errata/RHSA-2024:1530 RHSA-2024:1530 RHSA-2024:1530 https://access.redhat.com/security/cve/CVE-2023-52425 CVE-2023-52425 CVE-2023-52425 https://access.redhat.com/security/cve/CVE-2024-28757 CVE-2024-28757 CVE-2024-28757 https://bugzilla.redhat.com/2262877 2262877 https://bugzilla.redhat.com/2268766 2268766 https://errata.almalinux.org/9/ALSA-2024-1530.html ALSA-2024:1530 ALSA-2024:1530 � �nexpat-2.5.0-1.el9_3.1.x86_64.rpm � �nexpat-2.5.0-1.el9_3.1.i686.rpm � �nexpat-2.5.0-1.el9_3.1.x86_64.rpm � �nexpat-2.5.0-1.el9_3.1.i686.rpm �����5
��[security Moderate: less security update ,��x�#https://access.redhat.com/errata/RHSA-2024:1692 RHSA-2024:1692 RHSA-2024:1692 https://access.redhat.com/security/cve/CVE-2022-48624 CVE-2022-48624 CVE-2022-48624 https://bugzilla.redhat.com/2265081 2265081 https://errata.almalinux.org/9/ALSA-2024-1692.html ALSA-2024:1692 ALSA-2024:1692 �K�2less-590-3.el9_3.x86_64.rpm �K�2less-590-3.el9_3.x86_64.rpm ����|�6
��^Bsecurity Moderate: gnutls security update ,���https://access.redhat.com/errata/RHSA-2024:1879 RHSA-2024:1879 RHSA-2024:1879 https://access.redhat.com/security/cve/CVE-2024-28834 CVE-2024-28834 CVE-2024-28834 https://access.redhat.com/security/cve/CVE-2024-28835 CVE-2024-28835 CVE-2024-28835 https://bugzilla.redhat.com/2269084 2269084 https://bugzilla.redhat.com/2269228 2269228 https://errata.almalinux.org/9/ALSA-2024-1879.html ALSA-2024:1879 ALSA-2024:1879 �!�gnutls-3.7.6-23.el9_3.4.i686.rpm �!�gnutls-3.7.6-23.el9_3.4.x86_64.rpm �!�gnutls-3.7.6-23.el9_3.4.i686.rpm �!�gnutls-3.7.6-23.el9_3.4.x86_64.rpm �����7
�#�asecurity Important: shim bug fix update ,+��-�Mhttps://access.redhat.com/errata/RHSA-2024:1903 RHSA-2024:1903 RHSA-2024:1903 https://access.redhat.com/security/cve/CVE-2023-40546 CVE-2023-40546 CVE-2023-40546 https://access.redhat.com/security/cve/CVE-2023-40547 CVE-2023-40547 CVE-2023-40547 https://access.redhat.com/security/cve/CVE-2023-40548 CVE-2023-40548 CVE-2023-40548 https://access.redhat.com/security/cve/CVE-2023-40549 CVE-2023-40549 CVE-2023-40549 https://access.redhat.com/security/cve/CVE-2023-40550 CVE-2023-40550 CVE-2023-40550 https://access.redhat.com/security/cve/CVE-2023-40551 CVE-2023-40551 CVE-2023-40551 https://bugzilla.redhat.com/2234589 2234589 https://bugzilla.redhat.com/2241782 2241782 https://bugzilla.redhat.com/2241796 2241796 https://bugzilla.redhat.com/2241797 2241797 https://bugzilla.redhat.com/2259915 2259915 https://bugzilla.redhat.com/2259918 2259918 https://errata.almalinux.org/9/ALSA-2024-1903.html ALSA-2024:1903 ALSA-2024:1903 �z�shim-x64-15.8-4.el9_3.alma.1.x86_64.rpm �z�shim-x64-15.8-4.el9_3.alma.1.x86_64.rpm ����x�8
��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update ,+��z�%zhttps://access.redhat.com/errata/RHSA-2024:2394 RHSA-2024:2394 RHSA-2024:2394 https://bugzilla.redhat.com/1918601 1918601 https://bugzilla.redhat.com/2049700 2049700 https://bugzilla.redhat.com/2133452 2133452 https://bugzilla.redhat.com/2151959 2151959 https://bugzilla.redhat.com/2177759 2177759 https://bugzilla.redhat.com/2185519 2185519 https://bugzilla.redhat.com/2188102 2188102 https://bugzilla.redhat.com/2210024 2210024 https://bugzilla.redhat.com/2213132 2213132 https://bugzilla.redhat.com/2218332 2218332 https://bugzilla.redhat.com/2219359 2219359 https://bugzilla.redhat.com/2221039 2221039 https://bugzilla.redhat.com/2221463 2221463 https://bugzilla.redhat.com/2221702 2221702 https://bugzilla.redhat.com/2226777 2226777 https://bugzilla.redhat.com/2226787 2226787 https://bugzilla.redhat.com/2226788 2226788 https://bugzilla.redhat.com/2231410 2231410 https://bugzilla.redhat.com/2239845 2239845 https://bugzilla.redhat.com/2239848 2239848 https://bugzilla.redhat.com/2244720 2244720 https://bugzilla.redhat.com/2246980 2246980 https://bugzilla.redhat.com/2250043 2250043 https://bugzilla.redhat.com/2252731 2252731 https://bugzilla.redhat.com/2253034 2253034 https://bugzilla.redhat.com/2253632 2253632 https://bugzilla.redhat.com/2254961 2254961 https://bugzilla.redhat.com/2254982 2254982 https://bugzilla.redhat.com/2255283 2255283 https://bugzilla.redhat.com/2255498 2255498 https://bugzilla.redhat.com/2256490 2256490 https://bugzilla.redhat.com/2256822 2256822 https://bugzilla.redhat.com/2257682 2257682 https://bugzilla.redhat.com/2258013 2258013 https://bugzilla.redhat.com/2258518 2258518 https://bugzilla.redhat.com/2260005 2260005 https://bugzilla.redhat.com/2262126 2262126 https://bugzilla.redhat.com/2262127 2262127 https://bugzilla.redhat.com/2265285 2265285 https://bugzilla.redhat.com/2265517 2265517 https://bugzilla.redhat.com/2265518 2265518 https://bugzilla.redhat.com/2265519 2265519 https://bugzilla.redhat.com/2265520 2265520 https://bugzilla.redhat.com/2265645 2265645 https://bugzilla.redhat.com/2265646 2265646 https://bugzilla.redhat.com/2265653 2265653 https://bugzilla.redhat.com/2267041 2267041 https://bugzilla.redhat.com/2267695 2267695 https://bugzilla.redhat.com/2267750 2267750 https://bugzilla.redhat.com/2267758 2267758 https://bugzilla.redhat.com/2267760 2267760 https://bugzilla.redhat.com/2267761 2267761 https://bugzilla.redhat.com/2267788 2267788 https://bugzilla.redhat.com/2267795 2267795 https://bugzilla.redhat.com/2269189 2269189 https://bugzilla.redhat.com/2269217 2269217 https://bugzilla.redhat.com/2270080 2270080 https://bugzilla.redhat.com/2270118 2270118 https://bugzilla.redhat.com/2270883 2270883 https://errata.almalinux.org/9/ALSA-2024-2394.html ALSA-2024:2394 ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.html CVE-2020-26555 CVE-2020-26555 https://www.redhat.com/security/data/cve/CVE-2022-0480.html CVE-2022-0480 CVE-2022-0480 https://www.redhat.com/security/data/cve/CVE-2022-38096.html CVE-2022-38096 CVE-2022-38096 https://www.redhat.com/security/data/cve/CVE-2022-45934.html CVE-2022-45934 CVE-2022-45934 https://www.redhat.com/security/data/cve/CVE-2023-24023.html CVE-2023-24023 CVE-2023-24023 https://www.redhat.com/security/data/cve/CVE-2023-25775.html CVE-2023-25775 CVE-2023-25775 https://www.redhat.com/security/data/cve/CVE-2023-28464.html CVE-2023-28464 CVE-2023-28464 https://www.redhat.com/security/data/cve/CVE-2023-28866.html CVE-2023-28866 CVE-2023-28866 https://www.redhat.com/security/data/cve/CVE-2023-31083.html CVE-2023-31083 CVE-2023-31083 https://www.redhat.com/security/data/cve/CVE-2023-3567.html CVE-2023-3567 CVE-2023-3567 https://www.redhat.com/security/data/cve/CVE-2023-37453.html CVE-2023-37453 CVE-2023-37453 https://www.redhat.com/security/data/cve/CVE-2023-39189.html CVE-2023-39189 CVE-2023-39189 https://www.redhat.com/security/data/cve/CVE-2023-39193.html CVE-2023-39193 CVE-2023-39193 https://www.redhat.com/security/data/cve/CVE-2023-39194.html CVE-2023-39194 CVE-2023-39194 https://www.redhat.com/security/data/cve/CVE-2023-39198.html CVE-2023-39198 CVE-2023-39198 https://www.redhat.com/security/data/cve/CVE-2023-4133.html CVE-2023-4133 CVE-2023-4133 https://www.redhat.com/security/data/cve/CVE-2023-42754.html CVE-2023-42754 CVE-2023-42754 https://www.redhat.com/security/data/cve/CVE-2023-42756.html CVE-2023-42756 CVE-2023-42756 https://www.redhat.com/security/data/cve/CVE-2023-45863.html CVE-2023-45863 CVE-2023-45863 https://www.redhat.com/security/data/cve/CVE-2023-46862.html CVE-2023-46862 CVE-2023-46862 https://www.redhat.com/security/data/cve/CVE-2023-51043.html CVE-2023-51043 CVE-2023-51043 https://www.redhat.com/security/data/cve/CVE-2023-51779.html CVE-2023-51779 CVE-2023-51779 https://www.redhat.com/security/data/cve/CVE-2023-51780.html CVE-2023-51780 CVE-2023-51780 https://www.redhat.com/security/data/cve/CVE-2023-52434.html CVE-2023-52434 CVE-2023-52434 https://www.redhat.com/security/data/cve/CVE-2023-52448.html CVE-2023-52448 CVE-2023-52448 https://www.redhat.com/security/data/cve/CVE-2023-52450.html CVE-2023-52450 CVE-2023-52450 https://www.redhat.com/security/data/cve/CVE-2023-52476.html CVE-2023-52476 CVE-2023-52476 https://www.redhat.com/security/data/cve/CVE-2023-52489.html CVE-2023-52489 CVE-2023-52489 https://www.redhat.com/security/data/cve/CVE-2023-52522.html CVE-2023-52522 CVE-2023-52522 https://www.redhat.com/security/data/cve/CVE-2023-52529.html CVE-2023-52529 CVE-2023-52529 https://www.redhat.com/security/data/cve/CVE-2023-52574.html CVE-2023-52574 CVE-2023-52574 https://www.redhat.com/security/data/cve/CVE-2023-52578.html CVE-2023-52578 CVE-2023-52578 https://www.redhat.com/security/data/cve/CVE-2023-52580.html CVE-2023-52580 CVE-2023-52580 https://www.redhat.com/security/data/cve/CVE-2023-52581.html CVE-2023-52581 CVE-2023-52581 https://www.redhat.com/security/data/cve/CVE-2023-52597.html CVE-2023-52597 CVE-2023-52597 https://www.redhat.com/security/data/cve/CVE-2023-52610.html CVE-2023-52610 CVE-2023-52610 https://www.redhat.com/security/data/cve/CVE-2023-52620.html CVE-2023-52620 CVE-2023-52620 https://www.redhat.com/security/data/cve/CVE-2023-6040.html CVE-2023-6040 CVE-2023-6040 https://www.redhat.com/security/data/cve/CVE-2023-6121.html CVE-2023-6121 CVE-2023-6121 https://www.redhat.com/security/data/cve/CVE-2023-6176.html CVE-2023-6176 CVE-2023-6176 https://www.redhat.com/security/data/cve/CVE-2023-6531.html CVE-2023-6531 CVE-2023-6531 https://www.redhat.com/security/data/cve/CVE-2023-6546.html CVE-2023-6546 CVE-2023-6546 https://www.redhat.com/security/data/cve/CVE-2023-6622.html CVE-2023-6622 CVE-2023-6622 https://www.redhat.com/security/data/cve/CVE-2023-6915.html CVE-2023-6915 CVE-2023-6915 https://www.redhat.com/security/data/cve/CVE-2023-6931.html CVE-2023-6931 CVE-2023-6931 https://www.redhat.com/security/data/cve/CVE-2023-6932.html CVE-2023-6932 CVE-2023-6932 https://www.redhat.com/security/data/cve/CVE-2024-0565.html CVE-2024-0565 CVE-2024-0565 https://www.redhat.com/security/data/cve/CVE-2024-0841.html CVE-2024-0841 CVE-2024-0841 https://www.redhat.com/security/data/cve/CVE-2024-1085.html CVE-2024-1085 CVE-2024-1085 https://www.redhat.com/security/data/cve/CVE-2024-1086.html CVE-2024-1086 CVE-2024-1086 https://www.redhat.com/security/data/cve/CVE-2024-25744.html CVE-2024-25744 CVE-2024-25744 https://www.redhat.com/security/data/cve/CVE-2024-26582.html CVE-2024-26582 CVE-2024-26582 https://www.redhat.com/security/data/cve/CVE-2024-26583.html CVE-2024-26583 CVE-2024-26583 https://www.redhat.com/security/data/cve/CVE-2024-26584.html CVE-2024-26584 CVE-2024-26584 https://www.redhat.com/security/data/cve/CVE-2024-26585.html CVE-2024-26585 CVE-2024-26585 https://www.redhat.com/security/data/cve/CVE-2024-26586.html CVE-2024-26586 CVE-2024-26586 https://www.redhat.com/security/data/cve/CVE-2024-26593.html CVE-2024-26593 CVE-2024-26593 https://www.redhat.com/security/data/cve/CVE-2024-26602.html CVE-2024-26602 CVE-2024-26602 https://www.redhat.com/security/data/cve/CVE-2024-26609.html CVE-2024-26609 CVE-2024-26609 https://www.redhat.com/security/data/cve/CVE-2024-26633.html CVE-2024-26633 CVE-2024-26633 https://www.redhat.com/security/data/cve/CVE-2024-26671.html CVE-2024-26671 CVE-2024-26671 Ckernel-5.14.0-427.13.1.el9_4.x86_64.rpm !Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpm Ckernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm 2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm "Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm 1�8bpftool-7.3.0-427.13.1.el9_4.x86_64.rpm Ckernel-5.14.0-427.13.1.el9_4.x86_64.rpm !Ckernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpm Ckernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm 2Cpython3-perf-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm "Ckernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm Ckernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm 1�8bpftool-7.3.0-427.13.1.el9_4.x86_64.rpm ����'�9
��Esecurity Moderate: squashfs-tools security update ,���https://access.redhat.com/errata/RHSA-2024:2396 RHSA-2024:2396 RHSA-2024:2396 https://access.redhat.com/security/cve/CVE-2021-40153 CVE-2021-40153 CVE-2021-40153 https://access.redhat.com/security/cve/CVE-2021-41072 CVE-2021-41072 CVE-2021-41072 https://bugzilla.redhat.com/1998621 1998621 https://bugzilla.redhat.com/2004957 2004957 https://errata.almalinux.org/9/ALSA-2024-2396.html ALSA-2024:2396 ALSA-2024:2396 �u�-squashfs-tools-4.4-10.git1.el9.x86_64.rpm �u�-squashfs-tools-4.4-10.git1.el9.x86_64.rpm ����:
��HBsecurity Moderate: harfbuzz security update ,��>�{https://access.redhat.com/errata/RHSA-2024:2410 RHSA-2024:2410 RHSA-2024:2410 https://access.redhat.com/security/cve/CVE-2023-25193 CVE-2023-25193 CVE-2023-25193 https://bugzilla.redhat.com/2167254 2167254 https://errata.almalinux.org/9/ALSA-2024-2410.html ALSA-2024:2410 ALSA-2024:2410 �'�xharfbuzz-2.7.4-10.el9.x86_64.rpm �'�xharfbuzz-2.7.4-10.el9.i686.rpm �'�xharfbuzz-2.7.4-10.el9.x86_64.rpm �'�xharfbuzz-2.7.4-10.el9.i686.rpm ��� �;
��KBBBBsecurity Moderate: avahi security update ,��9�Ohttps://access.redhat.com/errata/RHSA-2024:2433 RHSA-2024:2433 RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469 CVE-2023-38469 CVE-2023-38469 https://access.redhat.com/security/cve/CVE-2023-38470 CVE-2023-38470 CVE-2023-38470 https://access.redhat.com/security/cve/CVE-2023-38471 CVE-2023-38471 CVE-2023-38471 https://access.redhat.com/security/cve/CVE-2023-38472 CVE-2023-38472 CVE-2023-38472 https://access.redhat.com/security/cve/CVE-2023-38473 CVE-2023-38473 CVE-2023-38473 https://bugzilla.redhat.com/2191687 2191687 https://bugzilla.redhat.com/2191690 2191690 https://bugzilla.redhat.com/2191691 2191691 https://bugzilla.redhat.com/2191692 2191692 https://bugzilla.redhat.com/2191694 2191694 https://errata.almalinux.org/9/ALSA-2024-2433.html ALSA-2024:2433 ALSA-2024:2433 �� avahi-libs-0.8-20.el9.x86_64.rpm � � avahi-0.8-20.el9.x86_64.rpm �� avahi-libs-0.8-20.el9.i686.rpm � � avahi-0.8-20.el9.i686.rpm �� avahi-libs-0.8-20.el9.x86_64.rpm � � avahi-0.8-20.el9.x86_64.rpm �� avahi-libs-0.8-20.el9.i686.rpm � � avahi-0.8-20.el9.i686.rpm ����<
��Qsecurity Moderate: exfatprogs security update ,���https://access.redhat.com/errata/RHSA-2024:2437 RHSA-2024:2437 RHSA-2024:2437 https://access.redhat.com/security/cve/CVE-2023-45897 CVE-2023-45897 CVE-2023-45897 https://bugzilla.redhat.com/2246976 2246976 https://errata.almalinux.org/9/ALSA-2024-2437.html ALSA-2024:2437 ALSA-2024:2437 �V�exfatprogs-1.2.2-2.el9.x86_64.rpm �V�exfatprogs-1.2.2-2.el9.x86_64.rpm ����=
��TBsecurity Moderate: pam security update ,���Ohttps://access.redhat.com/errata/RHSA-2024:2438 RHSA-2024:2438 RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365 CVE-2024-22365 CVE-2024-22365 https://bugzilla.redhat.com/2257722 2257722 https://errata.almalinux.org/9/ALSA-2024-2438.html ALSA-2024:2438 ALSA-2024:2438 �A�[pam-1.5.1-19.el9.x86_64.rpm �A�[pam-1.5.1-19.el9.i686.rpm �A�[pam-1.5.1-19.el9.x86_64.rpm �A�[pam-1.5.1-19.el9.i686.rpm ���
�>
� �WBBBsecurity Low: openssl and openssl-fips-provider security update ,�6��_�/https://access.redhat.com/errata/RHSA-2024:2447 RHSA-2024:2447 RHSA-2024:2447 https://access.redhat.com/security/cve/CVE-2023-2975 CVE-2023-2975 CVE-2023-2975 https://access.redhat.com/security/cve/CVE-2023-3446 CVE-2023-3446 CVE-2023-3446 https://access.redhat.com/security/cve/CVE-2023-3817 CVE-2023-3817 CVE-2023-3817 https://access.redhat.com/security/cve/CVE-2023-5678 CVE-2023-5678 CVE-2023-5678 https://access.redhat.com/security/cve/CVE-2023-6129 CVE-2023-6129 CVE-2023-6129 https://access.redhat.com/security/cve/CVE-2023-6237 CVE-2023-6237 CVE-2023-6237 https://access.redhat.com/security/cve/CVE-2024-0727 CVE-2024-0727 CVE-2024-0727 https://bugzilla.redhat.com/2223016 2223016 https://bugzilla.redhat.com/2224962 2224962 https://bugzilla.redhat.com/2227852 2227852 https://bugzilla.redhat.com/2248616 2248616 https://bugzilla.redhat.com/2257571 2257571 https://bugzilla.redhat.com/2258502 2258502 https://bugzilla.redhat.com/2259944 2259944 https://errata.almalinux.org/9/ALSA-2024-2447.html ALSA-2024:2447 ALSA-2024:2447 ��uopenssl-libs-3.0.7-27.el9.i686.rpm ��uopenssl-libs-3.0.7-27.el9.x86_64.rpm �7�uopenssl-3.0.7-27.el9.x86_64.rpm ��uopenssl-libs-3.0.7-27.el9.i686.rpm ��uopenssl-libs-3.0.7-27.el9.x86_64.rpm �7�uopenssl-3.0.7-27.el9.x86_64.rpm ����?
�.�\BBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update ,���Thttps://access.redhat.com/errata/RHSA-2024:2456 RHSA-2024:2456 RHSA-2024:2456 https://access.redhat.com/security/cve/CVE-2023-4692 CVE-2023-4692 CVE-2023-4692 https://access.redhat.com/security/cve/CVE-2023-4693 CVE-2023-4693 CVE-2023-4693 https://access.redhat.com/security/cve/CVE-2024-1048 CVE-2024-1048 CVE-2024-1048 https://bugzilla.redhat.com/2236613 2236613 https://bugzilla.redhat.com/2238343 2238343 https://bugzilla.redhat.com/2256827 2256827 https://errata.almalinux.org/9/ALSA-2024-2456.html ALSA-2024:2456 ALSA-2024:2456 �<�grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm �h�grub2-tools-2.06-77.el9.alma.1.x86_64.rpm �g�grub2-pc-2.06-77.el9.alma.1.x86_64.rpm �j�grub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm �e�grub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm �f�grub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm �;�grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm �:�grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm �9�grub2-common-2.06-77.el9.alma.1.noarch.rpm �k�grub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm �h�grub2-tools-2.06-77.el9.alma.1.x86_64.rpm �g�grub2-pc-2.06-77.el9.alma.1.x86_64.rpm �j�grub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm �e�grub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm �f�grub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm �;�grub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm �:�grub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm �9�grub2-common-2.06-77.el9.alma.1.noarch.rpm �k�grub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm ���F�@
�
�oBBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update ,��b�https://access.redhat.com/errata/RHSA-2024:2463 RHSA-2024:2463 RHSA-2024:2463 https://access.redhat.com/security/cve/CVE-2023-7008 CVE-2023-7008 CVE-2023-7008 https://bugzilla.redhat.com/2222672 2222672 https://errata.almalinux.org/9/ALSA-2024-2463.html ALSA-2024:2463 ALSA-2024:2463 �x�rhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm �Z�systemd-container-252-32.el9_4.alma.1.i686.rpm �C�systemd-udev-252-32.el9_4.alma.1.x86_64.rpm �@�systemd-oomd-252-32.el9_4.alma.1.x86_64.rpm �Y�systemd-252-32.el9_4.alma.1.x86_64.rpm �[�systemd-libs-252-32.el9_4.alma.1.i686.rpm �[�systemd-libs-252-32.el9_4.alma.1.x86_64.rpm �Y�systemd-252-32.el9_4.alma.1.i686.rpm �A�systemd-pam-252-32.el9_4.alma.1.x86_64.rpm �Z�systemd-container-252-32.el9_4.alma.1.x86_64.rpm �B�systemd-resolved-252-32.el9_4.alma.1.x86_64.rpm �n�systemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm �x�rhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm �Z�systemd-container-252-32.el9_4.alma.1.i686.rpm �C�systemd-udev-252-32.el9_4.alma.1.x86_64.rpm �@�systemd-oomd-252-32.el9_4.alma.1.x86_64.rpm �Y�systemd-252-32.el9_4.alma.1.x86_64.rpm �[�systemd-libs-252-32.el9_4.alma.1.i686.rpm �[�systemd-libs-252-32.el9_4.alma.1.x86_64.rpm �Y�systemd-252-32.el9_4.alma.1.i686.rpm �A�systemd-pam-252-32.el9_4.alma.1.x86_64.rpm �Z�systemd-container-252-32.el9_4.alma.1.x86_64.rpm �B�systemd-resolved-252-32.el9_4.alma.1.x86_64.rpm �n�systemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm ����A
��Bsecurity Moderate: traceroute security update ,��c�https://access.redhat.com/errata/RHSA-2024:2483 RHSA-2024:2483 RHSA-2024:2483 https://access.redhat.com/security/cve/CVE-2023-46316 CVE-2023-46316 CVE-2023-46316 https://bugzilla.redhat.com/2246303 2246303 https://errata.almalinux.org/9/ALSA-2024-2483.html ALSA-2024:2483 ALSA-2024:2483 �y�+traceroute-2.1.0-18.el9.x86_64.rpm �y�+traceroute-2.1.0-18.el9.x86_64.rpm ����B
��EBBsecurity Low: libssh security update ,�6��v�https://access.redhat.com/errata/RHSA-2024:2504 RHSA-2024:2504 RHSA-2024:2504 https://access.redhat.com/security/cve/CVE-2023-6004 CVE-2023-6004 CVE-2023-6004 https://access.redhat.com/security/cve/CVE-2023-6918 CVE-2023-6918 CVE-2023-6918 https://bugzilla.redhat.com/2251110 2251110 https://bugzilla.redhat.com/2254997 2254997 https://errata.almalinux.org/9/ALSA-2024-2504.html ALSA-2024:2504 ALSA-2024:2504 �@�5libssh-0.10.4-13.el9.x86_64.rpm ��5libssh-config-0.10.4-13.el9.noarch.rpm �@�5libssh-0.10.4-13.el9.i686.rpm �@�5libssh-0.10.4-13.el9.x86_64.rpm ��5libssh-config-0.10.4-13.el9.noarch.rpm �@�5libssh-0.10.4-13.el9.i686.rpm ���'�C
��IBBBsecurity Low: file security update ,�6��~�Bhttps://access.redhat.com/errata/RHSA-2024:2512 RHSA-2024:2512 RHSA-2024:2512 https://access.redhat.com/security/cve/CVE-2022-48554 CVE-2022-48554 CVE-2022-48554 https://bugzilla.redhat.com/2235714 2235714 https://errata.almalinux.org/9/ALSA-2024-2512.html ALSA-2024:2512 ALSA-2024:2512 ��!file-libs-5.39-16.el9.x86_64.rpm �X�!file-5.39-16.el9.x86_64.rpm ��!file-libs-5.39-16.el9.i686.rpm ��!file-libs-5.39-16.el9.x86_64.rpm �X�!file-5.39-16.el9.x86_64.rpm ��!file-libs-5.39-16.el9.i686.rpm ����D
��Nsecurity Moderate: wpa_supplicant security update ,��@�bhttps://access.redhat.com/errata/RHSA-2024:2517 RHSA-2024:2517 RHSA-2024:2517 https://access.redhat.com/security/cve/CVE-2023-52160 CVE-2023-52160 CVE-2023-52160 https://bugzilla.redhat.com/2264593 2264593 https://errata.almalinux.org/9/ALSA-2024-2517.html ALSA-2024:2517 ALSA-2024:2517 �}�wpa_supplicant-2.10-5.el9.x86_64.rpm �}�wpa_supplicant-2.10-5.el9.x86_64.rpm ����E
�
�QBsecurity Moderate: gnutls security update ,��"�https://access.redhat.com/errata/RHSA-2024:2570 RHSA-2024:2570 RHSA-2024:2570 https://access.redhat.com/security/cve/CVE-2024-28834 CVE-2024-28834 CVE-2024-28834 https://access.redhat.com/security/cve/CVE-2024-28835 CVE-2024-28835 CVE-2024-28835 https://bugzilla.redhat.com/2269084 2269084 https://bugzilla.redhat.com/2269228 2269228 https://errata.almalinux.org/9/ALSA-2024-2570.html ALSA-2024:2570 ALSA-2024:2570 �!�gnutls-3.8.3-4.el9_4.x86_64.rpm �!�gnutls-3.8.3-4.el9_4.i686.rpm �!�gnutls-3.8.3-4.el9_4.x86_64.rpm �!�gnutls-3.8.3-4.el9_4.i686.rpm ���A�F
��TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: sssd security and bug fix update ,��3�Hhttps://access.redhat.com/errata/RHSA-2024:2571 RHSA-2024:2571 RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758 CVE-2023-3758 CVE-2023-3758 https://bugzilla.redhat.com/2223762 2223762 https://errata.almalinux.org/9/ALSA-2024-2571.html ALSA-2024:2571 ALSA-2024:2571 #�w#python3-sssdconfig-2.9.4-6.el9_4.noarch.rpm �(#libipa_hbac-2.9.4-6.el9_4.x86_64.rpm �3#sssd-client-2.9.4-6.el9_4.i686.rpm �t#python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �}#sssd-common-2.9.4-6.el9_4.x86_64.rpm �{#sssd-2.9.4-6.el9_4.x86_64.rpm �v#python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm �.#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm �|#sssd-ad-2.9.4-6.el9_4.x86_64.rpm �#sssd-proxy-2.9.4-6.el9_4.x86_64.rpm �#sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm �.#libsss_simpleifp-2.9.4-6.el9_4.i686.rpm �#sssd-passkey-2.9.4-6.el9_4.x86_64.rpm � #sssd-tools-2.9.4-6.el9_4.x86_64.rpm �-#libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �#sssd-dbus-2.9.4-6.el9_4.x86_64.rpm �(#libipa_hbac-2.9.4-6.el9_4.i686.rpm �+#libsss_certmap-2.9.4-6.el9_4.i686.rpm �~#sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm �s#python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm �#sssd-ldap-2.9.4-6.el9_4.x86_64.rpm �#sssd-kcm-2.9.4-6.el9_4.x86_64.rpm �,#libsss_idmap-2.9.4-6.el9_4.i686.rpm �l#libsss_sudo-2.9.4-6.el9_4.x86_64.rpm �
#sssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm �#sssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm �k#libsss_autofs-2.9.4-6.el9_4.x86_64.rpm � #sssd-ipa-2.9.4-6.el9_4.x86_64.rpm �#sssd-krb5-2.9.4-6.el9_4.x86_64.rpm �+#libsss_certmap-2.9.4-6.el9_4.x86_64.rpm �#sssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm �3#sssd-client-2.9.4-6.el9_4.x86_64.rpm �,#libsss_idmap-2.9.4-6.el9_4.x86_64.rpm �u#python3-sss-2.9.4-6.el9_4.x86_64.rpm �-#libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm #�w#python3-sssdconfig-2.9.4-6.el9_4.noarch.rpm �(#libipa_hbac-2.9.4-6.el9_4.x86_64.rpm �3#sssd-client-2.9.4-6.el9_4.i686.rpm �t#python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �}#sssd-common-2.9.4-6.el9_4.x86_64.rpm �{#sssd-2.9.4-6.el9_4.x86_64.rpm �v#python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm �.#libsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm �|#sssd-ad-2.9.4-6.el9_4.x86_64.rpm �#sssd-proxy-2.9.4-6.el9_4.x86_64.rpm �#sssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm �.#libsss_simpleifp-2.9.4-6.el9_4.i686.rpm �#sssd-passkey-2.9.4-6.el9_4.x86_64.rpm � #sssd-tools-2.9.4-6.el9_4.x86_64.rpm �-#libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �#sssd-dbus-2.9.4-6.el9_4.x86_64.rpm �(#libipa_hbac-2.9.4-6.el9_4.i686.rpm �+#libsss_certmap-2.9.4-6.el9_4.i686.rpm �~#sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm �s#python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm �#sssd-ldap-2.9.4-6.el9_4.x86_64.rpm �#sssd-kcm-2.9.4-6.el9_4.x86_64.rpm �,#libsss_idmap-2.9.4-6.el9_4.i686.rpm �l#libsss_sudo-2.9.4-6.el9_4.x86_64.rpm �
#sssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm �#sssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm �k#libsss_autofs-2.9.4-6.el9_4.x86_64.rpm � #sssd-ipa-2.9.4-6.el9_4.x86_64.rpm �#sssd-krb5-2.9.4-6.el9_4.x86_64.rpm �+#libsss_certmap-2.9.4-6.el9_4.x86_64.rpm �#sssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm �3#sssd-client-2.9.4-6.el9_4.x86_64.rpm �,#libsss_idmap-2.9.4-6.el9_4.x86_64.rpm �u#python3-sss-2.9.4-6.el9_4.x86_64.rpm �-#libsss_nss_idmap-2.9.4-6.el9_4.i686.rpm ���#�G
��SBBBsecurity Moderate: libxml2 security update ,��{�nhttps://access.redhat.com/errata/RHSA-2024:2679 RHSA-2024:2679 RHSA-2024:2679 https://access.redhat.com/security/cve/CVE-2024-25062 CVE-2024-25062 CVE-2024-25062 https://bugzilla.redhat.com/2262726 2262726 https://errata.almalinux.org/9/ALSA-2024-2679.html ALSA-2024:2679 ALSA-2024:2679 �N�python3-libxml2-2.9.13-6.el9_4.x86_64.rpm �
�libxml2-2.9.13-6.el9_4.x86_64.rpm �
�libxml2-2.9.13-6.el9_4.i686.rpm �N�python3-libxml2-2.9.13-6.el9_4.x86_64.rpm �
�libxml2-2.9.13-6.el9_4.x86_64.rpm �
�libxml2-2.9.13-6.el9_4.i686.rpm ����k�H
��XBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ,��i�&https://access.redhat.com/errata/RHSA-2024:2758 RHSA-2024:2758 RHSA-2024:2758 https://bugzilla.redhat.com/2250843 2250843 https://bugzilla.redhat.com/2270836 2270836 https://errata.almalinux.org/9/ALSA-2024-2758.html ALSA-2024:2758 ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.html CVE-2023-5090 CVE-2023-5090 https://www.redhat.com/security/data/cve/CVE-2023-6240.html CVE-2023-6240 CVE-2023-6240 https://www.redhat.com/security/data/cve/CVE-2024-25742.html CVE-2024-25742 CVE-2024-25742 https://www.redhat.com/security/data/cve/CVE-2024-25743.html CVE-2024-25743 CVE-2024-25743 Dkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpm Dkernel-5.14.0-427.16.1.el9_4.x86_64.rpm 2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm 1�9bpftool-7.3.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm !Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm "Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpm Dkernel-5.14.0-427.16.1.el9_4.x86_64.rpm 2Dpython3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm 1�9bpftool-7.3.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm !Dkernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm "Dkernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm Dkernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm ����t�I
��yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ,���xhttps://access.redhat.com/errata/RHSA-2024:3306 RHSA-2024:3306 RHSA-2024:3306 https://bugzilla.redhat.com/2270879 2270879 https://bugzilla.redhat.com/2270881 2270881 https://bugzilla.redhat.com/2272816 2272816 https://bugzilla.redhat.com/2273423 2273423 https://errata.almalinux.org/9/ALSA-2024-3306.html ALSA-2024:3306 ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.html CVE-2024-26642 CVE-2024-26642 https://www.redhat.com/security/data/cve/CVE-2024-26643.html CVE-2024-26643 CVE-2024-26643 https://www.redhat.com/security/data/cve/CVE-2024-26673.html CVE-2024-26673 CVE-2024-26673 https://www.redhat.com/security/data/cve/CVE-2024-26804.html CVE-2024-26804 CVE-2024-26804 https://www.redhat.com/security/data/cve/CVE-2024-35890.html CVE-2024-35890 CVE-2024-35890 Ekernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm "Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpm Ekernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-core-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm !Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-5.14.0-427.18.1.el9_4.x86_64.rpm 2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm 1�:bpftool-7.3.0-427.18.1.el9_4.x86_64.rpm Ekernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm "Ekernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpm Ekernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-core-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm !Ekernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpm Ekernel-5.14.0-427.18.1.el9_4.x86_64.rpm 2Epython3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm 1�:bpftool-7.3.0-427.18.1.el9_4.x86_64.rpm ����"�J
��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: glibc security update ,+���https://access.redhat.com/errata/RHSA-2024:3339 RHSA-2024:3339 RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961 CVE-2024-2961 CVE-2024-2961 https://access.redhat.com/security/cve/CVE-2024-33599 CVE-2024-33599 CVE-2024-33599 https://access.redhat.com/security/cve/CVE-2024-33600 CVE-2024-33600 CVE-2024-33600 https://access.redhat.com/security/cve/CVE-2024-33601 CVE-2024-33601 CVE-2024-33601 https://access.redhat.com/security/cve/CVE-2024-33602 CVE-2024-33602 CVE-2024-33602 https://bugzilla.redhat.com/2273404 2273404 https://bugzilla.redhat.com/2277202 2277202 https://bugzilla.redhat.com/2277204 2277204 https://bugzilla.redhat.com/2277205 2277205 https://bugzilla.redhat.com/2277206 2277206 https://errata.almalinux.org/9/ALSA-2024-3339.html ALSA-2024:3339 ALSA-2024:3339 �P�glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm �_glibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm �Cglibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm �Unscd-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm �Jglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm �aglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm �qglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm �pglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm �Yglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm �^glibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm �Kglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm �Dglibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm �Uglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm �Mglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm �Bglibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm �
glibc-common-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm �Qglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm �Lglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm �dglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm �iglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm �Nglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm �kglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm �~glibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm �lglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm �|glibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm �Cglibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm �Iglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm �Gglibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm �+glibc-2.34-100.el9_4.2.x86_64.rpm �vglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm �zglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm �Wglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm �Nglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm �Oglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm �-libnsl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm �Pglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm �nglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm �!glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm �
glibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm �Sglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm �oglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm �Rglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm �cglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm �{glibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm �Zglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm �hglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm �Eglibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm �Fglibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm �`glibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm �glibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm �eglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm �yglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm �Xglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm �Hglibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm �Pglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm �Sglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm �Tglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm �Oglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm �Aglibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm �wglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm �Hglibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm �fglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm �Eglibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm �
glibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm �Tglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm �[glibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm �@glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm �+glibc-2.34-100.el9_4.2.i686.rpm �!glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm �Aglibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm �-libnsl-2.34-100.el9_4.2.i686.rpm �,glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm �Qglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm �Iglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm �Fglibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm �tglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm �uglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm �Gglibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm �}glibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm �Dglibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm �Bglibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm �]glibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm �,glibc-gconv-extra-2.34-100.el9_4.2.i686.rpm �mglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm �Rglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm �Lglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm �xglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm �rglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm �\glibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm �Vglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm �Jglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm �Kglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm �Mglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm �@glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm �sglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm �bglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm �jglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm �gglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm �P�glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm �_glibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm �Cglibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm �Unscd-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm �Jglibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm �aglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm �qglibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm �pglibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm �Yglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm �^glibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm �Kglibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm �Dglibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm �Uglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm �Mglibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm �Bglibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm �
glibc-common-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm �Qglibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm �Lglibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm �dglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm �iglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm �Nglibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm �kglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm �~glibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm �lglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm �|glibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm �Cglibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm �Iglibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm �Gglibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm �+glibc-2.34-100.el9_4.2.x86_64.rpm �vglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm �zglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm �Wglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm �Nglibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm �Oglibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm �-libnsl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm �Pglibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm �nglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm �!glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm �
glibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm �Sglibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm �oglibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm �Rglibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm �cglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm �{glibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm �Zglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm �hglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm �Eglibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm �Fglibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm �`glibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm �glibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm �eglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm �yglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm �Xglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm �Hglibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm �Pglibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm �Sglibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm �Tglibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm �Oglibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm �Aglibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm �wglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm �Hglibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm �fglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm �Eglibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm �
glibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm �Tglibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm �[glibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm �@glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm �+glibc-2.34-100.el9_4.2.i686.rpm �!glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm �Aglibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm �-libnsl-2.34-100.el9_4.2.i686.rpm �,glibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm �Qglibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm �Iglibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm �Fglibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm �tglibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm �uglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm �Gglibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm �}glibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm �Dglibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm �Bglibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm �]glibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm �,glibc-gconv-extra-2.34-100.el9_4.2.i686.rpm �mglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm �Rglibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm �Lglibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm �xglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm �rglibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm �\glibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm �Vglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm �Jglibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm �Kglibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm �Mglibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm �@glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm �sglibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm �bglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm �jglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm �gglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm ����"�K
�:�wBsecurity Moderate: nghttp2 security update ,���mhttps://access.redhat.com/errata/RHSA-2024:3501 RHSA-2024:3501 RHSA-2024:3501 https://access.redhat.com/security/cve/CVE-2024-28182 CVE-2024-28182 CVE-2024-28182 https://bugzilla.redhat.com/2268639 2268639 https://errata.almalinux.org/9/ALSA-2024-3501.html ALSA-2024:3501 ALSA-2024:3501 ��Zlibnghttp2-1.43.0-5.el9_4.3.i686.rpm ��Zlibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm ��Zlibnghttp2-1.43.0-5.el9_4.3.i686.rpm ��Zlibnghttp2-1.43.0-5.el9_4.3.x86_64.rpm ���<�L
�=�{security Important: less security update ,+���zhttps://access.redhat.com/errata/RHSA-2024:3513 RHSA-2024:3513 RHSA-2024:3513 https://access.redhat.com/security/cve/CVE-2024-32487 CVE-2024-32487 CVE-2024-32487 https://bugzilla.redhat.com/2274980 2274980 https://errata.almalinux.org/9/ALSA-2024-3513.html ALSA-2024:3513 ALSA-2024:3513 �K�3less-590-4.el9_4.x86_64.rpm �K�3less-590-4.el9_4.x86_64.rpm ���U�M
��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ,��~�bhttps://access.redhat.com/errata/RHSA-2024:3619 RHSA-2024:3619 RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735 CVE-2024-26735 CVE-2024-26735 https://access.redhat.com/security/cve/CVE-2024-26993 CVE-2024-26993 CVE-2024-26993 https://bugzilla.redhat.com/2273278 2273278 https://bugzilla.redhat.com/2278314 2278314 https://errata.almalinux.org/9/ALSA-2024-3619.html ALSA-2024:3619 ALSA-2024:3619 Fkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm 2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm 1�;bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm "Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm !Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpm Fkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm 2Fpython3-perf-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm 1�;bpftool-7.3.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm "Fkernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm !Fkernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpm Fkernel-core-5.14.0-427.20.1.el9_4.x86_64.rpm Fkernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm ����O�N
��_Bsecurity Low: c-ares security update ,�6��`�https://access.redhat.com/errata/RHSA-2024:3842 RHSA-2024:3842 RHSA-2024:3842 https://access.redhat.com/security/cve/CVE-2024-25629 CVE-2024-25629 CVE-2024-25629 https://bugzilla.redhat.com/2265713 2265713 https://errata.almalinux.org/9/ALSA-2024-3842.html ALSA-2024:3842 ALSA-2024:3842 ��Uc-ares-1.19.1-2.el9_4.i686.rpm ��Uc-ares-1.19.1-2.el9_4.x86_64.rpm ��Uc-ares-1.19.1-2.el9_4.i686.rpm ��Uc-ares-1.19.1-2.el9_4.x86_64.rpm ����W�O
��bBBBBBBsecurity Moderate: cockpit security update ,��b�Ehttps://access.redhat.com/errata/RHSA-2024:3843 RHSA-2024:3843 RHSA-2024:3843 https://access.redhat.com/security/cve/CVE-2024-2947 CVE-2024-2947 CVE-2024-2947 https://bugzilla.redhat.com/2271614 2271614 https://errata.almalinux.org/9/ALSA-2024-3843.html ALSA-2024:3843 ALSA-2024:3843 �W�ccockpit-system-311.2-1.el9_4.noarch.rpm �X�ccockpit-ws-311.2-1.el9_4.x86_64.rpm �T�ccockpit-311.2-1.el9_4.x86_64.rpm �V�ccockpit-doc-311.2-1.el9_4.noarch.rpm �U�ccockpit-bridge-311.2-1.el9_4.x86_64.rpm �W�ccockpit-system-311.2-1.el9_4.noarch.rpm �X�ccockpit-ws-311.2-1.el9_4.x86_64.rpm �T�ccockpit-311.2-1.el9_4.x86_64.rpm �V�ccockpit-doc-311.2-1.el9_4.noarch.rpm �U�ccockpit-bridge-311.2-1.el9_4.x86_64.rpm ����c�P
�+�*security Moderate: python-idna security update ,��'�https://access.redhat.com/errata/RHSA-2024:3846 RHSA-2024:3846 RHSA-2024:3846 https://access.redhat.com/security/cve/CVE-2024-3651 CVE-2024-3651 CVE-2024-3651 https://bugzilla.redhat.com/2274779 2274779 https://errata.almalinux.org/9/ALSA-2024-3846.html ALSA-2024:3846 ALSA-2024:3846 �"�python3-idna-2.10-7.el9_4.1.noarch.rpm �"�python3-idna-2.10-7.el9_4.1.noarch.rpm ����O�Q
��lBBBsecurity Important: python3.9 security update ,+��+�https://access.redhat.com/errata/RHSA-2024:4078 RHSA-2024:4078 RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597 CVE-2023-6597 CVE-2023-6597 https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://bugzilla.redhat.com/2276518 2276518 https://bugzilla.redhat.com/2276525 2276525 https://errata.almalinux.org/9/ALSA-2024-4078.html ALSA-2024:4078 ALSA-2024:4078 -�python3-libs-3.9.18-3.el9_4.1.x86_64.rpm ��python3-3.9.18-3.el9_4.1.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.1.i686.rpm -�python3-libs-3.9.18-3.el9_4.1.x86_64.rpm ��python3-3.9.18-3.el9_4.1.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.1.i686.rpm ����R
��qBBBBBBsecurity Important: openssh security update ,+��@�shttps://access.redhat.com/errata/RHSA-2024:4312 RHSA-2024:4312 RHSA-2024:4312 https://access.redhat.com/security/cve/CVE-2024-6387 CVE-2024-6387 CVE-2024-6387 https://bugzilla.redhat.com/2294604 2294604 https://errata.almalinux.org/9/ALSA-2024-4312.html ALSA-2024:4312 ALSA-2024:4312 �p�vopenssh-server-8.7p1-38.el9_4.1.x86_64.rpm �m�vopenssh-8.7p1-38.el9_4.1.x86_64.rpm �n�vopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpm �o�vopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm �p�vopenssh-server-8.7p1-38.el9_4.1.x86_64.rpm �m�vopenssh-8.7p1-38.el9_4.1.x86_64.rpm �n�vopenssh-clients-8.7p1-38.el9_4.1.x86_64.rpm �o�vopenssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm �����S
��yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ,��3�https://access.redhat.com/errata/RHSA-2024:4349 RHSA-2024:4349 RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400 CVE-2021-47400 CVE-2021-47400 https://access.redhat.com/security/cve/CVE-2023-52626 CVE-2023-52626 CVE-2023-52626 https://access.redhat.com/security/cve/CVE-2023-52667 CVE-2023-52667 CVE-2023-52667 https://access.redhat.com/security/cve/CVE-2024-26801 CVE-2024-26801 CVE-2024-26801 https://access.redhat.com/security/cve/CVE-2024-26974 CVE-2024-26974 CVE-2024-26974 https://access.redhat.com/security/cve/CVE-2024-27393 CVE-2024-27393 CVE-2024-27393 https://access.redhat.com/security/cve/CVE-2024-35870 CVE-2024-35870 CVE-2024-35870 https://access.redhat.com/security/cve/CVE-2024-35960 CVE-2024-35960 CVE-2024-35960 https://bugzilla.redhat.com/2271680 2271680 https://bugzilla.redhat.com/2273429 2273429 https://bugzilla.redhat.com/2278354 2278354 https://bugzilla.redhat.com/2280745 2280745 https://bugzilla.redhat.com/2281350 2281350 https://bugzilla.redhat.com/2281740 2281740 https://bugzilla.redhat.com/2281920 2281920 https://bugzilla.redhat.com/2282336 2282336 https://errata.almalinux.org/9/ALSA-2024-4349.html ALSA-2024:4349 ALSA-2024:4349 Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm !Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-5.14.0-427.24.1.el9_4.x86_64.rpm "Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm 1�<bpftool-7.3.0-427.24.1.el9_4.x86_64.rpm Gkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm 2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm !Gkernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-5.14.0-427.24.1.el9_4.x86_64.rpm "Gkernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm 1�<bpftool-7.3.0-427.24.1.el9_4.x86_64.rpm Gkernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm 2Gpython3-perf-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm Gkernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm ����{�T
��ZBBBBBBsecurity Moderate: openssh security update ,��A�https://access.redhat.com/errata/RHSA-2024:4457 RHSA-2024:4457 RHSA-2024:4457 https://access.redhat.com/security/cve/CVE-2024-6409 CVE-2024-6409 CVE-2024-6409 https://bugzilla.redhat.com/2295085 2295085 https://errata.almalinux.org/9/ALSA-2024-4457.html ALSA-2024:4457 ALSA-2024:4457 �o�wopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm �n�wopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpm �p�wopenssh-server-8.7p1-38.el9_4.4.x86_64.rpm �m�wopenssh-8.7p1-38.el9_4.4.x86_64.rpm �o�wopenssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm �n�wopenssh-clients-8.7p1-38.el9_4.4.x86_64.rpm �p�wopenssh-server-8.7p1-38.el9_4.4.x86_64.rpm �m�wopenssh-8.7p1-38.el9_4.4.x86_64.rpm ��ߴ�U
��bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update ,+��G�$https://access.redhat.com/errata/RHSA-2024:4583 RHSA-2024:4583 RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548 CVE-2021-47548 CVE-2021-47548 https://access.redhat.com/security/cve/CVE-2021-47596 CVE-2021-47596 CVE-2021-47596 https://access.redhat.com/security/cve/CVE-2022-48627 CVE-2022-48627 CVE-2022-48627 https://access.redhat.com/security/cve/CVE-2023-52638 CVE-2023-52638 CVE-2023-52638 https://access.redhat.com/security/cve/CVE-2024-26783 CVE-2024-26783 CVE-2024-26783 https://access.redhat.com/security/cve/CVE-2024-26858 CVE-2024-26858 CVE-2024-26858 https://access.redhat.com/security/cve/CVE-2024-27397 CVE-2024-27397 CVE-2024-27397 https://access.redhat.com/security/cve/CVE-2024-27435 CVE-2024-27435 CVE-2024-27435 https://access.redhat.com/security/cve/CVE-2024-35958 CVE-2024-35958 CVE-2024-35958 https://access.redhat.com/security/cve/CVE-2024-36270 CVE-2024-36270 CVE-2024-36270 https://access.redhat.com/security/cve/CVE-2024-36886 CVE-2024-36886 CVE-2024-36886 https://access.redhat.com/security/cve/CVE-2024-36904 CVE-2024-36904 CVE-2024-36904 https://access.redhat.com/security/cve/CVE-2024-36957 CVE-2024-36957 CVE-2024-36957 https://access.redhat.com/security/cve/CVE-2024-38543 CVE-2024-38543 CVE-2024-38543 https://access.redhat.com/security/cve/CVE-2024-38586 CVE-2024-38586 CVE-2024-38586 https://access.redhat.com/security/cve/CVE-2024-38593 CVE-2024-38593 CVE-2024-38593 https://access.redhat.com/security/cve/CVE-2024-38663 CVE-2024-38663 CVE-2024-38663 https://bugzilla.redhat.com/2267509 2267509 https://bugzilla.redhat.com/2273082 2273082 https://bugzilla.redhat.com/2273466 2273466 https://bugzilla.redhat.com/2275735 2275735 https://bugzilla.redhat.com/2277238 2277238 https://bugzilla.redhat.com/2280434 2280434 https://bugzilla.redhat.com/2281131 2281131 https://bugzilla.redhat.com/2281925 2281925 https://bugzilla.redhat.com/2283401 2283401 https://bugzilla.redhat.com/2284541 2284541 https://bugzilla.redhat.com/2284581 2284581 https://bugzilla.redhat.com/2293230 2293230 https://bugzilla.redhat.com/2293380 2293380 https://bugzilla.redhat.com/2293402 2293402 https://bugzilla.redhat.com/2293456 2293456 https://bugzilla.redhat.com/2293653 2293653 https://bugzilla.redhat.com/2294225 2294225 https://errata.almalinux.org/9/ALSA-2024-4583.html ALSA-2024:4583 ALSA-2024:4583 Hkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpm Hkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-5.14.0-427.26.1.el9_4.x86_64.rpm 1�=bpftool-7.3.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm 2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm !Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm "Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpm Hkernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-core-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-5.14.0-427.26.1.el9_4.x86_64.rpm 1�=bpftool-7.3.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm 2Hpython3-perf-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm !Hkernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm Hkernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm "Hkernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm ����&�V
��CBsecurity Important: libndp security update ,+��a�[https://access.redhat.com/errata/RHSA-2024:4636 RHSA-2024:4636 RHSA-2024:4636 https://access.redhat.com/security/cve/CVE-2024-5564 CVE-2024-5564 CVE-2024-5564 https://bugzilla.redhat.com/2284122 2284122 https://errata.almalinux.org/9/ALSA-2024-4636.html ALSA-2024:4636 ALSA-2024:4636 �/�clibndp-1.8-6.el9_4.alma.1.i686.rpm �/�clibndp-1.8-6.el9_4.alma.1.x86_64.rpm �/�clibndp-1.8-6.el9_4.alma.1.i686.rpm �/�clibndp-1.8-6.el9_4.alma.1.x86_64.rpm ����W
��GBBBBBBBBBBBBBBBsecurity Moderate: linux-firmware security update ,��<�#https://access.redhat.com/errata/RHSA-2024:4774 RHSA-2024:4774 RHSA-2024:4774 https://access.redhat.com/security/cve/CVE-2023-31346 CVE-2023-31346 CVE-2023-31346 https://bugzilla.redhat.com/2250458 2250458 https://errata.almalinux.org/9/ALSA-2024-4774.html ALSA-2024:4774 ALSA-2024:4774 �b�^iwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �h�iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm �c�Ciwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �g�^iwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �e�iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm �m�[netronome-firmware-20240603-143.1.el9_4.noarch.rpm �]�iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �`�^iwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �_�^iwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �j�[libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm �^�iwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �k�[linux-firmware-20240603-143.1.el9_4.noarch.rpm �f�^iwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm �i�Ciwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �l�[linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm �a�^iwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �b�^iwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �h�iwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm �c�Ciwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �g�^iwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �e�iwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm �m�[netronome-firmware-20240603-143.1.el9_4.noarch.rpm �]�iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �`�^iwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �_�^iwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �j�[libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm �^�iwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �k�[linux-firmware-20240603-143.1.el9_4.noarch.rpm �f�^iwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm �i�Ciwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �l�[linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm �a�^iwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm ����a�X
��YBsecurity Moderate: cups security update ,��_�
https://access.redhat.com/errata/RHSA-2024:4776 RHSA-2024:4776 RHSA-2024:4776 https://access.redhat.com/security/cve/CVE-2024-35235 CVE-2024-35235 CVE-2024-35235 https://bugzilla.redhat.com/2290318 2290318 https://errata.almalinux.org/9/ALSA-2024-4776.html ALSA-2024:4776 ALSA-2024:4776 �*�fcups-libs-2.3.3op2-27.el9_4.i686.rpm �*�fcups-libs-2.3.3op2-27.el9_4.x86_64.rpm �*�fcups-libs-2.3.3op2-27.el9_4.i686.rpm �*�fcups-libs-2.3.3op2-27.el9_4.x86_64.rpm ����Z�Y
��\BBBsecurity Low: python3 security update ,�6��i�,https://access.redhat.com/errata/RHSA-2024:4779 RHSA-2024:4779 RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://bugzilla.redhat.com/2292921 2292921 https://errata.almalinux.org/9/ALSA-2024-4779.html ALSA-2024:4779 ALSA-2024:4779 ��python3-3.9.18-3.el9_4.3.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.3.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.3.i686.rpm ��python3-3.9.18-3.el9_4.3.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.3.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.3.i686.rpm ����^�Z
��aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,���1$https://access.redhat.com/errata/RHSA-2024:4928 RHSA-2024:4928 RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459 CVE-2021-47459 CVE-2021-47459 https://access.redhat.com/security/cve/CVE-2022-48743 CVE-2022-48743 CVE-2022-48743 https://access.redhat.com/security/cve/CVE-2023-52458 CVE-2023-52458 CVE-2023-52458 https://access.redhat.com/security/cve/CVE-2023-52809 CVE-2023-52809 CVE-2023-52809 https://access.redhat.com/security/cve/CVE-2024-26737 CVE-2024-26737 CVE-2024-26737 https://access.redhat.com/security/cve/CVE-2024-26773 CVE-2024-26773 CVE-2024-26773 https://access.redhat.com/security/cve/CVE-2024-26852 CVE-2024-26852 CVE-2024-26852 https://access.redhat.com/security/cve/CVE-2024-26880 CVE-2024-26880 CVE-2024-26880 https://access.redhat.com/security/cve/CVE-2024-26982 CVE-2024-26982 CVE-2024-26982 https://access.redhat.com/security/cve/CVE-2024-27030 CVE-2024-27030 CVE-2024-27030 https://access.redhat.com/security/cve/CVE-2024-27046 CVE-2024-27046 CVE-2024-27046 https://access.redhat.com/security/cve/CVE-2024-35857 CVE-2024-35857 CVE-2024-35857 https://access.redhat.com/security/cve/CVE-2024-35885 CVE-2024-35885 CVE-2024-35885 https://access.redhat.com/security/cve/CVE-2024-35907 CVE-2024-35907 CVE-2024-35907 https://access.redhat.com/security/cve/CVE-2024-36924 CVE-2024-36924 CVE-2024-36924 https://access.redhat.com/security/cve/CVE-2024-36952 CVE-2024-36952 CVE-2024-36952 https://access.redhat.com/security/cve/CVE-2024-38580 CVE-2024-38580 CVE-2024-38580 https://bugzilla.redhat.com/2265794 2265794 https://bugzilla.redhat.com/2273236 2273236 https://bugzilla.redhat.com/2273274 2273274 https://bugzilla.redhat.com/2275690 2275690 https://bugzilla.redhat.com/2275761 2275761 https://bugzilla.redhat.com/2278337 2278337 https://bugzilla.redhat.com/2278435 2278435 https://bugzilla.redhat.com/2278473 2278473 https://bugzilla.redhat.com/2281247 2281247 https://bugzilla.redhat.com/2281647 2281647 https://bugzilla.redhat.com/2281700 2281700 https://bugzilla.redhat.com/2282669 2282669 https://bugzilla.redhat.com/2282898 2282898 https://bugzilla.redhat.com/2284506 2284506 https://bugzilla.redhat.com/2284598 2284598 https://bugzilla.redhat.com/2293316 2293316 https://bugzilla.redhat.com/2293412 2293412 https://errata.almalinux.org/9/ALSA-2024-4928.html ALSA-2024:4928 ALSA-2024:4928 Ikernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm 2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm "Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm !Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm 1�>bpftool-7.3.0-427.28.1.el9_4.x86_64.rpm Ikernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm Ikernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm 2Ipython3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm "Ikernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm !Ikernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm Ikernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm 1�>bpftool-7.3.0-427.28.1.el9_4.x86_64.rpm Ikernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm Ikernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm ����Q�[
��BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update ,+��F�4^https://access.redhat.com/errata/RHSA-2024:5363 RHSA-2024:5363 RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606 CVE-2021-47606 CVE-2021-47606 https://access.redhat.com/security/cve/CVE-2023-52651 CVE-2023-52651 CVE-2023-52651 https://access.redhat.com/security/cve/CVE-2023-52864 CVE-2023-52864 CVE-2023-52864 https://access.redhat.com/security/cve/CVE-2024-21823 CVE-2024-21823 CVE-2024-21823 https://access.redhat.com/security/cve/CVE-2024-26600 CVE-2024-26600 CVE-2024-26600 https://access.redhat.com/security/cve/CVE-2024-26808 CVE-2024-26808 CVE-2024-26808 https://access.redhat.com/security/cve/CVE-2024-26828 CVE-2024-26828 CVE-2024-26828 https://access.redhat.com/security/cve/CVE-2024-26853 CVE-2024-26853 CVE-2024-26853 https://access.redhat.com/security/cve/CVE-2024-26868 CVE-2024-26868 CVE-2024-26868 https://access.redhat.com/security/cve/CVE-2024-26897 CVE-2024-26897 CVE-2024-26897 https://access.redhat.com/security/cve/CVE-2024-27049 CVE-2024-27049 CVE-2024-27049 https://access.redhat.com/security/cve/CVE-2024-27052 CVE-2024-27052 CVE-2024-27052 https://access.redhat.com/security/cve/CVE-2024-27065 CVE-2024-27065 CVE-2024-27065 https://access.redhat.com/security/cve/CVE-2024-27417 CVE-2024-27417 CVE-2024-27417 https://access.redhat.com/security/cve/CVE-2024-27434 CVE-2024-27434 CVE-2024-27434 https://access.redhat.com/security/cve/CVE-2024-33621 CVE-2024-33621 CVE-2024-33621 https://access.redhat.com/security/cve/CVE-2024-35789 CVE-2024-35789 CVE-2024-35789 https://access.redhat.com/security/cve/CVE-2024-35800 CVE-2024-35800 CVE-2024-35800 https://access.redhat.com/security/cve/CVE-2024-35823 CVE-2024-35823 CVE-2024-35823 https://access.redhat.com/security/cve/CVE-2024-35845 CVE-2024-35845 CVE-2024-35845 https://access.redhat.com/security/cve/CVE-2024-35848 CVE-2024-35848 CVE-2024-35848 https://access.redhat.com/security/cve/CVE-2024-35852 CVE-2024-35852 CVE-2024-35852 https://access.redhat.com/security/cve/CVE-2024-35899 CVE-2024-35899 CVE-2024-35899 https://access.redhat.com/security/cve/CVE-2024-35911 CVE-2024-35911 CVE-2024-35911 https://access.redhat.com/security/cve/CVE-2024-35937 CVE-2024-35937 CVE-2024-35937 https://access.redhat.com/security/cve/CVE-2024-35969 CVE-2024-35969 CVE-2024-35969 https://access.redhat.com/security/cve/CVE-2024-36005 CVE-2024-36005 CVE-2024-36005 https://access.redhat.com/security/cve/CVE-2024-36017 CVE-2024-36017 CVE-2024-36017 https://access.redhat.com/security/cve/CVE-2024-36020 CVE-2024-36020 CVE-2024-36020 https://access.redhat.com/security/cve/CVE-2024-36489 CVE-2024-36489 CVE-2024-36489 https://access.redhat.com/security/cve/CVE-2024-36903 CVE-2024-36903 CVE-2024-36903 https://access.redhat.com/security/cve/CVE-2024-36921 CVE-2024-36921 CVE-2024-36921 https://access.redhat.com/security/cve/CVE-2024-36922 CVE-2024-36922 CVE-2024-36922 https://access.redhat.com/security/cve/CVE-2024-36929 CVE-2024-36929 CVE-2024-36929 https://access.redhat.com/security/cve/CVE-2024-36941 CVE-2024-36941 CVE-2024-36941 https://access.redhat.com/security/cve/CVE-2024-36971 CVE-2024-36971 CVE-2024-36971 https://access.redhat.com/security/cve/CVE-2024-37353 CVE-2024-37353 CVE-2024-37353 https://access.redhat.com/security/cve/CVE-2024-37356 CVE-2024-37356 CVE-2024-37356 https://access.redhat.com/security/cve/CVE-2024-38391 CVE-2024-38391 CVE-2024-38391 https://access.redhat.com/security/cve/CVE-2024-38558 CVE-2024-38558 CVE-2024-38558 https://access.redhat.com/security/cve/CVE-2024-38575 CVE-2024-38575 CVE-2024-38575 https://access.redhat.com/security/cve/CVE-2024-39487 CVE-2024-39487 CVE-2024-39487 https://access.redhat.com/security/cve/CVE-2024-40928 CVE-2024-40928 CVE-2024-40928 https://access.redhat.com/security/cve/CVE-2024-40954 CVE-2024-40954 CVE-2024-40954 https://access.redhat.com/security/cve/CVE-2024-40958 CVE-2024-40958 CVE-2024-40958 https://access.redhat.com/security/cve/CVE-2024-40961 CVE-2024-40961 CVE-2024-40961 https://bugzilla.redhat.com/2265838 2265838 https://bugzilla.redhat.com/2273405 2273405 https://bugzilla.redhat.com/2275600 2275600 https://bugzilla.redhat.com/2275655 2275655 https://bugzilla.redhat.com/2275715 2275715 https://bugzilla.redhat.com/2275748 2275748 https://bugzilla.redhat.com/2278380 2278380 https://bugzilla.redhat.com/2278417 2278417 https://bugzilla.redhat.com/2278429 2278429 https://bugzilla.redhat.com/2278519 2278519 https://bugzilla.redhat.com/2278989 2278989 https://bugzilla.redhat.com/2281057 2281057 https://bugzilla.redhat.com/2281097 2281097 https://bugzilla.redhat.com/2281133 2281133 https://bugzilla.redhat.com/2281190 2281190 https://bugzilla.redhat.com/2281237 2281237 https://bugzilla.redhat.com/2281257 2281257 https://bugzilla.redhat.com/2281265 2281265 https://bugzilla.redhat.com/2281272 2281272 https://bugzilla.redhat.com/2281639 2281639 https://bugzilla.redhat.com/2281667 2281667 https://bugzilla.redhat.com/2281821 2281821 https://bugzilla.redhat.com/2281900 2281900 https://bugzilla.redhat.com/2281949 2281949 https://bugzilla.redhat.com/2282719 2282719 https://bugzilla.redhat.com/2284400 2284400 https://bugzilla.redhat.com/2284417 2284417 https://bugzilla.redhat.com/2284474 2284474 https://bugzilla.redhat.com/2284496 2284496 https://bugzilla.redhat.com/2284511 2284511 https://bugzilla.redhat.com/2284513 2284513 https://bugzilla.redhat.com/2284543 2284543 https://bugzilla.redhat.com/2292331 2292331 https://bugzilla.redhat.com/2293208 2293208 https://bugzilla.redhat.com/2293418 2293418 https://bugzilla.redhat.com/2293441 2293441 https://bugzilla.redhat.com/2293657 2293657 https://bugzilla.redhat.com/2293658 2293658 https://bugzilla.redhat.com/2293686 2293686 https://bugzilla.redhat.com/2293687 2293687 https://bugzilla.redhat.com/2293688 2293688 https://bugzilla.redhat.com/2297056 2297056 https://bugzilla.redhat.com/2297512 2297512 https://bugzilla.redhat.com/2297538 2297538 https://bugzilla.redhat.com/2297542 2297542 https://bugzilla.redhat.com/2297545 2297545 https://errata.almalinux.org/9/ALSA-2024-5363.html ALSA-2024:5363 ALSA-2024:5363 Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm 1�?bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm 2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm !Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm Jkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm "Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm 1�?bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm 2Jpython3-perf-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-core-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm !Jkernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm Jkernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm "Jkernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm Jkernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm ����|�\
��cBBBBBBBBsecurity Moderate: curl security update ,��z�(https://access.redhat.com/errata/RHSA-2024:5529 RHSA-2024:5529 RHSA-2024:5529 https://access.redhat.com/security/cve/CVE-2024-2398 CVE-2024-2398 CVE-2024-2398 https://bugzilla.redhat.com/2270498 2270498 https://errata.almalinux.org/9/ALSA-2024-5529.html ALSA-2024:5529 ALSA-2024:5529 {�Llibcurl-minimal-7.76.1-29.el9_4.1.i686.rpm z�Llibcurl-7.76.1-29.el9_4.1.i686.rpm {�Llibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm �)�Lcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm �(�Lcurl-7.76.1-29.el9_4.1.x86_64.rpm z�Llibcurl-7.76.1-29.el9_4.1.x86_64.rpm {�Llibcurl-minimal-7.76.1-29.el9_4.1.i686.rpm z�Llibcurl-7.76.1-29.el9_4.1.i686.rpm {�Llibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm �)�Lcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm �(�Lcurl-7.76.1-29.el9_4.1.x86_64.rpm z�Llibcurl-7.76.1-29.el9_4.1.x86_64.rpm ����/�]
�/�msecurity Important: python-setuptools security update ,+��"�xhttps://access.redhat.com/errata/RHSA-2024:5534 RHSA-2024:5534 RHSA-2024:5534 https://access.redhat.com/security/cve/CVE-2024-6345 CVE-2024-6345 CVE-2024-6345 https://bugzilla.redhat.com/2297771 2297771 https://errata.almalinux.org/9/ALSA-2024-5534.html ALSA-2024:5534 ALSA-2024:5534 �E�Gpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm �F�Gpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm �E�Gpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm �F�Gpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm ����l�^
� �pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update ,+���Thttps://access.redhat.com/errata/RHSA-2024:5928 RHSA-2024:5928 RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771 CVE-2023-52771 CVE-2023-52771 https://access.redhat.com/security/cve/CVE-2023-52880 CVE-2023-52880 CVE-2023-52880 https://access.redhat.com/security/cve/CVE-2024-26581 CVE-2024-26581 CVE-2024-26581 https://access.redhat.com/security/cve/CVE-2024-26668 CVE-2024-26668 CVE-2024-26668 https://access.redhat.com/security/cve/CVE-2024-26810 CVE-2024-26810 CVE-2024-26810 https://access.redhat.com/security/cve/CVE-2024-26855 CVE-2024-26855 CVE-2024-26855 https://access.redhat.com/security/cve/CVE-2024-26908 CVE-2024-26908 CVE-2024-26908 https://access.redhat.com/security/cve/CVE-2024-26925 CVE-2024-26925 CVE-2024-26925 https://access.redhat.com/security/cve/CVE-2024-27016 CVE-2024-27016 CVE-2024-27016 https://access.redhat.com/security/cve/CVE-2024-27019 CVE-2024-27019 CVE-2024-27019 https://access.redhat.com/security/cve/CVE-2024-27020 CVE-2024-27020 CVE-2024-27020 https://access.redhat.com/security/cve/CVE-2024-27415 CVE-2024-27415 CVE-2024-27415 https://access.redhat.com/security/cve/CVE-2024-35839 CVE-2024-35839 CVE-2024-35839 https://access.redhat.com/security/cve/CVE-2024-35896 CVE-2024-35896 CVE-2024-35896 https://access.redhat.com/security/cve/CVE-2024-35897 CVE-2024-35897 CVE-2024-35897 https://access.redhat.com/security/cve/CVE-2024-35898 CVE-2024-35898 CVE-2024-35898 https://access.redhat.com/security/cve/CVE-2024-35962 CVE-2024-35962 CVE-2024-35962 https://access.redhat.com/security/cve/CVE-2024-36003 CVE-2024-36003 CVE-2024-36003 https://access.redhat.com/security/cve/CVE-2024-36025 CVE-2024-36025 CVE-2024-36025 https://access.redhat.com/security/cve/CVE-2024-38538 CVE-2024-38538 CVE-2024-38538 https://access.redhat.com/security/cve/CVE-2024-38540 CVE-2024-38540 CVE-2024-38540 https://access.redhat.com/security/cve/CVE-2024-38544 CVE-2024-38544 CVE-2024-38544 https://access.redhat.com/security/cve/CVE-2024-38579 CVE-2024-38579 CVE-2024-38579 https://access.redhat.com/security/cve/CVE-2024-38608 CVE-2024-38608 CVE-2024-38608 https://access.redhat.com/security/cve/CVE-2024-39476 CVE-2024-39476 CVE-2024-39476 https://access.redhat.com/security/cve/CVE-2024-40905 CVE-2024-40905 CVE-2024-40905 https://access.redhat.com/security/cve/CVE-2024-40911 CVE-2024-40911 CVE-2024-40911 https://access.redhat.com/security/cve/CVE-2024-40912 CVE-2024-40912 CVE-2024-40912 https://access.redhat.com/security/cve/CVE-2024-40914 CVE-2024-40914 CVE-2024-40914 https://access.redhat.com/security/cve/CVE-2024-40929 CVE-2024-40929 CVE-2024-40929 https://access.redhat.com/security/cve/CVE-2024-40939 CVE-2024-40939 CVE-2024-40939 https://access.redhat.com/security/cve/CVE-2024-40941 CVE-2024-40941 CVE-2024-40941 https://access.redhat.com/security/cve/CVE-2024-40957 CVE-2024-40957 CVE-2024-40957 https://access.redhat.com/security/cve/CVE-2024-40978 CVE-2024-40978 CVE-2024-40978 https://access.redhat.com/security/cve/CVE-2024-40983 CVE-2024-40983 CVE-2024-40983 https://access.redhat.com/security/cve/CVE-2024-41041 CVE-2024-41041 CVE-2024-41041 https://access.redhat.com/security/cve/CVE-2024-41076 CVE-2024-41076 CVE-2024-41076 https://access.redhat.com/security/cve/CVE-2024-41090 CVE-2024-41090 CVE-2024-41090 https://access.redhat.com/security/cve/CVE-2024-41091 CVE-2024-41091 CVE-2024-41091 https://access.redhat.com/security/cve/CVE-2024-42110 CVE-2024-42110 CVE-2024-42110 https://access.redhat.com/security/cve/CVE-2024-42152 CVE-2024-42152 CVE-2024-42152 https://bugzilla.redhat.com/2265185 2265185 https://bugzilla.redhat.com/2272797 2272797 https://bugzilla.redhat.com/2273654 2273654 https://bugzilla.redhat.com/2275742 2275742 https://bugzilla.redhat.com/2275744 2275744 https://bugzilla.redhat.com/2277166 2277166 https://bugzilla.redhat.com/2278256 2278256 https://bugzilla.redhat.com/2278258 2278258 https://bugzilla.redhat.com/2278264 2278264 https://bugzilla.redhat.com/2281101 2281101 https://bugzilla.redhat.com/2281284 2281284 https://bugzilla.redhat.com/2281669 2281669 https://bugzilla.redhat.com/2281672 2281672 https://bugzilla.redhat.com/2281675 2281675 https://bugzilla.redhat.com/2281916 2281916 https://bugzilla.redhat.com/2281958 2281958 https://bugzilla.redhat.com/2282720 2282720 https://bugzilla.redhat.com/2283468 2283468 https://bugzilla.redhat.com/2284421 2284421 https://bugzilla.redhat.com/2293356 2293356 https://bugzilla.redhat.com/2293414 2293414 https://bugzilla.redhat.com/2293455 2293455 https://bugzilla.redhat.com/2293459 2293459 https://bugzilla.redhat.com/2293461 2293461 https://bugzilla.redhat.com/2295914 2295914 https://bugzilla.redhat.com/2297489 2297489 https://bugzilla.redhat.com/2297495 2297495 https://bugzilla.redhat.com/2297496 2297496 https://bugzilla.redhat.com/2297498 2297498 https://bugzilla.redhat.com/2297513 2297513 https://bugzilla.redhat.com/2297523 2297523 https://bugzilla.redhat.com/2297525 2297525 https://bugzilla.redhat.com/2297541 2297541 https://bugzilla.redhat.com/2297562 2297562 https://bugzilla.redhat.com/2297567 2297567 https://bugzilla.redhat.com/2299240 2299240 https://bugzilla.redhat.com/2299336 2299336 https://bugzilla.redhat.com/2300410 2300410 https://bugzilla.redhat.com/2300453 2300453 https://bugzilla.redhat.com/2301473 2301473 https://bugzilla.redhat.com/2301519 2301519 https://errata.almalinux.org/9/ALSA-2024-5928.html ALSA-2024:5928 ALSA-2024:5928 Kkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm Kkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm 2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm "Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm !Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm 1�@bpftool-7.3.0-427.33.1.el9_4.x86_64.rpm Kkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm Kkernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm 2Kpython3-perf-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm "Kkernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpm Kkernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm !Kkernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm 1�@bpftool-7.3.0-427.33.1.el9_4.x86_64.rpm Kkernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm ����*�_
��security Moderate: python-urllib3 security update ,��2�+https://access.redhat.com/errata/RHSA-2024:6162 RHSA-2024:6162 RHSA-2024:6162 https://access.redhat.com/security/cve/CVE-2024-37891 CVE-2024-37891 CVE-2024-37891 https://bugzilla.redhat.com/2292788 2292788 https://errata.almalinux.org/9/ALSA-2024-6162.html ALSA-2024:6162 ALSA-2024:6162 �G�python3-urllib3-1.26.5-5.el9_4.1.noarch.rpm �G�python3-urllib3-1.26.5-5.el9_4.1.noarch.rpm ��ܝ7�`
�!�SBBBsecurity Moderate: python3.9 security update ,��]�hhttps://access.redhat.com/errata/RHSA-2024:6163 RHSA-2024:6163 RHSA-2024:6163 https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255 https://errata.almalinux.org/9/ALSA-2024-6163.html ALSA-2024:6163 ALSA-2024:6163 -�python3-libs-3.9.18-3.el9_4.5.i686.rpm ��python3-3.9.18-3.el9_4.5.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.5.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.5.i686.rpm ��python3-3.9.18-3.el9_4.5.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.5.x86_64.rpm ����a
�"�XBBBBBBBBBBBBBBBsecurity Moderate: krb5 security update ,��E�https://access.redhat.com/errata/RHSA-2024:6166 RHSA-2024:6166 RHSA-2024:6166 https://access.redhat.com/security/cve/CVE-2024-37370 CVE-2024-37370 CVE-2024-37370 https://access.redhat.com/security/cve/CVE-2024-37371 CVE-2024-37371 CVE-2024-37371 https://bugzilla.redhat.com/2294676 2294676 https://bugzilla.redhat.com/2294677 2294677 https://errata.almalinux.org/9/ALSA-2024-6166.html ALSA-2024:6166 ALSA-2024:6166 �"�krb5-libs-1.21.1-2.el9_4.i686.rpm �l�krb5-workstation-1.21.1-2.el9_4.x86_64.rpm �$�krb5-server-1.21.1-2.el9_4.x86_64.rpm �&�libkadm5-1.21.1-2.el9_4.i686.rpm �$�krb5-server-1.21.1-2.el9_4.i686.rpm �"�krb5-libs-1.21.1-2.el9_4.x86_64.rpm �%�krb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm �#�krb5-pkinit-1.21.1-2.el9_4.i686.rpm �&�libkadm5-1.21.1-2.el9_4.x86_64.rpm �#�krb5-pkinit-1.21.1-2.el9_4.x86_64.rpm �%�krb5-server-ldap-1.21.1-2.el9_4.i686.rpm �"�krb5-libs-1.21.1-2.el9_4.i686.rpm �l�krb5-workstation-1.21.1-2.el9_4.x86_64.rpm �$�krb5-server-1.21.1-2.el9_4.x86_64.rpm �&�libkadm5-1.21.1-2.el9_4.i686.rpm �$�krb5-server-1.21.1-2.el9_4.i686.rpm �"�krb5-libs-1.21.1-2.el9_4.x86_64.rpm �%�krb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm �#�krb5-pkinit-1.21.1-2.el9_4.i686.rpm �&�libkadm5-1.21.1-2.el9_4.x86_64.rpm �#�krb5-pkinit-1.21.1-2.el9_4.x86_64.rpm �%�krb5-server-ldap-1.21.1-2.el9_4.i686.rpm ��� �b
�#�isecurity Important: bubblewrap and flatpak security update ,+��K�Jhttps://access.redhat.com/errata/RHSA-2024:6356 RHSA-2024:6356 RHSA-2024:6356 https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://bugzilla.redhat.com/2305202 2305202 https://errata.almalinux.org/9/ALSA-2024-6356.html ALSA-2024:6356 ALSA-2024:6356 �S�bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm �S�bubblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm ���`�c
�$�kBsecurity Moderate: glib2 security update ,���
https://access.redhat.com/errata/RHSA-2024:6464 RHSA-2024:6464 RHSA-2024:6464 https://access.redhat.com/security/cve/CVE-2024-34397 CVE-2024-34397 CVE-2024-34397 https://bugzilla.redhat.com/2279632 2279632 https://errata.almalinux.org/9/ALSA-2024-6464.html ALSA-2024:6464 ALSA-2024:6464 �U�uglib2-2.68.4-14.el9_4.1.x86_64.rpm �U�uglib2-2.68.4-14.el9_4.1.i686.rpm �U�uglib2-2.68.4-14.el9_4.1.x86_64.rpm �U�uglib2-2.68.4-14.el9_4.1.i686.rpm ����0�d
�%�nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,��"�l8https://access.redhat.com/errata/RHSA-2024:6567 RHSA-2024:6567 RHSA-2024:6567 https://access.redhat.com/security/cve/CVE-2023-52463 CVE-2023-52463 CVE-2023-52463 https://access.redhat.com/security/cve/CVE-2023-52801 CVE-2023-52801 CVE-2023-52801 https://access.redhat.com/security/cve/CVE-2024-26629 CVE-2024-26629 CVE-2024-26629 https://access.redhat.com/security/cve/CVE-2024-26630 CVE-2024-26630 CVE-2024-26630 https://access.redhat.com/security/cve/CVE-2024-26720 CVE-2024-26720 CVE-2024-26720 https://access.redhat.com/security/cve/CVE-2024-26886 CVE-2024-26886 CVE-2024-26886 https://access.redhat.com/security/cve/CVE-2024-26946 CVE-2024-26946 CVE-2024-26946 https://access.redhat.com/security/cve/CVE-2024-35791 CVE-2024-35791 CVE-2024-35791 https://access.redhat.com/security/cve/CVE-2024-35797 CVE-2024-35797 CVE-2024-35797 https://access.redhat.com/security/cve/CVE-2024-35875 CVE-2024-35875 CVE-2024-35875 https://access.redhat.com/security/cve/CVE-2024-36000 CVE-2024-36000 CVE-2024-36000 https://access.redhat.com/security/cve/CVE-2024-36019 CVE-2024-36019 CVE-2024-36019 https://access.redhat.com/security/cve/CVE-2024-36883 CVE-2024-36883 CVE-2024-36883 https://access.redhat.com/security/cve/CVE-2024-36979 CVE-2024-36979 CVE-2024-36979 https://access.redhat.com/security/cve/CVE-2024-38559 CVE-2024-38559 CVE-2024-38559 https://access.redhat.com/security/cve/CVE-2024-38619 CVE-2024-38619 CVE-2024-38619 https://access.redhat.com/security/cve/CVE-2024-40927 CVE-2024-40927 CVE-2024-40927 https://access.redhat.com/security/cve/CVE-2024-40936 CVE-2024-40936 CVE-2024-40936 https://access.redhat.com/security/cve/CVE-2024-41040 CVE-2024-41040 CVE-2024-41040 https://access.redhat.com/security/cve/CVE-2024-41044 CVE-2024-41044 CVE-2024-41044 https://access.redhat.com/security/cve/CVE-2024-41055 CVE-2024-41055 CVE-2024-41055 https://access.redhat.com/security/cve/CVE-2024-41073 CVE-2024-41073 CVE-2024-41073 https://access.redhat.com/security/cve/CVE-2024-41096 CVE-2024-41096 CVE-2024-41096 https://access.redhat.com/security/cve/CVE-2024-42082 CVE-2024-42082 CVE-2024-42082 https://access.redhat.com/security/cve/CVE-2024-42096 CVE-2024-42096 CVE-2024-42096 https://access.redhat.com/security/cve/CVE-2024-42102 CVE-2024-42102 CVE-2024-42102 https://access.redhat.com/security/cve/CVE-2024-42131 CVE-2024-42131 CVE-2024-42131 https://bugzilla.redhat.com/2265797 2265797 https://bugzilla.redhat.com/2269434 2269434 https://bugzilla.redhat.com/2269436 2269436 https://bugzilla.redhat.com/2273141 2273141 https://bugzilla.redhat.com/2275678 2275678 https://bugzilla.redhat.com/2278206 2278206 https://bugzilla.redhat.com/2281052 2281052 https://bugzilla.redhat.com/2281151 2281151 https://bugzilla.redhat.com/2281727 2281727 https://bugzilla.redhat.com/2281968 2281968 https://bugzilla.redhat.com/2282709 2282709 https://bugzilla.redhat.com/2284271 2284271 https://bugzilla.redhat.com/2284402 2284402 https://bugzilla.redhat.com/2293273 2293273 https://bugzilla.redhat.com/2293276 2293276 https://bugzilla.redhat.com/2293440 2293440 https://bugzilla.redhat.com/2297511 2297511 https://bugzilla.redhat.com/2297520 2297520 https://bugzilla.redhat.com/2300409 2300409 https://bugzilla.redhat.com/2300414 2300414 https://bugzilla.redhat.com/2300429 2300429 https://bugzilla.redhat.com/2300491 2300491 https://bugzilla.redhat.com/2300520 2300520 https://bugzilla.redhat.com/2300713 2300713 https://bugzilla.redhat.com/2301465 2301465 https://bugzilla.redhat.com/2301496 2301496 https://bugzilla.redhat.com/2301637 2301637 https://errata.almalinux.org/9/ALSA-2024-6567.html ALSA-2024:6567 ALSA-2024:6567 Lkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm 2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm 1�Abpftool-7.3.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-5.14.0-427.35.1.el9_4.x86_64.rpm !Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm "Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpm Lkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-core-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm 2Lpython3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm 1�Abpftool-7.3.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-5.14.0-427.35.1.el9_4.x86_64.rpm !Lkernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm "Lkernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpm Lkernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpm Lkernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm ����Y�e
�&�OBsecurity Moderate: expat security update ,���;https://access.redhat.com/errata/RHSA-2024:6754 RHSA-2024:6754 RHSA-2024:6754 https://access.redhat.com/security/cve/CVE-2024-45490 CVE-2024-45490 CVE-2024-45490 https://access.redhat.com/security/cve/CVE-2024-45491 CVE-2024-45491 CVE-2024-45491 https://access.redhat.com/security/cve/CVE-2024-45492 CVE-2024-45492 CVE-2024-45492 https://bugzilla.redhat.com/2308615 2308615 https://bugzilla.redhat.com/2308616 2308616 https://bugzilla.redhat.com/2308617 2308617 https://errata.almalinux.org/9/ALSA-2024-6754.html ALSA-2024:6754 ALSA-2024:6754 � �oexpat-2.5.0-2.el9_4.1.i686.rpm � �oexpat-2.5.0-2.el9_4.1.x86_64.rpm � �oexpat-2.5.0-2.el9_4.1.i686.rpm � �oexpat-2.5.0-2.el9_4.1.x86_64.rpm ����1�f
�'�RBBBsecurity Moderate: openssl security update ,��I�Phttps://access.redhat.com/errata/RHSA-2024:6783 RHSA-2024:6783 RHSA-2024:6783 https://access.redhat.com/security/cve/CVE-2024-6119 CVE-2024-6119 CVE-2024-6119 https://bugzilla.redhat.com/2306158 2306158 https://errata.almalinux.org/9/ALSA-2024-6783.html ALSA-2024:6783 ALSA-2024:6783 ��vopenssl-libs-3.0.7-28.el9_4.i686.rpm �7�vopenssl-3.0.7-28.el9_4.x86_64.rpm ��vopenssl-libs-3.0.7-28.el9_4.x86_64.rpm ��vopenssl-libs-3.0.7-28.el9_4.i686.rpm �7�vopenssl-3.0.7-28.el9_4.x86_64.rpm ��vopenssl-libs-3.0.7-28.el9_4.x86_64.rpm ����Q�g
�(�WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update ,+���+https://access.redhat.com/errata/RHSA-2024:6997 RHSA-2024:6997 RHSA-2024:6997 https://access.redhat.com/security/cve/CVE-2023-52439 CVE-2023-52439 CVE-2023-52439 https://access.redhat.com/security/cve/CVE-2023-52884 CVE-2023-52884 CVE-2023-52884 https://access.redhat.com/security/cve/CVE-2024-26739 CVE-2024-26739 CVE-2024-26739 https://access.redhat.com/security/cve/CVE-2024-26929 CVE-2024-26929 CVE-2024-26929 https://access.redhat.com/security/cve/CVE-2024-26930 CVE-2024-26930 CVE-2024-26930 https://access.redhat.com/security/cve/CVE-2024-26931 CVE-2024-26931 CVE-2024-26931 https://access.redhat.com/security/cve/CVE-2024-26947 CVE-2024-26947 CVE-2024-26947 https://access.redhat.com/security/cve/CVE-2024-26991 CVE-2024-26991 CVE-2024-26991 https://access.redhat.com/security/cve/CVE-2024-27022 CVE-2024-27022 CVE-2024-27022 https://access.redhat.com/security/cve/CVE-2024-35895 CVE-2024-35895 CVE-2024-35895 https://access.redhat.com/security/cve/CVE-2024-36016 CVE-2024-36016 CVE-2024-36016 https://access.redhat.com/security/cve/CVE-2024-36899 CVE-2024-36899 CVE-2024-36899 https://access.redhat.com/security/cve/CVE-2024-38562 CVE-2024-38562 CVE-2024-38562 https://access.redhat.com/security/cve/CVE-2024-38570 CVE-2024-38570 CVE-2024-38570 https://access.redhat.com/security/cve/CVE-2024-38573 CVE-2024-38573 CVE-2024-38573 https://access.redhat.com/security/cve/CVE-2024-38601 CVE-2024-38601 CVE-2024-38601 https://access.redhat.com/security/cve/CVE-2024-38615 CVE-2024-38615 CVE-2024-38615 https://access.redhat.com/security/cve/CVE-2024-40984 CVE-2024-40984 CVE-2024-40984 https://access.redhat.com/security/cve/CVE-2024-41071 CVE-2024-41071 CVE-2024-41071 https://access.redhat.com/security/cve/CVE-2024-42225 CVE-2024-42225 CVE-2024-42225 https://access.redhat.com/security/cve/CVE-2024-42246 CVE-2024-42246 CVE-2024-42246 https://bugzilla.redhat.com/2265271 2265271 https://bugzilla.redhat.com/2273270 2273270 https://bugzilla.redhat.com/2278167 2278167 https://bugzilla.redhat.com/2278245 2278245 https://bugzilla.redhat.com/2278248 2278248 https://bugzilla.redhat.com/2278250 2278250 https://bugzilla.redhat.com/2278252 2278252 https://bugzilla.redhat.com/2278318 2278318 https://bugzilla.redhat.com/2281677 2281677 https://bugzilla.redhat.com/2283894 2283894 https://bugzilla.redhat.com/2284549 2284549 https://bugzilla.redhat.com/2293348 2293348 https://bugzilla.redhat.com/2293364 2293364 https://bugzilla.redhat.com/2293420 2293420 https://bugzilla.redhat.com/2293423 2293423 https://bugzilla.redhat.com/2293431 2293431 https://bugzilla.redhat.com/2293685 2293685 https://bugzilla.redhat.com/2297568 2297568 https://bugzilla.redhat.com/2300448 2300448 https://bugzilla.redhat.com/2301543 2301543 https://errata.almalinux.org/9/ALSA-2024-6997.html ALSA-2024:6997 ALSA-2024:6997 Mkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm "Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm !Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm 2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm 1�Bbpftool-7.3.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm Mkernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm "Mkernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm !Mkernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm 2Mpython3-perf-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm 1�Bbpftool-7.3.0-427.37.1.el9_4.x86_64.rpm Mkernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpm Mkernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm ���� �h
� �xBBBBBBBBBBBBBBBsecurity Moderate: linux-firmware security update ,��.�*https://access.redhat.com/errata/RHSA-2024:7484 RHSA-2024:7484 RHSA-2024:7484 https://access.redhat.com/security/cve/CVE-2023-20584 CVE-2023-20584 CVE-2023-20584 https://access.redhat.com/security/cve/CVE-2023-31356 CVE-2023-31356 CVE-2023-31356 https://bugzilla.redhat.com/2304583 2304583 https://bugzilla.redhat.com/2304593 2304593 https://errata.almalinux.org/9/ALSA-2024-7484.html ALSA-2024:7484 ALSA-2024:7484 �f�_iwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �a�_iwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �_�_iwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �i�Diwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �^�iwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �c�Diwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm �l�\linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm �e�iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm �b�_iwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �h�iwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm �j�\libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm �g�_iwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �m�\netronome-firmware-20240905-143.3.el9_4.noarch.rpm �k�\linux-firmware-20240905-143.3.el9_4.noarch.rpm �]�iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �`�_iwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �f�_iwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �a�_iwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �_�_iwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �i�Diwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �^�iwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �c�Diwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �d�iwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm �l�\linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm �e�iwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm �b�_iwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �h�iwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm �j�\libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm �g�_iwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �m�\netronome-firmware-20240905-143.3.el9_4.noarch.rpm �k�\linux-firmware-20240905-143.3.el9_4.noarch.rpm �]�iwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �`�_iwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm ����y�i
�)�JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,��X�<https://access.redhat.com/errata/RHSA-2024:8162 RHSA-2024:8162 RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385 CVE-2021-47385 CVE-2021-47385 https://access.redhat.com/security/cve/CVE-2023-28746 CVE-2023-28746 CVE-2023-28746 https://access.redhat.com/security/cve/CVE-2023-52658 CVE-2023-52658 CVE-2023-52658 https://access.redhat.com/security/cve/CVE-2024-27403 CVE-2024-27403 CVE-2024-27403 https://access.redhat.com/security/cve/CVE-2024-35989 CVE-2024-35989 CVE-2024-35989 https://access.redhat.com/security/cve/CVE-2024-36889 CVE-2024-36889 CVE-2024-36889 https://access.redhat.com/security/cve/CVE-2024-36978 CVE-2024-36978 CVE-2024-36978 https://access.redhat.com/security/cve/CVE-2024-38556 CVE-2024-38556 CVE-2024-38556 https://access.redhat.com/security/cve/CVE-2024-39483 CVE-2024-39483 CVE-2024-39483 https://access.redhat.com/security/cve/CVE-2024-39502 CVE-2024-39502 CVE-2024-39502 https://access.redhat.com/security/cve/CVE-2024-40959 CVE-2024-40959 CVE-2024-40959 https://access.redhat.com/security/cve/CVE-2024-42079 CVE-2024-42079 CVE-2024-42079 https://access.redhat.com/security/cve/CVE-2024-42272 CVE-2024-42272 CVE-2024-42272 https://access.redhat.com/security/cve/CVE-2024-42284 CVE-2024-42284 CVE-2024-42284 https://bugzilla.redhat.com/2270700 2270700 https://bugzilla.redhat.com/2281127 2281127 https://bugzilla.redhat.com/2281149 2281149 https://bugzilla.redhat.com/2281847 2281847 https://bugzilla.redhat.com/2282355 2282355 https://bugzilla.redhat.com/2284571 2284571 https://bugzilla.redhat.com/2293078 2293078 https://bugzilla.redhat.com/2293443 2293443 https://bugzilla.redhat.com/2295921 2295921 https://bugzilla.redhat.com/2297474 2297474 https://bugzilla.redhat.com/2297543 2297543 https://bugzilla.redhat.com/2300517 2300517 https://errata.almalinux.org/9/ALSA-2024-8162.html ALSA-2024:8162 ALSA-2024:8162 "Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm 2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-5.14.0-427.40.1.el9_4.x86_64.rpm !Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 1�Cbpftool-7.3.0-427.40.1.el9_4.x86_64.rpm Nkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpm Nkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm "Nkernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm 2Npython3-perf-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-core-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-5.14.0-427.40.1.el9_4.x86_64.rpm !Nkernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 1�Cbpftool-7.3.0-427.40.1.el9_4.x86_64.rpm Nkernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpm Nkernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm Nkernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm ��� �j
�*�kBBBsecurity Moderate: python3.9 security update ,���\https://access.redhat.com/errata/RHSA-2024:8446 RHSA-2024:8446 RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-8446.html ALSA-2024:8446 ALSA-2024:8446 ��python3-3.9.18-3.el9_4.6.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.6.i686.rpm -�python3-libs-3.9.18-3.el9_4.6.x86_64.rpm ��python3-3.9.18-3.el9_4.6.x86_64.rpm -�python3-libs-3.9.18-3.el9_4.6.i686.rpm -�python3-libs-3.9.18-3.el9_4.6.x86_64.rpm ����k
�+�pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,��p�>-https://access.redhat.com/errata/RHSA-2024:8617 RHSA-2024:8617 RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383 CVE-2021-47383 CVE-2021-47383 https://access.redhat.com/security/cve/CVE-2024-2201 CVE-2024-2201 CVE-2024-2201 https://access.redhat.com/security/cve/CVE-2024-26640 CVE-2024-26640 CVE-2024-26640 https://access.redhat.com/security/cve/CVE-2024-26826 CVE-2024-26826 CVE-2024-26826 https://access.redhat.com/security/cve/CVE-2024-26923 CVE-2024-26923 CVE-2024-26923 https://access.redhat.com/security/cve/CVE-2024-26935 CVE-2024-26935 CVE-2024-26935 https://access.redhat.com/security/cve/CVE-2024-26961 CVE-2024-26961 CVE-2024-26961 https://access.redhat.com/security/cve/CVE-2024-36244 CVE-2024-36244 CVE-2024-36244 https://access.redhat.com/security/cve/CVE-2024-39472 CVE-2024-39472 CVE-2024-39472 https://access.redhat.com/security/cve/CVE-2024-39504 CVE-2024-39504 CVE-2024-39504 https://access.redhat.com/security/cve/CVE-2024-40904 CVE-2024-40904 CVE-2024-40904 https://access.redhat.com/security/cve/CVE-2024-40931 CVE-2024-40931 CVE-2024-40931 https://access.redhat.com/security/cve/CVE-2024-40960 CVE-2024-40960 CVE-2024-40960 https://access.redhat.com/security/cve/CVE-2024-40972 CVE-2024-40972 CVE-2024-40972 https://access.redhat.com/security/cve/CVE-2024-40977 CVE-2024-40977 CVE-2024-40977 https://access.redhat.com/security/cve/CVE-2024-40995 CVE-2024-40995 CVE-2024-40995 https://access.redhat.com/security/cve/CVE-2024-40998 CVE-2024-40998 CVE-2024-40998 https://access.redhat.com/security/cve/CVE-2024-41005 CVE-2024-41005 CVE-2024-41005 https://access.redhat.com/security/cve/CVE-2024-41013 CVE-2024-41013 CVE-2024-41013 https://access.redhat.com/security/cve/CVE-2024-41014 CVE-2024-41014 CVE-2024-41014 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://bugzilla.redhat.com/2268118 2268118 https://bugzilla.redhat.com/2270100 2270100 https://bugzilla.redhat.com/2275604 2275604 https://bugzilla.redhat.com/2277171 2277171 https://bugzilla.redhat.com/2278176 2278176 https://bugzilla.redhat.com/2278235 2278235 https://bugzilla.redhat.com/2282357 2282357 https://bugzilla.redhat.com/2293654 2293654 https://bugzilla.redhat.com/2296067 2296067 https://bugzilla.redhat.com/2297476 2297476 https://bugzilla.redhat.com/2297488 2297488 https://bugzilla.redhat.com/2297515 2297515 https://bugzilla.redhat.com/2297544 2297544 https://bugzilla.redhat.com/2297556 2297556 https://bugzilla.redhat.com/2297561 2297561 https://bugzilla.redhat.com/2297579 2297579 https://bugzilla.redhat.com/2297582 2297582 https://bugzilla.redhat.com/2297589 2297589 https://bugzilla.redhat.com/2300296 2300296 https://bugzilla.redhat.com/2300297 2300297 https://bugzilla.redhat.com/2311715 2311715 https://errata.almalinux.org/9/ALSA-2024-8617.html ALSA-2024:8617 ALSA-2024:8617 Okernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm 2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm !Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm "Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm 1�Dbpftool-7.3.0-427.42.1.el9_4.x86_64.rpm Okernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm 2Opython3-perf-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm !Okernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm "Okernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm 1�Dbpftool-7.3.0-427.42.1.el9_4.x86_64.rpm Okernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm Okernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm ����E�l
�,�QBBBBBBBBBBBBBBBBBsecurity Low: NetworkManager security update ,�6��.�jhttps://access.redhat.com/errata/RHSA-2024:9317 RHSA-2024:9317 RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501 CVE-2024-6501 CVE-2024-6501 https://bugzilla.redhat.com/2295734 2295734 https://errata.almalinux.org/9/ALSA-2024-9317.html ALSA-2024:9317 ALSA-2024:9317 �M�NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm �Q�NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm �K�NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm �L�NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm �P�NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm �#�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm �I�NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm �#�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm �J�NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm �N�NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm �O�NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm �M�NetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm �Q�NetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm �K�NetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm �L�NetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm �P�NetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm �#�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm �I�NetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm �#�NetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm �J�NetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm �N�NetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm �O�NetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm ����%�m
�-�dBBBBBBsecurity Low: cockpit security update ,�6���2https://access.redhat.com/errata/RHSA-2024:9325 RHSA-2024:9325 RHSA-2024:9325 https://access.redhat.com/security/cve/CVE-2024-6126 CVE-2024-6126 CVE-2024-6126 https://bugzilla.redhat.com/2292897 2292897 https://errata.almalinux.org/9/ALSA-2024-9325.html ALSA-2024:9325 ALSA-2024:9325 �U�dcockpit-bridge-323.1-1.el9_5.x86_64.rpm �X�dcockpit-ws-323.1-1.el9_5.x86_64.rpm �T�dcockpit-323.1-1.el9_5.x86_64.rpm �W�dcockpit-system-323.1-1.el9_5.noarch.rpm �V�dcockpit-doc-323.1-1.el9_5.noarch.rpm �U�dcockpit-bridge-323.1-1.el9_5.x86_64.rpm �X�dcockpit-ws-323.1-1.el9_5.x86_64.rpm �T�dcockpit-323.1-1.el9_5.x86_64.rpm �W�dcockpit-system-323.1-1.el9_5.noarch.rpm �V�dcockpit-doc-323.1-1.el9_5.noarch.rpm ����K�n
�.�lBBBBBBBBBBBBBBBsecurity Moderate: krb5 security update ,��J�https://access.redhat.com/errata/RHSA-2024:9331 RHSA-2024:9331 RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 CVE-2024-26458 CVE-2024-26458 https://access.redhat.com/security/cve/CVE-2024-26461 CVE-2024-26461 CVE-2024-26461 https://access.redhat.com/security/cve/CVE-2024-26462 CVE-2024-26462 CVE-2024-26462 https://bugzilla.redhat.com/2266731 2266731 https://bugzilla.redhat.com/2266740 2266740 https://bugzilla.redhat.com/2266742 2266742 https://errata.almalinux.org/9/ALSA-2024-9331.html ALSA-2024:9331 ALSA-2024:9331 �"�krb5-libs-1.21.1-3.el9.i686.rpm �&�libkadm5-1.21.1-3.el9.x86_64.rpm �$�krb5-server-1.21.1-3.el9.i686.rpm �%�krb5-server-ldap-1.21.1-3.el9.x86_64.rpm �"�krb5-libs-1.21.1-3.el9.x86_64.rpm �#�krb5-pkinit-1.21.1-3.el9.i686.rpm �$�krb5-server-1.21.1-3.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-3.el9.i686.rpm �#�krb5-pkinit-1.21.1-3.el9.x86_64.rpm �&�libkadm5-1.21.1-3.el9.i686.rpm �l�krb5-workstation-1.21.1-3.el9.x86_64.rpm �"�krb5-libs-1.21.1-3.el9.i686.rpm �&�libkadm5-1.21.1-3.el9.x86_64.rpm �$�krb5-server-1.21.1-3.el9.i686.rpm �%�krb5-server-ldap-1.21.1-3.el9.x86_64.rpm �"�krb5-libs-1.21.1-3.el9.x86_64.rpm �#�krb5-pkinit-1.21.1-3.el9.i686.rpm �$�krb5-server-1.21.1-3.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-3.el9.i686.rpm �#�krb5-pkinit-1.21.1-3.el9.x86_64.rpm �&�libkadm5-1.21.1-3.el9.i686.rpm �l�krb5-workstation-1.21.1-3.el9.x86_64.rpm ���h�o
�/�}BBBsecurity Low: openssl security update ,�6��U�L
https://access.redhat.com/errata/RHSA-2024:9333 RHSA-2024:9333 RHSA-2024:9333 https://access.redhat.com/security/cve/CVE-2024-2511 CVE-2024-2511 CVE-2024-2511 https://access.redhat.com/security/cve/CVE-2024-4603 CVE-2024-4603 CVE-2024-4603 https://access.redhat.com/security/cve/CVE-2024-4741 CVE-2024-4741 CVE-2024-4741 https://access.redhat.com/security/cve/CVE-2024-5535 CVE-2024-5535 CVE-2024-5535 https://bugzilla.redhat.com/2274020 2274020 https://bugzilla.redhat.com/2281029 2281029 https://bugzilla.redhat.com/2283757 2283757 https://bugzilla.redhat.com/2294581 2294581 https://errata.almalinux.org/9/ALSA-2024-9333.html ALSA-2024:9333 ALSA-2024:9333 �7�xopenssl-3.2.2-6.el9_5.x86_64.rpm ��xopenssl-libs-3.2.2-6.el9_5.x86_64.rpm ��xopenssl-libs-3.2.2-6.el9_5.i686.rpm �7�xopenssl-3.2.2-6.el9_5.x86_64.rpm ��xopenssl-libs-3.2.2-6.el9_5.x86_64.rpm ��xopenssl-libs-3.2.2-6.el9_5.i686.rpm ����e�p
�0�BBBBsecurity Moderate: python3.9 security update ,��!�khttps://access.redhat.com/errata/RHSA-2024:9371 RHSA-2024:9371 RHSA-2024:9371 https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2307370 2307370 https://errata.almalinux.org/9/ALSA-2024-9371.html ALSA-2024:9371 ALSA-2024:9371 -�python3-libs-3.9.19-8.el9.i686.rpm -�python3-libs-3.9.19-8.el9.x86_64.rpm ��python3-3.9.19-8.el9.x86_64.rpm -�python3-libs-3.9.19-8.el9.i686.rpm -�python3-libs-3.9.19-8.el9.x86_64.rpm ��python3-3.9.19-8.el9.x86_64.rpm ���4�q
��security Moderate: microcode_ctl security update ,���dhttps://access.redhat.com/errata/RHSA-2024:9401 RHSA-2024:9401 RHSA-2024:9401 https://access.redhat.com/security/cve/CVE-2023-22655 CVE-2023-22655 CVE-2023-22655 https://access.redhat.com/security/cve/CVE-2023-28746 CVE-2023-28746 CVE-2023-28746 https://access.redhat.com/security/cve/CVE-2023-38575 CVE-2023-38575 CVE-2023-38575 https://access.redhat.com/security/cve/CVE-2023-39368 CVE-2023-39368 CVE-2023-39368 https://access.redhat.com/security/cve/CVE-2023-43490 CVE-2023-43490 CVE-2023-43490 https://access.redhat.com/security/cve/CVE-2023-45733 CVE-2023-45733 CVE-2023-45733 https://access.redhat.com/security/cve/CVE-2023-46103 CVE-2023-46103 CVE-2023-46103 https://bugzilla.redhat.com/2270698 2270698 https://bugzilla.redhat.com/2270700 2270700 https://bugzilla.redhat.com/2270701 2270701 https://bugzilla.redhat.com/2270703 2270703 https://bugzilla.redhat.com/2270704 2270704 https://bugzilla.redhat.com/2292296 2292296 https://bugzilla.redhat.com/2292300 2292300 https://errata.almalinux.org/9/ALSA-2024-9401.html ALSA-2024:9401 ALSA-2024:9401 �m�microcode_ctl-20240910-1.el9_5.noarch.rpm �m�microcode_ctl-20240910-1.el9_5.noarch.rpm ����3�r
�1�IBsecurity Moderate: libgcrypt security update ,��p�
https://access.redhat.com/errata/RHSA-2024:9404 RHSA-2024:9404 RHSA-2024:9404 https://access.redhat.com/security/cve/CVE-2024-2236 CVE-2024-2236 CVE-2024-2236 https://bugzilla.redhat.com/2245218 2245218 https://errata.almalinux.org/9/ALSA-2024-9404.html ALSA-2024:9404 ALSA-2024:9404 �)�Rlibgcrypt-1.10.0-11.el9.x86_64.rpm �)�Rlibgcrypt-1.10.0-11.el9.i686.rpm �)�Rlibgcrypt-1.10.0-11.el9.x86_64.rpm �)�Rlibgcrypt-1.10.0-11.el9.i686.rpm ����H�s
�2�LBsecurity Low: vim security update ,�6��z�thttps://access.redhat.com/errata/RHSA-2024:9405 RHSA-2024:9405 RHSA-2024:9405 https://access.redhat.com/security/cve/CVE-2021-3903 CVE-2021-3903 CVE-2021-3903 https://bugzilla.redhat.com/2018558 2018558 https://errata.almalinux.org/9/ALSA-2024-9405.html ALSA-2024:9405 ALSA-2024:9405 �=�}vim-filesystem-8.2.2637-21.el9.noarch.rpm �r�}vim-minimal-8.2.2637-21.el9.x86_64.rpm �=�}vim-filesystem-8.2.2637-21.el9.noarch.rpm �r�}vim-minimal-8.2.2637-21.el9.x86_64.rpm ����a�t
�3�OBBBsecurity Moderate: bluez security update ,��n�+https://access.redhat.com/errata/RHSA-2024:9413 RHSA-2024:9413 RHSA-2024:9413 https://access.redhat.com/security/cve/CVE-2023-27349 CVE-2023-27349 CVE-2023-27349 https://access.redhat.com/security/cve/CVE-2023-44431 CVE-2023-44431 CVE-2023-44431 https://access.redhat.com/security/cve/CVE-2023-45866 CVE-2023-45866 CVE-2023-45866 https://access.redhat.com/security/cve/CVE-2023-50229 CVE-2023-50229 CVE-2023-50229 https://access.redhat.com/security/cve/CVE-2023-50230 CVE-2023-50230 CVE-2023-50230 https://access.redhat.com/security/cve/CVE-2023-51580 CVE-2023-51580 CVE-2023-51580 https://access.redhat.com/security/cve/CVE-2023-51589 CVE-2023-51589 CVE-2023-51589 https://access.redhat.com/security/cve/CVE-2023-51592 CVE-2023-51592 CVE-2023-51592 https://access.redhat.com/security/cve/CVE-2023-51594 CVE-2023-51594 CVE-2023-51594 https://access.redhat.com/security/cve/CVE-2023-51596 CVE-2023-51596 CVE-2023-51596 https://bugzilla.redhat.com/2253391 2253391 https://bugzilla.redhat.com/2278787 2278787 https://bugzilla.redhat.com/2278945 2278945 https://bugzilla.redhat.com/2278955 2278955 https://bugzilla.redhat.com/2278962 2278962 https://bugzilla.redhat.com/2278965 2278965 https://bugzilla.redhat.com/2278967 2278967 https://bugzilla.redhat.com/2278969 2278969 https://bugzilla.redhat.com/2278972 2278972 https://bugzilla.redhat.com/2278974 2278974 https://errata.almalinux.org/9/ALSA-2024-9413.html ALSA-2024:9413 ALSA-2024:9413 ��"bluez-libs-5.72-2.el9.x86_64.rpm �P�"bluez-5.72-2.el9.x86_64.rpm ��"bluez-libs-5.72-2.el9.i686.rpm ��"bluez-libs-5.72-2.el9.x86_64.rpm �P�"bluez-5.72-2.el9.x86_64.rpm ��"bluez-libs-5.72-2.el9.i686.rpm ����t�u
��security Moderate: python-dns security update ,���qhttps://access.redhat.com/errata/RHSA-2024:9423 RHSA-2024:9423 RHSA-2024:9423 https://access.redhat.com/security/cve/CVE-2023-29483 CVE-2023-29483 CVE-2023-29483 https://bugzilla.redhat.com/2274520 2274520 https://errata.almalinux.org/9/ALSA-2024-9423.html ALSA-2024:9423 ALSA-2024:9423 �!�python3-dns-2.6.1-3.el9.noarch.rpm �!�python3-dns-2.6.1-3.el9.noarch.rpm ����0�v
��Vsecurity Low: tpm2-tools security update ,�6��
�'https://access.redhat.com/errata/RHSA-2024:9424 RHSA-2024:9424 RHSA-2024:9424 https://access.redhat.com/security/cve/CVE-2024-29038 CVE-2024-29038 CVE-2024-29038 https://access.redhat.com/security/cve/CVE-2024-29039 CVE-2024-29039 CVE-2024-29039 https://bugzilla.redhat.com/2278071 2278071 https://bugzilla.redhat.com/2278075 2278075 https://errata.almalinux.org/9/ALSA-2024-9424.html ALSA-2024:9424 ALSA-2024:9424 �x�/tpm2-tools-5.2-4.el9.x86_64.rpm �x�/tpm2-tools-5.2-4.el9.x86_64.rpm ����5�w
��Ysecurity Low: nano security update ,�6��1�Ahttps://access.redhat.com/errata/RHSA-2024:9430 RHSA-2024:9430 RHSA-2024:9430 https://access.redhat.com/security/cve/CVE-2024-5742 CVE-2024-5742 CVE-2024-5742 https://bugzilla.redhat.com/2278574 2278574 https://errata.almalinux.org/9/ALSA-2024-9430.html ALSA-2024:9430 ALSA-2024:9430 �`�0nano-5.6.1-6.el9.x86_64.rpm �`�0nano-5.6.1-6.el9.x86_64.rpm ����5�x
�4�\security Important: bubblewrap and flatpak security update ,+��r�Rhttps://access.redhat.com/errata/RHSA-2024:9449 RHSA-2024:9449 RHSA-2024:9449 https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://errata.almalinux.org/9/ALSA-2024-9449.html ALSA-2024:9449 ALSA-2024:9449 �S�bubblewrap-0.4.1-8.el9_5.x86_64.rpm �S�bubblewrap-0.4.1-8.el9_5.x86_64.rpm ����6�y
�5�^BBBsecurity Moderate: python3.9 security update ,��D�\https://access.redhat.com/errata/RHSA-2024:9468 RHSA-2024:9468 RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-9468.html ALSA-2024:9468 ALSA-2024:9468 -�python3-libs-3.9.19-8.el9_5.1.i686.rpm ��python3-3.9.19-8.el9_5.1.x86_64.rpm -�python3-libs-3.9.19-8.el9_5.1.x86_64.rpm -�python3-libs-3.9.19-8.el9_5.1.i686.rpm ��python3-3.9.19-8.el9_5.1.x86_64.rpm -�python3-libs-3.9.19-8.el9_5.1.x86_64.rpm �����z
�6�cBsecurity Low: cups security update ,�6�� �)https://access.redhat.com/errata/RHSA-2024:9470 RHSA-2024:9470 RHSA-2024:9470 https://access.redhat.com/security/cve/CVE-2024-47175 CVE-2024-47175 CVE-2024-47175 https://bugzilla.redhat.com/2314256 2314256 https://errata.almalinux.org/9/ALSA-2024-9470.html ALSA-2024:9470 ALSA-2024:9470 �*�gcups-libs-2.3.3op2-31.el9_5.i686.rpm �*�gcups-libs-2.3.3op2-31.el9_5.x86_64.rpm �*�gcups-libs-2.3.3op2-31.el9_5.i686.rpm �*�gcups-libs-2.3.3op2-31.el9_5.x86_64.rpm ����S�{
�7�fBBBBBBBBBBBBBBBsecurity Important: krb5 security update ,+��I�Shttps://access.redhat.com/errata/RHSA-2024:9474 RHSA-2024:9474 RHSA-2024:9474 https://access.redhat.com/security/cve/CVE-2024-3596 CVE-2024-3596 CVE-2024-3596 https://bugzilla.redhat.com/2263240 2263240 https://errata.almalinux.org/9/ALSA-2024-9474.html ALSA-2024:9474 ALSA-2024:9474 �%�krb5-server-ldap-1.21.1-4.el9_5.i686.rpm �#�krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm �%�krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm �$�krb5-server-1.21.1-4.el9_5.i686.rpm �"�krb5-libs-1.21.1-4.el9_5.x86_64.rpm �$�krb5-server-1.21.1-4.el9_5.x86_64.rpm �"�krb5-libs-1.21.1-4.el9_5.i686.rpm �#�krb5-pkinit-1.21.1-4.el9_5.i686.rpm �&�libkadm5-1.21.1-4.el9_5.i686.rpm �l�krb5-workstation-1.21.1-4.el9_5.x86_64.rpm �&�libkadm5-1.21.1-4.el9_5.x86_64.rpm �%�krb5-server-ldap-1.21.1-4.el9_5.i686.rpm �#�krb5-pkinit-1.21.1-4.el9_5.x86_64.rpm �%�krb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm �$�krb5-server-1.21.1-4.el9_5.i686.rpm �"�krb5-libs-1.21.1-4.el9_5.x86_64.rpm �$�krb5-server-1.21.1-4.el9_5.x86_64.rpm �"�krb5-libs-1.21.1-4.el9_5.i686.rpm �#�krb5-pkinit-1.21.1-4.el9_5.i686.rpm �&�libkadm5-1.21.1-4.el9_5.i686.rpm �l�krb5-workstation-1.21.1-4.el9_5.x86_64.rpm �&�libkadm5-1.21.1-4.el9_5.x86_64.rpm ����Q�|
�8�wBsecurity Moderate: expat security update ,���Ghttps://access.redhat.com/errata/RHSA-2024:9541 RHSA-2024:9541 RHSA-2024:9541 https://access.redhat.com/security/cve/CVE-2024-50602 CVE-2024-50602 CVE-2024-50602 https://bugzilla.redhat.com/2321987 2321987 https://errata.almalinux.org/9/ALSA-2024-9541.html ALSA-2024:9541 ALSA-2024:9541 � �pexpat-2.5.0-3.el9_5.1.x86_64.rpm � �pexpat-2.5.0-3.el9_5.1.i686.rpm � �pexpat-2.5.0-3.el9_5.1.x86_64.rpm � �pexpat-2.5.0-3.el9_5.1.i686.rpm ����U�}
�9�zBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ,��c�'https://access.redhat.com/errata/RHSA-2024:9605 RHSA-2024:9605 RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283 CVE-2024-42283 CVE-2024-42283 https://access.redhat.com/security/cve/CVE-2024-46824 CVE-2024-46824 CVE-2024-46824 https://access.redhat.com/security/cve/CVE-2024-46858 CVE-2024-46858 CVE-2024-46858 https://bugzilla.redhat.com/2315176 2315176 https://bugzilla.redhat.com/2315210 2315210 https://errata.almalinux.org/9/ALSA-2024-9605.html ALSA-2024:9605 ALSA-2024:9605 3kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm %3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm 23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm 1�Ebpftool-7.4.0-503.14.1.el9_5.x86_64.rpm 3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm "3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm !3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm 3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm %3kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm 23python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm 1�Ebpftool-7.4.0-503.14.1.el9_5.x86_64.rpm 3kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm "3kernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm !3kernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm 3kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm 3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm ����F�~
�:�]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��
�
https://access.redhat.com/errata/RHSA-2025:0059 RHSA-2025:0059 RHSA-2025:0059 https://access.redhat.com/security/cve/CVE-2024-46713 CVE-2024-46713 CVE-2024-46713 https://access.redhat.com/security/cve/CVE-2024-50208 CVE-2024-50208 CVE-2024-50208 https://access.redhat.com/security/cve/CVE-2024-50252 CVE-2024-50252 CVE-2024-50252 https://access.redhat.com/security/cve/CVE-2024-53122 CVE-2024-53122 CVE-2024-53122 https://bugzilla.redhat.com/2312221 2312221 https://bugzilla.redhat.com/2324611 2324611 https://bugzilla.redhat.com/2324898 2324898 https://bugzilla.redhat.com/2329932 2329932 https://errata.almalinux.org/9/ALSA-2025-0059.html ALSA-2025:0059 ALSA-2025:0059 7kernel-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm 1�Ibpftool-7.4.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm 27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm !7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm "7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm %7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-abi-stablelists-5.14.0-503.21.1.el9_5.noarch.rpm 1�Ibpftool-7.4.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-tools-libs-5.14.0-503.21.1.el9_5.x86_64.rpm 27python3-perf-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-core-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-modules-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-modules-extra-5.14.0-503.21.1.el9_5.x86_64.rpm !7kernel-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-core-5.14.0-503.21.1.el9_5.x86_64.rpm "7kernel-uki-virt-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-modules-core-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-tools-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-modules-5.14.0-503.21.1.el9_5.x86_64.rpm 7kernel-debug-5.14.0-503.21.1.el9_5.x86_64.rpm %7kernel-uki-virt-addons-5.14.0-503.21.1.el9_5.x86_64.rpm ����>�
�;�@security Important: rsync security update &+���8https://access.redhat.com/errata/RHSA-2025:0324 RHSA-2025:0324 RHSA-2025:0324 https://access.redhat.com/security/cve/CVE-2024-12085 CVE-2024-12085 CVE-2024-12085 https://bugzilla.redhat.com/2330539 2330539 https://errata.almalinux.org/9/ALSA-2025-0324.html ALSA-2025:0324 ALSA-2025:0324 �;�&rsync-3.2.3-20.el9_5.1.x86_64.rpm �;�&rsync-3.2.3-20.el9_5.1.x86_64.rpm ����d�
�<�BBBBBBBBBBBBBBBBBBsecurity Moderate: Security and bug fixes for NetworkManager &��L�Lhttps://access.redhat.com/errata/RHSA-2025:0377 RHSA-2025:0377 RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661 CVE-2024-3661 CVE-2024-3661 https://errata.almalinux.org/9/ALSA-2025-0377.html ALSA-2025:0377 ALSA-2025:0377 �Q�NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm �P�NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm �N�NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm �J�NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm �K�NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm �#�NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm �O�NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm �#�NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm �M�NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm �L�NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm �I�NetworkManager-1.48.10-5.el9_5.x86_64.rpm �Q�NetworkManager-wwan-1.48.10-5.el9_5.x86_64.rpm �P�NetworkManager-wifi-1.48.10-5.el9_5.x86_64.rpm �N�NetworkManager-team-1.48.10-5.el9_5.x86_64.rpm �J�NetworkManager-adsl-1.48.10-5.el9_5.x86_64.rpm �K�NetworkManager-bluetooth-1.48.10-5.el9_5.x86_64.rpm �#�NetworkManager-libnm-1.48.10-5.el9_5.x86_64.rpm �O�NetworkManager-tui-1.48.10-5.el9_5.x86_64.rpm �#�NetworkManager-libnm-1.48.10-5.el9_5.i686.rpm �M�NetworkManager-initscripts-updown-1.48.10-5.el9_5.noarch.rpm �L�NetworkManager-config-server-1.48.10-5.el9_5.noarch.rpm �I�NetworkManager-1.48.10-5.el9_5.x86_64.rpm ����(�
�=�UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &���Ehttps://access.redhat.com/errata/RHSA-2025:0578 RHSA-2025:0578 RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154 CVE-2024-50154 CVE-2024-50154 https://access.redhat.com/security/cve/CVE-2024-50275 CVE-2024-50275 CVE-2024-50275 https://access.redhat.com/security/cve/CVE-2024-53088 CVE-2024-53088 CVE-2024-53088 https://bugzilla.redhat.com/2324313 2324313 https://bugzilla.redhat.com/2327198 2327198 https://bugzilla.redhat.com/2327328 2327328 https://errata.almalinux.org/9/ALSA-2025-0578.html ALSA-2025:0578 ALSA-2025:0578 8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm "8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm 1�Jbpftool-7.4.0-503.22.1.el9_5.x86_64.rpm !8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm %8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm 28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-tools-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-tools-libs-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-abi-stablelists-5.14.0-503.22.1.el9_5.noarch.rpm "8kernel-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-modules-extra-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-modules-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-core-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-uki-virt-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-debug-core-5.14.0-503.22.1.el9_5.x86_64.rpm 1�Jbpftool-7.4.0-503.22.1.el9_5.x86_64.rpm !8kernel-modules-core-5.14.0-503.22.1.el9_5.x86_64.rpm %8kernel-uki-virt-addons-5.14.0-503.22.1.el9_5.x86_64.rpm 28python3-perf-5.14.0-503.22.1.el9_5.x86_64.rpm 8kernel-5.14.0-503.22.1.el9_5.x86_64.rpm ��Օ/�
�>�xBBBsecurity Moderate: bzip2 security update &��]�https://access.redhat.com/errata/RHSA-2025:0925 RHSA-2025:0925 RHSA-2025:0925 https://access.redhat.com/security/cve/CVE-2019-12900 CVE-2019-12900 CVE-2019-12900 https://bugzilla.redhat.com/2332075 2332075 https://errata.almalinux.org/9/ALSA-2025-0925.html ALSA-2025:0925 ALSA-2025:0925 �R�obzip2-1.0.8-10.el9_5.x86_64.rpm ��obzip2-libs-1.0.8-10.el9_5.i686.rpm ��obzip2-libs-1.0.8-10.el9_5.x86_64.rpm �R�obzip2-1.0.8-10.el9_5.x86_64.rpm ��obzip2-libs-1.0.8-10.el9_5.i686.rpm ��obzip2-libs-1.0.8-10.el9_5.x86_64.rpm �����
�?�}BBBsecurity Important: python3.9 security update &+��n�ghttps://access.redhat.com/errata/RHSA-2025:10136 RHSA-2025:10136 RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010 https://bugzilla.redhat.com/2370013 2370013 https://bugzilla.redhat.com/2370014 2370014 https://bugzilla.redhat.com/2370016 2370016 https://bugzilla.redhat.com/2372426 2372426 https://errata.almalinux.org/9/ALSA-2025-10136.html ALSA-2025:10136 ALSA-2025:10136 ��python3-3.9.21-2.el9_6.1.x86_64.rpm -�python3-libs-3.9.21-2.el9_6.1.i686.rpm -�python3-libs-3.9.21-2.el9_6.1.x86_64.rpm ��python3-3.9.21-2.el9_6.1.x86_64.rpm -�python3-libs-3.9.21-2.el9_6.1.i686.rpm -�python3-libs-3.9.21-2.el9_6.1.x86_64.rpm ��l�
� �BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��U�]https://access.redhat.com/errata/RHSA-2025:10379 RHSA-2025:10379 RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846 CVE-2022-49846 CVE-2022-49846 https://access.redhat.com/security/cve/CVE-2025-21759 CVE-2025-21759 CVE-2025-21759 https://access.redhat.com/security/cve/CVE-2025-21887 CVE-2025-21887 CVE-2025-21887 https://access.redhat.com/security/cve/CVE-2025-22004 CVE-2025-22004 CVE-2025-22004 https://access.redhat.com/security/cve/CVE-2025-37799 CVE-2025-37799 CVE-2025-37799 https://bugzilla.redhat.com/2348596 2348596 https://bugzilla.redhat.com/2355405 2355405 https://bugzilla.redhat.com/2357142 2357142 https://bugzilla.redhat.com/2363432 2363432 https://bugzilla.redhat.com/2363876 2363876 https://errata.almalinux.org/9/ALSA-2025-10379.html ALSA-2025:10379 ALSA-2025:10379 Xkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm "Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm %Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-5.14.0-570.25.1.el9_6.x86_64.rpm !Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm "Xkernel-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm %Xkernel-uki-virt-addons-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-5.14.0-570.25.1.el9_6.x86_64.rpm !Xkernel-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-modules-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-abi-stablelists-5.14.0-570.25.1.el9_6.noarch.rpm Xkernel-debug-uki-virt-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-tools-libs-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-tools-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm Xkernel-core-5.14.0-570.25.1.el9_6.x86_64.rpm �ÿ��
�#�asecurity Moderate: python-setuptools security update &��2�Jhttps://access.redhat.com/errata/RHSA-2025:10407 RHSA-2025:10407 RHSA-2025:10407 https://access.redhat.com/security/cve/CVE-2025-47273 CVE-2025-47273 CVE-2025-47273 https://bugzilla.redhat.com/2366982 2366982 https://errata.almalinux.org/9/ALSA-2025-10407.html ALSA-2025:10407 ALSA-2025:10407 �F�Hpython3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm �E�Hpython3-setuptools-53.0.0-13.el9_6.1.noarch.rpm �F�Hpython3-setuptools-wheel-53.0.0-13.el9_6.1.noarch.rpm �E�Hpython3-setuptools-53.0.0-13.el9_6.1.noarch.rpm �ó�`�
�'�dBsecurity Moderate: jq security update &��|�
https://access.redhat.com/errata/RHSA-2025:10585 RHSA-2025:10585 RHSA-2025:10585 https://access.redhat.com/security/cve/CVE-2024-23337 CVE-2024-23337 CVE-2024-23337 https://access.redhat.com/security/cve/CVE-2025-48060 CVE-2025-48060 CVE-2025-48060 https://bugzilla.redhat.com/2367807 2367807 https://bugzilla.redhat.com/2367842 2367842 https://errata.almalinux.org/9/ALSA-2025-10585.html ALSA-2025:10585 ALSA-2025:10585 � �bjq-1.6-17.el9_6.2.x86_64.rpm � �bjq-1.6-17.el9_6.2.i686.rpm � �bjq-1.6-17.el9_6.2.x86_64.rpm � �bjq-1.6-17.el9_6.2.i686.rpm �þ�C�
��hBBBsecurity Important: libxml2 security update &+���Lhttps://access.redhat.com/errata/RHSA-2025:10699 RHSA-2025:10699 RHSA-2025:10699 https://access.redhat.com/security/cve/CVE-2025-49794 CVE-2025-49794 CVE-2025-49794 https://access.redhat.com/security/cve/CVE-2025-49796 CVE-2025-49796 CVE-2025-49796 https://access.redhat.com/security/cve/CVE-2025-6021 CVE-2025-6021 CVE-2025-6021 https://bugzilla.redhat.com/2372373 2372373 https://bugzilla.redhat.com/2372385 2372385 https://bugzilla.redhat.com/2372406 2372406 https://errata.almalinux.org/9/ALSA-2025-10699.html ALSA-2025:10699 ALSA-2025:10699 �
�libxml2-2.9.13-10.el9_6.x86_64.rpm �N�python3-libxml2-2.9.13-10.el9_6.x86_64.rpm �
�libxml2-2.9.13-10.el9_6.i686.rpm �
�libxml2-2.9.13-10.el9_6.x86_64.rpm �N�python3-libxml2-2.9.13-10.el9_6.x86_64.rpm �
�libxml2-2.9.13-10.el9_6.i686.rpm �þ�#�
��mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��R�https://access.redhat.com/errata/RHSA-2025:10837 RHSA-2025:10837 RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991 CVE-2025-21991 CVE-2025-21991 https://bugzilla.redhat.com/2356917 2356917 https://errata.almalinux.org/9/ALSA-2025-10837.html ALSA-2025:10837 ALSA-2025:10837 Ykernel-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm "Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm %Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm !Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-core-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpm Ykernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-modules-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm "Ykernel-uki-virt-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-tools-libs-5.14.0-570.26.1.el9_6.x86_64.rpm %Ykernel-uki-virt-addons-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm !Ykernel-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-tools-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-core-5.14.0-570.26.1.el9_6.x86_64.rpm Ykernel-abi-stablelists-5.14.0-570.26.1.el9_6.noarch.rpm Ykernel-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm ����p�
��LBsecurity Moderate: glib2 security update &��f�https://access.redhat.com/errata/RHSA-2025:11140 RHSA-2025:11140 RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533 CVE-2024-52533 CVE-2024-52533 https://access.redhat.com/security/cve/CVE-2025-4373 CVE-2025-4373 CVE-2025-4373 https://bugzilla.redhat.com/2325340 2325340 https://bugzilla.redhat.com/2364265 2364265 https://errata.almalinux.org/9/ALSA-2025-11140.html ALSA-2025:11140 ALSA-2025:11140 �U�vglib2-2.68.4-16.el9_6.2.i686.rpm �U�vglib2-2.68.4-16.el9_6.2.x86_64.rpm �U�vglib2-2.68.4-16.el9_6.2.i686.rpm �U�vglib2-2.68.4-16.el9_6.2.x86_64.rpm ��.�
��OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��j�Vhttps://access.redhat.com/errata/RHSA-2025:11411 RHSA-2025:11411 RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002 CVE-2024-58002 CVE-2024-58002 https://access.redhat.com/security/cve/CVE-2025-38089 CVE-2025-38089 CVE-2025-38089 https://bugzilla.redhat.com/2348513 2348513 https://bugzilla.redhat.com/2375529 2375529 https://errata.almalinux.org/9/ALSA-2025-11411.html ALSA-2025:11411 ALSA-2025:11411 %Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm "Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm !Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpm %Zkernel-uki-virt-addons-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-modules-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-abi-stablelists-5.14.0-570.28.1.el9_6.noarch.rpm Zkernel-debug-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-tools-libs-5.14.0-570.28.1.el9_6.x86_64.rpm "Zkernel-uki-virt-5.14.0-570.28.1.el9_6.x86_64.rpm !Zkernel-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-debug-5.14.0-570.28.1.el9_6.x86_64.rpm Zkernel-tools-5.14.0-570.28.1.el9_6.x86_64.rpm ��V�
��nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��@�https://access.redhat.com/errata/RHSA-2025:11861 RHSA-2025:11861 RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980 CVE-2024-57980 CVE-2024-57980 https://access.redhat.com/security/cve/CVE-2025-21905 CVE-2025-21905 CVE-2025-21905 https://access.redhat.com/security/cve/CVE-2025-22085 CVE-2025-22085 CVE-2025-22085 https://access.redhat.com/security/cve/CVE-2025-22091 CVE-2025-22091 CVE-2025-22091 https://access.redhat.com/security/cve/CVE-2025-22113 CVE-2025-22113 CVE-2025-22113 https://access.redhat.com/security/cve/CVE-2025-22121 CVE-2025-22121 CVE-2025-22121 https://access.redhat.com/security/cve/CVE-2025-37797 CVE-2025-37797 CVE-2025-37797 https://access.redhat.com/security/cve/CVE-2025-37958 CVE-2025-37958 CVE-2025-37958 https://access.redhat.com/security/cve/CVE-2025-38086 CVE-2025-38086 CVE-2025-38086 https://access.redhat.com/security/cve/CVE-2025-38110 CVE-2025-38110 CVE-2025-38110 https://bugzilla.redhat.com/2348599 2348599 https://bugzilla.redhat.com/2356613 2356613 https://bugzilla.redhat.com/2360186 2360186 https://bugzilla.redhat.com/2360199 2360199 https://bugzilla.redhat.com/2360212 2360212 https://bugzilla.redhat.com/2360219 2360219 https://bugzilla.redhat.com/2363672 2363672 https://bugzilla.redhat.com/2367572 2367572 https://bugzilla.redhat.com/2375305 2375305 https://bugzilla.redhat.com/2376035 2376035 https://errata.almalinux.org/9/ALSA-2025-11861.html ALSA-2025:11861 ALSA-2025:11861 [kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm %[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm [kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm "[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-5.14.0-570.30.1.el9_6.x86_64.rpm ![kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm %[kernel-uki-virt-addons-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-abi-stablelists-5.14.0-570.30.1.el9_6.noarch.rpm [kernel-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-modules-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-tools-libs-5.14.0-570.30.1.el9_6.x86_64.rpm "[kernel-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-5.14.0-570.30.1.el9_6.x86_64.rpm ![kernel-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-debug-uki-virt-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm [kernel-tools-5.14.0-570.30.1.el9_6.x86_64.rpm �į�+�
��MBsecurity Important: sqlite security update &+��N� https://access.redhat.com/errata/RHSA-2025:11992 RHSA-2025:11992 RHSA-2025:11992 https://access.redhat.com/security/cve/CVE-2025-6965 CVE-2025-6965 CVE-2025-6965 https://bugzilla.redhat.com/2380149 2380149 https://errata.almalinux.org/9/ALSA-2025-11992.html ALSA-2025:11992 ALSA-2025:11992 �X�sqlite-libs-3.34.1-8.el9_6.x86_64.rpm �X�sqlite-libs-3.34.1-8.el9_6.i686.rpm �X�sqlite-libs-3.34.1-8.el9_6.x86_64.rpm �X�sqlite-libs-3.34.1-8.el9_6.i686.rpm ���
��PBsecurity Moderate: icu security update &��W�https://access.redhat.com/errata/RHSA-2025:12083 RHSA-2025:12083 RHSA-2025:12083 https://access.redhat.com/security/cve/CVE-2025-5222 CVE-2025-5222 CVE-2025-5222 https://bugzilla.redhat.com/2368600 2368600 https://errata.almalinux.org/9/ALSA-2025-12083.html ALSA-2025:12083 ALSA-2025:12083 �,�libicu-67.1-10.el9_6.i686.rpm �,�libicu-67.1-10.el9_6.x86_64.rpm �,�libicu-67.1-10.el9_6.i686.rpm �,�libicu-67.1-10.el9_6.x86_64.rpm �ħ�G�
��SBBBsecurity Important: libxml2 security update &+��i�!https://access.redhat.com/errata/RHSA-2025:12447 RHSA-2025:12447 RHSA-2025:12447 https://access.redhat.com/security/cve/CVE-2025-7425 CVE-2025-7425 CVE-2025-7425 https://bugzilla.redhat.com/2379274 2379274 https://errata.almalinux.org/9/ALSA-2025-12447.html ALSA-2025:12447 ALSA-2025:12447 �
� libxml2-2.9.13-11.el9_6.i686.rpm �
� libxml2-2.9.13-11.el9_6.x86_64.rpm �N� python3-libxml2-2.9.13-11.el9_6.x86_64.rpm �
� libxml2-2.9.13-11.el9_6.i686.rpm �
� libxml2-2.9.13-11.el9_6.x86_64.rpm �N� python3-libxml2-2.9.13-11.el9_6.x86_64.rpm �ij�y�
� �security Moderate: python-requests security update &��
�Rhttps://access.redhat.com/errata/RHSA-2025:12519 RHSA-2025:12519 RHSA-2025:12519 https://access.redhat.com/security/cve/CVE-2024-47081 CVE-2024-47081 CVE-2024-47081 https://bugzilla.redhat.com/2371272 2371272 https://errata.almalinux.org/9/ALSA-2025-12519.html ALSA-2025:12519 ALSA-2025:12519 �D�python3-requests-2.25.1-10.el9_6.noarch.rpm �D�python3-requests-2.25.1-10.el9_6.noarch.rpm ����f�
�
�YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��\�https://access.redhat.com/errata/RHSA-2025:1262 RHSA-2025:1262 RHSA-2025:1262 https://access.redhat.com/security/cve/CVE-2024-53104 CVE-2024-53104 CVE-2024-53104 https://bugzilla.redhat.com/2329817 2329817 https://errata.almalinux.org/9/ALSA-2025-1262.html ALSA-2025:1262 ALSA-2025:1262 "9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm 1�Kbpftool-7.4.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm 29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm %9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm !9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm "9kernel-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-modules-5.14.0-503.23.2.el9_5.x86_64.rpm 1�Kbpftool-7.4.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-tools-libs-5.14.0-503.23.2.el9_5.x86_64.rpm 29python3-perf-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-tools-5.14.0-503.23.2.el9_5.x86_64.rpm %9kernel-uki-virt-addons-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-uki-virt-5.14.0-503.23.2.el9_5.x86_64.rpm !9kernel-modules-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-debug-core-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-modules-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-5.14.0-503.23.2.el9_5.x86_64.rpm 9kernel-abi-stablelists-5.14.0-503.23.2.el9_5.noarch.rpm �����
��|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��y�ohttps://access.redhat.com/errata/RHSA-2025:12746 RHSA-2025:12746 RHSA-2025:12746 https://access.redhat.com/security/cve/CVE-2022-49788 CVE-2022-49788 CVE-2022-49788 https://access.redhat.com/security/cve/CVE-2025-21727 CVE-2025-21727 CVE-2025-21727 https://access.redhat.com/security/cve/CVE-2025-21928 CVE-2025-21928 CVE-2025-21928 https://access.redhat.com/security/cve/CVE-2025-21929 CVE-2025-21929 CVE-2025-21929 https://access.redhat.com/security/cve/CVE-2025-21962 CVE-2025-21962 CVE-2025-21962 https://access.redhat.com/security/cve/CVE-2025-22020 CVE-2025-22020 CVE-2025-22020 https://access.redhat.com/security/cve/CVE-2025-37890 CVE-2025-37890 CVE-2025-37890 https://access.redhat.com/security/cve/CVE-2025-38052 CVE-2025-38052 CVE-2025-38052 https://access.redhat.com/security/cve/CVE-2025-38087 CVE-2025-38087 CVE-2025-38087 https://bugzilla.redhat.com/2348516 2348516 https://bugzilla.redhat.com/2356592 2356592 https://bugzilla.redhat.com/2356594 2356594 https://bugzilla.redhat.com/2356624 2356624 https://bugzilla.redhat.com/2360099 2360099 https://bugzilla.redhat.com/2363378 2363378 https://bugzilla.redhat.com/2366848 2366848 https://bugzilla.redhat.com/2373380 2373380 https://bugzilla.redhat.com/2375531 2375531 https://errata.almalinux.org/9/ALSA-2025-12746.html ALSA-2025:12746 ALSA-2025:12746 \kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm %\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm "\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm !\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm \kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm %\kernel-uki-virt-addons-5.14.0-570.32.1.el9_6.x86_64.rpm "\kernel-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-uki-virt-5.14.0-570.32.1.el9_6.x86_64.rpm !\kernel-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-tools-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-modules-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm \kernel-abi-stablelists-5.14.0-570.32.1.el9_6.noarch.rpm \kernel-tools-libs-5.14.0-570.32.1.el9_6.x86_64.rpm ��Қ�
��[BBBsecurity Important: openssl security update &+��h�qhttps://access.redhat.com/errata/RHSA-2025:1330 RHSA-2025:1330 RHSA-2025:1330 https://access.redhat.com/security/cve/CVE-2024-12797 CVE-2024-12797 CVE-2024-12797 https://bugzilla.redhat.com/2342757 2342757 https://errata.almalinux.org/9/ALSA-2025-1330.html ALSA-2025:1330 ALSA-2025:1330 ��yopenssl-libs-3.2.2-6.el9_5.1.i686.rpm �7�yopenssl-3.2.2-6.el9_5.1.x86_64.rpm ��yopenssl-libs-3.2.2-6.el9_5.1.x86_64.rpm ��yopenssl-libs-3.2.2-6.el9_5.1.i686.rpm �7�yopenssl-3.2.2-6.el9_5.1.x86_64.rpm ��yopenssl-libs-3.2.2-6.el9_5.1.x86_64.rpm ����\�
�
�`BBBsecurity Moderate: libxml2 security update &��Y�https://access.redhat.com/errata/RHSA-2025:13428 RHSA-2025:13428 RHSA-2025:13428 https://access.redhat.com/security/cve/CVE-2025-32414 CVE-2025-32414 CVE-2025-32414 https://access.redhat.com/security/cve/CVE-2025-32415 CVE-2025-32415 CVE-2025-32415 https://bugzilla.redhat.com/2358121 2358121 https://bugzilla.redhat.com/2360768 2360768 https://errata.almalinux.org/9/ALSA-2025-13428.html ALSA-2025:13428 ALSA-2025:13428 �N�python3-libxml2-2.9.13-12.el9_6.x86_64.rpm �
�libxml2-2.9.13-12.el9_6.x86_64.rpm �
�libxml2-2.9.13-12.el9_6.i686.rpm �N�python3-libxml2-2.9.13-12.el9_6.x86_64.rpm �
�libxml2-2.9.13-12.el9_6.x86_64.rpm �
�libxml2-2.9.13-12.el9_6.i686.rpm ��Լ>�
��eBBBBBBBBBBBBBBBBsecurity Moderate: gcc security update &��n�Khttps://access.redhat.com/errata/RHSA-2025:1346 RHSA-2025:1346 RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023 CVE-2020-11023 CVE-2020-11023 https://bugzilla.redhat.com/1850004 1850004 https://errata.almalinux.org/9/ALSA-2025-1346.html ALSA-2025:1346 ALSA-2025:1346 �+�libgomp-11.5.0-5.el9_5.alma.1.i686.rpm �4�libstdc++-11.5.0-5.el9_5.alma.1.i686.rpm �+�libgomp-11.5.0-5.el9_5.alma.1.x86_64.rpm �*�libgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm �(�libgcc-11.5.0-5.el9_5.alma.1.i686.rpm �*�libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm �!�libatomic-11.5.0-5.el9_5.alma.1.i686.rpm �(�libgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm �4�libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpm �!�libatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm �1�libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm �1�libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm �+�libgomp-11.5.0-5.el9_5.alma.1.i686.rpm �4�libstdc++-11.5.0-5.el9_5.alma.1.i686.rpm �+�libgomp-11.5.0-5.el9_5.alma.1.x86_64.rpm �*�libgfortran-11.5.0-5.el9_5.alma.1.x86_64.rpm �(�libgcc-11.5.0-5.el9_5.alma.1.i686.rpm �*�libgfortran-11.5.0-5.el9_5.alma.1.i686.rpm �!�libatomic-11.5.0-5.el9_5.alma.1.i686.rpm �(�libgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm �4�libstdc++-11.5.0-5.el9_5.alma.1.x86_64.rpm �!�libatomic-11.5.0-5.el9_5.alma.1.x86_64.rpm �1�libquadmath-11.5.0-5.el9_5.alma.1.x86_64.rpm �1�libquadmath-11.5.0-5.el9_5.alma.1.i686.rpm �����
��wBBBsecurity Important: libxml2 security update &+��9�~https://access.redhat.com/errata/RHSA-2025:1350 RHSA-2025:1350 RHSA-2025:1350 https://access.redhat.com/security/cve/CVE-2022-49043 CVE-2022-49043 CVE-2022-49043 https://bugzilla.redhat.com/2342118 2342118 https://errata.almalinux.org/9/ALSA-2025-1350.html ALSA-2025:1350 ALSA-2025:1350 �N�python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm �
�libxml2-2.9.13-6.el9_5.1.i686.rpm �
�libxml2-2.9.13-6.el9_5.1.x86_64.rpm �N�python3-libxml2-2.9.13-6.el9_5.1.x86_64.rpm �
�libxml2-2.9.13-6.el9_5.1.i686.rpm �
�libxml2-2.9.13-6.el9_5.1.x86_64.rpm ����
�
��|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��7�Hhttps://access.redhat.com/errata/RHSA-2025:13602 RHSA-2025:13602 RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079 CVE-2025-38079 CVE-2025-38079 https://access.redhat.com/security/cve/CVE-2025-38292 CVE-2025-38292 CVE-2025-38292 https://bugzilla.redhat.com/2373383 2373383 https://bugzilla.redhat.com/2379219 2379219 https://errata.almalinux.org/9/ALSA-2025-13602.html ALSA-2025:13602 ALSA-2025:13602 ]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm !]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm ]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm %]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm "]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm !]kernel-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-abi-stablelists-5.14.0-570.33.2.el9_6.noarch.rpm ]kernel-tools-libs-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm %]kernel-uki-virt-addons-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-tools-5.14.0-570.33.2.el9_6.x86_64.rpm "]kernel-uki-virt-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-modules-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm ]kernel-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm ����
��[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+���https://access.redhat.com/errata/RHSA-2025:13962 RHSA-2025:13962 RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956 CVE-2024-28956 CVE-2024-28956 https://access.redhat.com/security/cve/CVE-2025-21867 CVE-2025-21867 CVE-2025-21867 https://access.redhat.com/security/cve/CVE-2025-38084 CVE-2025-38084 CVE-2025-38084 https://access.redhat.com/security/cve/CVE-2025-38085 CVE-2025-38085 CVE-2025-38085 https://access.redhat.com/security/cve/CVE-2025-38124 CVE-2025-38124 CVE-2025-38124 https://access.redhat.com/security/cve/CVE-2025-38159 CVE-2025-38159 CVE-2025-38159 https://access.redhat.com/security/cve/CVE-2025-38250 CVE-2025-38250 CVE-2025-38250 https://access.redhat.com/security/cve/CVE-2025-38380 CVE-2025-38380 CVE-2025-38380 https://access.redhat.com/security/cve/CVE-2025-38471 CVE-2025-38471 CVE-2025-38471 https://bugzilla.redhat.com/2355334 2355334 https://bugzilla.redhat.com/2366125 2366125 https://bugzilla.redhat.com/2375303 2375303 https://bugzilla.redhat.com/2375304 2375304 https://bugzilla.redhat.com/2376041 2376041 https://bugzilla.redhat.com/2376064 2376064 https://bugzilla.redhat.com/2378982 2378982 https://bugzilla.redhat.com/2383381 2383381 https://bugzilla.redhat.com/2383893 2383893 https://errata.almalinux.org/9/ALSA-2025-13962.html ALSA-2025:13962 ALSA-2025:13962 ^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm %^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm !^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm "^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-modules-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-core-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-core-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-tools-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-tools-libs-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-5.14.0-570.35.1.el9_6.x86_64.rpm %^kernel-uki-virt-addons-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm !^kernel-modules-core-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-abi-stablelists-5.14.0-570.35.1.el9_6.noarch.rpm "^kernel-uki-virt-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-modules-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-5.14.0-570.35.1.el9_6.x86_64.rpm ^kernel-debug-modules-extra-5.14.0-570.35.1.el9_6.x86_64.rpm ���
��zBsecurity Important: libarchive security update &+���}https://access.redhat.com/errata/RHSA-2025:14130 RHSA-2025:14130 RHSA-2025:14130 https://access.redhat.com/security/cve/CVE-2025-5914 CVE-2025-5914 CVE-2025-5914 https://bugzilla.redhat.com/2370861 2370861 https://errata.almalinux.org/9/ALSA-2025-14130.html ALSA-2025:14130 ALSA-2025:14130 �?� libarchive-3.5.3-6.el9_6.x86_64.rpm �?� libarchive-3.5.3-6.el9_6.i686.rpm �?� libarchive-3.5.3-6.el9_6.x86_64.rpm �?� libarchive-3.5.3-6.el9_6.i686.rpm �ŗ�l�
��}BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��
�!https://access.redhat.com/errata/RHSA-2025:14420 RHSA-2025:14420 RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058 CVE-2025-22058 CVE-2025-22058 https://access.redhat.com/security/cve/CVE-2025-37914 CVE-2025-37914 CVE-2025-37914 https://access.redhat.com/security/cve/CVE-2025-38417 CVE-2025-38417 CVE-2025-38417 https://bugzilla.redhat.com/2360276 2360276 https://bugzilla.redhat.com/2367500 2367500 https://bugzilla.redhat.com/2383463 2383463 https://errata.almalinux.org/9/ALSA-2025-14420.html ALSA-2025:14420 ALSA-2025:14420 _kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm %_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm "_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm !_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm _kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm %_kernel-uki-virt-addons-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-tools-libs-5.14.0-570.37.1.el9_6.x86_64.rpm "_kernel-uki-virt-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-modules-5.14.0-570.37.1.el9_6.x86_64.rpm !_kernel-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-core-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-tools-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm _kernel-abi-stablelists-5.14.0-570.37.1.el9_6.noarch.rpm _kernel-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm ��v�
��\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��.�https://access.redhat.com/errata/RHSA-2025:15011 RHSA-2025:15011 RHSA-2025:15011 https://bugzilla.redhat.com/2365024 2365024 https://bugzilla.redhat.com/2376392 2376392 https://bugzilla.redhat.com/2376406 2376406 https://bugzilla.redhat.com/2382054 2382054 https://bugzilla.redhat.com/2383509 2383509 https://bugzilla.redhat.com/2383513 2383513 https://bugzilla.redhat.com/2387866 2387866 https://errata.almalinux.org/9/ALSA-2025-15011.html ALSA-2025:15011 ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.html CVE-2025-37823 CVE-2025-37823 https://www.redhat.com/security/data/cve/CVE-2025-38200.html CVE-2025-38200 CVE-2025-38200 https://www.redhat.com/security/data/cve/CVE-2025-38211.html CVE-2025-38211 CVE-2025-38211 https://www.redhat.com/security/data/cve/CVE-2025-38350.html CVE-2025-38350 CVE-2025-38350 https://www.redhat.com/security/data/cve/CVE-2025-38461.html CVE-2025-38461 CVE-2025-38461 https://www.redhat.com/security/data/cve/CVE-2025-38464.html CVE-2025-38464 CVE-2025-38464 https://www.redhat.com/security/data/cve/CVE-2025-38500.html CVE-2025-38500 CVE-2025-38500 https://www.redhat.com/security/data/cve/CVE-2025-38684.html CVE-2025-38684 CVE-2025-38684 `kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm !`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm "`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm %`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-tools-libs-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-modules-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm !`kernel-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-tools-5.14.0-570.39.1.el9_6.x86_64.rpm "`kernel-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-abi-stablelists-5.14.0-570.39.1.el9_6.noarch.rpm %`kernel-uki-virt-addons-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-uki-virt-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm `kernel-5.14.0-570.39.1.el9_6.x86_64.rpm ���'�
��{BBBsecurity Moderate: python3.9 security update &��E�;https://access.redhat.com/errata/RHSA-2025:15019 RHSA-2025:15019 RHSA-2025:15019 https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043 https://errata.almalinux.org/9/ALSA-2025-15019.html ALSA-2025:15019 ALSA-2025:15019 ��python3-3.9.21-2.el9_6.2.x86_64.rpm -�python3-libs-3.9.21-2.el9_6.2.i686.rpm -�python3-libs-3.9.21-2.el9_6.2.x86_64.rpm ��python3-3.9.21-2.el9_6.2.x86_64.rpm -�python3-libs-3.9.21-2.el9_6.2.i686.rpm -�python3-libs-3.9.21-2.el9_6.2.x86_64.rpm ����
��@Bsecurity Important: pam security update &+�� �phttps://access.redhat.com/errata/RHSA-2025:15099 RHSA-2025:15099 RHSA-2025:15099 https://access.redhat.com/security/cve/CVE-2025-6020 CVE-2025-6020 CVE-2025-6020 https://access.redhat.com/security/cve/CVE-2025-8941 CVE-2025-8941 CVE-2025-8941 https://bugzilla.redhat.com/2372512 2372512 https://bugzilla.redhat.com/2388220 2388220 https://errata.almalinux.org/9/ALSA-2025-15099.html ALSA-2025:15099 ALSA-2025:15099 �A�_pam-1.5.1-26.el9_6.x86_64.rpm �A�_pam-1.5.1-26.el9_6.i686.rpm �A�_pam-1.5.1-26.el9_6.x86_64.rpm �A�_pam-1.5.1-26.el9_6.i686.rpm ����
��CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��p�Whttps://access.redhat.com/errata/RHSA-2025:15429 RHSA-2025:15429 RHSA-2025:15429 https://access.redhat.com/security/cve/CVE-2025-37803 CVE-2025-37803 CVE-2025-37803 https://access.redhat.com/security/cve/CVE-2025-38392 CVE-2025-38392 CVE-2025-38392 https://bugzilla.redhat.com/2365013 2365013 https://bugzilla.redhat.com/2383407 2383407 https://errata.almalinux.org/9/ALSA-2025-15429.html ALSA-2025:15429 ALSA-2025:15429 akernel-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpm akernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm "akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm !akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm %akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-core-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-modules-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-abi-stablelists-5.14.0-570.41.1.el9_6.noarch.rpm akernel-debug-core-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm "akernel-uki-virt-5.14.0-570.41.1.el9_6.x86_64.rpm !akernel-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm %akernel-uki-virt-addons-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-tools-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-core-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-modules-core-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-modules-extra-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-tools-libs-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-5.14.0-570.41.1.el9_6.x86_64.rpm akernel-debug-modules-5.14.0-570.41.1.el9_6.x86_64.rpm �Ɵ�+�
��bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��G�
https://access.redhat.com/errata/RHSA-2025:15661 RHSA-2025:15661 RHSA-2025:15661 https://access.redhat.com/security/cve/CVE-2025-22097 CVE-2025-22097 CVE-2025-22097 https://access.redhat.com/security/cve/CVE-2025-38332 CVE-2025-38332 CVE-2025-38332 https://access.redhat.com/security/cve/CVE-2025-38352 CVE-2025-38352 CVE-2025-38352 https://access.redhat.com/security/cve/CVE-2025-38449 CVE-2025-38449 CVE-2025-38449 https://bugzilla.redhat.com/2360223 2360223 https://bugzilla.redhat.com/2379246 2379246 https://bugzilla.redhat.com/2382581 2382581 https://bugzilla.redhat.com/2383519 2383519 https://errata.almalinux.org/9/ALSA-2025-15661.html ALSA-2025:15661 ALSA-2025:15661 !bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm "bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm %bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm !bkernel-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm "bkernel-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm %bkernel-uki-virt-addons-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-uki-virt-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-tools-libs-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-modules-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-core-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-tools-5.14.0-570.42.2.el9_6.x86_64.rpm bkernel-abi-stablelists-5.14.0-570.42.2.el9_6.noarch.rpm �Ƥ�U�
��ABsecurity Important: cups security update &+��a�
https://access.redhat.com/errata/RHSA-2025:15700 RHSA-2025:15700 RHSA-2025:15700 https://access.redhat.com/security/cve/CVE-2025-58060 CVE-2025-58060 CVE-2025-58060 https://access.redhat.com/security/cve/CVE-2025-58364 CVE-2025-58364 CVE-2025-58364 https://bugzilla.redhat.com/2392595 2392595 https://bugzilla.redhat.com/2393078 2393078 https://errata.almalinux.org/9/ALSA-2025-15700.html ALSA-2025:15700 ALSA-2025:15700 �*�hcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm �*�hcups-libs-2.3.3op2-33.el9_6.1.i686.rpm �*�hcups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm �*�hcups-libs-2.3.3op2-33.el9_6.1.i686.rpm ���S�
��DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��n� https://access.redhat.com/errata/RHSA-2025:15740 RHSA-2025:15740 RHSA-2025:15740 https://access.redhat.com/security/cve/CVE-2025-38550 CVE-2025-38550 CVE-2025-38550 https://bugzilla.redhat.com/2388941 2388941 https://errata.almalinux.org/9/ALSA-2025-15740.html ALSA-2025:15740 ALSA-2025:15740 %ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm "ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm !ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm %ckernel-uki-virt-addons-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-modules-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-abi-stablelists-5.14.0-570.44.1.el9_6.noarch.rpm "ckernel-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-tools-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-modules-extra-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-modules-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-tools-libs-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-5.14.0-570.44.1.el9_6.x86_64.rpm !ckernel-modules-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-core-5.14.0-570.44.1.el9_6.x86_64.rpm ckernel-debug-uki-virt-5.14.0-570.44.1.el9_6.x86_64.rpm ��ԃP�!
�%�csecurity Moderate: python-cryptography security update &��n�Lhttps://access.redhat.com/errata/RHSA-2025:15874 RHSA-2025:15874 RHSA-2025:15874 https://access.redhat.com/security/cve/CVE-2023-49083 CVE-2023-49083 CVE-2023-49083 https://bugzilla.redhat.com/2255331 2255331 https://errata.almalinux.org/9/ALSA-2025-15874.html ALSA-2025:15874 ALSA-2025:15874 �r�*python3-cryptography-36.0.1-5.el9_6.x86_64.rpm �r�*python3-cryptography-36.0.1-5.el9_6.x86_64.rpm �Ư�#�"
��fBsecurity Moderate: gnutls security, bug fix, and enhancement update &��:�
https://access.redhat.com/errata/RHSA-2025:16116 RHSA-2025:16116 RHSA-2025:16116 https://access.redhat.com/security/cve/CVE-2025-32988 CVE-2025-32988 CVE-2025-32988 https://access.redhat.com/security/cve/CVE-2025-32989 CVE-2025-32989 CVE-2025-32989 https://access.redhat.com/security/cve/CVE-2025-32990 CVE-2025-32990 CVE-2025-32990 https://access.redhat.com/security/cve/CVE-2025-6395 CVE-2025-6395 CVE-2025-6395 https://bugzilla.redhat.com/2359620 2359620 https://bugzilla.redhat.com/2359621 2359621 https://bugzilla.redhat.com/2359622 2359622 https://bugzilla.redhat.com/2376755 2376755 https://errata.almalinux.org/9/ALSA-2025-16116.html ALSA-2025:16116 ALSA-2025:16116 �!�gnutls-3.8.3-6.el9_6.2.x86_64.rpm �!�gnutls-3.8.3-6.el9_6.2.i686.rpm �!�gnutls-3.8.3-6.el9_6.2.x86_64.rpm �!�gnutls-3.8.3-6.el9_6.2.i686.rpm ���
�#
��iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��K�
https://access.redhat.com/errata/RHSA-2025:16398 RHSA-2025:16398 RHSA-2025:16398 https://access.redhat.com/security/cve/CVE-2023-53125 CVE-2023-53125 CVE-2023-53125 https://access.redhat.com/security/cve/CVE-2025-37810 CVE-2025-37810 CVE-2025-37810 https://access.redhat.com/security/cve/CVE-2025-38498 CVE-2025-38498 CVE-2025-38498 https://access.redhat.com/security/cve/CVE-2025-39694 CVE-2025-39694 CVE-2025-39694 https://bugzilla.redhat.com/2363686 2363686 https://bugzilla.redhat.com/2365028 2365028 https://bugzilla.redhat.com/2384422 2384422 https://bugzilla.redhat.com/2393534 2393534 https://errata.almalinux.org/9/ALSA-2025-16398.html ALSA-2025:16398 ALSA-2025:16398 dkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm !dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm %dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpm dkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm "dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm !dkernel-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-tools-libs-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-5.14.0-570.46.1.el9_6.x86_64.rpm %dkernel-uki-virt-addons-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-modules-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-modules-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-tools-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-abi-stablelists-5.14.0-570.46.1.el9_6.noarch.rpm dkernel-modules-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-debug-core-5.14.0-570.46.1.el9_6.x86_64.rpm dkernel-modules-extra-5.14.0-570.46.1.el9_6.x86_64.rpm "dkernel-uki-virt-5.14.0-570.46.1.el9_6.x86_64.rpm ���r�$
��HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��R�https://access.redhat.com/errata/RHSA-2025:1659 RHSA-2025:1659 RHSA-2025:1659 https://access.redhat.com/security/cve/CVE-2023-52490 CVE-2023-52490 CVE-2023-52490 https://bugzilla.redhat.com/2269187 2269187 https://errata.almalinux.org/9/ALSA-2025-1659.html ALSA-2025:1659 ALSA-2025:1659 2:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm %:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm 1�Lbpftool-7.4.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm !:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm ":kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm 2:python3-perf-5.14.0-503.26.1.el9_5.x86_64.rpm %:kernel-uki-virt-addons-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-core-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-abi-stablelists-5.14.0-503.26.1.el9_5.noarch.rpm 1�Lbpftool-7.4.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.26.1.el9_5.x86_64.rpm !:kernel-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-modules-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-tools-libs-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-modules-core-5.14.0-503.26.1.el9_5.x86_64.rpm ":kernel-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-uki-virt-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-core-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-debug-modules-extra-5.14.0-503.26.1.el9_5.x86_64.rpm :kernel-modules-5.14.0-503.26.1.el9_5.x86_64.rpm ����J�%
��kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��c�ihttps://access.redhat.com/errata/RHSA-2025:16880 RHSA-2025:16880 RHSA-2025:16880 https://access.redhat.com/security/cve/CVE-2025-38472 CVE-2025-38472 CVE-2025-38472 https://access.redhat.com/security/cve/CVE-2025-38527 CVE-2025-38527 CVE-2025-38527 https://access.redhat.com/security/cve/CVE-2025-38718 CVE-2025-38718 CVE-2025-38718 https://access.redhat.com/security/cve/CVE-2025-39682 CVE-2025-39682 CVE-2025-39682 https://access.redhat.com/security/cve/CVE-2025-39698 CVE-2025-39698 CVE-2025-39698 https://bugzilla.redhat.com/2383916 2383916 https://bugzilla.redhat.com/2388928 2388928 https://bugzilla.redhat.com/2393166 2393166 https://bugzilla.redhat.com/2393511 2393511 https://bugzilla.redhat.com/2393519 2393519 https://errata.almalinux.org/9/ALSA-2025-16880.html ALSA-2025:16880 ALSA-2025:16880 ekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm !ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm "ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm %ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-abi-stablelists-5.14.0-570.49.1.el9_6.noarch.rpm !ekernel-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm "ekernel-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm %ekernel-uki-virt-addons-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-uki-virt-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-tools-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-tools-libs-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-modules-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-core-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpm ekernel-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm ����M�&
��JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��L�Fhttps://access.redhat.com/errata/RHSA-2025:17377 RHSA-2025:17377 RHSA-2025:17377 https://access.redhat.com/security/cve/CVE-2024-50301 CVE-2024-50301 CVE-2024-50301 https://access.redhat.com/security/cve/CVE-2025-38351 CVE-2025-38351 CVE-2025-38351 https://access.redhat.com/security/cve/CVE-2025-39761 CVE-2025-39761 CVE-2025-39761 https://bugzilla.redhat.com/2327188 2327188 https://bugzilla.redhat.com/2382059 2382059 https://bugzilla.redhat.com/2394606 2394606 https://errata.almalinux.org/9/ALSA-2025-17377.html ALSA-2025:17377 ALSA-2025:17377 fkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm %fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm "fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm !fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpm fkernel-tools-libs-5.14.0-570.51.1.el9_6.x86_64.rpm %fkernel-uki-virt-addons-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-tools-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-5.14.0-570.51.1.el9_6.x86_64.rpm "fkernel-uki-virt-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-modules-extra-5.14.0-570.51.1.el9_6.x86_64.rpm !fkernel-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-modules-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-modules-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-debug-modules-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-core-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-5.14.0-570.51.1.el9_6.x86_64.rpm fkernel-abi-stablelists-5.14.0-570.51.1.el9_6.noarch.rpm �ǝ�U�'
� �isecurity Moderate: iputils security update &���ghttps://access.redhat.com/errata/RHSA-2025:17558 RHSA-2025:17558 RHSA-2025:17558 https://access.redhat.com/security/cve/CVE-2025-48964 CVE-2025-48964 CVE-2025-48964 https://bugzilla.redhat.com/2382657 2382657 https://errata.almalinux.org/9/ALSA-2025-17558.html ALSA-2025:17558 ALSA-2025:17558 �a� iputils-20210202-11.el9_6.3.x86_64.rpm �a� iputils-20210202-11.el9_6.3.x86_64.rpm �Dz�^�(
�!�kBsecurity Moderate: vim security update &��y�zhttps://access.redhat.com/errata/RHSA-2025:17742 RHSA-2025:17742 RHSA-2025:17742 https://access.redhat.com/security/cve/CVE-2025-53905 CVE-2025-53905 CVE-2025-53905 https://access.redhat.com/security/cve/CVE-2025-53906 CVE-2025-53906 CVE-2025-53906 https://bugzilla.redhat.com/2380360 2380360 https://bugzilla.redhat.com/2380362 2380362 https://errata.almalinux.org/9/ALSA-2025-17742.html ALSA-2025:17742 ALSA-2025:17742 �r�vim-minimal-8.2.2637-22.el9_6.1.x86_64.rpm �=�vim-filesystem-8.2.2637-22.el9_6.1.noarch.rpm �r�vim-minimal-8.2.2637-22.el9_6.1.x86_64.rpm �=�vim-filesystem-8.2.2637-22.el9_6.1.noarch.rpm �ǹ� �)
�"�nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��s�d
https://access.redhat.com/errata/RHSA-2025:17760 RHSA-2025:17760 RHSA-2025:17760 https://access.redhat.com/security/cve/CVE-2023-53373 CVE-2023-53373 CVE-2023-53373 https://access.redhat.com/security/cve/CVE-2025-38556 CVE-2025-38556 CVE-2025-38556 https://access.redhat.com/security/cve/CVE-2025-38614 CVE-2025-38614 CVE-2025-38614 https://access.redhat.com/security/cve/CVE-2025-39757 CVE-2025-39757 CVE-2025-39757 https://bugzilla.redhat.com/2389456 2389456 https://bugzilla.redhat.com/2389491 2389491 https://bugzilla.redhat.com/2394615 2394615 https://bugzilla.redhat.com/2396379 2396379 https://errata.almalinux.org/9/ALSA-2025-17760.html ALSA-2025:17760 ALSA-2025:17760 gkernel-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm gkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm %gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm !gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm "gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-tools-libs-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-tools-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-abi-stablelists-5.14.0-570.52.1.el9_6.noarch.rpm gkernel-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm %gkernel-uki-virt-addons-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-core-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm !gkernel-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm gkernel-modules-5.14.0-570.52.1.el9_6.x86_64.rpm "gkernel-uki-virt-5.14.0-570.52.1.el9_6.x86_64.rpm ��¿7�*
�#�MBBsecurity Moderate: libssh security update &��W�https://access.redhat.com/errata/RHSA-2025:18275 RHSA-2025:18275 RHSA-2025:18275 https://access.redhat.com/security/cve/CVE-2025-5318 CVE-2025-5318 CVE-2025-5318 https://bugzilla.redhat.com/2369131 2369131 https://errata.almalinux.org/9/ALSA-2025-18275.html ALSA-2025:18275 ALSA-2025:18275 �@�6libssh-0.10.4-15.el9_6.x86_64.rpm ��6libssh-config-0.10.4-15.el9_6.noarch.rpm �@�6libssh-0.10.4-15.el9_6.i686.rpm �@�6libssh-0.10.4-15.el9_6.x86_64.rpm ��6libssh-config-0.10.4-15.el9_6.noarch.rpm �@�6libssh-0.10.4-15.el9_6.i686.rpm ���� �+
�$�QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��b�https://access.redhat.com/errata/RHSA-2025:18281 RHSA-2025:18281 RHSA-2025:18281 https://access.redhat.com/security/cve/CVE-2022-50087 CVE-2022-50087 CVE-2022-50087 https://access.redhat.com/security/cve/CVE-2025-22026 CVE-2025-22026 CVE-2025-22026 https://access.redhat.com/security/cve/CVE-2025-38566 CVE-2025-38566 CVE-2025-38566 https://access.redhat.com/security/cve/CVE-2025-38571 CVE-2025-38571 CVE-2025-38571 https://access.redhat.com/security/cve/CVE-2025-39817 CVE-2025-39817 CVE-2025-39817 https://access.redhat.com/security/cve/CVE-2025-39841 CVE-2025-39841 CVE-2025-39841 https://access.redhat.com/security/cve/CVE-2025-39849 CVE-2025-39849 CVE-2025-39849 https://bugzilla.redhat.com/2360224 2360224 https://bugzilla.redhat.com/2373539 2373539 https://bugzilla.redhat.com/2389480 2389480 https://bugzilla.redhat.com/2389487 2389487 https://bugzilla.redhat.com/2395805 2395805 https://bugzilla.redhat.com/2396928 2396928 https://bugzilla.redhat.com/2396944 2396944 https://errata.almalinux.org/9/ALSA-2025-18281.html ALSA-2025:18281 ALSA-2025:18281 hkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm !hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-5.14.0-570.55.1.el9_6.x86_64.rpm %hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm "hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpm hkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-tools-libs-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-modules-5.14.0-570.55.1.el9_6.x86_64.rpm !hkernel-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-modules-core-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-core-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-5.14.0-570.55.1.el9_6.x86_64.rpm %hkernel-uki-virt-addons-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-tools-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-modules-extra-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-debug-core-5.14.0-570.55.1.el9_6.x86_64.rpm "hkernel-uki-virt-5.14.0-570.55.1.el9_6.x86_64.rpm hkernel-abi-stablelists-5.14.0-570.55.1.el9_6.noarch.rpm hkernel-modules-5.14.0-570.55.1.el9_6.x86_64.rpm ����
�,
�%�pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��w�https://access.redhat.com/errata/RHSA-2025:19409 RHSA-2025:19409 RHSA-2025:19409 https://access.redhat.com/security/cve/CVE-2022-50367 CVE-2022-50367 CVE-2022-50367 https://access.redhat.com/security/cve/CVE-2023-53494 CVE-2023-53494 CVE-2023-53494 https://access.redhat.com/security/cve/CVE-2025-39702 CVE-2025-39702 CVE-2025-39702 https://bugzilla.redhat.com/2393533 2393533 https://bugzilla.redhat.com/2396114 2396114 https://bugzilla.redhat.com/2400777 2400777 https://errata.almalinux.org/9/ALSA-2025-19409.html ALSA-2025:19409 ALSA-2025:19409 ikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm %ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm !ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm "ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpm ikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-modules-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-modules-5.14.0-570.60.1.el9_6.x86_64.rpm %ikernel-uki-virt-addons-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-core-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-tools-5.14.0-570.60.1.el9_6.x86_64.rpm !ikernel-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm "ikernel-uki-virt-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-modules-core-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-tools-libs-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-debug-modules-extra-5.14.0-570.60.1.el9_6.x86_64.rpm ikernel-abi-stablelists-5.14.0-570.60.1.el9_6.noarch.rpm ikernel-core-5.14.0-570.60.1.el9_6.x86_64.rpm �ȷ� �-
�&�OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��{�9https://access.redhat.com/errata/RHSA-2025:19930 RHSA-2025:19930 RHSA-2025:19930 https://access.redhat.com/security/cve/CVE-2024-36350 CVE-2024-36350 CVE-2024-36350 https://access.redhat.com/security/cve/CVE-2024-36357 CVE-2024-36357 CVE-2024-36357 https://access.redhat.com/security/cve/CVE-2025-40300 CVE-2025-40300 CVE-2025-40300 https://bugzilla.redhat.com/2350725 2350725 https://bugzilla.redhat.com/2350726 2350726 https://bugzilla.redhat.com/2394627 2394627 https://errata.almalinux.org/9/ALSA-2025-19930.html ALSA-2025:19930 ALSA-2025:19930 jkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm "jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm %jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm !jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-modules-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-abi-stablelists-5.14.0-570.62.1.el9_6.noarch.rpm "jkernel-uki-virt-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-tools-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-tools-libs-5.14.0-570.62.1.el9_6.x86_64.rpm %jkernel-uki-virt-addons-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-debug-modules-5.14.0-570.62.1.el9_6.x86_64.rpm !jkernel-modules-core-5.14.0-570.62.1.el9_6.x86_64.rpm jkernel-modules-extra-5.14.0-570.62.1.el9_6.x86_64.rpm ��ѴE�.
�'�nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��4�X�ahttps://access.redhat.com/errata/RHSA-2025:20518 RHSA-2025:20518 RHSA-2025:20518 https://bugzilla.redhat.com/2298169 2298169 https://bugzilla.redhat.com/2312077 2312077 https://bugzilla.redhat.com/2313092 2313092 https://bugzilla.redhat.com/2320172 2320172 https://bugzilla.redhat.com/2320259 2320259 https://bugzilla.redhat.com/2320455 2320455 https://bugzilla.redhat.com/2320616 2320616 https://bugzilla.redhat.com/2320722 2320722 https://bugzilla.redhat.com/2324549 2324549 https://bugzilla.redhat.com/2327203 2327203 https://bugzilla.redhat.com/2327374 2327374 https://bugzilla.redhat.com/2327887 2327887 https://bugzilla.redhat.com/2329918 2329918 https://bugzilla.redhat.com/2330341 2330341 https://bugzilla.redhat.com/2331326 2331326 https://bugzilla.redhat.com/2334357 2334357 https://bugzilla.redhat.com/2334396 2334396 https://bugzilla.redhat.com/2334415 2334415 https://bugzilla.redhat.com/2334439 2334439 https://bugzilla.redhat.com/2334537 2334537 https://bugzilla.redhat.com/2334547 2334547 https://bugzilla.redhat.com/2334548 2334548 https://bugzilla.redhat.com/2334560 2334560 https://bugzilla.redhat.com/2334676 2334676 https://bugzilla.redhat.com/2334795 2334795 https://bugzilla.redhat.com/2334829 2334829 https://bugzilla.redhat.com/2336541 2336541 https://bugzilla.redhat.com/2337121 2337121 https://bugzilla.redhat.com/2337124 2337124 https://bugzilla.redhat.com/2338814 2338814 https://bugzilla.redhat.com/2338828 2338828 https://bugzilla.redhat.com/2338832 2338832 https://bugzilla.redhat.com/2343172 2343172 https://bugzilla.redhat.com/2343175 2343175 https://bugzilla.redhat.com/2344684 2344684 https://bugzilla.redhat.com/2344687 2344687 https://bugzilla.redhat.com/2345240 2345240 https://bugzilla.redhat.com/2346272 2346272 https://bugzilla.redhat.com/2347707 2347707 https://bugzilla.redhat.com/2347753 2347753 https://bugzilla.redhat.com/2347759 2347759 https://bugzilla.redhat.com/2347781 2347781 https://bugzilla.redhat.com/2347807 2347807 https://bugzilla.redhat.com/2347859 2347859 https://bugzilla.redhat.com/2347919 2347919 https://bugzilla.redhat.com/2347968 2347968 https://bugzilla.redhat.com/2348022 2348022 https://bugzilla.redhat.com/2348071 2348071 https://bugzilla.redhat.com/2348238 2348238 https://bugzilla.redhat.com/2348240 2348240 https://bugzilla.redhat.com/2348279 2348279 https://bugzilla.redhat.com/2348515 2348515 https://bugzilla.redhat.com/2348523 2348523 https://bugzilla.redhat.com/2348528 2348528 https://bugzilla.redhat.com/2348541 2348541 https://bugzilla.redhat.com/2348543 2348543 https://bugzilla.redhat.com/2348547 2348547 https://bugzilla.redhat.com/2348550 2348550 https://bugzilla.redhat.com/2348554 2348554 https://bugzilla.redhat.com/2348556 2348556 https://bugzilla.redhat.com/2348566 2348566 https://bugzilla.redhat.com/2348573 2348573 https://bugzilla.redhat.com/2348574 2348574 https://bugzilla.redhat.com/2348577 2348577 https://bugzilla.redhat.com/2348578 2348578 https://bugzilla.redhat.com/2348581 2348581 https://bugzilla.redhat.com/2348584 2348584 https://bugzilla.redhat.com/2348585 2348585 https://bugzilla.redhat.com/2348587 2348587 https://bugzilla.redhat.com/2348595 2348595 https://bugzilla.redhat.com/2348597 2348597 https://bugzilla.redhat.com/2348600 2348600 https://bugzilla.redhat.com/2348601 2348601 https://bugzilla.redhat.com/2348615 2348615 https://bugzilla.redhat.com/2348620 2348620 https://bugzilla.redhat.com/2348625 2348625 https://bugzilla.redhat.com/2348634 2348634 https://bugzilla.redhat.com/2348645 2348645 https://bugzilla.redhat.com/2348650 2348650 https://bugzilla.redhat.com/2348654 2348654 https://bugzilla.redhat.com/2348901 2348901 https://bugzilla.redhat.com/2350363 2350363 https://bugzilla.redhat.com/2350367 2350367 https://bugzilla.redhat.com/2350374 2350374 https://bugzilla.redhat.com/2350375 2350375 https://bugzilla.redhat.com/2350386 2350386 https://bugzilla.redhat.com/2350388 2350388 https://bugzilla.redhat.com/2350392 2350392 https://bugzilla.redhat.com/2350396 2350396 https://bugzilla.redhat.com/2350397 2350397 https://bugzilla.redhat.com/2350400 2350400 https://bugzilla.redhat.com/2350585 2350585 https://bugzilla.redhat.com/2350589 2350589 https://bugzilla.redhat.com/2350725 2350725 https://bugzilla.redhat.com/2350726 2350726 https://bugzilla.redhat.com/2351606 2351606 https://bugzilla.redhat.com/2351608 2351608 https://bugzilla.redhat.com/2351612 2351612 https://bugzilla.redhat.com/2351613 2351613 https://bugzilla.redhat.com/2351616 2351616 https://bugzilla.redhat.com/2351618 2351618 https://bugzilla.redhat.com/2351620 2351620 https://bugzilla.redhat.com/2351624 2351624 https://bugzilla.redhat.com/2351625 2351625 https://bugzilla.redhat.com/2351629 2351629 https://bugzilla.redhat.com/2351633 2351633 https://bugzilla.redhat.com/2360215 2360215 https://bugzilla.redhat.com/2363380 2363380 https://bugzilla.redhat.com/2369184 2369184 https://bugzilla.redhat.com/2376076 2376076 https://bugzilla.redhat.com/2383441 2383441 https://errata.almalinux.org/9/ALSA-2025-20518.html ALSA-2025:20518 ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.html CVE-2022-48830 CVE-2022-48830 https://www.redhat.com/security/data/cve/CVE-2022-49024.html CVE-2022-49024 CVE-2022-49024 https://www.redhat.com/security/data/cve/CVE-2022-49269.html CVE-2022-49269 CVE-2022-49269 https://www.redhat.com/security/data/cve/CVE-2022-49353.html CVE-2022-49353 CVE-2022-49353 https://www.redhat.com/security/data/cve/CVE-2022-49357.html CVE-2022-49357 CVE-2022-49357 https://www.redhat.com/security/data/cve/CVE-2022-49432.html CVE-2022-49432 CVE-2022-49432 https://www.redhat.com/security/data/cve/CVE-2022-49437.html CVE-2022-49437 CVE-2022-49437 https://www.redhat.com/security/data/cve/CVE-2022-49443.html CVE-2022-49443 CVE-2022-49443 https://www.redhat.com/security/data/cve/CVE-2022-49623.html CVE-2022-49623 CVE-2022-49623 https://www.redhat.com/security/data/cve/CVE-2022-49627.html CVE-2022-49627 CVE-2022-49627 https://www.redhat.com/security/data/cve/CVE-2022-49643.html CVE-2022-49643 CVE-2022-49643 https://www.redhat.com/security/data/cve/CVE-2022-49648.html CVE-2022-49648 CVE-2022-49648 https://www.redhat.com/security/data/cve/CVE-2022-49657.html CVE-2022-49657 CVE-2022-49657 https://www.redhat.com/security/data/cve/CVE-2022-49670.html CVE-2022-49670 CVE-2022-49670 https://www.redhat.com/security/data/cve/CVE-2022-49672.html CVE-2022-49672 CVE-2022-49672 https://www.redhat.com/security/data/cve/CVE-2022-49845.html CVE-2022-49845 CVE-2022-49845 https://www.redhat.com/security/data/cve/CVE-2024-36350.html CVE-2024-36350 CVE-2024-36350 https://www.redhat.com/security/data/cve/CVE-2024-36357.html CVE-2024-36357 CVE-2024-36357 https://www.redhat.com/security/data/cve/CVE-2024-46689.html CVE-2024-46689 CVE-2024-46689 https://www.redhat.com/security/data/cve/CVE-2024-46744.html CVE-2024-46744 CVE-2024-46744 https://www.redhat.com/security/data/cve/CVE-2024-47679.html CVE-2024-47679 CVE-2024-47679 https://www.redhat.com/security/data/cve/CVE-2024-47727.html CVE-2024-47727 CVE-2024-47727 https://www.redhat.com/security/data/cve/CVE-2024-49570.html CVE-2024-49570 CVE-2024-49570 https://www.redhat.com/security/data/cve/CVE-2024-49864.html CVE-2024-49864 CVE-2024-49864 https://www.redhat.com/security/data/cve/CVE-2024-50060.html CVE-2024-50060 CVE-2024-50060 https://www.redhat.com/security/data/cve/CVE-2024-50195.html CVE-2024-50195 CVE-2024-50195 https://www.redhat.com/security/data/cve/CVE-2024-50294.html CVE-2024-50294 CVE-2024-50294 https://www.redhat.com/security/data/cve/CVE-2024-52332.html CVE-2024-52332 CVE-2024-52332 https://www.redhat.com/security/data/cve/CVE-2024-53052.html CVE-2024-53052 CVE-2024-53052 https://www.redhat.com/security/data/cve/CVE-2024-53090.html CVE-2024-53090 CVE-2024-53090 https://www.redhat.com/security/data/cve/CVE-2024-53119.html CVE-2024-53119 CVE-2024-53119 https://www.redhat.com/security/data/cve/CVE-2024-53135.html CVE-2024-53135 CVE-2024-53135 https://www.redhat.com/security/data/cve/CVE-2024-53170.html CVE-2024-53170 CVE-2024-53170 https://www.redhat.com/security/data/cve/CVE-2024-53216.html CVE-2024-53216 CVE-2024-53216 https://www.redhat.com/security/data/cve/CVE-2024-53229.html CVE-2024-53229 CVE-2024-53229 https://www.redhat.com/security/data/cve/CVE-2024-53241.html CVE-2024-53241 CVE-2024-53241 https://www.redhat.com/security/data/cve/CVE-2024-53680.html CVE-2024-53680 CVE-2024-53680 https://www.redhat.com/security/data/cve/CVE-2024-54456.html CVE-2024-54456 CVE-2024-54456 https://www.redhat.com/security/data/cve/CVE-2024-56603.html CVE-2024-56603 CVE-2024-56603 https://www.redhat.com/security/data/cve/CVE-2024-56645.html CVE-2024-56645 CVE-2024-56645 https://www.redhat.com/security/data/cve/CVE-2024-56662.html CVE-2024-56662 CVE-2024-56662 https://www.redhat.com/security/data/cve/CVE-2024-56672.html CVE-2024-56672 CVE-2024-56672 https://www.redhat.com/security/data/cve/CVE-2024-56675.html CVE-2024-56675 CVE-2024-56675 https://www.redhat.com/security/data/cve/CVE-2024-56690.html CVE-2024-56690 CVE-2024-56690 https://www.redhat.com/security/data/cve/CVE-2024-56709.html CVE-2024-56709 CVE-2024-56709 https://www.redhat.com/security/data/cve/CVE-2024-56739.html CVE-2024-56739 CVE-2024-56739 https://www.redhat.com/security/data/cve/CVE-2024-56786.html CVE-2024-56786 CVE-2024-56786 https://www.redhat.com/security/data/cve/CVE-2024-57981.html CVE-2024-57981 CVE-2024-57981 https://www.redhat.com/security/data/cve/CVE-2024-57986.html CVE-2024-57986 CVE-2024-57986 https://www.redhat.com/security/data/cve/CVE-2024-57987.html CVE-2024-57987 CVE-2024-57987 https://www.redhat.com/security/data/cve/CVE-2024-57988.html CVE-2024-57988 CVE-2024-57988 https://www.redhat.com/security/data/cve/CVE-2024-57989.html CVE-2024-57989 CVE-2024-57989 https://www.redhat.com/security/data/cve/CVE-2024-57990.html CVE-2024-57990 CVE-2024-57990 https://www.redhat.com/security/data/cve/CVE-2024-57993.html CVE-2024-57993 CVE-2024-57993 https://www.redhat.com/security/data/cve/CVE-2024-57995.html CVE-2024-57995 CVE-2024-57995 https://www.redhat.com/security/data/cve/CVE-2024-57998.html CVE-2024-57998 CVE-2024-57998 https://www.redhat.com/security/data/cve/CVE-2024-58012.html CVE-2024-58012 CVE-2024-58012 https://www.redhat.com/security/data/cve/CVE-2024-58014.html CVE-2024-58014 CVE-2024-58014 https://www.redhat.com/security/data/cve/CVE-2024-58015.html CVE-2024-58015 CVE-2024-58015 https://www.redhat.com/security/data/cve/CVE-2024-58057.html CVE-2024-58057 CVE-2024-58057 https://www.redhat.com/security/data/cve/CVE-2024-58062.html CVE-2024-58062 CVE-2024-58062 https://www.redhat.com/security/data/cve/CVE-2024-58068.html CVE-2024-58068 CVE-2024-58068 https://www.redhat.com/security/data/cve/CVE-2024-58072.html CVE-2024-58072 CVE-2024-58072 https://www.redhat.com/security/data/cve/CVE-2024-58075.html CVE-2024-58075 CVE-2024-58075 https://www.redhat.com/security/data/cve/CVE-2024-58077.html CVE-2024-58077 CVE-2024-58077 https://www.redhat.com/security/data/cve/CVE-2024-58083.html CVE-2024-58083 CVE-2024-58083 https://www.redhat.com/security/data/cve/CVE-2024-58088.html CVE-2024-58088 CVE-2024-58088 https://www.redhat.com/security/data/cve/CVE-2025-21631.html CVE-2025-21631 CVE-2025-21631 https://www.redhat.com/security/data/cve/CVE-2025-21647.html CVE-2025-21647 CVE-2025-21647 https://www.redhat.com/security/data/cve/CVE-2025-21648.html CVE-2025-21648 CVE-2025-21648 https://www.redhat.com/security/data/cve/CVE-2025-21671.html CVE-2025-21671 CVE-2025-21671 https://www.redhat.com/security/data/cve/CVE-2025-21672.html CVE-2025-21672 CVE-2025-21672 https://www.redhat.com/security/data/cve/CVE-2025-21691.html CVE-2025-21691 CVE-2025-21691 https://www.redhat.com/security/data/cve/CVE-2025-21693.html CVE-2025-21693 CVE-2025-21693 https://www.redhat.com/security/data/cve/CVE-2025-21696.html CVE-2025-21696 CVE-2025-21696 https://www.redhat.com/security/data/cve/CVE-2025-21702.html CVE-2025-21702 CVE-2025-21702 https://www.redhat.com/security/data/cve/CVE-2025-21714.html CVE-2025-21714 CVE-2025-21714 https://www.redhat.com/security/data/cve/CVE-2025-21726.html CVE-2025-21726 CVE-2025-21726 https://www.redhat.com/security/data/cve/CVE-2025-21728.html CVE-2025-21728 CVE-2025-21728 https://www.redhat.com/security/data/cve/CVE-2025-21729.html CVE-2025-21729 CVE-2025-21729 https://www.redhat.com/security/data/cve/CVE-2025-21738.html CVE-2025-21738 CVE-2025-21738 https://www.redhat.com/security/data/cve/CVE-2025-21739.html CVE-2025-21739 CVE-2025-21739 https://www.redhat.com/security/data/cve/CVE-2025-21745.html CVE-2025-21745 CVE-2025-21745 https://www.redhat.com/security/data/cve/CVE-2025-21746.html CVE-2025-21746 CVE-2025-21746 https://www.redhat.com/security/data/cve/CVE-2025-21765.html CVE-2025-21765 CVE-2025-21765 https://www.redhat.com/security/data/cve/CVE-2025-21786.html CVE-2025-21786 CVE-2025-21786 https://www.redhat.com/security/data/cve/CVE-2025-21787.html CVE-2025-21787 CVE-2025-21787 https://www.redhat.com/security/data/cve/CVE-2025-21790.html CVE-2025-21790 CVE-2025-21790 https://www.redhat.com/security/data/cve/CVE-2025-21791.html CVE-2025-21791 CVE-2025-21791 https://www.redhat.com/security/data/cve/CVE-2025-21795.html CVE-2025-21795 CVE-2025-21795 https://www.redhat.com/security/data/cve/CVE-2025-21796.html CVE-2025-21796 CVE-2025-21796 https://www.redhat.com/security/data/cve/CVE-2025-21806.html CVE-2025-21806 CVE-2025-21806 https://www.redhat.com/security/data/cve/CVE-2025-21826.html CVE-2025-21826 CVE-2025-21826 https://www.redhat.com/security/data/cve/CVE-2025-21828.html CVE-2025-21828 CVE-2025-21828 https://www.redhat.com/security/data/cve/CVE-2025-21829.html CVE-2025-21829 CVE-2025-21829 https://www.redhat.com/security/data/cve/CVE-2025-21837.html CVE-2025-21837 CVE-2025-21837 https://www.redhat.com/security/data/cve/CVE-2025-21839.html CVE-2025-21839 CVE-2025-21839 https://www.redhat.com/security/data/cve/CVE-2025-21844.html CVE-2025-21844 CVE-2025-21844 https://www.redhat.com/security/data/cve/CVE-2025-21846.html CVE-2025-21846 CVE-2025-21846 https://www.redhat.com/security/data/cve/CVE-2025-21847.html CVE-2025-21847 CVE-2025-21847 https://www.redhat.com/security/data/cve/CVE-2025-21848.html CVE-2025-21848 CVE-2025-21848 https://www.redhat.com/security/data/cve/CVE-2025-21851.html CVE-2025-21851 CVE-2025-21851 https://www.redhat.com/security/data/cve/CVE-2025-21853.html CVE-2025-21853 CVE-2025-21853 https://www.redhat.com/security/data/cve/CVE-2025-21855.html CVE-2025-21855 CVE-2025-21855 https://www.redhat.com/security/data/cve/CVE-2025-21861.html CVE-2025-21861 CVE-2025-21861 https://www.redhat.com/security/data/cve/CVE-2025-21863.html CVE-2025-21863 CVE-2025-21863 https://www.redhat.com/security/data/cve/CVE-2025-21864.html CVE-2025-21864 CVE-2025-21864 https://www.redhat.com/security/data/cve/CVE-2025-22056.html CVE-2025-22056 CVE-2025-22056 https://www.redhat.com/security/data/cve/CVE-2025-22097.html CVE-2025-22097 CVE-2025-22097 https://www.redhat.com/security/data/cve/CVE-2025-37994.html CVE-2025-37994 CVE-2025-37994 https://www.redhat.com/security/data/cve/CVE-2025-38116.html CVE-2025-38116 CVE-2025-38116 https://www.redhat.com/security/data/cve/CVE-2025-38396.html CVE-2025-38396 CVE-2025-38396 ykernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm %ykernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm ykernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-5.14.0-611.5.1.el9_7.x86_64.rpm !ykernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm "ykernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-core-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm %ykernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm ykernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-5.14.0-611.5.1.el9_7.x86_64.rpm !ykernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm "ykernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpm ykernel-core-5.14.0-611.5.1.el9_7.x86_64.rpm ���F�/
��MBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update &���Mhttps://access.redhat.com/errata/RHSA-2025:20532 RHSA-2025:20532 RHSA-2025:20532 https://access.redhat.com/security/cve/CVE-2024-45777 CVE-2024-45777 CVE-2024-45777 https://bugzilla.redhat.com/2346343 2346343 https://errata.almalinux.org/9/ALSA-2025-20532.html ALSA-2025:20532 ALSA-2025:20532 �:�grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpm �g�grub2-pc-2.06-114.el9_7.alma.1.x86_64.rpm �;�grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm �9�grub2-common-2.06-114.el9_7.alma.1.noarch.rpm �f�grub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpm �e�grub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpm �h�grub2-tools-2.06-114.el9_7.alma.1.x86_64.rpm �k�grub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpm �j�grub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm �:�grub2-efi-aa64-modules-2.06-114.el9_7.alma.1.noarch.rpm �g�grub2-pc-2.06-114.el9_7.alma.1.x86_64.rpm �;�grub2-efi-x64-modules-2.06-114.el9_7.alma.1.noarch.rpm �9�grub2-common-2.06-114.el9_7.alma.1.noarch.rpm �f�grub2-efi-x64-cdboot-2.06-114.el9_7.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-114.el9_7.alma.1.x86_64.rpm �e�grub2-efi-x64-2.06-114.el9_7.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-114.el9_7.alma.1.noarch.rpm �h�grub2-tools-2.06-114.el9_7.alma.1.x86_64.rpm �k�grub2-tools-minimal-2.06-114.el9_7.alma.1.x86_64.rpm �j�grub2-tools-extra-2.06-114.el9_7.alma.1.x86_64.rpm ���R�0
�%�`BBBsecurity Low: shadow-utils security update &�6��Y�https://access.redhat.com/errata/RHSA-2025:20559 RHSA-2025:20559 RHSA-2025:20559 https://access.redhat.com/security/cve/CVE-2024-56433 CVE-2024-56433 CVE-2024-56433 https://bugzilla.redhat.com/2334165 2334165 https://errata.almalinux.org/9/ALSA-2025-20559.html ALSA-2025:20559 ALSA-2025:20559 �y� shadow-utils-4.9-15.el9.x86_64.rpm �2� shadow-utils-subid-4.9-15.el9.x86_64.rpm �2� shadow-utils-subid-4.9-15.el9.i686.rpm �y� shadow-utils-4.9-15.el9.x86_64.rpm �2� shadow-utils-subid-4.9-15.el9.x86_64.rpm �2� shadow-utils-subid-4.9-15.el9.i686.rpm ����1
�(�fBsecurity Important: sqlite security update &+��`� https://access.redhat.com/errata/RHSA-2025:20936 RHSA-2025:20936 RHSA-2025:20936 https://access.redhat.com/security/cve/CVE-2025-6965 CVE-2025-6965 CVE-2025-6965 https://bugzilla.redhat.com/2380149 2380149 https://errata.almalinux.org/9/ALSA-2025-20936.html ALSA-2025:20936 ALSA-2025:20936 �X�sqlite-libs-3.34.1-9.el9_7.x86_64.rpm �X�sqlite-libs-3.34.1-9.el9_7.i686.rpm �X�sqlite-libs-3.34.1-9.el9_7.x86_64.rpm �X�sqlite-libs-3.34.1-9.el9_7.i686.rpm ����2
�)�iBBsecurity Moderate: libssh security update &��i�https://access.redhat.com/errata/RHSA-2025:20943 RHSA-2025:20943 RHSA-2025:20943 https://access.redhat.com/security/cve/CVE-2025-5318 CVE-2025-5318 CVE-2025-5318 https://bugzilla.redhat.com/2369131 2369131 https://errata.almalinux.org/9/ALSA-2025-20943.html ALSA-2025:20943 ALSA-2025:20943 �@�7libssh-0.10.4-15.el9_7.x86_64.rpm ��7libssh-config-0.10.4-15.el9_7.noarch.rpm �@�7libssh-0.10.4-15.el9_7.i686.rpm �@�7libssh-0.10.4-15.el9_7.x86_64.rpm ��7libssh-config-0.10.4-15.el9_7.noarch.rpm �@�7libssh-0.10.4-15.el9_7.i686.rpm ���C�3
�*�mBsecurity Moderate: vim security update &��t�zhttps://access.redhat.com/errata/RHSA-2025:20945 RHSA-2025:20945 RHSA-2025:20945 https://access.redhat.com/security/cve/CVE-2025-53905 CVE-2025-53905 CVE-2025-53905 https://access.redhat.com/security/cve/CVE-2025-53906 CVE-2025-53906 CVE-2025-53906 https://bugzilla.redhat.com/2380360 2380360 https://bugzilla.redhat.com/2380362 2380362 https://errata.almalinux.org/9/ALSA-2025-20945.html ALSA-2025:20945 ALSA-2025:20945 �r� vim-minimal-8.2.2637-23.el9_7.x86_64.rpm �=� vim-filesystem-8.2.2637-23.el9_7.noarch.rpm �r� vim-minimal-8.2.2637-23.el9_7.x86_64.rpm �=� vim-filesystem-8.2.2637-23.el9_7.noarch.rpm ���T�4
�+�pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: sssd security update &+��n�/https://access.redhat.com/errata/RHSA-2025:20954 RHSA-2025:20954 RHSA-2025:20954 https://access.redhat.com/security/cve/CVE-2025-11561 CVE-2025-11561 CVE-2025-11561 https://bugzilla.redhat.com/2402727 2402727 https://errata.almalinux.org/9/ALSA-2025-20954.html ALSA-2025:20954 ALSA-2025:20954 #�{$sssd-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpm � $sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpm � $sssd-tools-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpm �s$python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm �u$python3-sss-2.9.7-4.el9_7.1.x86_64.rpm �3$sssd-client-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpm �t$python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm �+$libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpm �}$sssd-common-2.9.7-4.el9_7.1.x86_64.rpm �~$sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm �l$libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpm �w$python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm �($libipa_hbac-2.9.7-4.el9_7.1.i686.rpm �$sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm �($libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm �v$python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm �,$libsss_idmap-2.9.7-4.el9_7.1.i686.rpm �.$libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpm �
$sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm �.$libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpm �$sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpm �|$sssd-ad-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm �-$libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm �3$sssd-client-2.9.7-4.el9_7.1.i686.rpm �k$libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm �-$libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm �+$libsss_certmap-2.9.7-4.el9_7.1.i686.rpm �,$libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm #�{$sssd-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-passkey-2.9.7-4.el9_7.1.x86_64.rpm � $sssd-ipa-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-dbus-2.9.7-4.el9_7.1.x86_64.rpm � $sssd-tools-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-proxy-2.9.7-4.el9_7.1.x86_64.rpm �s$python3-libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm �u$python3-sss-2.9.7-4.el9_7.1.x86_64.rpm �3$sssd-client-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-krb5-2.9.7-4.el9_7.1.x86_64.rpm �t$python3-libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm �+$libsss_certmap-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-kcm-2.9.7-4.el9_7.1.x86_64.rpm �}$sssd-common-2.9.7-4.el9_7.1.x86_64.rpm �~$sssd-common-pac-2.9.7-4.el9_7.1.x86_64.rpm �l$libsss_sudo-2.9.7-4.el9_7.1.x86_64.rpm �w$python3-sssdconfig-2.9.7-4.el9_7.1.noarch.rpm �($libipa_hbac-2.9.7-4.el9_7.1.i686.rpm �$sssd-polkit-rules-2.9.7-4.el9_7.1.x86_64.rpm �($libipa_hbac-2.9.7-4.el9_7.1.x86_64.rpm �v$python3-sss-murmur-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-ldap-2.9.7-4.el9_7.1.x86_64.rpm �,$libsss_idmap-2.9.7-4.el9_7.1.i686.rpm �.$libsss_simpleifp-2.9.7-4.el9_7.1.x86_64.rpm �
$sssd-winbind-idmap-2.9.7-4.el9_7.1.x86_64.rpm �.$libsss_simpleifp-2.9.7-4.el9_7.1.i686.rpm �$sssd-krb5-common-2.9.7-4.el9_7.1.x86_64.rpm �|$sssd-ad-2.9.7-4.el9_7.1.x86_64.rpm �$sssd-nfs-idmap-2.9.7-4.el9_7.1.x86_64.rpm �-$libsss_nss_idmap-2.9.7-4.el9_7.1.x86_64.rpm �3$sssd-client-2.9.7-4.el9_7.1.i686.rpm �k$libsss_autofs-2.9.7-4.el9_7.1.x86_64.rpm �-$libsss_nss_idmap-2.9.7-4.el9_7.1.i686.rpm �+$libsss_certmap-2.9.7-4.el9_7.1.i686.rpm �,$libsss_idmap-2.9.7-4.el9_7.1.x86_64.rpm �ɵ��5
�,�oBBBsecurity Moderate: openssl security update &���Zhttps://access.redhat.com/errata/RHSA-2025:21255 RHSA-2025:21255 RHSA-2025:21255 https://access.redhat.com/security/cve/CVE-2025-9230 CVE-2025-9230 CVE-2025-9230 https://bugzilla.redhat.com/2396054 2396054 https://errata.almalinux.org/9/ALSA-2025-21255.html ALSA-2025:21255 ALSA-2025:21255 ��zopenssl-libs-3.5.1-4.el9_7.x86_64.rpm �7�zopenssl-3.5.1-4.el9_7.x86_64.rpm ��zopenssl-libs-3.5.1-4.el9_7.i686.rpm ��zopenssl-libs-3.5.1-4.el9_7.x86_64.rpm �7�zopenssl-3.5.1-4.el9_7.x86_64.rpm ��zopenssl-libs-3.5.1-4.el9_7.i686.rpm �ɵ�s�6
�-�tBsecurity Moderate: kernel security update &��w�https://access.redhat.com/errata/RHSA-2025:21926 RHSA-2025:21926 RHSA-2025:21926 https://access.redhat.com/security/cve/CVE-2025-39843 CVE-2025-39843 CVE-2025-39843 https://bugzilla.redhat.com/2396941 2396941 https://errata.almalinux.org/9/ALSA-2025-21926.html ALSA-2025:21926 ALSA-2025:21926 �kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm �kernel-5.14.0-611.9.1.el9_7.x86_64.rpm �kernel-abi-stablelists-5.14.0-611.9.1.el9_7.noarch.rpm �kernel-5.14.0-611.9.1.el9_7.x86_64.rpm �ɵ�=�7
�.�wBsecurity Important: expat security update &+��v�&https://access.redhat.com/errata/RHSA-2025:22175 RHSA-2025:22175 RHSA-2025:22175 https://access.redhat.com/security/cve/CVE-2025-59375 CVE-2025-59375 CVE-2025-59375 https://bugzilla.redhat.com/2395108 2395108 https://errata.almalinux.org/9/ALSA-2025-22175.html ALSA-2025:22175 ALSA-2025:22175 � �sexpat-2.5.0-5.el9_7.1.i686.rpm � �sexpat-2.5.0-5.el9_7.1.x86_64.rpm � �sexpat-2.5.0-5.el9_7.1.i686.rpm � �sexpat-2.5.0-5.el9_7.1.x86_64.rpm ����8
�/�zBBBsecurity Moderate: libxml2 security update &���,https://access.redhat.com/errata/RHSA-2025:22376 RHSA-2025:22376 RHSA-2025:22376 https://access.redhat.com/security/cve/CVE-2025-9714 CVE-2025-9714 CVE-2025-9714 https://bugzilla.redhat.com/2392605 2392605 https://errata.almalinux.org/9/ALSA-2025-22376.html ALSA-2025:22376 ALSA-2025:22376 �
�libxml2-2.9.13-14.el9_7.i686.rpm �
�libxml2-2.9.13-14.el9_7.x86_64.rpm �N�python3-libxml2-2.9.13-14.el9_7.x86_64.rpm �
�libxml2-2.9.13-14.el9_7.i686.rpm �
�libxml2-2.9.13-14.el9_7.x86_64.rpm �N�python3-libxml2-2.9.13-14.el9_7.x86_64.rpm ����9
�0�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��H�;https://access.redhat.com/errata/RHSA-2025:22405 RHSA-2025:22405 RHSA-2025:22405 https://access.redhat.com/security/cve/CVE-2025-38724 CVE-2025-38724 CVE-2025-38724 https://access.redhat.com/security/cve/CVE-2025-39864 CVE-2025-39864 CVE-2025-39864 https://access.redhat.com/security/cve/CVE-2025-39898 CVE-2025-39898 CVE-2025-39898 https://access.redhat.com/security/cve/CVE-2025-39918 CVE-2025-39918 CVE-2025-39918 https://access.redhat.com/security/cve/CVE-2025-39955 CVE-2025-39955 CVE-2025-39955 https://access.redhat.com/security/cve/CVE-2025-39981 CVE-2025-39981 CVE-2025-39981 https://access.redhat.com/security/cve/CVE-2025-40058 CVE-2025-40058 CVE-2025-40058 https://access.redhat.com/security/cve/CVE-2025-40185 CVE-2025-40185 CVE-2025-40185 https://bugzilla.redhat.com/2393172 2393172 https://bugzilla.redhat.com/2396934 2396934 https://bugzilla.redhat.com/2400598 2400598 https://bugzilla.redhat.com/2400628 2400628 https://bugzilla.redhat.com/2402699 2402699 https://bugzilla.redhat.com/2404105 2404105 https://bugzilla.redhat.com/2406776 2406776 https://bugzilla.redhat.com/2414741 2414741 https://errata.almalinux.org/9/ALSA-2025-22405.html ALSA-2025:22405 ALSA-2025:22405 !kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm "kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpm kkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm %kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm !kkernel-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm "kkernel-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-abi-stablelists-5.14.0-611.11.1.el9_7.noarch.rpm kkernel-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-modules-core-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-core-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-modules-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-core-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-modules-extra-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-debug-uki-virt-5.14.0-611.11.1.el9_7.x86_64.rpm %kkernel-uki-virt-addons-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-tools-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-tools-libs-5.14.0-611.11.1.el9_7.x86_64.rpm kkernel-modules-5.14.0-611.11.1.el9_7.x86_64.rpm ��ۅm�:
�1�^BBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update &���)https://access.redhat.com/errata/RHSA-2025:22660 RHSA-2025:22660 RHSA-2025:22660 https://access.redhat.com/security/cve/CVE-2025-4598 CVE-2025-4598 CVE-2025-4598 https://bugzilla.redhat.com/2369242 2369242 https://errata.almalinux.org/9/ALSA-2025-22660.html ALSA-2025:22660 ALSA-2025:22660 �Y�systemd-252-55.el9_7.7.alma.1.x86_64.rpm �[�systemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm �B�systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpm �Y�systemd-252-55.el9_7.7.alma.1.i686.rpm �Z�systemd-container-252-55.el9_7.7.alma.1.x86_64.rpm �Z�systemd-container-252-55.el9_7.7.alma.1.i686.rpm �n�systemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpm �[�systemd-libs-252-55.el9_7.7.alma.1.i686.rpm �x�rhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm �@�systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm �C�systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm �A�systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm �Y�systemd-252-55.el9_7.7.alma.1.x86_64.rpm �[�systemd-libs-252-55.el9_7.7.alma.1.x86_64.rpm �B�systemd-resolved-252-55.el9_7.7.alma.1.x86_64.rpm �Y�systemd-252-55.el9_7.7.alma.1.i686.rpm �Z�systemd-container-252-55.el9_7.7.alma.1.x86_64.rpm �Z�systemd-container-252-55.el9_7.7.alma.1.i686.rpm �n�systemd-rpm-macros-252-55.el9_7.7.alma.1.noarch.rpm �[�systemd-libs-252-55.el9_7.7.alma.1.i686.rpm �x�rhel-net-naming-sysattrs-252-55.el9_7.7.alma.1.noarch.rpm �@�systemd-oomd-252-55.el9_7.7.alma.1.x86_64.rpm �C�systemd-udev-252-55.el9_7.7.alma.1.x86_64.rpm �A�systemd-pam-252-55.el9_7.7.alma.1.x86_64.rpm ��ƗC�;
�2�qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��,�Shttps://access.redhat.com/errata/RHSA-2025:22865 RHSA-2025:22865 RHSA-2025:22865 https://access.redhat.com/security/cve/CVE-2025-39925 CVE-2025-39925 CVE-2025-39925 https://access.redhat.com/security/cve/CVE-2025-39979 CVE-2025-39979 CVE-2025-39979 https://bugzilla.redhat.com/2400629 2400629 https://bugzilla.redhat.com/2404109 2404109 https://errata.almalinux.org/9/ALSA-2025-22865.html ALSA-2025:22865 ALSA-2025:22865 lkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm !lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpm lkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm %lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm "lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-tools-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-tools-libs-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm !lkernel-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-abi-stablelists-5.14.0-611.13.1.el9_7.noarch.rpm lkernel-debug-modules-5.14.0-611.13.1.el9_7.x86_64.rpm %lkernel-uki-virt-addons-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-modules-extra-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-modules-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-core-5.14.0-611.13.1.el9_7.x86_64.rpm "lkernel-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-modules-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-core-5.14.0-611.13.1.el9_7.x86_64.rpm lkernel-debug-uki-virt-5.14.0-611.13.1.el9_7.x86_64.rpm �ʊ��<
�3�PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+���Mhttps://access.redhat.com/errata/RHSA-2025:23241 RHSA-2025:23241 RHSA-2025:23241 https://access.redhat.com/security/cve/CVE-2025-38499 CVE-2025-38499 CVE-2025-38499 https://access.redhat.com/security/cve/CVE-2025-39966 CVE-2025-39966 CVE-2025-39966 https://access.redhat.com/security/cve/CVE-2025-40176 CVE-2025-40176 CVE-2025-40176 https://bugzilla.redhat.com/2387670 2387670 https://bugzilla.redhat.com/2404107 2404107 https://bugzilla.redhat.com/2414524 2414524 https://errata.almalinux.org/9/ALSA-2025-23241.html ALSA-2025:23241 ALSA-2025:23241 %mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm !mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm "mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm %mkernel-uki-virt-addons-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-modules-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-tools-5.14.0-611.16.1.el9_7.x86_64.rpm !mkernel-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-modules-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-modules-core-5.14.0-611.16.1.el9_7.x86_64.rpm "mkernel-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-tools-libs-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-abi-stablelists-5.14.0-611.16.1.el9_7.noarch.rpm mkernel-debug-uki-virt-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-core-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-core-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-debug-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm mkernel-modules-extra-5.14.0-611.16.1.el9_7.x86_64.rpm ���"�=
�4�oBBBsecurity Moderate: python3.9 security update &��L�x
https://access.redhat.com/errata/RHSA-2025:23342 RHSA-2025:23342 RHSA-2025:23342 https://access.redhat.com/security/cve/CVE-2024-5642 CVE-2024-5642 CVE-2024-5642 https://access.redhat.com/security/cve/CVE-2025-6069 CVE-2025-6069 CVE-2025-6069 https://access.redhat.com/security/cve/CVE-2025-6075 CVE-2025-6075 CVE-2025-6075 https://access.redhat.com/security/cve/CVE-2025-8291 CVE-2025-8291 CVE-2025-8291 https://bugzilla.redhat.com/2294682 2294682 https://bugzilla.redhat.com/2373234 2373234 https://bugzilla.redhat.com/2402342 2402342 https://bugzilla.redhat.com/2408891 2408891 https://errata.almalinux.org/9/ALSA-2025-23342.html ALSA-2025:23342 ALSA-2025:23342 ��python3-3.9.25-2.el9_7.x86_64.rpm -�python3-libs-3.9.25-2.el9_7.i686.rpm -�python3-libs-3.9.25-2.el9_7.x86_64.rpm ��python3-3.9.25-2.el9_7.x86_64.rpm -�python3-libs-3.9.25-2.el9_7.i686.rpm -�python3-libs-3.9.25-2.el9_7.x86_64.rpm �ʥ�p�>
�5�tBBBsecurity Moderate: binutils security update &��D�https://access.redhat.com/errata/RHSA-2025:23343 RHSA-2025:23343 RHSA-2025:23343 https://access.redhat.com/security/cve/CVE-2025-11083 CVE-2025-11083 CVE-2025-11083 https://bugzilla.redhat.com/2399948 2399948 https://errata.almalinux.org/9/ALSA-2025-23343.html ALSA-2025:23343 ALSA-2025:23343 �R�~binutils-gold-2.35.2-67.el9_7.1.x86_64.rpm �$�~binutils-2.35.2-67.el9_7.1.i686.rpm �$�~binutils-2.35.2-67.el9_7.1.x86_64.rpm �R�~binutils-gold-2.35.2-67.el9_7.1.x86_64.rpm �$�~binutils-2.35.2-67.el9_7.1.i686.rpm �$�~binutils-2.35.2-67.el9_7.1.x86_64.rpm �ʥ�j�?
�6�yBBBBBBsecurity Moderate: openssh security update &��_�whttps://access.redhat.com/errata/RHSA-2025:23480 RHSA-2025:23480 RHSA-2025:23480 https://access.redhat.com/security/cve/CVE-2025-61984 CVE-2025-61984 CVE-2025-61984 https://access.redhat.com/security/cve/CVE-2025-61985 CVE-2025-61985 CVE-2025-61985 https://bugzilla.redhat.com/2401960 2401960 https://bugzilla.redhat.com/2401962 2401962 https://errata.almalinux.org/9/ALSA-2025-23480.html ALSA-2025:23480 ALSA-2025:23480 �n�yopenssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpm �p�yopenssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpm �m�yopenssh-8.7p1-47.el9_7.alma.1.x86_64.rpm �o�yopenssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpm �n�yopenssh-clients-8.7p1-47.el9_7.alma.1.x86_64.rpm �p�yopenssh-server-8.7p1-47.el9_7.alma.1.x86_64.rpm �m�yopenssh-8.7p1-47.el9_7.alma.1.x86_64.rpm �o�yopenssh-keycat-8.7p1-47.el9_7.alma.1.x86_64.rpm �ʡ��@
�7�ABBsecurity Moderate: libssh security update &��V�&https://access.redhat.com/errata/RHSA-2025:23483 RHSA-2025:23483 RHSA-2025:23483 https://access.redhat.com/security/cve/CVE-2025-5987 CVE-2025-5987 CVE-2025-5987 https://bugzilla.redhat.com/2376219 2376219 https://errata.almalinux.org/9/ALSA-2025-23483.html ALSA-2025:23483 ALSA-2025:23483 �@�8libssh-0.10.4-17.el9_7.x86_64.rpm ��8libssh-config-0.10.4-17.el9_7.noarch.rpm �@�8libssh-0.10.4-17.el9_7.i686.rpm �@�8libssh-0.10.4-17.el9_7.x86_64.rpm ��8libssh-config-0.10.4-17.el9_7.noarch.rpm �@�8libssh-0.10.4-17.el9_7.i686.rpm �ʡ��A
�8�EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��|�9https://access.redhat.com/errata/RHSA-2025:2627 RHSA-2025:2627 RHSA-2025:2627 https://access.redhat.com/security/cve/CVE-2023-52605 CVE-2023-52605 CVE-2023-52605 https://access.redhat.com/security/cve/CVE-2023-52922 CVE-2023-52922 CVE-2023-52922 https://access.redhat.com/security/cve/CVE-2024-50264 CVE-2024-50264 CVE-2024-50264 https://access.redhat.com/security/cve/CVE-2024-50302 CVE-2024-50302 CVE-2024-50302 https://access.redhat.com/security/cve/CVE-2024-53113 CVE-2024-53113 CVE-2024-53113 https://access.redhat.com/security/cve/CVE-2024-53197 CVE-2024-53197 CVE-2024-53197 https://bugzilla.redhat.com/2268295 2268295 https://bugzilla.redhat.com/2327168 2327168 https://bugzilla.redhat.com/2327169 2327169 https://bugzilla.redhat.com/2329370 2329370 https://bugzilla.redhat.com/2329924 2329924 https://bugzilla.redhat.com/2334412 2334412 https://errata.almalinux.org/9/ALSA-2025-2627.html ALSA-2025:2627 ALSA-2025:2627 ;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm 1�Mbpftool-7.4.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm ;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm %;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm !;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm ";kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm 2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-modules-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-modules-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-core-5.14.0-503.31.1.el9_5.x86_64.rpm 1�Mbpftool-7.4.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-abi-stablelists-5.14.0-503.31.1.el9_5.noarch.rpm ;kernel-5.14.0-503.31.1.el9_5.x86_64.rpm %;kernel-uki-virt-addons-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-tools-5.14.0-503.31.1.el9_5.x86_64.rpm !;kernel-modules-core-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-modules-extra-5.14.0-503.31.1.el9_5.x86_64.rpm ";kernel-uki-virt-5.14.0-503.31.1.el9_5.x86_64.rpm 2;python3-perf-5.14.0-503.31.1.el9_5.x86_64.rpm ;kernel-debug-core-5.14.0-503.31.1.el9_5.x86_64.rpm ����R�B
�9�hBBBsecurity Important: libxml2 security update &+��5�Phttps://access.redhat.com/errata/RHSA-2025:2679 RHSA-2025:2679 RHSA-2025:2679 https://access.redhat.com/security/cve/CVE-2024-56171 CVE-2024-56171 CVE-2024-56171 https://access.redhat.com/security/cve/CVE-2025-24928 CVE-2025-24928 CVE-2025-24928 https://bugzilla.redhat.com/2346416 2346416 https://bugzilla.redhat.com/2346421 2346421 https://errata.almalinux.org/9/ALSA-2025-2679.html ALSA-2025:2679 ALSA-2025:2679 �
�libxml2-2.9.13-6.el9_5.2.x86_64.rpm �N�python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm �
�libxml2-2.9.13-6.el9_5.2.i686.rpm �
�libxml2-2.9.13-6.el9_5.2.x86_64.rpm �N�python3-libxml2-2.9.13-6.el9_5.2.x86_64.rpm �
�libxml2-2.9.13-6.el9_5.2.i686.rpm ��ʏW�C
� �mBBBBBBBBBBBBBBBBBsecurity Important: grub2 security update &+���7https://access.redhat.com/errata/RHSA-2025:2867 RHSA-2025:2867 RHSA-2025:2867 https://access.redhat.com/security/cve/CVE-2025-0624 CVE-2025-0624 CVE-2025-0624 https://bugzilla.redhat.com/2346112 2346112 https://errata.almalinux.org/9/ALSA-2025-2867.html ALSA-2025:2867 ALSA-2025:2867 �h�
grub2-tools-2.06-94.el9_5.alma.1.x86_64.rpm �<�
grub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpm ��
grub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpm �e�
grub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpm �;�
grub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpm �g�
grub2-pc-2.06-94.el9_5.alma.1.x86_64.rpm �i�
grub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpm �f�
grub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpm �j�
grub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm �9�
grub2-common-2.06-94.el9_5.alma.1.noarch.rpm �k�
grub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpm �:�
grub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm �h�
grub2-tools-2.06-94.el9_5.alma.1.x86_64.rpm �<�
grub2-pc-modules-2.06-94.el9_5.alma.1.noarch.rpm ��
grub2-ppc64le-modules-2.06-94.el9_5.alma.1.noarch.rpm �e�
grub2-efi-x64-2.06-94.el9_5.alma.1.x86_64.rpm �;�
grub2-efi-x64-modules-2.06-94.el9_5.alma.1.noarch.rpm �g�
grub2-pc-2.06-94.el9_5.alma.1.x86_64.rpm �i�
grub2-tools-efi-2.06-94.el9_5.alma.1.x86_64.rpm �f�
grub2-efi-x64-cdboot-2.06-94.el9_5.alma.1.x86_64.rpm �j�
grub2-tools-extra-2.06-94.el9_5.alma.1.x86_64.rpm �9�
grub2-common-2.06-94.el9_5.alma.1.noarch.rpm �k�
grub2-tools-minimal-2.06-94.el9_5.alma.1.x86_64.rpm �:�
grub2-efi-aa64-modules-2.06-94.el9_5.alma.1.noarch.rpm ����K�D
�:�ABsecurity Moderate: expat security update &��<�lhttps://access.redhat.com/errata/RHSA-2025:3531 RHSA-2025:3531 RHSA-2025:3531 https://access.redhat.com/security/cve/CVE-2024-8176 CVE-2024-8176 CVE-2024-8176 https://bugzilla.redhat.com/2310137 2310137 https://errata.almalinux.org/9/ALSA-2025-3531.html ALSA-2025:3531 ALSA-2025:3531 � �qexpat-2.5.0-3.el9_5.3.x86_64.rpm � �qexpat-2.5.0-3.el9_5.3.i686.rpm � �qexpat-2.5.0-3.el9_5.3.x86_64.rpm � �qexpat-2.5.0-3.el9_5.3.i686.rpm ����K�E
�=�{B�IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��(�https://access.redhat.com/errata/RHSA-2025:3937 RHSA-2025:3937 RHSA-2025:3937 https://access.redhat.com/security/cve/CVE-2024-53150 CVE-2024-53150 CVE-2024-53150 https://bugzilla.redhat.com/2333971 2333971 https://errata.almalinux.org/9/ALSA-2025-3937.html ALSA-2025:3937 ALSA-2025:3937 1�Nbpftool-7.4.0-503.38.1.el9_5.x86_64.rpm <kernel-tools-libs-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-modules-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-modules-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-tools-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-5.14.0-503.38.1.el9_5.x86_64.rpm 2<python3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm !<kernel-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-abi-stablelists-5.14.0-503.38.1.el9_5.noarch.rpm "<kernel-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm %<kernel-uki-virt-addons-5.14.0-503.38.1.el9_5.x86_64.rpm 1�Nbpftool-7.4.0-503.38.1.el9_5.x86_64.rpm <kernel-tools-libs-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-modules-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-modules-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-tools-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-5.14.0-503.38.1.el9_5.x86_64.rpm 2<python3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-debug-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm !<kernel-modules-core-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-modules-extra-5.14.0-503.38.1.el9_5.x86_64.rpm <kernel-abi-stablelists-5.14.0-503.38.1.el9_5.noarch.rpm "<kernel-uki-virt-5.14.0-503.38.1.el9_5.x86_64.rpm %<kernel-uki-virt-addons-5.14.0-503.38.1.el9_5.x86_64.rpm ����d�F
�>�eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: glibc security update &��7�;https://access.redhat.com/errata/RHSA-2025:4244 RHSA-2025:4244 RHSA-2025:4244 https://access.redhat.com/security/cve/CVE-2025-0395 CVE-2025-0395 CVE-2025-0395 https://bugzilla.redhat.com/2339460 2339460 https://errata.almalinux.org/9/ALSA-2025-4244.html ALSA-2025:4244 ALSA-2025:4244 �P�2glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpm �&glibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm �2glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpm �Hglibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpm �#glibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm �1glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm �Eglibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpm �lglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm �>glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm �@glibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-2.34-125.el9_5.8.alma.1.x86_64.rpm �|glibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm �;glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm �Fglibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpm �uglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpm �Rglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpm �Sglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm �Hglibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpm �}glibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm �-glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm �/glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpm �sglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm �;glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-2.34-125.el9_5.8.alma.1.i686.rpm �%glibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpm �Lglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm �:glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpm �~glibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpm �Vglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm �>glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm �Cglibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpm �%glibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm �.glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpm �`glibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm �.glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpm �Pglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm �eglibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpm �Mglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm �(glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpm �iglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm �*glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpm �nglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpm �Lglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm �6glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpm �xglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpm �Iglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpm �Unscd-2.34-125.el9_5.8.alma.1.x86_64.rpm �Nglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm �?glibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpm �kglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpm �&glibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm �Aglibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm �Gglibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm �)glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpm �mglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpm �
glibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm �/glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpm �Tglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpm �Kglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm �<glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm �Bglibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpm �jglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm �:glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm �Dglibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm �4glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpm �cglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpm �$glibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm �<glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm �Aglibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpm �Wglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm �7glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm �)glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpm �Iglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpm �bglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpm �Oglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm �-libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpm �Oglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm �8glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpm �{glibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm �-libnsl-2.34-125.el9_5.8.alma.1.i686.rpm �glibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpm �Sglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpm �$glibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpm �
glibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm �Fglibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpm �^glibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpm �"glibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm �9glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm �8glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm �=glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpm �Uglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpm �dglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpm �Kglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm �3glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm �4glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpm �#glibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpm �Pglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm �Gglibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm �1glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpm �!glibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpm �!glibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpm �Zglibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpm �Mglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm �*glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpm �rglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm �5glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpm �zglibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm �(glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpm �wglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpm �Yglibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm �Bglibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpm �]glibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpm �oglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm �-glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm �?glibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm �0glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpm �'glibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpm �Jglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpm �tglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm �0glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpm �
glibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm �Dglibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpm �yglibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm �Cglibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpm �qglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpm �'glibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpm �Rglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm �Eglibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm �9glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpm �_glibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm �hglibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpm �Nglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm �fglibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm �@glibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpm �Jglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm �7glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm �3glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpm �Xglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm �5glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpm �Tglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpm �pglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpm �\glibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpm �vglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm �=glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpm �"glibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm �gglibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpm �[glibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpm �aglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm �6glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpm �P�2glibc-langpack-de-2.34-125.el9_5.8.alma.1.x86_64.rpm �&glibc-langpack-sid-2.34-125.el9_5.8.alma.1.x86_64.rpm �2glibc-langpack-ta-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-langpack-sr-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ak-2.34-125.el9_5.8.alma.1.x86_64.rpm �Hglibc-langpack-vi-2.34-125.el9_5.8.alma.1.x86_64.rpm �#glibc-langpack-shn-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ru-2.34-125.el9_5.8.alma.1.x86_64.rpm �1glibc-langpack-da-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-oc-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qglibc-langpack-hr-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ar-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pa-2.34-125.el9_5.8.alma.1.x86_64.rpm �Eglibc-langpack-ga-2.34-125.el9_5.8.alma.1.x86_64.rpm �lglibc-langpack-li-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ms-2.34-125.el9_5.8.alma.1.x86_64.rpm �>glibc-langpack-tpi-2.34-125.el9_5.8.alma.1.x86_64.rpm �@glibc-langpack-ts-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-2.34-125.el9_5.8.alma.1.x86_64.rpm �|glibc-langpack-ml-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ayc-2.34-125.el9_5.8.alma.1.x86_64.rpm �;glibc-langpack-et-2.34-125.el9_5.8.alma.1.x86_64.rpm �Fglibc-langpack-uz-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nr-2.34-125.el9_5.8.alma.1.x86_64.rpm �uglibc-langpack-mfe-2.34-125.el9_5.8.alma.1.x86_64.rpm �Rglibc-langpack-hsb-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-mr-2.34-125.el9_5.8.alma.1.x86_64.rpm �Sglibc-langpack-zu-2.34-125.el9_5.8.alma.1.x86_64.rpm �Hglibc-langpack-gl-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-niu-2.34-125.el9_5.8.alma.1.x86_64.rpm �}glibc-langpack-mn-2.34-125.el9_5.8.alma.1.x86_64.rpm �-glibc-langpack-cs-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-mt-2.34-125.el9_5.8.alma.1.x86_64.rpm �/glibc-langpack-cv-2.34-125.el9_5.8.alma.1.x86_64.rpm �sglibc-langpack-mag-2.34-125.el9_5.8.alma.1.x86_64.rpm �;glibc-langpack-tl-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-2.34-125.el9_5.8.alma.1.i686.rpm �%glibc-langpack-bs-2.34-125.el9_5.8.alma.1.x86_64.rpm �Lglibc-langpack-wo-2.34-125.el9_5.8.alma.1.x86_64.rpm �:glibc-langpack-es-2.34-125.el9_5.8.alma.1.x86_64.rpm �~glibc-langpack-mni-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-aa-2.34-125.el9_5.8.alma.1.x86_64.rpm �Vglibc-langpack-ia-2.34-125.el9_5.8.alma.1.x86_64.rpm �>glibc-langpack-ff-2.34-125.el9_5.8.alma.1.x86_64.rpm �Cglibc-langpack-uk-2.34-125.el9_5.8.alma.1.x86_64.rpm �%glibc-langpack-si-2.34-125.el9_5.8.alma.1.x86_64.rpm �.glibc-langpack-csb-2.34-125.el9_5.8.alma.1.x86_64.rpm �`glibc-langpack-kk-2.34-125.el9_5.8.alma.1.x86_64.rpm �.glibc-langpack-st-2.34-125.el9_5.8.alma.1.x86_64.rpm �Pglibc-langpack-yue-2.34-125.el9_5.8.alma.1.x86_64.rpm �eglibc-langpack-kok-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-os-2.34-125.el9_5.8.alma.1.x86_64.rpm �Mglibc-langpack-he-2.34-125.el9_5.8.alma.1.x86_64.rpm �(glibc-langpack-sl-2.34-125.el9_5.8.alma.1.x86_64.rpm �iglibc-langpack-ky-2.34-125.el9_5.8.alma.1.x86_64.rpm �*glibc-langpack-ckb-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sah-2.34-125.el9_5.8.alma.1.x86_64.rpm �nglibc-langpack-ln-2.34-125.el9_5.8.alma.1.x86_64.rpm �Lglibc-langpack-hak-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ber-2.34-125.el9_5.8.alma.1.x86_64.rpm �6glibc-langpack-th-2.34-125.el9_5.8.alma.1.x86_64.rpm �xglibc-langpack-mi-2.34-125.el9_5.8.alma.1.x86_64.rpm �Iglibc-langpack-wa-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-gconv-extra-2.34-125.el9_5.8.alma.1.i686.rpm �Unscd-2.34-125.el9_5.8.alma.1.x86_64.rpm �Nglibc-langpack-hi-2.34-125.el9_5.8.alma.1.x86_64.rpm �?glibc-langpack-fi-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sa-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sc-2.34-125.el9_5.8.alma.1.x86_64.rpm �kglibc-langpack-lg-2.34-125.el9_5.8.alma.1.x86_64.rpm �&glibc-langpack-byn-2.34-125.el9_5.8.alma.1.x86_64.rpm �Aglibc-langpack-tt-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pap-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-sat-2.34-125.el9_5.8.alma.1.x86_64.rpm �Gglibc-langpack-ve-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-rw-2.34-125.el9_5.8.alma.1.x86_64.rpm �)glibc-langpack-chr-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bem-2.34-125.el9_5.8.alma.1.x86_64.rpm �mglibc-langpack-lij-2.34-125.el9_5.8.alma.1.x86_64.rpm �
glibc-common-2.34-125.el9_5.8.alma.1.x86_64.rpm �/glibc-langpack-sv-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ro-2.34-125.el9_5.8.alma.1.x86_64.rpm �Tglibc-langpack-hu-2.34-125.el9_5.8.alma.1.x86_64.rpm �Kglibc-langpack-ha-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ps-2.34-125.el9_5.8.alma.1.x86_64.rpm �<glibc-langpack-tn-2.34-125.el9_5.8.alma.1.x86_64.rpm �Bglibc-langpack-ug-2.34-125.el9_5.8.alma.1.x86_64.rpm �jglibc-langpack-lb-2.34-125.el9_5.8.alma.1.x86_64.rpm �:glibc-langpack-tk-2.34-125.el9_5.8.alma.1.x86_64.rpm �Dglibc-langpack-fy-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-langpack-cmn-2.34-125.el9_5.8.alma.1.x86_64.rpm �4glibc-langpack-dsb-2.34-125.el9_5.8.alma.1.x86_64.rpm �cglibc-langpack-kn-2.34-125.el9_5.8.alma.1.x86_64.rpm �$glibc-langpack-brx-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-mnw-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nn-2.34-125.el9_5.8.alma.1.x86_64.rpm �<glibc-langpack-eu-2.34-125.el9_5.8.alma.1.x86_64.rpm �Aglibc-langpack-fo-2.34-125.el9_5.8.alma.1.x86_64.rpm �Wglibc-langpack-id-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ast-2.34-125.el9_5.8.alma.1.x86_64.rpm �7glibc-langpack-el-2.34-125.el9_5.8.alma.1.x86_64.rpm �)glibc-langpack-sm-2.34-125.el9_5.8.alma.1.x86_64.rpm �Iglibc-langpack-gu-2.34-125.el9_5.8.alma.1.x86_64.rpm �bglibc-langpack-km-2.34-125.el9_5.8.alma.1.x86_64.rpm �Oglibc-langpack-yo-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-om-2.34-125.el9_5.8.alma.1.x86_64.rpm �-libnsl-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nb-2.34-125.el9_5.8.alma.1.x86_64.rpm �Oglibc-langpack-hif-2.34-125.el9_5.8.alma.1.x86_64.rpm �8glibc-langpack-ti-2.34-125.el9_5.8.alma.1.x86_64.rpm �{glibc-langpack-mk-2.34-125.el9_5.8.alma.1.x86_64.rpm �-libnsl-2.34-125.el9_5.8.alma.1.i686.rpm �glibc-langpack-agr-2.34-125.el9_5.8.alma.1.x86_64.rpm �Sglibc-langpack-ht-2.34-125.el9_5.8.alma.1.x86_64.rpm �$glibc-langpack-shs-2.34-125.el9_5.8.alma.1.x86_64.rpm �
glibc-langpack-nl-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-quz-2.34-125.el9_5.8.alma.1.x86_64.rpm �Fglibc-langpack-gd-2.34-125.el9_5.8.alma.1.x86_64.rpm �+glibc-langpack-sq-2.34-125.el9_5.8.alma.1.x86_64.rpm �^glibc-langpack-ka-2.34-125.el9_5.8.alma.1.x86_64.rpm �"glibc-langpack-bo-2.34-125.el9_5.8.alma.1.x86_64.rpm �9glibc-langpack-eo-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-anp-2.34-125.el9_5.8.alma.1.x86_64.rpm �8glibc-langpack-en-2.34-125.el9_5.8.alma.1.x86_64.rpm �=glibc-langpack-to-2.34-125.el9_5.8.alma.1.x86_64.rpm �Uglibc-langpack-hy-2.34-125.el9_5.8.alma.1.x86_64.rpm �dglibc-langpack-ko-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-my-2.34-125.el9_5.8.alma.1.x86_64.rpm �Kglibc-langpack-wal-2.34-125.el9_5.8.alma.1.x86_64.rpm �3glibc-langpack-tcy-2.34-125.el9_5.8.alma.1.x86_64.rpm �4glibc-langpack-te-2.34-125.el9_5.8.alma.1.x86_64.rpm �#glibc-langpack-br-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-be-2.34-125.el9_5.8.alma.1.x86_64.rpm �Pglibc-langpack-hne-2.34-125.el9_5.8.alma.1.x86_64.rpm �Gglibc-langpack-gez-2.34-125.el9_5.8.alma.1.x86_64.rpm �1glibc-langpack-szl-2.34-125.el9_5.8.alma.1.x86_64.rpm �!glibc-langpack-bn-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pt-2.34-125.el9_5.8.alma.1.x86_64.rpm �!glibc-langpack-se-2.34-125.el9_5.8.alma.1.x86_64.rpm �Zglibc-langpack-is-2.34-125.el9_5.8.alma.1.x86_64.rpm �Mglibc-langpack-xh-2.34-125.el9_5.8.alma.1.x86_64.rpm �*glibc-langpack-so-2.34-125.el9_5.8.alma.1.x86_64.rpm �rglibc-langpack-lzh-2.34-125.el9_5.8.alma.1.x86_64.rpm �5glibc-langpack-tg-2.34-125.el9_5.8.alma.1.x86_64.rpm �zglibc-langpack-mjw-2.34-125.el9_5.8.alma.1.x86_64.rpm �(glibc-langpack-ce-2.34-125.el9_5.8.alma.1.x86_64.rpm �wglibc-langpack-mhr-2.34-125.el9_5.8.alma.1.x86_64.rpm �Yglibc-langpack-ik-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-gconv-extra-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-raj-2.34-125.el9_5.8.alma.1.x86_64.rpm �Bglibc-langpack-fr-2.34-125.el9_5.8.alma.1.x86_64.rpm �]glibc-langpack-ja-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-az-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bhb-2.34-125.el9_5.8.alma.1.x86_64.rpm �oglibc-langpack-lo-2.34-125.el9_5.8.alma.1.x86_64.rpm �-glibc-langpack-ss-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-am-2.34-125.el9_5.8.alma.1.x86_64.rpm �?glibc-langpack-tr-2.34-125.el9_5.8.alma.1.x86_64.rpm �0glibc-langpack-cy-2.34-125.el9_5.8.alma.1.x86_64.rpm �'glibc-langpack-sk-2.34-125.el9_5.8.alma.1.x86_64.rpm �Jglibc-langpack-gv-2.34-125.el9_5.8.alma.1.x86_64.rpm �tglibc-langpack-mai-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-sd-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-as-2.34-125.el9_5.8.alma.1.x86_64.rpm �0glibc-langpack-sw-2.34-125.el9_5.8.alma.1.x86_64.rpm �
glibc-langpack-nso-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-all-langpacks-2.34-125.el9_5.8.alma.1.x86_64.rpm �Dglibc-langpack-unm-2.34-125.el9_5.8.alma.1.x86_64.rpm �yglibc-langpack-miq-2.34-125.el9_5.8.alma.1.x86_64.rpm �Cglibc-langpack-fur-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-af-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nds-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-ne-2.34-125.el9_5.8.alma.1.x86_64.rpm �qglibc-langpack-lv-2.34-125.el9_5.8.alma.1.x86_64.rpm �'glibc-langpack-ca-2.34-125.el9_5.8.alma.1.x86_64.rpm �Rglibc-langpack-zh-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bg-2.34-125.el9_5.8.alma.1.x86_64.rpm �Eglibc-langpack-ur-2.34-125.el9_5.8.alma.1.x86_64.rpm �9glibc-langpack-tig-2.34-125.el9_5.8.alma.1.x86_64.rpm �_glibc-langpack-kab-2.34-125.el9_5.8.alma.1.x86_64.rpm � glibc-langpack-bi-2.34-125.el9_5.8.alma.1.x86_64.rpm �hglibc-langpack-kw-2.34-125.el9_5.8.alma.1.x86_64.rpm �Nglibc-langpack-yi-2.34-125.el9_5.8.alma.1.x86_64.rpm �fglibc-langpack-ks-2.34-125.el9_5.8.alma.1.x86_64.rpm �@glibc-langpack-fil-2.34-125.el9_5.8.alma.1.x86_64.rpm �Jglibc-langpack-wae-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-bho-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qglibc-langpack-yuw-2.34-125.el9_5.8.alma.1.x86_64.rpm �7glibc-langpack-the-2.34-125.el9_5.8.alma.1.x86_64.rpm �3glibc-langpack-doi-2.34-125.el9_5.8.alma.1.x86_64.rpm �Xglibc-langpack-ig-2.34-125.el9_5.8.alma.1.x86_64.rpm �5glibc-langpack-dv-2.34-125.el9_5.8.alma.1.x86_64.rpm �Tglibc-minimal-langpack-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-an-2.34-125.el9_5.8.alma.1.x86_64.rpm �pglibc-langpack-lt-2.34-125.el9_5.8.alma.1.x86_64.rpm �,glibc-langpack-crh-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nan-2.34-125.el9_5.8.alma.1.x86_64.rpm �\glibc-langpack-iu-2.34-125.el9_5.8.alma.1.x86_64.rpm �vglibc-langpack-mg-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-or-2.34-125.el9_5.8.alma.1.x86_64.rpm �=glibc-langpack-fa-2.34-125.el9_5.8.alma.1.x86_64.rpm �"glibc-langpack-sgs-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-nhn-2.34-125.el9_5.8.alma.1.x86_64.rpm �glibc-langpack-pl-2.34-125.el9_5.8.alma.1.x86_64.rpm �gglibc-langpack-ku-2.34-125.el9_5.8.alma.1.x86_64.rpm �[glibc-langpack-it-2.34-125.el9_5.8.alma.1.x86_64.rpm �aglibc-langpack-kl-2.34-125.el9_5.8.alma.1.x86_64.rpm �6glibc-langpack-dz-2.34-125.el9_5.8.alma.1.x86_64.rpm ����r�G
�?�BBBBsecurity Moderate: python3.9 security update &��r�[https://access.redhat.com/errata/RHSA-2025:6977 RHSA-2025:6977 RHSA-2025:6977 https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237 https://errata.almalinux.org/9/ALSA-2025-6977.html ALSA-2025:6977 ALSA-2025:6977 -�python3-libs-3.9.21-2.el9.i686.rpm ��python3-3.9.21-2.el9.x86_64.rpm -�python3-libs-3.9.21-2.el9.x86_64.rpm -�python3-libs-3.9.21-2.el9.i686.rpm ��python3-3.9.21-2.el9.x86_64.rpm -�python3-libs-3.9.21-2.el9.x86_64.rpm ��p�H
��GBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update &��M� https://access.redhat.com/errata/RHSA-2025:6990 RHSA-2025:6990 RHSA-2025:6990 https://access.redhat.com/security/cve/CVE-2024-45774 CVE-2024-45774 CVE-2024-45774 https://access.redhat.com/security/cve/CVE-2024-45775 CVE-2024-45775 CVE-2024-45775 https://access.redhat.com/security/cve/CVE-2024-45776 CVE-2024-45776 CVE-2024-45776 https://access.redhat.com/security/cve/CVE-2024-45781 CVE-2024-45781 CVE-2024-45781 https://access.redhat.com/security/cve/CVE-2024-45783 CVE-2024-45783 CVE-2024-45783 https://access.redhat.com/security/cve/CVE-2025-0622 CVE-2025-0622 CVE-2025-0622 https://access.redhat.com/security/cve/CVE-2025-0677 CVE-2025-0677 CVE-2025-0677 https://access.redhat.com/security/cve/CVE-2025-0690 CVE-2025-0690 CVE-2025-0690 https://bugzilla.redhat.com/2337461 2337461 https://bugzilla.redhat.com/2337481 2337481 https://bugzilla.redhat.com/2339182 2339182 https://bugzilla.redhat.com/2345857 2345857 https://bugzilla.redhat.com/2345863 2345863 https://bugzilla.redhat.com/2345865 2345865 https://bugzilla.redhat.com/2346116 2346116 https://bugzilla.redhat.com/2346123 2346123 https://errata.almalinux.org/9/ALSA-2025-6990.html ALSA-2025:6990 ALSA-2025:6990 �9�grub2-common-2.06-104.el9_6.alma.1.noarch.rpm �g�grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpm �e�grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpm �k�grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpm �:�grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpm �f�grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpm �j�grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpm �;�grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpm �h�grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm �9�grub2-common-2.06-104.el9_6.alma.1.noarch.rpm �g�grub2-pc-2.06-104.el9_6.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-104.el9_6.alma.1.x86_64.rpm �e�grub2-efi-x64-2.06-104.el9_6.alma.1.x86_64.rpm �k�grub2-tools-minimal-2.06-104.el9_6.alma.1.x86_64.rpm �:�grub2-efi-aa64-modules-2.06-104.el9_6.alma.1.noarch.rpm �f�grub2-efi-x64-cdboot-2.06-104.el9_6.alma.1.x86_64.rpm �j�grub2-tools-extra-2.06-104.el9_6.alma.1.x86_64.rpm �;�grub2-efi-x64-modules-2.06-104.el9_6.alma.1.noarch.rpm �h�grub2-tools-2.06-104.el9_6.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-104.el9_6.alma.1.noarch.rpm ��|�I
� �ZBBBBBBsecurity Moderate: openssh security update &��m� https://access.redhat.com/errata/RHSA-2025:6993 RHSA-2025:6993 RHSA-2025:6993 https://access.redhat.com/security/cve/CVE-2025-26465 CVE-2025-26465 CVE-2025-26465 https://bugzilla.redhat.com/2344780 2344780 https://errata.almalinux.org/9/ALSA-2025-6993.html ALSA-2025:6993 ALSA-2025:6993 �m�xopenssh-8.7p1-45.el9.x86_64.rpm �p�xopenssh-server-8.7p1-45.el9.x86_64.rpm �n�xopenssh-clients-8.7p1-45.el9.x86_64.rpm �o�xopenssh-keycat-8.7p1-45.el9.x86_64.rpm �m�xopenssh-8.7p1-45.el9.x86_64.rpm �p�xopenssh-server-8.7p1-45.el9.x86_64.rpm �n�xopenssh-clients-8.7p1-45.el9.x86_64.rpm �o�xopenssh-keycat-8.7p1-45.el9.x86_64.rpm ��|�J
�#�"security Moderate: microcode_ctl security update &��m�Lhttps://access.redhat.com/errata/RHSA-2025:7043 RHSA-2025:7043 RHSA-2025:7043 https://access.redhat.com/security/cve/CVE-2024-28047 CVE-2024-28047 CVE-2024-28047 https://access.redhat.com/security/cve/CVE-2024-31157 CVE-2024-31157 CVE-2024-31157 https://access.redhat.com/security/cve/CVE-2024-39279 CVE-2024-39279 CVE-2024-39279 https://bugzilla.redhat.com/2345363 2345363 https://bugzilla.redhat.com/2345381 2345381 https://bugzilla.redhat.com/2345421 2345421 https://errata.almalinux.org/9/ALSA-2025-7043.html ALSA-2025:7043 ALSA-2025:7043 �m�microcode_ctl-20250211-1.el9_6.noarch.rpm �m�microcode_ctl-20250211-1.el9_6.noarch.rpm ���K
��$security Moderate: python-requests security update &��9�`https://access.redhat.com/errata/RHSA-2025:7049 RHSA-2025:7049 RHSA-2025:7049 https://access.redhat.com/security/cve/CVE-2024-35195 CVE-2024-35195 CVE-2024-35195 https://bugzilla.redhat.com/2282114 2282114 https://errata.almalinux.org/9/ALSA-2025-7049.html ALSA-2025:7049 ALSA-2025:7049 �D�
python3-requests-2.25.1-9.el9.noarch.rpm �D�
python3-requests-2.25.1-9.el9.noarch.rpm �Ô�"�L
��esecurity Moderate: rsync security update &���`https://access.redhat.com/errata/RHSA-2025:7050 RHSA-2025:7050 RHSA-2025:7050 https://access.redhat.com/security/cve/CVE-2024-12087 CVE-2024-12087 CVE-2024-12087 https://access.redhat.com/security/cve/CVE-2024-12088 CVE-2024-12088 CVE-2024-12088 https://access.redhat.com/security/cve/CVE-2024-12747 CVE-2024-12747 CVE-2024-12747 https://bugzilla.redhat.com/2330672 2330672 https://bugzilla.redhat.com/2330676 2330676 https://bugzilla.redhat.com/2332968 2332968 https://errata.almalinux.org/9/ALSA-2025-7050.html ALSA-2025:7050 ALSA-2025:7050 �;�'rsync-3.2.5-3.el9.x86_64.rpm �;�'rsync-3.2.5-3.el9.x86_64.rpm ��+�M
�)�gsecurity Moderate: iptraf-ng security update &��y�Hhttps://access.redhat.com/errata/RHSA-2025:7064 RHSA-2025:7064 RHSA-2025:7064 https://access.redhat.com/security/cve/CVE-2024-52949 CVE-2024-52949 CVE-2024-52949 https://bugzilla.redhat.com/2332702 2332702 https://errata.almalinux.org/9/ALSA-2025-7064.html ALSA-2025:7064 ALSA-2025:7064 �Z�iptraf-ng-1.2.2-1.el9.x86_64.rpm �Z�iptraf-ng-1.2.2-1.el9.x86_64.rpm ��E�N
��jBBBBBBBBBBBBBBBsecurity Moderate: krb5 security update &��A�{https://access.redhat.com/errata/RHSA-2025:7067 RHSA-2025:7067 RHSA-2025:7067 https://access.redhat.com/security/cve/CVE-2025-24528 CVE-2025-24528 CVE-2025-24528 https://bugzilla.redhat.com/2342796 2342796 https://errata.almalinux.org/9/ALSA-2025-7067.html ALSA-2025:7067 ALSA-2025:7067 �&�libkadm5-1.21.1-6.el9.x86_64.rpm �&�libkadm5-1.21.1-6.el9.i686.rpm �$�krb5-server-1.21.1-6.el9.i686.rpm �#�krb5-pkinit-1.21.1-6.el9.i686.rpm �$�krb5-server-1.21.1-6.el9.x86_64.rpm �#�krb5-pkinit-1.21.1-6.el9.x86_64.rpm �"�krb5-libs-1.21.1-6.el9.i686.rpm �"�krb5-libs-1.21.1-6.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-6.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-6.el9.i686.rpm �l�krb5-workstation-1.21.1-6.el9.x86_64.rpm �&�libkadm5-1.21.1-6.el9.x86_64.rpm �&�libkadm5-1.21.1-6.el9.i686.rpm �$�krb5-server-1.21.1-6.el9.i686.rpm �#�krb5-pkinit-1.21.1-6.el9.i686.rpm �$�krb5-server-1.21.1-6.el9.x86_64.rpm �#�krb5-pkinit-1.21.1-6.el9.x86_64.rpm �"�krb5-libs-1.21.1-6.el9.i686.rpm �"�krb5-libs-1.21.1-6.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-6.el9.x86_64.rpm �%�krb5-server-ldap-1.21.1-6.el9.i686.rpm �l�krb5-workstation-1.21.1-6.el9.x86_64.rpm ��l�O
��{Bsecurity Moderate: gnutls security update &��<�xhttps://access.redhat.com/errata/RHSA-2025:7076 RHSA-2025:7076 RHSA-2025:7076 https://access.redhat.com/security/cve/CVE-2024-12243 CVE-2024-12243 CVE-2024-12243 https://bugzilla.redhat.com/2344615 2344615 https://errata.almalinux.org/9/ALSA-2025-7076.html ALSA-2025:7076 ALSA-2025:7076 �!�gnutls-3.8.3-6.el9.x86_64.rpm �!�gnutls-3.8.3-6.el9.i686.rpm �!�gnutls-3.8.3-6.el9.x86_64.rpm �!�gnutls-3.8.3-6.el9.i686.rpm ��u�P
��~Bsecurity Moderate: libtasn1 security update &��4�4https://access.redhat.com/errata/RHSA-2025:7077 RHSA-2025:7077 RHSA-2025:7077 https://access.redhat.com/security/cve/CVE-2024-12133 CVE-2024-12133 CVE-2024-12133 https://bugzilla.redhat.com/2344611 2344611 https://errata.almalinux.org/9/ALSA-2025-7077.html ALSA-2025:7077 ALSA-2025:7077 �/�libtasn1-4.16.0-9.el9.x86_64.rpm �/�libtasn1-4.16.0-9.el9.i686.rpm �/�libtasn1-4.16.0-9.el9.x86_64.rpm �/�libtasn1-4.16.0-9.el9.i686.rpm ���Q
��ABBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��h�@https://access.redhat.com/errata/RHSA-2025:7423 RHSA-2025:7423 RHSA-2025:7423 https://access.redhat.com/security/cve/CVE-2024-58005 CVE-2024-58005 CVE-2024-58005 https://access.redhat.com/security/cve/CVE-2024-58007 CVE-2024-58007 CVE-2024-58007 https://access.redhat.com/security/cve/CVE-2024-58069 CVE-2024-58069 CVE-2024-58069 https://access.redhat.com/security/cve/CVE-2025-21633 CVE-2025-21633 CVE-2025-21633 https://access.redhat.com/security/cve/CVE-2025-21927 CVE-2025-21927 CVE-2025-21927 https://access.redhat.com/security/cve/CVE-2025-21993 CVE-2025-21993 CVE-2025-21993 https://bugzilla.redhat.com/2338813 2338813 https://bugzilla.redhat.com/2348565 2348565 https://bugzilla.redhat.com/2348590 2348590 https://bugzilla.redhat.com/2350364 2350364 https://bugzilla.redhat.com/2356593 2356593 https://bugzilla.redhat.com/2356908 2356908 https://errata.almalinux.org/9/ALSA-2025-7423.html ALSA-2025:7423 ALSA-2025:7423 %Pkernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpm Pkernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm !Pkernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm "Pkernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpm %Pkernel-uki-virt-addons-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-modules-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-abi-stablelists-5.14.0-570.16.1.el9_6.noarch.rpm Pkernel-debug-modules-extra-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-modules-5.14.0-570.16.1.el9_6.x86_64.rpm !Pkernel-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm "Pkernel-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-uki-virt-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-debug-modules-core-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-tools-5.14.0-570.16.1.el9_6.x86_64.rpm Pkernel-tools-libs-5.14.0-570.16.1.el9_6.x86_64.rpm ��ɐ1�R
��`BBBBsecurity Moderate: avahi security update &��(�*https://access.redhat.com/errata/RHSA-2025:7437 RHSA-2025:7437 RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 CVE-2024-52616 CVE-2024-52616 https://bugzilla.redhat.com/2326429 2326429 https://errata.almalinux.org/9/ALSA-2025-7437.html ALSA-2025:7437 ALSA-2025:7437 ��
avahi-libs-0.8-22.el9_6.i686.rpm � �
avahi-0.8-22.el9_6.x86_64.rpm ��
avahi-libs-0.8-22.el9_6.x86_64.rpm � �
avahi-0.8-22.el9_6.i686.rpm ��
avahi-libs-0.8-22.el9_6.i686.rpm � �
avahi-0.8-22.el9_6.x86_64.rpm ��
avahi-libs-0.8-22.el9_6.x86_64.rpm � �
avahi-0.8-22.el9_6.i686.rpm ����u�S
��fBsecurity Low: vim security update &�6��R�phttps://access.redhat.com/errata/RHSA-2025:7440 RHSA-2025:7440 RHSA-2025:7440 https://access.redhat.com/security/cve/CVE-2023-4752 CVE-2023-4752 CVE-2023-4752 https://bugzilla.redhat.com/2237311 2237311 https://errata.almalinux.org/9/ALSA-2025-7440.html ALSA-2025:7440 ALSA-2025:7440 �=�~vim-filesystem-8.2.2637-22.el9_6.noarch.rpm �r�~vim-minimal-8.2.2637-22.el9_6.x86_64.rpm �=�~vim-filesystem-8.2.2637-22.el9_6.noarch.rpm �r�~vim-minimal-8.2.2637-22.el9_6.x86_64.rpm ����^�T
� �iBsecurity Moderate: expat security update &��B�lhttps://access.redhat.com/errata/RHSA-2025:7444 RHSA-2025:7444 RHSA-2025:7444 https://access.redhat.com/security/cve/CVE-2024-8176 CVE-2024-8176 CVE-2024-8176 https://bugzilla.redhat.com/2310137 2310137 https://errata.almalinux.org/9/ALSA-2025-7444.html ALSA-2025:7444 ALSA-2025:7444 � �rexpat-2.5.0-5.el9_6.i686.rpm � �rexpat-2.5.0-5.el9_6.x86_64.rpm � �rexpat-2.5.0-5.el9_6.i686.rpm � �rexpat-2.5.0-5.el9_6.x86_64.rpm ����U�U
�
�lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��.�9https://access.redhat.com/errata/RHSA-2025:7903 RHSA-2025:7903 RHSA-2025:7903 https://access.redhat.com/security/cve/CVE-2025-21756 CVE-2025-21756 CVE-2025-21756 https://access.redhat.com/security/cve/CVE-2025-21966 CVE-2025-21966 CVE-2025-21966 https://access.redhat.com/security/cve/CVE-2025-37749 CVE-2025-37749 CVE-2025-37749 https://bugzilla.redhat.com/2348609 2348609 https://bugzilla.redhat.com/2356605 2356605 https://bugzilla.redhat.com/2363332 2363332 https://errata.almalinux.org/9/ALSA-2025-7903.html ALSA-2025:7903 ALSA-2025:7903 %Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm "Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm !Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpm Qkernel-5.14.0-570.17.1.el9_6.x86_64.rpm %Qkernel-uki-virt-addons-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-modules-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-modules-5.14.0-570.17.1.el9_6.x86_64.rpm "Qkernel-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-modules-extra-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-uki-virt-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-debug-5.14.0-570.17.1.el9_6.x86_64.rpm !Qkernel-modules-core-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-tools-libs-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-tools-5.14.0-570.17.1.el9_6.x86_64.rpm Qkernel-abi-stablelists-5.14.0-570.17.1.el9_6.noarch.rpm Qkernel-5.14.0-570.17.1.el9_6.x86_64.rpm ����e�V
��KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��g�
https://access.redhat.com/errata/RHSA-2025:8142 RHSA-2025:8142 RHSA-2025:8142 https://access.redhat.com/security/cve/CVE-2025-21964 CVE-2025-21964 CVE-2025-21964 https://bugzilla.redhat.com/2356665 2356665 https://errata.almalinux.org/9/ALSA-2025-8142.html ALSA-2025:8142 ALSA-2025:8142 Rkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm "Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpm Rkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm %Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm !Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm "Rkernel-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-modules-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-abi-stablelists-5.14.0-570.18.1.el9_6.noarch.rpm Rkernel-core-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-tools-libs-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-uki-virt-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm %Rkernel-uki-virt-addons-5.14.0-570.18.1.el9_6.x86_64.rpm Rkernel-tools-5.14.0-570.18.1.el9_6.x86_64.rpm !Rkernel-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm ��ܣ}�W
��jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��t�Whttps://access.redhat.com/errata/RHSA-2025:8333 RHSA-2025:8333 RHSA-2025:8333 https://access.redhat.com/security/cve/CVE-2022-3424 CVE-2022-3424 CVE-2022-3424 https://access.redhat.com/security/cve/CVE-2025-21764 CVE-2025-21764 CVE-2025-21764 https://bugzilla.redhat.com/2132640 2132640 https://bugzilla.redhat.com/2348575 2348575 https://errata.almalinux.org/9/ALSA-2025-8333.html ALSA-2025:8333 ALSA-2025:8333 Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm %Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm !Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpm Skernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm "Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm %Skernel-uki-virt-addons-5.14.0-570.19.1.el9_6.x86_64.rpm !Skernel-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-tools-libs-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-abi-stablelists-5.14.0-570.19.1.el9_6.noarch.rpm Skernel-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-modules-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm "Skernel-uki-virt-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-core-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-tools-5.14.0-570.19.1.el9_6.x86_64.rpm Skernel-5.14.0-570.19.1.el9_6.x86_64.rpm ��]�X
�
�IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��K�https://access.redhat.com/errata/RHSA-2025:8643 RHSA-2025:8643 RHSA-2025:8643 https://access.redhat.com/security/cve/CVE-2025-21920 CVE-2025-21920 CVE-2025-21920 https://access.redhat.com/security/cve/CVE-2025-21926 CVE-2025-21926 CVE-2025-21926 https://access.redhat.com/security/cve/CVE-2025-21997 CVE-2025-21997 CVE-2025-21997 https://access.redhat.com/security/cve/CVE-2025-22055 CVE-2025-22055 CVE-2025-22055 https://access.redhat.com/security/cve/CVE-2025-37785 CVE-2025-37785 CVE-2025-37785 https://access.redhat.com/security/cve/CVE-2025-37943 CVE-2025-37943 CVE-2025-37943 https://bugzilla.redhat.com/2356587 2356587 https://bugzilla.redhat.com/2356639 2356639 https://bugzilla.redhat.com/2357143 2357143 https://bugzilla.redhat.com/2360300 2360300 https://bugzilla.redhat.com/2360921 2360921 https://bugzilla.redhat.com/2367748 2367748 https://errata.almalinux.org/9/ALSA-2025-8643.html ALSA-2025:8643 ALSA-2025:8643 Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm !Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm Tkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm "Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm %Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm !Tkernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm Tkernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm "Tkernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm %Tkernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-5.14.0-570.21.1.el9_6.x86_64.rpm Tkernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm �«�n�Y
��hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: glibc security update &��S�Nhttps://access.redhat.com/errata/RHSA-2025:8655 RHSA-2025:8655 RHSA-2025:8655 https://access.redhat.com/security/cve/CVE-2025-4802 CVE-2025-4802 CVE-2025-4802 https://bugzilla.redhat.com/2367468 2367468 https://errata.almalinux.org/9/ALSA-2025-8655.html ALSA-2025:8655 ALSA-2025:8655 �P�glibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpm �Rglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpm �pglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm �<glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm �<glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpm �Iglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm �?glibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm �@glibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpm �[glibc-langpack-it-2.34-168.el9_6.19.x86_64.rpm �Kglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpm �Mglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm �4glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm �5glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpm �&glibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpm �{glibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm �-glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpm �'glibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm �=glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpm �vglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpm �xglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm �6glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpm �bglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpm �Qglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm �Hglibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm �1glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpm �cglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm �2glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpm �Yglibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-as-2.34-168.el9_6.19.x86_64.rpm �Tglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpm �Oglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm �/glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm �>glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpm �Pglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm �fglibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpm �aglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpm �\glibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm �gglibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpm �}glibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpm �Vglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpm �Jglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm �Bglibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm �6glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm �)glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpm �%glibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm �0glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-my-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpm �"glibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm �0glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpm �Sglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm �+glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm �-libnsl-2.34-168.el9_6.19.i686.rpm �glibc-langpack-af-2.34-168.el9_6.19.x86_64.rpm �#glibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpm �|glibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpm �sglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm �+glibc-2.34-168.el9_6.19.i686.rpm �=glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpm �qglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpm �tglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm �/glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm �8glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm �9glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm �3glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpm �dglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpm �^glibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpm �Zglibc-langpack-is-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpm �lglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm �5glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpm �&glibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpm �Rglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm �;glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpm �Lglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm �?glibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpm �_glibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpm �!glibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm �Gglibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm �,glibc-gconv-extra-2.34-168.el9_6.19.i686.rpm �Kglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpm �kglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpm �rglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpm �
glibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm �hglibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm �,glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpm �~glibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm �Eglibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpm �Nglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpm �Xglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-or-2.34-168.el9_6.19.x86_64.rpm �nglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpm �wglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpm �jglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm �>glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-am-2.34-168.el9_6.19.x86_64.rpm �glibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm �9glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm �+glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm �.glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm �*glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-om-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-be-2.34-168.el9_6.19.x86_64.rpm �
glibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm �Gglibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpm �Tglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpm �Lglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpm �'glibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpm �"glibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-az-2.34-168.el9_6.19.x86_64.rpm �#glibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm �7glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm �8glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm �-glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpm �Jglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm �@glibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpm �Qglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm �Fglibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm �(glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpm �oglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpm �yglibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpm �$glibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm �;glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpm �mglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm �-libnsl-2.34-168.el9_6.19.x86_64.rpm �Bglibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm �,glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm �Hglibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpm �`glibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpm �$glibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm �Cglibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm �Fglibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpm �!glibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm �Cglibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpm �%glibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm �(glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm �)glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpm �Oglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpm �zglibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpm �Mglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm �,glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpm �Pglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpm �Unscd-2.34-168.el9_6.19.x86_64.rpm �Aglibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm �:glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm �Eglibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpm �Nglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm �4glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpm �Uglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpm �Sglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm �:glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm �.glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm �Dglibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm �*glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpm �uglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm �Aglibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm �+glibc-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-os-2.34-168.el9_6.19.x86_64.rpm �Iglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpm �]glibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpm �
glibc-common-2.34-168.el9_6.19.x86_64.rpm �eglibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm �2glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm �Dglibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm �3glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm �1glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpm �Wglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpm �iglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm �7glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpm �P�glibc-langpack-pa-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nb-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-pap-2.34-168.el9_6.19.x86_64.rpm �Rglibc-langpack-hsb-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sa-2.34-168.el9_6.19.x86_64.rpm �pglibc-langpack-lt-2.34-168.el9_6.19.x86_64.rpm �<glibc-langpack-eu-2.34-168.el9_6.19.x86_64.rpm �<glibc-langpack-tn-2.34-168.el9_6.19.x86_64.rpm �Iglibc-langpack-gu-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-oc-2.34-168.el9_6.19.x86_64.rpm �?glibc-langpack-tr-2.34-168.el9_6.19.x86_64.rpm �@glibc-langpack-fil-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sc-2.34-168.el9_6.19.x86_64.rpm �[glibc-langpack-it-2.34-168.el9_6.19.x86_64.rpm �Kglibc-langpack-wal-2.34-168.el9_6.19.x86_64.rpm �Mglibc-langpack-he-2.34-168.el9_6.19.x86_64.rpm �4glibc-langpack-te-2.34-168.el9_6.19.x86_64.rpm �5glibc-langpack-tg-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ro-2.34-168.el9_6.19.x86_64.rpm �&glibc-langpack-byn-2.34-168.el9_6.19.x86_64.rpm �{glibc-langpack-mk-2.34-168.el9_6.19.x86_64.rpm �-glibc-langpack-ss-2.34-168.el9_6.19.x86_64.rpm �'glibc-langpack-sk-2.34-168.el9_6.19.x86_64.rpm �=glibc-langpack-fa-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-agr-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-niu-2.34-168.el9_6.19.x86_64.rpm �vglibc-langpack-mg-2.34-168.el9_6.19.x86_64.rpm �xglibc-langpack-mi-2.34-168.el9_6.19.x86_64.rpm �6glibc-langpack-dz-2.34-168.el9_6.19.x86_64.rpm �bglibc-langpack-km-2.34-168.el9_6.19.x86_64.rpm �Qglibc-langpack-hr-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bhb-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-bi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ru-2.34-168.el9_6.19.x86_64.rpm �Hglibc-langpack-vi-2.34-168.el9_6.19.x86_64.rpm �1glibc-langpack-da-2.34-168.el9_6.19.x86_64.rpm �cglibc-langpack-kn-2.34-168.el9_6.19.x86_64.rpm �2glibc-langpack-de-2.34-168.el9_6.19.x86_64.rpm �Yglibc-langpack-ik-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-as-2.34-168.el9_6.19.x86_64.rpm �Tglibc-langpack-hu-2.34-168.el9_6.19.x86_64.rpm �Oglibc-langpack-yo-2.34-168.el9_6.19.x86_64.rpm �/glibc-langpack-cv-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nhn-2.34-168.el9_6.19.x86_64.rpm �>glibc-langpack-tpi-2.34-168.el9_6.19.x86_64.rpm �Pglibc-langpack-yue-2.34-168.el9_6.19.x86_64.rpm �fglibc-langpack-ks-2.34-168.el9_6.19.x86_64.rpm �aglibc-langpack-kl-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-mt-2.34-168.el9_6.19.x86_64.rpm �\glibc-langpack-iu-2.34-168.el9_6.19.x86_64.rpm �gglibc-langpack-ku-2.34-168.el9_6.19.x86_64.rpm �}glibc-langpack-mn-2.34-168.el9_6.19.x86_64.rpm �Vglibc-langpack-ia-2.34-168.el9_6.19.x86_64.rpm �Jglibc-langpack-gv-2.34-168.el9_6.19.x86_64.rpm �Bglibc-langpack-fr-2.34-168.el9_6.19.x86_64.rpm �6glibc-langpack-th-2.34-168.el9_6.19.x86_64.rpm �)glibc-langpack-sm-2.34-168.el9_6.19.x86_64.rpm �%glibc-langpack-si-2.34-168.el9_6.19.x86_64.rpm �0glibc-langpack-cy-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-my-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-quz-2.34-168.el9_6.19.x86_64.rpm �"glibc-langpack-bo-2.34-168.el9_6.19.x86_64.rpm �0glibc-langpack-sw-2.34-168.el9_6.19.x86_64.rpm �Sglibc-langpack-zu-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-anp-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-rw-2.34-168.el9_6.19.x86_64.rpm �+glibc-langpack-cmn-2.34-168.el9_6.19.x86_64.rpm �-libnsl-2.34-168.el9_6.19.i686.rpm �glibc-langpack-af-2.34-168.el9_6.19.x86_64.rpm �#glibc-langpack-shn-2.34-168.el9_6.19.x86_64.rpm �|glibc-langpack-ml-2.34-168.el9_6.19.x86_64.rpm �sglibc-langpack-mag-2.34-168.el9_6.19.x86_64.rpm �+glibc-2.34-168.el9_6.19.i686.rpm �=glibc-langpack-to-2.34-168.el9_6.19.x86_64.rpm �qglibc-langpack-lv-2.34-168.el9_6.19.x86_64.rpm �tglibc-langpack-mai-2.34-168.el9_6.19.x86_64.rpm �/glibc-langpack-sv-2.34-168.el9_6.19.x86_64.rpm �8glibc-langpack-ti-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-mnw-2.34-168.el9_6.19.x86_64.rpm �9glibc-langpack-eo-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ber-2.34-168.el9_6.19.x86_64.rpm �3glibc-langpack-doi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nn-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bg-2.34-168.el9_6.19.x86_64.rpm �dglibc-langpack-ko-2.34-168.el9_6.19.x86_64.rpm �^glibc-langpack-ka-2.34-168.el9_6.19.x86_64.rpm �Zglibc-langpack-is-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sah-2.34-168.el9_6.19.x86_64.rpm �lglibc-langpack-li-2.34-168.el9_6.19.x86_64.rpm �5glibc-langpack-dv-2.34-168.el9_6.19.x86_64.rpm �&glibc-langpack-sid-2.34-168.el9_6.19.x86_64.rpm �Rglibc-langpack-zh-2.34-168.el9_6.19.x86_64.rpm �;glibc-langpack-tl-2.34-168.el9_6.19.x86_64.rpm �Lglibc-langpack-hak-2.34-168.el9_6.19.x86_64.rpm �?glibc-langpack-fi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ar-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-raj-2.34-168.el9_6.19.x86_64.rpm �_glibc-langpack-kab-2.34-168.el9_6.19.x86_64.rpm �!glibc-langpack-bn-2.34-168.el9_6.19.x86_64.rpm �Gglibc-langpack-ve-2.34-168.el9_6.19.x86_64.rpm �,glibc-gconv-extra-2.34-168.el9_6.19.i686.rpm �Kglibc-langpack-ha-2.34-168.el9_6.19.x86_64.rpm �kglibc-langpack-lg-2.34-168.el9_6.19.x86_64.rpm �rglibc-langpack-lzh-2.34-168.el9_6.19.x86_64.rpm �
glibc-langpack-nl-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bho-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-an-2.34-168.el9_6.19.x86_64.rpm �hglibc-langpack-kw-2.34-168.el9_6.19.x86_64.rpm �,glibc-gconv-extra-2.34-168.el9_6.19.x86_64.rpm �~glibc-langpack-mni-2.34-168.el9_6.19.x86_64.rpm �Eglibc-langpack-ur-2.34-168.el9_6.19.x86_64.rpm �Nglibc-langpack-yi-2.34-168.el9_6.19.x86_64.rpm �Xglibc-langpack-ig-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-sat-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-or-2.34-168.el9_6.19.x86_64.rpm �nglibc-langpack-ln-2.34-168.el9_6.19.x86_64.rpm �wglibc-langpack-mhr-2.34-168.el9_6.19.x86_64.rpm �jglibc-langpack-lb-2.34-168.el9_6.19.x86_64.rpm �>glibc-langpack-ff-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-am-2.34-168.el9_6.19.x86_64.rpm �glibc-all-langpacks-2.34-168.el9_6.19.x86_64.rpm �9glibc-langpack-tig-2.34-168.el9_6.19.x86_64.rpm �+glibc-langpack-sq-2.34-168.el9_6.19.x86_64.rpm �.glibc-langpack-st-2.34-168.el9_6.19.x86_64.rpm �*glibc-langpack-ckb-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-mr-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-om-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-be-2.34-168.el9_6.19.x86_64.rpm �
glibc-langpack-nso-2.34-168.el9_6.19.x86_64.rpm �Gglibc-langpack-gez-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nan-2.34-168.el9_6.19.x86_64.rpm �Tglibc-minimal-langpack-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ast-2.34-168.el9_6.19.x86_64.rpm �Lglibc-langpack-wo-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-pt-2.34-168.el9_6.19.x86_64.rpm �'glibc-langpack-ca-2.34-168.el9_6.19.x86_64.rpm �"glibc-langpack-sgs-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-az-2.34-168.el9_6.19.x86_64.rpm �#glibc-langpack-br-2.34-168.el9_6.19.x86_64.rpm �7glibc-langpack-the-2.34-168.el9_6.19.x86_64.rpm �8glibc-langpack-en-2.34-168.el9_6.19.x86_64.rpm �-glibc-langpack-cs-2.34-168.el9_6.19.x86_64.rpm �Jglibc-langpack-wae-2.34-168.el9_6.19.x86_64.rpm �@glibc-langpack-ts-2.34-168.el9_6.19.x86_64.rpm �Qglibc-langpack-yuw-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nr-2.34-168.el9_6.19.x86_64.rpm �Fglibc-langpack-uz-2.34-168.el9_6.19.x86_64.rpm �(glibc-langpack-sl-2.34-168.el9_6.19.x86_64.rpm �oglibc-langpack-lo-2.34-168.el9_6.19.x86_64.rpm �yglibc-langpack-miq-2.34-168.el9_6.19.x86_64.rpm �$glibc-langpack-shs-2.34-168.el9_6.19.x86_64.rpm �;glibc-langpack-et-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ne-2.34-168.el9_6.19.x86_64.rpm �mglibc-langpack-lij-2.34-168.el9_6.19.x86_64.rpm �-libnsl-2.34-168.el9_6.19.x86_64.rpm �Bglibc-langpack-ug-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ayc-2.34-168.el9_6.19.x86_64.rpm �,glibc-langpack-crh-2.34-168.el9_6.19.x86_64.rpm �Hglibc-langpack-gl-2.34-168.el9_6.19.x86_64.rpm �`glibc-langpack-kk-2.34-168.el9_6.19.x86_64.rpm �$glibc-langpack-brx-2.34-168.el9_6.19.x86_64.rpm �Cglibc-langpack-fur-2.34-168.el9_6.19.x86_64.rpm �Fglibc-langpack-gd-2.34-168.el9_6.19.x86_64.rpm � glibc-langpack-sd-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-pl-2.34-168.el9_6.19.x86_64.rpm �!glibc-langpack-se-2.34-168.el9_6.19.x86_64.rpm �Cglibc-langpack-uk-2.34-168.el9_6.19.x86_64.rpm �%glibc-langpack-bs-2.34-168.el9_6.19.x86_64.rpm �(glibc-langpack-ce-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-aa-2.34-168.el9_6.19.x86_64.rpm �)glibc-langpack-chr-2.34-168.el9_6.19.x86_64.rpm �Oglibc-langpack-hif-2.34-168.el9_6.19.x86_64.rpm �zglibc-langpack-mjw-2.34-168.el9_6.19.x86_64.rpm �Mglibc-langpack-xh-2.34-168.el9_6.19.x86_64.rpm �,glibc-langpack-sr-2.34-168.el9_6.19.x86_64.rpm �Pglibc-langpack-hne-2.34-168.el9_6.19.x86_64.rpm �Unscd-2.34-168.el9_6.19.x86_64.rpm �Aglibc-langpack-fo-2.34-168.el9_6.19.x86_64.rpm �:glibc-langpack-tk-2.34-168.el9_6.19.x86_64.rpm �Eglibc-langpack-ga-2.34-168.el9_6.19.x86_64.rpm �Nglibc-langpack-hi-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ak-2.34-168.el9_6.19.x86_64.rpm �4glibc-langpack-dsb-2.34-168.el9_6.19.x86_64.rpm �Uglibc-langpack-hy-2.34-168.el9_6.19.x86_64.rpm �Sglibc-langpack-ht-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-nds-2.34-168.el9_6.19.x86_64.rpm �:glibc-langpack-es-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ps-2.34-168.el9_6.19.x86_64.rpm �.glibc-langpack-csb-2.34-168.el9_6.19.x86_64.rpm �Dglibc-langpack-unm-2.34-168.el9_6.19.x86_64.rpm �*glibc-langpack-so-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-ms-2.34-168.el9_6.19.x86_64.rpm �uglibc-langpack-mfe-2.34-168.el9_6.19.x86_64.rpm �Aglibc-langpack-tt-2.34-168.el9_6.19.x86_64.rpm �+glibc-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-os-2.34-168.el9_6.19.x86_64.rpm �Iglibc-langpack-wa-2.34-168.el9_6.19.x86_64.rpm �]glibc-langpack-ja-2.34-168.el9_6.19.x86_64.rpm �
glibc-common-2.34-168.el9_6.19.x86_64.rpm �eglibc-langpack-kok-2.34-168.el9_6.19.x86_64.rpm �2glibc-langpack-ta-2.34-168.el9_6.19.x86_64.rpm �glibc-langpack-bem-2.34-168.el9_6.19.x86_64.rpm �Dglibc-langpack-fy-2.34-168.el9_6.19.x86_64.rpm �3glibc-langpack-tcy-2.34-168.el9_6.19.x86_64.rpm �1glibc-langpack-szl-2.34-168.el9_6.19.x86_64.rpm �Wglibc-langpack-id-2.34-168.el9_6.19.x86_64.rpm �iglibc-langpack-ky-2.34-168.el9_6.19.x86_64.rpm �7glibc-langpack-el-2.34-168.el9_6.19.x86_64.rpm ��O�Z
��EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update &+��!�ihttps://access.redhat.com/errata/RHSA-2025:9080 RHSA-2025:9080 RHSA-2025:9080 https://access.redhat.com/security/cve/CVE-2025-21961 CVE-2025-21961 CVE-2025-21961 https://access.redhat.com/security/cve/CVE-2025-21963 CVE-2025-21963 CVE-2025-21963 https://access.redhat.com/security/cve/CVE-2025-21969 CVE-2025-21969 CVE-2025-21969 https://access.redhat.com/security/cve/CVE-2025-21979 CVE-2025-21979 CVE-2025-21979 https://access.redhat.com/security/cve/CVE-2025-21999 CVE-2025-21999 CVE-2025-21999 https://access.redhat.com/security/cve/CVE-2025-22126 CVE-2025-22126 CVE-2025-22126 https://access.redhat.com/security/cve/CVE-2025-37750 CVE-2025-37750 CVE-2025-37750 https://bugzilla.redhat.com/2356584 2356584 https://bugzilla.redhat.com/2356633 2356633 https://bugzilla.redhat.com/2356642 2356642 https://bugzilla.redhat.com/2356652 2356652 https://bugzilla.redhat.com/2357134 2357134 https://bugzilla.redhat.com/2360236 2360236 https://bugzilla.redhat.com/2363341 2363341 https://errata.almalinux.org/9/ALSA-2025-9080.html ALSA-2025:9080 ALSA-2025:9080 Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm %Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm "Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpm Ukernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm !Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-tools-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-tools-libs-5.14.0-570.22.1.el9_6.x86_64.rpm %Ukernel-uki-virt-addons-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm "Ukernel-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-abi-stablelists-5.14.0-570.22.1.el9_6.noarch.rpm Ukernel-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-modules-5.14.0-570.22.1.el9_6.x86_64.rpm !Ukernel-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-uki-virt-5.14.0-570.22.1.el9_6.x86_64.rpm Ukernel-debug-5.14.0-570.22.1.el9_6.x86_64.rpm ��1�[
��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��
�https://access.redhat.com/errata/RHSA-2025:9302 RHSA-2025:9302 RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883 CVE-2025-21883 CVE-2025-21883 https://access.redhat.com/security/cve/CVE-2025-21919 CVE-2025-21919 CVE-2025-21919 https://access.redhat.com/security/cve/CVE-2025-22104 CVE-2025-22104 CVE-2025-22104 https://access.redhat.com/security/cve/CVE-2025-23150 CVE-2025-23150 CVE-2025-23150 https://access.redhat.com/security/cve/CVE-2025-37738 CVE-2025-37738 CVE-2025-37738 https://bugzilla.redhat.com/2355415 2355415 https://bugzilla.redhat.com/2356618 2356618 https://bugzilla.redhat.com/2360265 2360265 https://bugzilla.redhat.com/2363268 2363268 https://bugzilla.redhat.com/2363305 2363305 https://errata.almalinux.org/9/ALSA-2025-9302.html ALSA-2025:9302 ALSA-2025:9302 Vkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpm Vkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm "Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm %Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm !Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-abi-stablelists-5.14.0-570.23.1.el9_6.noarch.rpm Vkernel-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm "Vkernel-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-tools-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-uki-virt-5.14.0-570.23.1.el9_6.x86_64.rpm %Vkernel-uki-virt-addons-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-modules-5.14.0-570.23.1.el9_6.x86_64.rpm !Vkernel-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-tools-libs-5.14.0-570.23.1.el9_6.x86_64.rpm Vkernel-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpm �Ù�G�\
��CBBBBBBBBBBBBBBBsecurity Moderate: krb5 security update &��$�https://access.redhat.com/errata/RHSA-2025:9430 RHSA-2025:9430 RHSA-2025:9430 https://access.redhat.com/security/cve/CVE-2025-3576 CVE-2025-3576 CVE-2025-3576 https://bugzilla.redhat.com/2359465 2359465 https://errata.almalinux.org/9/ALSA-2025-9430.html ALSA-2025:9430 ALSA-2025:9430 �&�libkadm5-1.21.1-8.el9_6.i686.rpm �$�krb5-server-1.21.1-8.el9_6.i686.rpm �%�krb5-server-ldap-1.21.1-8.el9_6.i686.rpm �"�krb5-libs-1.21.1-8.el9_6.i686.rpm �%�krb5-server-ldap-1.21.1-8.el9_6.x86_64.rpm �"�krb5-libs-1.21.1-8.el9_6.x86_64.rpm �#�krb5-pkinit-1.21.1-8.el9_6.i686.rpm �$�krb5-server-1.21.1-8.el9_6.x86_64.rpm �l�krb5-workstation-1.21.1-8.el9_6.x86_64.rpm �&�libkadm5-1.21.1-8.el9_6.x86_64.rpm �#�krb5-pkinit-1.21.1-8.el9_6.x86_64.rpm �&�libkadm5-1.21.1-8.el9_6.i686.rpm �$�krb5-server-1.21.1-8.el9_6.i686.rpm �%�krb5-server-ldap-1.21.1-8.el9_6.i686.rpm �"�krb5-libs-1.21.1-8.el9_6.i686.rpm �%�krb5-server-ldap-1.21.1-8.el9_6.x86_64.rpm �"�krb5-libs-1.21.1-8.el9_6.x86_64.rpm �#�krb5-pkinit-1.21.1-8.el9_6.i686.rpm �$�krb5-server-1.21.1-8.el9_6.x86_64.rpm �l�krb5-workstation-1.21.1-8.el9_6.x86_64.rpm �&�libkadm5-1.21.1-8.el9_6.x86_64.rpm �#�krb5-pkinit-1.21.1-8.el9_6.x86_64.rpm ��N�]
��TBsecurity Moderate: libarchive security update &��<�Rhttps://access.redhat.com/errata/RHSA-2025:9431 RHSA-2025:9431 RHSA-2025:9431 https://access.redhat.com/security/cve/CVE-2025-25724 CVE-2025-25724 CVE-2025-25724 https://bugzilla.redhat.com/2349221 2349221 https://errata.almalinux.org/9/ALSA-2025-9431.html ALSA-2025:9431 ALSA-2025:9431 �?�libarchive-3.5.3-5.el9_6.x86_64.rpm �?�libarchive-3.5.3-5.el9_6.i686.rpm �?�libarchive-3.5.3-5.el9_6.x86_64.rpm �?�libarchive-3.5.3-5.el9_6.i686.rpm ��@�^
��Wsecurity Moderate: iputils security update &���https://access.redhat.com/errata/RHSA-2025:9432 RHSA-2025:9432 RHSA-2025:9432 https://access.redhat.com/security/cve/CVE-2025-47268 CVE-2025-47268 CVE-2025-47268 https://bugzilla.redhat.com/2364090 2364090 https://errata.almalinux.org/9/ALSA-2025-9432.html ALSA-2025:9432 ALSA-2025:9432 �a�iputils-20210202-11.el9_6.1.x86_64.rpm �a�iputils-20210202-11.el9_6.1.x86_64.rpm ��H�_
��YBsecurity Important: pam security update &+�� �0https://access.redhat.com/errata/RHSA-2025:9526 RHSA-2025:9526 RHSA-2025:9526 https://access.redhat.com/security/cve/CVE-2025-6020 CVE-2025-6020 CVE-2025-6020 https://bugzilla.redhat.com/2372512 2372512 https://errata.almalinux.org/9/ALSA-2025-9526.html ALSA-2025:9526 ALSA-2025:9526 �A�^pam-1.5.1-25.el9_6.i686.rpm �A�^pam-1.5.1-25.el9_6.x86_64.rpm �A�^pam-1.5.1-25.el9_6.i686.rpm �A�^pam-1.5.1-25.el9_6.x86_64.rpm ���&�`
��\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: glibc security update &��P�2https://access.redhat.com/errata/RHSA-2025:9877 RHSA-2025:9877 RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702 CVE-2025-5702 CVE-2025-5702 https://bugzilla.redhat.com/2370472 2370472 https://errata.almalinux.org/9/ALSA-2025-9877.html ALSA-2025:9877 ALSA-2025:9877 �P� glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpm �H glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm �; glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpm �K glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm �0 glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm �D glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm �h glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm �5 glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpm �} glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm �0 glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpm �W glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm �2 glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpm �\ glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpm �r glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm �- glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpm �N glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm �% glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm �9 glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm �) glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm �* glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpm �o glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm �+ glibc-2.34-168.el9_6.20.x86_64.rpm �T glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm �F glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm �C glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm �! glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpm �O glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpm �_ glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm �! glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpm �T glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpm �u glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm �> glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm �2 glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm �E glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm �. glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpm �J glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm �G glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm �& glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm �A glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm �, glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm � glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm �B glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm �8 glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm �
glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpm �L glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpm �t glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm �> glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm �& glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpm �M glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm �6 glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm �- libnsl-2.34-168.el9_6.20.i686.rpm �1 glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpm �M glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm �, glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpm �x glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm �E glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm �B glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpm �| glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm �/ glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm �" glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm �g glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpm �P glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpm �Z glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm �3 glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm �f glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpm �Q glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm �4 glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm �$ glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpm �K glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpm �{ glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm �, glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpm �L glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpm �a glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpm �b glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm �G glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm �@ glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm �' glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm �H glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpm �] glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm �: glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm �( glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm �% glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpm �s glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm �: glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpm �c glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm �' glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpm �n glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpm �S glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm �( glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpm �q glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm �+ glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpm �~ glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpm �U nscd-2.34-168.el9_6.20.x86_64.rpm �4 glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpm �U glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpm �R glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm �# glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpm �[ glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpm �I glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpm �y glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm �@ glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm �C glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpm �k glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpm �R glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm �
glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpm �` glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm �A glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpm �S glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpm �N glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpm �w glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm �, glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm �5 glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm �9 glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm �8 glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpm �Y glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm �F glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpm �d glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm �D glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpm �p glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm �< glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpm �O glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm �$ glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm �+ glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpm �Q glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm �+ glibc-2.34-168.el9_6.20.i686.rpm �V glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm �< glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm �e glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpm �J glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm �? glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpm �i glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpm �^ glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm �/ glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm �* glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpm �j glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm �" glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm �7 glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm �- libnsl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm �- glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpm �m glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm �6 glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpm �I glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpm �P glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpm �z glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm �= glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm �? glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpm �v glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm �) glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm �7 glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm �= glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpm �l glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpm �X glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm �. glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm �# glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm �1 glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm �
glibc-common-2.34-168.el9_6.20.x86_64.rpm �3 glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm �; glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpm �P� glibc-all-langpacks-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ps-2.34-168.el9_6.20.x86_64.rpm �H glibc-langpack-gl-2.34-168.el9_6.20.x86_64.rpm �; glibc-langpack-tl-2.34-168.el9_6.20.x86_64.rpm �K glibc-langpack-ha-2.34-168.el9_6.20.x86_64.rpm �0 glibc-langpack-sw-2.34-168.el9_6.20.x86_64.rpm �D glibc-langpack-fy-2.34-168.el9_6.20.x86_64.rpm �h glibc-langpack-kw-2.34-168.el9_6.20.x86_64.rpm �5 glibc-langpack-tg-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bi-2.34-168.el9_6.20.x86_64.rpm �} glibc-langpack-mn-2.34-168.el9_6.20.x86_64.rpm �0 glibc-langpack-cy-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nds-2.34-168.el9_6.20.x86_64.rpm �W glibc-langpack-id-2.34-168.el9_6.20.x86_64.rpm �2 glibc-langpack-de-2.34-168.el9_6.20.x86_64.rpm �\ glibc-langpack-iu-2.34-168.el9_6.20.x86_64.rpm �r glibc-langpack-lzh-2.34-168.el9_6.20.x86_64.rpm �- glibc-langpack-cs-2.34-168.el9_6.20.x86_64.rpm �N glibc-langpack-yi-2.34-168.el9_6.20.x86_64.rpm �% glibc-langpack-si-2.34-168.el9_6.20.x86_64.rpm �9 glibc-langpack-eo-2.34-168.el9_6.20.x86_64.rpm �) glibc-langpack-chr-2.34-168.el9_6.20.x86_64.rpm �* glibc-langpack-ckb-2.34-168.el9_6.20.x86_64.rpm �o glibc-langpack-lo-2.34-168.el9_6.20.x86_64.rpm �+ glibc-2.34-168.el9_6.20.x86_64.rpm �T glibc-minimal-langpack-2.34-168.el9_6.20.x86_64.rpm �F glibc-langpack-gd-2.34-168.el9_6.20.x86_64.rpm �C glibc-langpack-uk-2.34-168.el9_6.20.x86_64.rpm �! glibc-langpack-se-2.34-168.el9_6.20.x86_64.rpm �O glibc-langpack-hif-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-aa-2.34-168.el9_6.20.x86_64.rpm �_ glibc-langpack-kab-2.34-168.el9_6.20.x86_64.rpm �! glibc-langpack-bn-2.34-168.el9_6.20.x86_64.rpm �T glibc-langpack-hu-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ak-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-or-2.34-168.el9_6.20.x86_64.rpm �u glibc-langpack-mfe-2.34-168.el9_6.20.x86_64.rpm �> glibc-langpack-ff-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bem-2.34-168.el9_6.20.x86_64.rpm �2 glibc-langpack-ta-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ast-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-mr-2.34-168.el9_6.20.x86_64.rpm �E glibc-langpack-ga-2.34-168.el9_6.20.x86_64.rpm �. glibc-langpack-st-2.34-168.el9_6.20.x86_64.rpm �J glibc-langpack-gv-2.34-168.el9_6.20.x86_64.rpm �G glibc-langpack-gez-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-niu-2.34-168.el9_6.20.x86_64.rpm �& glibc-langpack-sid-2.34-168.el9_6.20.x86_64.rpm �A glibc-langpack-fo-2.34-168.el9_6.20.x86_64.rpm �, glibc-gconv-extra-2.34-168.el9_6.20.i686.rpm � glibc-langpack-ru-2.34-168.el9_6.20.x86_64.rpm �B glibc-langpack-fr-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pl-2.34-168.el9_6.20.x86_64.rpm �8 glibc-langpack-en-2.34-168.el9_6.20.x86_64.rpm �
glibc-langpack-nl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sa-2.34-168.el9_6.20.x86_64.rpm �L glibc-langpack-wo-2.34-168.el9_6.20.x86_64.rpm �t glibc-langpack-mai-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pap-2.34-168.el9_6.20.x86_64.rpm �> glibc-langpack-tpi-2.34-168.el9_6.20.x86_64.rpm �& glibc-langpack-byn-2.34-168.el9_6.20.x86_64.rpm �M glibc-langpack-xh-2.34-168.el9_6.20.x86_64.rpm �6 glibc-langpack-dz-2.34-168.el9_6.20.x86_64.rpm �- libnsl-2.34-168.el9_6.20.i686.rpm �1 glibc-langpack-da-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bho-2.34-168.el9_6.20.x86_64.rpm �M glibc-langpack-he-2.34-168.el9_6.20.x86_64.rpm �, glibc-langpack-sr-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-om-2.34-168.el9_6.20.x86_64.rpm �x glibc-langpack-mi-2.34-168.el9_6.20.x86_64.rpm �E glibc-langpack-ur-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-be-2.34-168.el9_6.20.x86_64.rpm �B glibc-langpack-ug-2.34-168.el9_6.20.x86_64.rpm �| glibc-langpack-ml-2.34-168.el9_6.20.x86_64.rpm �/ glibc-langpack-sv-2.34-168.el9_6.20.x86_64.rpm �" glibc-langpack-bo-2.34-168.el9_6.20.x86_64.rpm �g glibc-langpack-ku-2.34-168.el9_6.20.x86_64.rpm �P glibc-langpack-yue-2.34-168.el9_6.20.x86_64.rpm �Z glibc-langpack-is-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ro-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-af-2.34-168.el9_6.20.x86_64.rpm �3 glibc-langpack-tcy-2.34-168.el9_6.20.x86_64.rpm �f glibc-langpack-ks-2.34-168.el9_6.20.x86_64.rpm �Q glibc-langpack-hr-2.34-168.el9_6.20.x86_64.rpm �4 glibc-langpack-te-2.34-168.el9_6.20.x86_64.rpm �$ glibc-langpack-shs-2.34-168.el9_6.20.x86_64.rpm �K glibc-langpack-wal-2.34-168.el9_6.20.x86_64.rpm �{ glibc-langpack-mk-2.34-168.el9_6.20.x86_64.rpm �, glibc-gconv-extra-2.34-168.el9_6.20.x86_64.rpm �L glibc-langpack-hak-2.34-168.el9_6.20.x86_64.rpm �a glibc-langpack-kl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-as-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nb-2.34-168.el9_6.20.x86_64.rpm �b glibc-langpack-km-2.34-168.el9_6.20.x86_64.rpm �G glibc-langpack-ve-2.34-168.el9_6.20.x86_64.rpm �@ glibc-langpack-fil-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-mnw-2.34-168.el9_6.20.x86_64.rpm �' glibc-langpack-sk-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nan-2.34-168.el9_6.20.x86_64.rpm �H glibc-langpack-vi-2.34-168.el9_6.20.x86_64.rpm �] glibc-langpack-ja-2.34-168.el9_6.20.x86_64.rpm �: glibc-langpack-es-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bhb-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-rw-2.34-168.el9_6.20.x86_64.rpm �( glibc-langpack-ce-2.34-168.el9_6.20.x86_64.rpm �% glibc-langpack-bs-2.34-168.el9_6.20.x86_64.rpm �s glibc-langpack-mag-2.34-168.el9_6.20.x86_64.rpm �: glibc-langpack-tk-2.34-168.el9_6.20.x86_64.rpm �c glibc-langpack-kn-2.34-168.el9_6.20.x86_64.rpm �' glibc-langpack-ca-2.34-168.el9_6.20.x86_64.rpm �n glibc-langpack-ln-2.34-168.el9_6.20.x86_64.rpm �S glibc-langpack-ht-2.34-168.el9_6.20.x86_64.rpm �( glibc-langpack-sl-2.34-168.el9_6.20.x86_64.rpm �q glibc-langpack-lv-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pt-2.34-168.el9_6.20.x86_64.rpm �+ glibc-langpack-sq-2.34-168.el9_6.20.x86_64.rpm �~ glibc-langpack-mni-2.34-168.el9_6.20.x86_64.rpm �U nscd-2.34-168.el9_6.20.x86_64.rpm �4 glibc-langpack-dsb-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sc-2.34-168.el9_6.20.x86_64.rpm �U glibc-langpack-hy-2.34-168.el9_6.20.x86_64.rpm �R glibc-langpack-hsb-2.34-168.el9_6.20.x86_64.rpm �# glibc-langpack-br-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ne-2.34-168.el9_6.20.x86_64.rpm �[ glibc-langpack-it-2.34-168.el9_6.20.x86_64.rpm �I glibc-langpack-wa-2.34-168.el9_6.20.x86_64.rpm �y glibc-langpack-miq-2.34-168.el9_6.20.x86_64.rpm �@ glibc-langpack-ts-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-os-2.34-168.el9_6.20.x86_64.rpm �C glibc-langpack-fur-2.34-168.el9_6.20.x86_64.rpm �k glibc-langpack-lg-2.34-168.el9_6.20.x86_64.rpm �R glibc-langpack-zh-2.34-168.el9_6.20.x86_64.rpm �
glibc-langpack-nso-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ber-2.34-168.el9_6.20.x86_64.rpm �` glibc-langpack-kk-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ms-2.34-168.el9_6.20.x86_64.rpm �A glibc-langpack-tt-2.34-168.el9_6.20.x86_64.rpm �S glibc-langpack-zu-2.34-168.el9_6.20.x86_64.rpm �N glibc-langpack-hi-2.34-168.el9_6.20.x86_64.rpm �w glibc-langpack-mhr-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nn-2.34-168.el9_6.20.x86_64.rpm �, glibc-langpack-crh-2.34-168.el9_6.20.x86_64.rpm �5 glibc-langpack-dv-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-az-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-am-2.34-168.el9_6.20.x86_64.rpm �9 glibc-langpack-tig-2.34-168.el9_6.20.x86_64.rpm �8 glibc-langpack-ti-2.34-168.el9_6.20.x86_64.rpm �Y glibc-langpack-ik-2.34-168.el9_6.20.x86_64.rpm �F glibc-langpack-uz-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-agr-2.34-168.el9_6.20.x86_64.rpm �d glibc-langpack-ko-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-an-2.34-168.el9_6.20.x86_64.rpm �D glibc-langpack-unm-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-quz-2.34-168.el9_6.20.x86_64.rpm �p glibc-langpack-lt-2.34-168.el9_6.20.x86_64.rpm �< glibc-langpack-eu-2.34-168.el9_6.20.x86_64.rpm �O glibc-langpack-yo-2.34-168.el9_6.20.x86_64.rpm �$ glibc-langpack-brx-2.34-168.el9_6.20.x86_64.rpm �+ glibc-langpack-cmn-2.34-168.el9_6.20.x86_64.rpm �Q glibc-langpack-yuw-2.34-168.el9_6.20.x86_64.rpm �+ glibc-2.34-168.el9_6.20.i686.rpm �V glibc-langpack-ia-2.34-168.el9_6.20.x86_64.rpm �< glibc-langpack-tn-2.34-168.el9_6.20.x86_64.rpm �e glibc-langpack-kok-2.34-168.el9_6.20.x86_64.rpm �J glibc-langpack-wae-2.34-168.el9_6.20.x86_64.rpm �? glibc-langpack-tr-2.34-168.el9_6.20.x86_64.rpm �i glibc-langpack-ky-2.34-168.el9_6.20.x86_64.rpm �^ glibc-langpack-ka-2.34-168.el9_6.20.x86_64.rpm �/ glibc-langpack-cv-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ar-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-bg-2.34-168.el9_6.20.x86_64.rpm �* glibc-langpack-so-2.34-168.el9_6.20.x86_64.rpm �j glibc-langpack-lb-2.34-168.el9_6.20.x86_64.rpm �" glibc-langpack-sgs-2.34-168.el9_6.20.x86_64.rpm �7 glibc-langpack-el-2.34-168.el9_6.20.x86_64.rpm �- libnsl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-pa-2.34-168.el9_6.20.x86_64.rpm �- glibc-langpack-ss-2.34-168.el9_6.20.x86_64.rpm �m glibc-langpack-lij-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-my-2.34-168.el9_6.20.x86_64.rpm �6 glibc-langpack-th-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sah-2.34-168.el9_6.20.x86_64.rpm �I glibc-langpack-gu-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-anp-2.34-168.el9_6.20.x86_64.rpm �P glibc-langpack-hne-2.34-168.el9_6.20.x86_64.rpm �z glibc-langpack-mjw-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nhn-2.34-168.el9_6.20.x86_64.rpm �= glibc-langpack-to-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sat-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-sd-2.34-168.el9_6.20.x86_64.rpm �? glibc-langpack-fi-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-mt-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-nr-2.34-168.el9_6.20.x86_64.rpm �v glibc-langpack-mg-2.34-168.el9_6.20.x86_64.rpm �) glibc-langpack-sm-2.34-168.el9_6.20.x86_64.rpm �7 glibc-langpack-the-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-raj-2.34-168.el9_6.20.x86_64.rpm �= glibc-langpack-fa-2.34-168.el9_6.20.x86_64.rpm �l glibc-langpack-li-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-oc-2.34-168.el9_6.20.x86_64.rpm �X glibc-langpack-ig-2.34-168.el9_6.20.x86_64.rpm �. glibc-langpack-csb-2.34-168.el9_6.20.x86_64.rpm �# glibc-langpack-shn-2.34-168.el9_6.20.x86_64.rpm �1 glibc-langpack-szl-2.34-168.el9_6.20.x86_64.rpm � glibc-langpack-ayc-2.34-168.el9_6.20.x86_64.rpm �
glibc-common-2.34-168.el9_6.20.x86_64.rpm �3 glibc-langpack-doi-2.34-168.el9_6.20.x86_64.rpm �; glibc-langpack-et-2.34-168.el9_6.20.x86_64.rpm ��a�a
���yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update &��� https://access.redhat.com/errata/RHSA-2025:9880 RHSA-2025:9880 RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933 CVE-2023-52933 CVE-2023-52933 https://bugzilla.redhat.com/2355476 2355476 https://errata.almalinux.org/9/ALSA-2025-9880.html ALSA-2025:9880 ALSA-2025:9880 Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpm Wkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm !Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm "Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm %Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-abi-stablelists-5.14.0-570.24.1.el9_6.noarch.rpm Wkernel-debug-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-modules-extra-5.14.0-570.24.1.el9_6.x86_64.rpm !Wkernel-modules-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-modules-5.14.0-570.24.1.el9_6.x86_64.rpm "Wkernel-uki-virt-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-tools-libs-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-tools-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-core-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-5.14.0-570.24.1.el9_6.x86_64.rpm %Wkernel-uki-virt-addons-5.14.0-570.24.1.el9_6.x86_64.rpm Wkernel-debug-modules-5.14.0-570.24.1.el9_6.x86_64.rpm ���b
���Xsecurity Important: sudo security update &+���shttps://access.redhat.com/errata/RHSA-2025:9978 RHSA-2025:9978 RHSA-2025:9978 https://access.redhat.com/security/cve/CVE-2025-32462 CVE-2025-32462 CVE-2025-32462 https://bugzilla.redhat.com/2374692 2374692 https://errata.almalinux.org/9/ALSA-2025-9978.html ALSA-2025:9978 ALSA-2025:9978 �L�sudo-1.9.5p2-10.el9_6.1.x86_64.rpm �L�sudo-1.9.5p2-10.el9_6.1.x86_64.rpm ��z�c
����Zsecurity Moderate: tar security update �'��~�bhttps://access.redhat.com/errata/RHSA-2026:0067 RHSA-2026:0067 RHSA-2026:0067 https://access.redhat.com/security/cve/CVE-2025-45582 CVE-2025-45582 CVE-2025-45582 https://bugzilla.redhat.com/2379592 2379592 https://errata.almalinux.org/9/ALSA-2026-0067.html ALSA-2026:0067 ALSA-2026:0067 ��#tar-1.34-9.el9_7.x86_64.rpm ��#tar-1.34-9.el9_7.x86_64.rpm �˘�n�d
���]Bsecurity Important: libpng security update �'+��`�https://access.redhat.com/errata/RHSA-2026:0238 RHSA-2026:0238 RHSA-2026:0238 https://access.redhat.com/security/cve/CVE-2025-64720 CVE-2025-64720 CVE-2025-64720 https://access.redhat.com/security/cve/CVE-2025-65018 CVE-2025-65018 CVE-2025-65018 https://access.redhat.com/security/cve/CVE-2025-66293 CVE-2025-66293 CVE-2025-66293 https://bugzilla.redhat.com/2416904 2416904 https://bugzilla.redhat.com/2416907 2416907 https://bugzilla.redhat.com/2418711 2418711 https://errata.almalinux.org/9/ALSA-2026-0238.html ALSA-2026:0238 ALSA-2026:0238 �*�zlibpng-1.6.37-12.el9_7.1.x86_64.rpm �*�zlibpng-1.6.37-12.el9_7.1.i686.rpm �*�zlibpng-1.6.37-12.el9_7.1.x86_64.rpm �*�zlibpng-1.6.37-12.el9_7.1.i686.rpm ���U�e
���`Bsecurity Moderate: cups security update �'��}�https://access.redhat.com/errata/RHSA-2026:0312 RHSA-2026:0312 RHSA-2026:0312 https://access.redhat.com/security/cve/CVE-2025-58436 CVE-2025-58436 CVE-2025-58436 https://access.redhat.com/security/cve/CVE-2025-61915 CVE-2025-61915 CVE-2025-61915 https://bugzilla.redhat.com/2416039 2416039 https://bugzilla.redhat.com/2416040 2416040 https://errata.almalinux.org/9/ALSA-2026-0312.html ALSA-2026:0312 ALSA-2026:0312 �*�icups-libs-2.3.3op2-34.el9_7.2.i686.rpm �*�icups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm �*�icups-libs-2.3.3op2-34.el9_7.2.i686.rpm �*�icups-libs-2.3.3op2-34.el9_7.2.x86_64.rpm �˩�r�f
���cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'���0
https://access.redhat.com/errata/RHSA-2026:0445 RHSA-2026:0445 RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806 CVE-2025-39806 CVE-2025-39806 https://access.redhat.com/security/cve/CVE-2025-39840 CVE-2025-39840 CVE-2025-39840 https://access.redhat.com/security/cve/CVE-2025-39883 CVE-2025-39883 CVE-2025-39883 https://access.redhat.com/security/cve/CVE-2025-40240 CVE-2025-40240 CVE-2025-40240 https://bugzilla.redhat.com/2395807 2395807 https://bugzilla.redhat.com/2396936 2396936 https://bugzilla.redhat.com/2397553 2397553 https://bugzilla.redhat.com/2418832 2418832 https://errata.almalinux.org/9/ALSA-2026-0445.html ALSA-2026:0445 ALSA-2026:0445 nkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm nkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm %nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm !nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm "nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-modules-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-core-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-modules-extra-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-tools-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-modules-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-abi-stablelists-5.14.0-611.20.1.el9_7.noarch.rpm nkernel-tools-libs-5.14.0-611.20.1.el9_7.x86_64.rpm %nkernel-uki-virt-addons-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm !nkernel-modules-core-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm nkernel-debug-core-5.14.0-611.20.1.el9_7.x86_64.rpm "nkernel-uki-virt-5.14.0-611.20.1.el9_7.x86_64.rpm �˩�X�g
���Bsecurity Important: gnupg2 security update �'+��/�bhttps://access.redhat.com/errata/RHSA-2026:0719 RHSA-2026:0719 RHSA-2026:0719 https://access.redhat.com/security/cve/CVE-2025-68973 CVE-2025-68973 CVE-2025-68973 https://bugzilla.redhat.com/2425966 2425966 https://errata.almalinux.org/9/ALSA-2026-0719.html ALSA-2026:0719 ALSA-2026:0719 �`�gnupg2-2.3.3-5.el9_7.x86_64.rpm �`�gnupg2-2.3.3-5.el9_7.x86_64.rpm �˧�i�h
���DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update �'+���+https://access.redhat.com/errata/RHSA-2026:0793 RHSA-2026:0793 RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703 CVE-2025-38703 CVE-2025-38703 https://access.redhat.com/security/cve/CVE-2025-39933 CVE-2025-39933 CVE-2025-39933 https://access.redhat.com/security/cve/CVE-2025-40277 CVE-2025-40277 CVE-2025-40277 https://access.redhat.com/security/cve/CVE-2025-68285 CVE-2025-68285 CVE-2025-68285 https://access.redhat.com/security/cve/CVE-2025-68287 CVE-2025-68287 CVE-2025-68287 https://bugzilla.redhat.com/2393157 2393157 https://bugzilla.redhat.com/2401432 2401432 https://bugzilla.redhat.com/2419954 2419954 https://bugzilla.redhat.com/2422788 2422788 https://bugzilla.redhat.com/2422801 2422801 https://errata.almalinux.org/9/ALSA-2026-0793.html ALSA-2026:0793 ALSA-2026:0793 okernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm okernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm %okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm "okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm !okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-modules-extra-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-tools-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-abi-stablelists-5.14.0-611.24.1.el9_7.noarch.rpm okernel-debug-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm %okernel-uki-virt-addons-5.14.0-611.24.1.el9_7.x86_64.rpm "okernel-uki-virt-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-modules-5.14.0-611.24.1.el9_7.x86_64.rpm !okernel-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-modules-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-debug-modules-core-5.14.0-611.24.1.el9_7.x86_64.rpm okernel-tools-libs-5.14.0-611.24.1.el9_7.x86_64.rpm �����i
���cBsecurity Moderate: glib2 security update �'��<�https://access.redhat.com/errata/RHSA-2026:0936 RHSA-2026:0936 RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601 CVE-2025-13601 CVE-2025-13601 https://bugzilla.redhat.com/2416741 2416741 https://errata.almalinux.org/9/ALSA-2026-0936.html ALSA-2026:0936 ALSA-2026:0936 �U�wglib2-2.68.4-18.el9_7.1.i686.rpm �U�wglib2-2.68.4-18.el9_7.1.x86_64.rpm �U�wglib2-2.68.4-18.el9_7.1.i686.rpm �U�wglib2-2.68.4-18.el9_7.1.x86_64.rpm ����d�j
��'��&security Important: python-urllib3 security update �'+��Y�7https://access.redhat.com/errata/RHSA-2026:1087 RHSA-2026:1087 RHSA-2026:1087 https://access.redhat.com/security/cve/CVE-2025-66418 CVE-2025-66418 CVE-2025-66418 https://access.redhat.com/security/cve/CVE-2025-66471 CVE-2025-66471 CVE-2025-66471 https://access.redhat.com/security/cve/CVE-2026-21441 CVE-2026-21441 CVE-2026-21441 https://bugzilla.redhat.com/2419455 2419455 https://bugzilla.redhat.com/2419467 2419467 https://bugzilla.redhat.com/2427726 2427726 https://errata.almalinux.org/9/ALSA-2026-1087.html ALSA-2026:1087 ALSA-2026:1087 �G�python3-urllib3-1.26.5-6.el9_7.1.noarch.rpm �G�python3-urllib3-1.26.5-6.el9_7.1.noarch.rpm ����
�k
���hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update �'+���https://access.redhat.com/errata/RHSA-2026:1143 RHSA-2026:1143 RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141 CVE-2025-38141 CVE-2025-38141 https://access.redhat.com/security/cve/CVE-2025-38349 CVE-2025-38349 CVE-2025-38349 https://access.redhat.com/security/cve/CVE-2025-38731 CVE-2025-38731 CVE-2025-38731 https://access.redhat.com/security/cve/CVE-2025-40248 CVE-2025-40248 CVE-2025-40248 https://access.redhat.com/security/cve/CVE-2025-40258 CVE-2025-40258 CVE-2025-40258 https://access.redhat.com/security/cve/CVE-2025-40294 CVE-2025-40294 CVE-2025-40294 https://access.redhat.com/security/cve/CVE-2025-68301 CVE-2025-68301 CVE-2025-68301 https://access.redhat.com/security/cve/CVE-2025-68305 CVE-2025-68305 CVE-2025-68305 https://bugzilla.redhat.com/2376052 2376052 https://bugzilla.redhat.com/2381870 2381870 https://bugzilla.redhat.com/2393488 2393488 https://bugzilla.redhat.com/2418872 2418872 https://bugzilla.redhat.com/2418876 2418876 https://bugzilla.redhat.com/2419891 2419891 https://bugzilla.redhat.com/2422836 2422836 https://bugzilla.redhat.com/2422840 2422840 https://errata.almalinux.org/9/ALSA-2026-1143.html ALSA-2026:1143 ALSA-2026:1143 %pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm !pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm "pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpm pkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm %pkernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm !pkernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm "pkernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpm pkernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-core-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm pkernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm ���;�l
���GBBBBBBBBsecurity Moderate: curl security update �'��-�Ahttps://access.redhat.com/errata/RHSA-2026:1350 RHSA-2026:1350 RHSA-2026:1350 https://access.redhat.com/security/cve/CVE-2025-9086 CVE-2025-9086 CVE-2025-9086 https://bugzilla.redhat.com/2394750 2394750 https://errata.almalinux.org/9/ALSA-2026-1350.html ALSA-2026:1350 ALSA-2026:1350 �(�Mcurl-7.76.1-35.el9_7.3.x86_64.rpm z�Mlibcurl-7.76.1-35.el9_7.3.x86_64.rpm {�Mlibcurl-minimal-7.76.1-35.el9_7.3.i686.rpm �)�Mcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm z�Mlibcurl-7.76.1-35.el9_7.3.i686.rpm {�Mlibcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm �(�Mcurl-7.76.1-35.el9_7.3.x86_64.rpm z�Mlibcurl-7.76.1-35.el9_7.3.x86_64.rpm {�Mlibcurl-minimal-7.76.1-35.el9_7.3.i686.rpm �)�Mcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm z�Mlibcurl-7.76.1-35.el9_7.3.i686.rpm {�Mlibcurl-minimal-7.76.1-35.el9_7.3.x86_64.rpm ���
�m
� ��QBBBsecurity Important: openssl security update �'+��n�Lhttps://access.redhat.com/errata/RHSA-2026:1473 RHSA-2026:1473 RHSA-2026:1473 https://access.redhat.com/security/cve/CVE-2025-11187 CVE-2025-11187 CVE-2025-11187 https://access.redhat.com/security/cve/CVE-2025-15467 CVE-2025-15467 CVE-2025-15467 https://access.redhat.com/security/cve/CVE-2025-15468 CVE-2025-15468 CVE-2025-15468 https://access.redhat.com/security/cve/CVE-2025-15469 CVE-2025-15469 CVE-2025-15469 https://access.redhat.com/security/cve/CVE-2025-66199 CVE-2025-66199 CVE-2025-66199 https://access.redhat.com/security/cve/CVE-2025-68160 CVE-2025-68160 CVE-2025-68160 https://access.redhat.com/security/cve/CVE-2025-69418 CVE-2025-69418 CVE-2025-69418 https://access.redhat.com/security/cve/CVE-2025-69419 CVE-2025-69419 CVE-2025-69419 https://access.redhat.com/security/cve/CVE-2025-69420 CVE-2025-69420 CVE-2025-69420 https://access.redhat.com/security/cve/CVE-2025-69421 CVE-2025-69421 CVE-2025-69421 https://access.redhat.com/security/cve/CVE-2026-22795 CVE-2026-22795 CVE-2026-22795 https://access.redhat.com/security/cve/CVE-2026-22796 CVE-2026-22796 CVE-2026-22796 https://bugzilla.redhat.com/2430375 2430375 https://bugzilla.redhat.com/2430376 2430376 https://bugzilla.redhat.com/2430377 2430377 https://bugzilla.redhat.com/2430378 2430378 https://bugzilla.redhat.com/2430379 2430379 https://bugzilla.redhat.com/2430380 2430380 https://bugzilla.redhat.com/2430381 2430381 https://bugzilla.redhat.com/2430386 2430386 https://bugzilla.redhat.com/2430387 2430387 https://bugzilla.redhat.com/2430388 2430388 https://bugzilla.redhat.com/2430389 2430389 https://bugzilla.redhat.com/2430390 2430390 https://errata.almalinux.org/9/ALSA-2026-1473.html ALSA-2026:1473 ALSA-2026:1473 ��{openssl-libs-3.5.1-7.el9_7.i686.rpm ��{openssl-libs-3.5.1-7.el9_7.x86_64.rpm �7�{openssl-3.5.1-7.el9_7.x86_64.rpm ��{openssl-libs-3.5.1-7.el9_7.i686.rpm ��{openssl-libs-3.5.1-7.el9_7.x86_64.rpm �7�{openssl-3.5.1-7.el9_7.x86_64.rpm �̂��n
�!��VBBBsecurity Moderate: python3.9 security update �'��:�bhttps://access.redhat.com/errata/RHSA-2026:1478 RHSA-2026:1478 RHSA-2026:1478 https://access.redhat.com/security/cve/CVE-2025-12084 CVE-2025-12084 CVE-2025-12084 https://bugzilla.redhat.com/2418655 2418655 https://errata.almalinux.org/9/ALSA-2026-1478.html ALSA-2026:1478 ALSA-2026:1478 ��python3-3.9.25-3.el9_7.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.i686.rpm ��python3-3.9.25-3.el9_7.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.i686.rpm ����r�o
�"��[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'���Dhttps://access.redhat.com/errata/RHSA-2026:1617 RHSA-2026:1617 RHSA-2026:1617 https://access.redhat.com/security/cve/CVE-2025-38568 CVE-2025-38568 CVE-2025-38568 https://access.redhat.com/security/cve/CVE-2025-40154 CVE-2025-40154 CVE-2025-40154 https://access.redhat.com/security/cve/CVE-2025-40251 CVE-2025-40251 CVE-2025-40251 https://bugzilla.redhat.com/2389507 2389507 https://bugzilla.redhat.com/2414494 2414494 https://bugzilla.redhat.com/2418892 2418892 https://errata.almalinux.org/9/ALSA-2026-1617.html ALSA-2026:1617 ALSA-2026:1617 qkernel-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm "qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm %qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm !qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-abi-stablelists-5.14.0-611.27.1.el9_7.noarch.rpm qkernel-debug-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-modules-5.14.0-611.27.1.el9_7.x86_64.rpm "qkernel-uki-virt-5.14.0-611.27.1.el9_7.x86_64.rpm %qkernel-uki-virt-addons-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-tools-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-tools-libs-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm !qkernel-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-modules-extra-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-modules-core-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-modules-5.14.0-611.27.1.el9_7.x86_64.rpm qkernel-debug-core-5.14.0-611.27.1.el9_7.x86_64.rpm �̖�L�p
�#��zBBBBBBBBBBBBBBBBBBBsecurity Moderate: util-linux security update �'��`�https://access.redhat.com/errata/RHSA-2026:1913 RHSA-2026:1913 RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104 CVE-2025-14104 CVE-2025-14104 https://bugzilla.redhat.com/2419369 2419369 https://errata.almalinux.org/9/ALSA-2026-1913.html ALSA-2026:1913 ALSA-2026:1913
�|�util-linux-user-2.37.4-21.el9_7.x86_64.rpm �{�util-linux-core-2.37.4-21.el9_7.x86_64.rpm �2�libsmartcols-2.37.4-21.el9_7.x86_64.rpm �2�libsmartcols-2.37.4-21.el9_7.i686.rpm �.�libmount-2.37.4-21.el9_7.x86_64.rpm �6�libuuid-2.37.4-21.el9_7.x86_64.rpm �z�util-linux-2.37.4-21.el9_7.x86_64.rpm �.�libmount-2.37.4-21.el9_7.i686.rpm �"�libblkid-2.37.4-21.el9_7.i686.rpm �'�libfdisk-2.37.4-21.el9_7.i686.rpm �6�libuuid-2.37.4-21.el9_7.i686.rpm �'�libfdisk-2.37.4-21.el9_7.x86_64.rpm �"�libblkid-2.37.4-21.el9_7.x86_64.rpm
�|�util-linux-user-2.37.4-21.el9_7.x86_64.rpm �{�util-linux-core-2.37.4-21.el9_7.x86_64.rpm �2�libsmartcols-2.37.4-21.el9_7.x86_64.rpm �2�libsmartcols-2.37.4-21.el9_7.i686.rpm �.�libmount-2.37.4-21.el9_7.x86_64.rpm �6�libuuid-2.37.4-21.el9_7.x86_64.rpm �z�util-linux-2.37.4-21.el9_7.x86_64.rpm �.�libmount-2.37.4-21.el9_7.i686.rpm �"�libblkid-2.37.4-21.el9_7.i686.rpm �'�libfdisk-2.37.4-21.el9_7.i686.rpm �6�libuuid-2.37.4-21.el9_7.i686.rpm �'�libfdisk-2.37.4-21.el9_7.x86_64.rpm �"�libblkid-2.37.4-21.el9_7.x86_64.rpm �̫�I�q
�$��OBsecurity Important: brotli security update �'+��|�https://access.redhat.com/errata/RHSA-2026:2042 RHSA-2026:2042 RHSA-2026:2042 https://access.redhat.com/security/cve/CVE-2025-6176 CVE-2025-6176 CVE-2025-6176 https://bugzilla.redhat.com/2408762 2408762 https://errata.almalinux.org/9/ALSA-2026-2042.html ALSA-2026:2042 ALSA-2026:2042 �#�Qlibbrotli-1.0.9-9.el9_7.x86_64.rpm �#�Qlibbrotli-1.0.9-9.el9_7.i686.rpm �#�Qlibbrotli-1.0.9-9.el9_7.x86_64.rpm �#�Qlibbrotli-1.0.9-9.el9_7.i686.rpm �̒�4�r
�%��RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'���u"https://access.redhat.com/errata/RHSA-2026:2212 RHSA-2026:2212 RHSA-2026:2212 https://access.redhat.com/security/cve/CVE-2025-37789 CVE-2025-37789 CVE-2025-37789 https://access.redhat.com/security/cve/CVE-2025-37819 CVE-2025-37819 CVE-2025-37819 https://access.redhat.com/security/cve/CVE-2025-38022 CVE-2025-38022 CVE-2025-38022 https://access.redhat.com/security/cve/CVE-2025-38024 CVE-2025-38024 CVE-2025-38024 https://access.redhat.com/security/cve/CVE-2025-38403 CVE-2025-38403 CVE-2025-38403 https://access.redhat.com/security/cve/CVE-2025-38415 CVE-2025-38415 CVE-2025-38415 https://access.redhat.com/security/cve/CVE-2025-38459 CVE-2025-38459 CVE-2025-38459 https://access.redhat.com/security/cve/CVE-2025-38730 CVE-2025-38730 CVE-2025-38730 https://access.redhat.com/security/cve/CVE-2025-39760 CVE-2025-39760 CVE-2025-39760 https://access.redhat.com/security/cve/CVE-2025-40135 CVE-2025-40135 CVE-2025-40135 https://access.redhat.com/security/cve/CVE-2025-40141 CVE-2025-40141 CVE-2025-40141 https://access.redhat.com/security/cve/CVE-2025-40158 CVE-2025-40158 CVE-2025-40158 https://access.redhat.com/security/cve/CVE-2025-40170 CVE-2025-40170 CVE-2025-40170 https://access.redhat.com/security/cve/CVE-2025-40269 CVE-2025-40269 CVE-2025-40269 https://access.redhat.com/security/cve/CVE-2025-40271 CVE-2025-40271 CVE-2025-40271 https://access.redhat.com/security/cve/CVE-2025-40318 CVE-2025-40318 CVE-2025-40318 https://bugzilla.redhat.com/2363315 2363315 https://bugzilla.redhat.com/2365032 2365032 https://bugzilla.redhat.com/2373326 2373326 https://bugzilla.redhat.com/2373354 2373354 https://bugzilla.redhat.com/2383404 2383404 https://bugzilla.redhat.com/2383421 2383421 https://bugzilla.redhat.com/2383487 2383487 https://bugzilla.redhat.com/2393191 2393191 https://bugzilla.redhat.com/2394601 2394601 https://bugzilla.redhat.com/2414506 2414506 https://bugzilla.redhat.com/2414521 2414521 https://bugzilla.redhat.com/2414522 2414522 https://bugzilla.redhat.com/2414523 2414523 https://bugzilla.redhat.com/2419837 2419837 https://bugzilla.redhat.com/2419919 2419919 https://bugzilla.redhat.com/2419920 2419920 https://errata.almalinux.org/9/ALSA-2026-2212.html ALSA-2026:2212 ALSA-2026:2212 "rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm !rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpm rkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm %rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm "rkernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm !rkernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpm rkernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-core-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm %rkernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-5.14.0-611.30.1.el9_7.x86_64.rpm rkernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm �̶�/�s
�&��qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'���https://access.redhat.com/errata/RHSA-2026:2722 RHSA-2026:2722 RHSA-2026:2722 https://access.redhat.com/security/cve/CVE-2023-53034 CVE-2023-53034 CVE-2023-53034 https://access.redhat.com/security/cve/CVE-2025-40064 CVE-2025-40064 CVE-2025-40064 https://access.redhat.com/security/cve/CVE-2025-40304 CVE-2025-40304 CVE-2025-40304 https://access.redhat.com/security/cve/CVE-2025-40322 CVE-2025-40322 CVE-2025-40322 https://access.redhat.com/security/cve/CVE-2025-68349 CVE-2025-68349 CVE-2025-68349 https://access.redhat.com/security/cve/CVE-2025-68811 CVE-2025-68811 CVE-2025-68811 https://access.redhat.com/security/cve/CVE-2026-22998 CVE-2026-22998 CVE-2026-22998 https://bugzilla.redhat.com/2360239 2360239 https://bugzilla.redhat.com/2406747 2406747 https://bugzilla.redhat.com/2419870 2419870 https://bugzilla.redhat.com/2419902 2419902 https://bugzilla.redhat.com/2424880 2424880 https://bugzilla.redhat.com/2429116 2429116 https://bugzilla.redhat.com/2432671 2432671 https://errata.almalinux.org/9/ALSA-2026-2722.html ALSA-2026:2722 ALSA-2026:2722 skernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpm skernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm "skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm %skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm !skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-abi-stablelists-5.14.0-611.34.1.el9_7.noarch.rpm skernel-modules-5.14.0-611.34.1.el9_7.x86_64.rpm "skernel-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-uki-virt-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-modules-extra-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-modules-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-tools-5.14.0-611.34.1.el9_7.x86_64.rpm %skernel-uki-virt-addons-5.14.0-611.34.1.el9_7.x86_64.rpm !skernel-modules-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-debug-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-core-5.14.0-611.34.1.el9_7.x86_64.rpm skernel-tools-libs-5.14.0-611.34.1.el9_7.x86_64.rpm ���:�t
�'��PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: glibc security update �'��'�|https://access.redhat.com/errata/RHSA-2026:2786 RHSA-2026:2786 RHSA-2026:2786 https://access.redhat.com/security/cve/CVE-2025-15281 CVE-2025-15281 CVE-2025-15281 https://access.redhat.com/security/cve/CVE-2026-0861 CVE-2026-0861 CVE-2026-0861 https://access.redhat.com/security/cve/CVE-2026-0915 CVE-2026-0915 CVE-2026-0915 https://bugzilla.redhat.com/2429771 2429771 https://bugzilla.redhat.com/2430201 2430201 https://bugzilla.redhat.com/2431196 2431196 https://errata.almalinux.org/9/ALSA-2026-2786.html ALSA-2026:2786 ALSA-2026:2786 �P�w
glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpm �M
glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpm �J
glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpm �Q
glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm �g
glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm �+
glibc-2.34-231.el9_7.10.i686.rpm �T
glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm �)
glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm �9
glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm �=
glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpm �Q
glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpm �p
glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm �(
glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm �:
glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm �#
glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpm �l
glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm �!
glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpm �K
glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm �4
glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm �<
glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm �8
glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm �@
glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm �6
glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpm �a
glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpm �V
glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpm �i
glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm �6
glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm �$
glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpm �c
glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpm �T
glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm �f
glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm �h
glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpm �U
glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm �%
glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm �"
glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm �C
glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm �/
glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm �D
glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm �2
glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpm �R
glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpm �q
glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm �A
glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpm �~
glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpm �x
glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpm �O
glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpm �^
glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm �?
glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm �+
glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpm �S
glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpm �S
glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpm �z
glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm �
glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm �+
glibc-2.34-231.el9_7.10.x86_64.rpm �4
glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm �%
glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm �)
glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpm �Y
glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpm �O
glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpm �I
glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm �(
glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm �A
glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm �9
glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpm �P
glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm �!
glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm �E
glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm �D
glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm �G
glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpm �o
glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpm �{
glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm �-
glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm �<
glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpm �n
glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm �5
glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm �.
glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm �&
glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm �.
glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm �"
glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpm �J
glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm �8
glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpm �j
glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm �>
glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm �B
glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm �G
glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm �'
glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm �-
libnsl-2.34-231.el9_7.10.i686.rpm �,
glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm �0
glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpm �N
glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpm �M
glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm �e
glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm �2
glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpm �_
glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpm �}
glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpm �I
glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm �H
glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpm �`
glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpm �N
glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm �
glibc-common-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpm �W
glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm �=
glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm �F
glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm �B
glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpm �u
glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm �,
glibc-gconv-extra-2.34-231.el9_7.10.i686.rpm �d
glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpm �t
glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpm �m
glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm �#
glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm �-
glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm �E
glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpm �[
glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpm �U
nscd-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpm �Z
glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm �5
glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm �7
glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm �0
glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm �,
glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpm �r
glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm �?
glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm �1
glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm �H
glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpm �v
glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm �&
glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpm �L
glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm �C
glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpm �R
glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpm �y
glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm �1
glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm �>
glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm �'
glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm �3
glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm �@
glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpm �X
glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpm �b
glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm �*
glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpm �s
glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm �-
libnsl-2.34-231.el9_7.10.x86_64.rpm �$
glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm �3
glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpm �K
glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpm �]
glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpm �L
glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm �/
glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpm �\
glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm �;
glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpm �P
glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm �7
glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm �:
glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm �+
glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpm �|
glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm �;
glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpm �k
glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm �,
glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm �F
glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm �*
glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpm �P�w
glibc-langpack-mhr-2.34-231.el9_7.10.x86_64.rpm �M
glibc-langpack-he-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-quz-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nan-2.34-231.el9_7.10.x86_64.rpm �J
glibc-langpack-gv-2.34-231.el9_7.10.x86_64.rpm �Q
glibc-langpack-yuw-2.34-231.el9_7.10.x86_64.rpm �g
glibc-langpack-ku-2.34-231.el9_7.10.x86_64.rpm �+
glibc-2.34-231.el9_7.10.i686.rpm �T
glibc-langpack-hu-2.34-231.el9_7.10.x86_64.rpm �)
glibc-langpack-chr-2.34-231.el9_7.10.x86_64.rpm �9
glibc-langpack-tig-2.34-231.el9_7.10.x86_64.rpm �=
glibc-langpack-to-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-anp-2.34-231.el9_7.10.x86_64.rpm �Q
glibc-langpack-hr-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ps-2.34-231.el9_7.10.x86_64.rpm �p
glibc-langpack-lt-2.34-231.el9_7.10.x86_64.rpm �(
glibc-langpack-sl-2.34-231.el9_7.10.x86_64.rpm �:
glibc-langpack-tk-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ne-2.34-231.el9_7.10.x86_64.rpm �#
glibc-langpack-shn-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ast-2.34-231.el9_7.10.x86_64.rpm �l
glibc-langpack-li-2.34-231.el9_7.10.x86_64.rpm �!
glibc-langpack-bn-2.34-231.el9_7.10.x86_64.rpm �K
glibc-langpack-wal-2.34-231.el9_7.10.x86_64.rpm �4
glibc-langpack-dsb-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sah-2.34-231.el9_7.10.x86_64.rpm �<
glibc-langpack-tn-2.34-231.el9_7.10.x86_64.rpm �8
glibc-langpack-ti-2.34-231.el9_7.10.x86_64.rpm �@
glibc-langpack-fil-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nds-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-om-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-an-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-oc-2.34-231.el9_7.10.x86_64.rpm �6
glibc-langpack-dz-2.34-231.el9_7.10.x86_64.rpm �a
glibc-langpack-kl-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-be-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-niu-2.34-231.el9_7.10.x86_64.rpm �V
glibc-langpack-ia-2.34-231.el9_7.10.x86_64.rpm �i
glibc-langpack-ky-2.34-231.el9_7.10.x86_64.rpm �6
glibc-langpack-th-2.34-231.el9_7.10.x86_64.rpm �$
glibc-langpack-shs-2.34-231.el9_7.10.x86_64.rpm �c
glibc-langpack-kn-2.34-231.el9_7.10.x86_64.rpm �T
glibc-minimal-langpack-2.34-231.el9_7.10.x86_64.rpm �f
glibc-langpack-ks-2.34-231.el9_7.10.x86_64.rpm �h
glibc-langpack-kw-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ar-2.34-231.el9_7.10.x86_64.rpm �U
glibc-langpack-hy-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sat-2.34-231.el9_7.10.x86_64.rpm �%
glibc-langpack-bs-2.34-231.el9_7.10.x86_64.rpm �"
glibc-langpack-bo-2.34-231.el9_7.10.x86_64.rpm �C
glibc-langpack-fur-2.34-231.el9_7.10.x86_64.rpm �/
glibc-langpack-sv-2.34-231.el9_7.10.x86_64.rpm �D
glibc-langpack-fy-2.34-231.el9_7.10.x86_64.rpm �2
glibc-langpack-ta-2.34-231.el9_7.10.x86_64.rpm �R
glibc-langpack-hsb-2.34-231.el9_7.10.x86_64.rpm �q
glibc-langpack-lv-2.34-231.el9_7.10.x86_64.rpm �A
glibc-langpack-tt-2.34-231.el9_7.10.x86_64.rpm �~
glibc-langpack-mni-2.34-231.el9_7.10.x86_64.rpm �x
glibc-langpack-mi-2.34-231.el9_7.10.x86_64.rpm �O
glibc-langpack-yo-2.34-231.el9_7.10.x86_64.rpm �^
glibc-langpack-ka-2.34-231.el9_7.10.x86_64.rpm �?
glibc-langpack-tr-2.34-231.el9_7.10.x86_64.rpm �+
glibc-langpack-sq-2.34-231.el9_7.10.x86_64.rpm �S
glibc-langpack-ht-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-af-2.34-231.el9_7.10.x86_64.rpm �S
glibc-langpack-zu-2.34-231.el9_7.10.x86_64.rpm �z
glibc-langpack-mjw-2.34-231.el9_7.10.x86_64.rpm �
glibc-all-langpacks-2.34-231.el9_7.10.x86_64.rpm �+
glibc-2.34-231.el9_7.10.x86_64.rpm �4
glibc-langpack-te-2.34-231.el9_7.10.x86_64.rpm �%
glibc-langpack-si-2.34-231.el9_7.10.x86_64.rpm �)
glibc-langpack-sm-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-az-2.34-231.el9_7.10.x86_64.rpm �Y
glibc-langpack-ik-2.34-231.el9_7.10.x86_64.rpm �O
glibc-langpack-hif-2.34-231.el9_7.10.x86_64.rpm �I
glibc-langpack-wa-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-or-2.34-231.el9_7.10.x86_64.rpm �(
glibc-langpack-ce-2.34-231.el9_7.10.x86_64.rpm �A
glibc-langpack-fo-2.34-231.el9_7.10.x86_64.rpm �9
glibc-langpack-eo-2.34-231.el9_7.10.x86_64.rpm �P
glibc-langpack-hne-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-os-2.34-231.el9_7.10.x86_64.rpm �!
glibc-langpack-se-2.34-231.el9_7.10.x86_64.rpm �E
glibc-langpack-ur-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-my-2.34-231.el9_7.10.x86_64.rpm �D
glibc-langpack-unm-2.34-231.el9_7.10.x86_64.rpm �G
glibc-langpack-gez-2.34-231.el9_7.10.x86_64.rpm �o
glibc-langpack-lo-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nn-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bi-2.34-231.el9_7.10.x86_64.rpm �{
glibc-langpack-mk-2.34-231.el9_7.10.x86_64.rpm �-
glibc-langpack-cs-2.34-231.el9_7.10.x86_64.rpm �<
glibc-langpack-eu-2.34-231.el9_7.10.x86_64.rpm �n
glibc-langpack-ln-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pl-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nso-2.34-231.el9_7.10.x86_64.rpm �5
glibc-langpack-tg-2.34-231.el9_7.10.x86_64.rpm �.
glibc-langpack-csb-2.34-231.el9_7.10.x86_64.rpm �&
glibc-langpack-sid-2.34-231.el9_7.10.x86_64.rpm �.
glibc-langpack-st-2.34-231.el9_7.10.x86_64.rpm �"
glibc-langpack-sgs-2.34-231.el9_7.10.x86_64.rpm �J
glibc-langpack-wae-2.34-231.el9_7.10.x86_64.rpm �8
glibc-langpack-en-2.34-231.el9_7.10.x86_64.rpm �j
glibc-langpack-lb-2.34-231.el9_7.10.x86_64.rpm �>
glibc-langpack-ff-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nb-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ms-2.34-231.el9_7.10.x86_64.rpm �B
glibc-langpack-fr-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-mt-2.34-231.el9_7.10.x86_64.rpm �G
glibc-langpack-ve-2.34-231.el9_7.10.x86_64.rpm �'
glibc-langpack-sk-2.34-231.el9_7.10.x86_64.rpm �-
libnsl-2.34-231.el9_7.10.i686.rpm �,
glibc-langpack-sr-2.34-231.el9_7.10.x86_64.rpm �0
glibc-langpack-cy-2.34-231.el9_7.10.x86_64.rpm �N
glibc-langpack-yi-2.34-231.el9_7.10.x86_64.rpm �M
glibc-langpack-xh-2.34-231.el9_7.10.x86_64.rpm �e
glibc-langpack-kok-2.34-231.el9_7.10.x86_64.rpm �2
glibc-langpack-de-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-rw-2.34-231.el9_7.10.x86_64.rpm �_
glibc-langpack-kab-2.34-231.el9_7.10.x86_64.rpm �}
glibc-langpack-mn-2.34-231.el9_7.10.x86_64.rpm �I
glibc-langpack-gu-2.34-231.el9_7.10.x86_64.rpm �H
glibc-langpack-gl-2.34-231.el9_7.10.x86_64.rpm �`
glibc-langpack-kk-2.34-231.el9_7.10.x86_64.rpm �N
glibc-langpack-hi-2.34-231.el9_7.10.x86_64.rpm �
glibc-common-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-raj-2.34-231.el9_7.10.x86_64.rpm �W
glibc-langpack-id-2.34-231.el9_7.10.x86_64.rpm �=
glibc-langpack-fa-2.34-231.el9_7.10.x86_64.rpm �F
glibc-langpack-uz-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pap-2.34-231.el9_7.10.x86_64.rpm �B
glibc-langpack-ug-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ro-2.34-231.el9_7.10.x86_64.rpm �u
glibc-langpack-mfe-2.34-231.el9_7.10.x86_64.rpm �,
glibc-gconv-extra-2.34-231.el9_7.10.i686.rpm �d
glibc-langpack-ko-2.34-231.el9_7.10.x86_64.rpm �t
glibc-langpack-mai-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-as-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nhn-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ber-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nr-2.34-231.el9_7.10.x86_64.rpm �m
glibc-langpack-lij-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-aa-2.34-231.el9_7.10.x86_64.rpm �#
glibc-langpack-br-2.34-231.el9_7.10.x86_64.rpm �-
glibc-langpack-ss-2.34-231.el9_7.10.x86_64.rpm �E
glibc-langpack-ga-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pt-2.34-231.el9_7.10.x86_64.rpm �[
glibc-langpack-it-2.34-231.el9_7.10.x86_64.rpm �U
nscd-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-nl-2.34-231.el9_7.10.x86_64.rpm �Z
glibc-langpack-is-2.34-231.el9_7.10.x86_64.rpm �5
glibc-langpack-dv-2.34-231.el9_7.10.x86_64.rpm �7
glibc-langpack-el-2.34-231.el9_7.10.x86_64.rpm �0
glibc-langpack-sw-2.34-231.el9_7.10.x86_64.rpm �,
glibc-gconv-extra-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-pa-2.34-231.el9_7.10.x86_64.rpm �r
glibc-langpack-lzh-2.34-231.el9_7.10.x86_64.rpm �?
glibc-langpack-fi-2.34-231.el9_7.10.x86_64.rpm �1
glibc-langpack-szl-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bhb-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sc-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bho-2.34-231.el9_7.10.x86_64.rpm �H
glibc-langpack-vi-2.34-231.el9_7.10.x86_64.rpm �v
glibc-langpack-mg-2.34-231.el9_7.10.x86_64.rpm �&
glibc-langpack-byn-2.34-231.el9_7.10.x86_64.rpm �L
glibc-langpack-wo-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bg-2.34-231.el9_7.10.x86_64.rpm �C
glibc-langpack-uk-2.34-231.el9_7.10.x86_64.rpm �R
glibc-langpack-zh-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ru-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-mnw-2.34-231.el9_7.10.x86_64.rpm �y
glibc-langpack-miq-2.34-231.el9_7.10.x86_64.rpm �1
glibc-langpack-da-2.34-231.el9_7.10.x86_64.rpm �>
glibc-langpack-tpi-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sd-2.34-231.el9_7.10.x86_64.rpm �'
glibc-langpack-ca-2.34-231.el9_7.10.x86_64.rpm �3
glibc-langpack-tcy-2.34-231.el9_7.10.x86_64.rpm �@
glibc-langpack-ts-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ayc-2.34-231.el9_7.10.x86_64.rpm �X
glibc-langpack-ig-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-mr-2.34-231.el9_7.10.x86_64.rpm �b
glibc-langpack-km-2.34-231.el9_7.10.x86_64.rpm �*
glibc-langpack-so-2.34-231.el9_7.10.x86_64.rpm �s
glibc-langpack-mag-2.34-231.el9_7.10.x86_64.rpm �-
libnsl-2.34-231.el9_7.10.x86_64.rpm �$
glibc-langpack-brx-2.34-231.el9_7.10.x86_64.rpm �3
glibc-langpack-doi-2.34-231.el9_7.10.x86_64.rpm �K
glibc-langpack-ha-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-agr-2.34-231.el9_7.10.x86_64.rpm �]
glibc-langpack-ja-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-am-2.34-231.el9_7.10.x86_64.rpm �L
glibc-langpack-hak-2.34-231.el9_7.10.x86_64.rpm �/
glibc-langpack-cv-2.34-231.el9_7.10.x86_64.rpm �\
glibc-langpack-iu-2.34-231.el9_7.10.x86_64.rpm �;
glibc-langpack-tl-2.34-231.el9_7.10.x86_64.rpm �P
glibc-langpack-yue-2.34-231.el9_7.10.x86_64.rpm �7
glibc-langpack-the-2.34-231.el9_7.10.x86_64.rpm �:
glibc-langpack-es-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-sa-2.34-231.el9_7.10.x86_64.rpm �+
glibc-langpack-cmn-2.34-231.el9_7.10.x86_64.rpm �|
glibc-langpack-ml-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-bem-2.34-231.el9_7.10.x86_64.rpm �
glibc-langpack-ak-2.34-231.el9_7.10.x86_64.rpm �;
glibc-langpack-et-2.34-231.el9_7.10.x86_64.rpm �k
glibc-langpack-lg-2.34-231.el9_7.10.x86_64.rpm �,
glibc-langpack-crh-2.34-231.el9_7.10.x86_64.rpm �F
glibc-langpack-gd-2.34-231.el9_7.10.x86_64.rpm �*
glibc-langpack-ckb-2.34-231.el9_7.10.x86_64.rpm ��ׄD�u
�(��mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'��#�whttps://access.redhat.com/errata/RHSA-2026:3066 RHSA-2026:3066 RHSA-2026:3066 https://access.redhat.com/security/cve/CVE-2025-38129 CVE-2025-38129 CVE-2025-38129 https://access.redhat.com/security/cve/CVE-2025-38206 CVE-2025-38206 CVE-2025-38206 https://bugzilla.redhat.com/2376034 2376034 https://bugzilla.redhat.com/2376377 2376377 https://errata.almalinux.org/9/ALSA-2026-3066.html ALSA-2026:3066 ALSA-2026:3066 tkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-5.14.0-611.35.1.el9_7.x86_64.rpm "tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm !tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm %tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpm tkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-modules-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-modules-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-5.14.0-611.35.1.el9_7.x86_64.rpm "tkernel-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-core-5.14.0-611.35.1.el9_7.x86_64.rpm !tkernel-modules-core-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-tools-5.14.0-611.35.1.el9_7.x86_64.rpm %tkernel-uki-virt-addons-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-tools-libs-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-uki-virt-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-debug-core-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-abi-stablelists-5.14.0-611.35.1.el9_7.noarch.rpm tkernel-debug-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm tkernel-modules-extra-5.14.0-611.35.1.el9_7.x86_64.rpm �̀�-�v
�)��LBsecurity Important: libpng security update �'+���6https://access.redhat.com/errata/RHSA-2026:3405 RHSA-2026:3405 RHSA-2026:3405 https://access.redhat.com/security/cve/CVE-2026-22695 CVE-2026-22695 CVE-2026-22695 https://access.redhat.com/security/cve/CVE-2026-22801 CVE-2026-22801 CVE-2026-22801 https://access.redhat.com/security/cve/CVE-2026-25646 CVE-2026-25646 CVE-2026-25646 https://bugzilla.redhat.com/2428824 2428824 https://bugzilla.redhat.com/2428825 2428825 https://bugzilla.redhat.com/2438542 2438542 https://errata.almalinux.org/9/ALSA-2026-3405.html ALSA-2026:3405 ALSA-2026:3405 �*�{libpng-1.6.37-12.el9_7.2.x86_64.rpm �*�{libpng-1.6.37-12.el9_7.2.i686.rpm �*�{libpng-1.6.37-12.el9_7.2.x86_64.rpm �*�{libpng-1.6.37-12.el9_7.2.i686.rpm �͖��w
�*��OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'��P�Zhttps://access.redhat.com/errata/RHSA-2026:3488 RHSA-2026:3488 RHSA-2026:3488 https://access.redhat.com/security/cve/CVE-2025-40168 CVE-2025-40168 CVE-2025-40168 https://access.redhat.com/security/cve/CVE-2025-71085 CVE-2025-71085 CVE-2025-71085 https://access.redhat.com/security/cve/CVE-2026-23097 CVE-2026-23097 CVE-2026-23097 https://bugzilla.redhat.com/2414482 2414482 https://bugzilla.redhat.com/2429026 2429026 https://bugzilla.redhat.com/2436802 2436802 https://errata.almalinux.org/9/ALSA-2026-3488.html ALSA-2026:3488 ALSA-2026:3488 ukernel-debug-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-tools-5.14.0-611.36.1.el9_7.x86_64.rpm !ukernel-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm %ukernel-uki-virt-addons-5.14.0-611.36.1.el9_7.x86_64.rpm "ukernel-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-modules-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-modules-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-tools-libs-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-abi-stablelists-5.14.0-611.36.1.el9_7.noarch.rpm ukernel-debug-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-tools-5.14.0-611.36.1.el9_7.x86_64.rpm !ukernel-modules-core-5.14.0-611.36.1.el9_7.x86_64.rpm %ukernel-uki-virt-addons-5.14.0-611.36.1.el9_7.x86_64.rpm "ukernel-uki-virt-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-modules-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-modules-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-modules-extra-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-tools-libs-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-debug-core-5.14.0-611.36.1.el9_7.x86_64.rpm ukernel-abi-stablelists-5.14.0-611.36.1.el9_7.noarch.rpm �͠�[�x
�+��nBBBsecurity Moderate: nfs-utils security update �'��*�@https://access.redhat.com/errata/RHSA-2026:3940 RHSA-2026:3940 RHSA-2026:3940 https://access.redhat.com/security/cve/CVE-2025-12801 CVE-2025-12801 CVE-2025-12801 https://bugzilla.redhat.com/2413081 2413081 https://errata.almalinux.org/9/ALSA-2026-3940.html ALSA-2026:3940 ALSA-2026:3940 �0�plibnfsidmap-2.5.4-38.el9_7.3.i686.rpm �0�plibnfsidmap-2.5.4-38.el9_7.3.x86_64.rpm �b�pnfs-utils-2.5.4-38.el9_7.3.x86_64.rpm �0�plibnfsidmap-2.5.4-38.el9_7.3.i686.rpm �0�plibnfsidmap-2.5.4-38.el9_7.3.x86_64.rpm �b�pnfs-utils-2.5.4-38.el9_7.3.x86_64.rpm ��ϲ!�y
�,��sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'��j�https://access.redhat.com/errata/RHSA-2026:3966 RHSA-2026:3966 RHSA-2026:3966 https://access.redhat.com/security/cve/CVE-2025-38106 CVE-2025-38106 CVE-2025-38106 https://access.redhat.com/security/cve/CVE-2026-23001 CVE-2026-23001 CVE-2026-23001 https://bugzilla.redhat.com/2376077 2376077 https://bugzilla.redhat.com/2432664 2432664 https://errata.almalinux.org/9/ALSA-2026-3966.html ALSA-2026:3966 ALSA-2026:3966 vkernel-abi-stablelists-5.14.0-611.38.1.el9_7.noarch.rpm vkernel-debug-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-modules-5.14.0-611.38.1.el9_7.x86_64.rpm "vkernel-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm !vkernel-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-tools-libs-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-tools-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-modules-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-5.14.0-611.38.1.el9_7.x86_64.rpm %vkernel-uki-virt-addons-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-abi-stablelists-5.14.0-611.38.1.el9_7.noarch.rpm vkernel-debug-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-modules-5.14.0-611.38.1.el9_7.x86_64.rpm "vkernel-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm !vkernel-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-tools-libs-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-modules-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-tools-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-modules-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-uki-virt-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-modules-extra-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-5.14.0-611.38.1.el9_7.x86_64.rpm %vkernel-uki-virt-addons-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-core-5.14.0-611.38.1.el9_7.x86_64.rpm vkernel-debug-5.14.0-611.38.1.el9_7.x86_64.rpm ����z
�-��RBBBsecurity Moderate: python3.9 security update �'��{�` https://access.redhat.com/errata/RHSA-2026:4168 RHSA-2026:4168 RHSA-2026:4168 https://bugzilla.redhat.com/2431368 2431368 https://bugzilla.redhat.com/2431373 2431373 https://bugzilla.redhat.com/2432437 2432437 https://errata.almalinux.org/9/ALSA-2026-4168.html ALSA-2026:4168 ALSA-2026:4168 https://www.redhat.com/security/data/cve/CVE-2025-15366.html CVE-2025-15366 CVE-2025-15366 https://www.redhat.com/security/data/cve/CVE-2025-15367.html CVE-2025-15367 CVE-2025-15367 https://www.redhat.com/security/data/cve/CVE-2026-0865.html CVE-2026-0865 CVE-2026-0865 https://www.redhat.com/security/data/cve/CVE-2026-1299.html CVE-2026-1299 CVE-2026-1299 ��python3-3.9.25-3.el9_7.1.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.1.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.1.i686.rpm ��python3-3.9.25-3.el9_7.1.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.1.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.1.i686.rpm ��ϰ$�{
�.��WBsecurity Moderate: gnutls security update �'��[�Thttps://access.redhat.com/errata/RHSA-2026:4188 RHSA-2026:4188 RHSA-2026:4188 https://access.redhat.com/security/cve/CVE-2025-14831 CVE-2025-14831 CVE-2025-14831 https://access.redhat.com/security/cve/CVE-2025-9820 CVE-2025-9820 CVE-2025-9820 https://bugzilla.redhat.com/2392528 2392528 https://bugzilla.redhat.com/2423177 2423177 https://errata.almalinux.org/9/ALSA-2026-4188.html ALSA-2026:4188 ALSA-2026:4188 �!�gnutls-3.8.3-10.el9_7.i686.rpm �!�gnutls-3.8.3-10.el9_7.x86_64.rpm �!�gnutls-3.8.3-10.el9_7.i686.rpm �!�gnutls-3.8.3-10.el9_7.x86_64.rpm ��Ϯ5�|
�/��ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'��/�https://access.redhat.com/errata/RHSA-2026:4759 RHSA-2026:4759 RHSA-2026:4759 https://access.redhat.com/security/cve/CVE-2025-39818 CVE-2025-39818 CVE-2025-39818 https://access.redhat.com/security/cve/CVE-2025-68800 CVE-2025-68800 CVE-2025-68800 https://bugzilla.redhat.com/2395797 2395797 https://bugzilla.redhat.com/2429065 2429065 https://errata.almalinux.org/9/ALSA-2026-4759.html ALSA-2026:4759 ALSA-2026:4759 wkernel-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-tools-libs-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-abi-stablelists-5.14.0-611.41.1.el9_7.noarch.rpm wkernel-debug-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-5.14.0-611.41.1.el9_7.x86_64.rpm "wkernel-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-5.14.0-611.41.1.el9_7.x86_64.rpm %wkernel-uki-virt-addons-5.14.0-611.41.1.el9_7.x86_64.rpm !wkernel-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-tools-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-tools-libs-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-abi-stablelists-5.14.0-611.41.1.el9_7.noarch.rpm wkernel-debug-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-modules-extra-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-5.14.0-611.41.1.el9_7.x86_64.rpm "wkernel-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-5.14.0-611.41.1.el9_7.x86_64.rpm %wkernel-uki-virt-addons-5.14.0-611.41.1.el9_7.x86_64.rpm !wkernel-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-modules-core-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-tools-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-modules-5.14.0-611.41.1.el9_7.x86_64.rpm wkernel-debug-uki-virt-5.14.0-611.41.1.el9_7.x86_64.rpm ����t�}
����yBBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update �'��3�Ehttps://access.redhat.com/errata/RHSA-2026:4760 RHSA-2026:4760 RHSA-2026:4760 https://access.redhat.com/security/cve/CVE-2025-61662 CVE-2025-61662 CVE-2025-61662 https://bugzilla.redhat.com/2414683 2414683 https://errata.almalinux.org/9/ALSA-2026-4760.html ALSA-2026:4760 ALSA-2026:4760 �j�grub2-tools-extra-2.06-114.el9_7.1.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �;�grub2-efi-x64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �k�grub2-tools-minimal-2.06-114.el9_7.1.alma.1.x86_64.rpm �f�grub2-efi-x64-cdboot-2.06-114.el9_7.1.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-114.el9_7.1.alma.1.x86_64.rpm �g�grub2-pc-2.06-114.el9_7.1.alma.1.x86_64.rpm �9�grub2-common-2.06-114.el9_7.1.alma.1.noarch.rpm �:�grub2-efi-aa64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �e�grub2-efi-x64-2.06-114.el9_7.1.alma.1.x86_64.rpm �h�grub2-tools-2.06-114.el9_7.1.alma.1.x86_64.rpm ��grub2-ppc64le-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �j�grub2-tools-extra-2.06-114.el9_7.1.alma.1.x86_64.rpm �<�grub2-pc-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �;�grub2-efi-x64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �k�grub2-tools-minimal-2.06-114.el9_7.1.alma.1.x86_64.rpm �f�grub2-efi-x64-cdboot-2.06-114.el9_7.1.alma.1.x86_64.rpm �i�grub2-tools-efi-2.06-114.el9_7.1.alma.1.x86_64.rpm �g�grub2-pc-2.06-114.el9_7.1.alma.1.x86_64.rpm �9�grub2-common-2.06-114.el9_7.1.alma.1.noarch.rpm �:�grub2-efi-aa64-modules-2.06-114.el9_7.1.alma.1.noarch.rpm �e�grub2-efi-x64-2.06-114.el9_7.1.alma.1.x86_64.rpm �h�grub2-tools-2.06-114.el9_7.1.alma.1.x86_64.rpm ��grub2-ppc64le-modules-2.06-114.el9_7.1.alma.1.noarch.rpm ���{�~
�0��MBsecurity Important: libarchive security update �'+��x�https://access.redhat.com/errata/RHSA-2026:5080 RHSA-2026:5080 RHSA-2026:5080 https://access.redhat.com/security/cve/CVE-2026-4111 CVE-2026-4111 CVE-2026-4111 https://bugzilla.redhat.com/2446453 2446453 https://errata.almalinux.org/9/ALSA-2026-5080.html ALSA-2026:5080 ALSA-2026:5080 �?�
libarchive-3.5.3-7.el9_7.x86_64.rpm �?�
libarchive-3.5.3-7.el9_7.i686.rpm �?�
libarchive-3.5.3-7.el9_7.x86_64.rpm �?�
libarchive-3.5.3-7.el9_7.i686.rpm �����
�1��PBsecurity Moderate: vim security update �'��y�xhttps://access.redhat.com/errata/RHSA-2026:5602 RHSA-2026:5602 RHSA-2026:5602 https://access.redhat.com/security/cve/CVE-2026-25749 CVE-2026-25749 CVE-2026-25749 https://bugzilla.redhat.com/2437843 2437843 https://errata.almalinux.org/9/ALSA-2026-5602.html ALSA-2026:5602 ALSA-2026:5602 �r�vim-minimal-8.2.2637-23.el9_7.1.x86_64.rpm �=�vim-filesystem-8.2.2637-23.el9_7.1.noarch.rpm �r�vim-minimal-8.2.2637-23.el9_7.1.x86_64.rpm �=�vim-filesystem-8.2.2637-23.el9_7.1.noarch.rpm ���
����SBBBBBBBBBsecurity Moderate: opencryptoki security update �'��q�[https://access.redhat.com/errata/RHSA-2026:5603 RHSA-2026:5603 RHSA-2026:5603 https://access.redhat.com/security/cve/CVE-2026-23893 CVE-2026-23893 CVE-2026-23893 https://bugzilla.redhat.com/2431909 2431909 https://errata.almalinux.org/9/ALSA-2026-5603.html ALSA-2026:5603 ALSA-2026:5603 �0�>opencryptoki-libs-3.25.0-4.el9_7.2.i686.rpm �o�>opencryptoki-icsftok-3.25.0-4.el9_7.2.x86_64.rpm �p�>opencryptoki-swtok-3.25.0-4.el9_7.2.x86_64.rpm �0�>opencryptoki-libs-3.25.0-4.el9_7.2.x86_64.rpm �i�>opencryptoki-ccatok-3.25.0-4.el9_7.2.x86_64.rpm �n�>opencryptoki-3.25.0-4.el9_7.2.x86_64.rpm �0�>opencryptoki-libs-3.25.0-4.el9_7.2.i686.rpm �o�>opencryptoki-icsftok-3.25.0-4.el9_7.2.x86_64.rpm �p�>opencryptoki-swtok-3.25.0-4.el9_7.2.x86_64.rpm �0�>opencryptoki-libs-3.25.0-4.el9_7.2.x86_64.rpm �i�>opencryptoki-ccatok-3.25.0-4.el9_7.2.x86_64.rpm �n�>opencryptoki-3.25.0-4.el9_7.2.x86_64.rpm ��K�
�2��_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �'��L�<https://access.redhat.com/errata/RHSA-2026:6153 RHSA-2026:6153 RHSA-2026:6153 https://access.redhat.com/security/cve/CVE-2025-38180 CVE-2025-38180 CVE-2025-38180 https://access.redhat.com/security/cve/CVE-2025-40096 CVE-2025-40096 CVE-2025-40096 https://access.redhat.com/security/cve/CVE-2026-23144 CVE-2026-23144 CVE-2026-23144 https://access.redhat.com/security/cve/CVE-2026-23171 CVE-2026-23171 CVE-2026-23171 https://access.redhat.com/security/cve/CVE-2026-23191 CVE-2026-23191 CVE-2026-23191 https://access.redhat.com/security/cve/CVE-2026-23193 CVE-2026-23193 CVE-2026-23193 https://access.redhat.com/security/cve/CVE-2026-23204 CVE-2026-23204 CVE-2026-23204 https://access.redhat.com/security/cve/CVE-2026-23209 CVE-2026-23209 CVE-2026-23209 https://bugzilla.redhat.com/2376376 2376376 https://bugzilla.redhat.com/2407333 2407333 https://bugzilla.redhat.com/2439872 2439872 https://bugzilla.redhat.com/2439886 2439886 https://bugzilla.redhat.com/2439887 2439887 https://bugzilla.redhat.com/2439900 2439900 https://bugzilla.redhat.com/2439931 2439931 https://bugzilla.redhat.com/2439947 2439947 https://errata.almalinux.org/9/ALSA-2026-6153.html ALSA-2026:6153 ALSA-2026:6153 !xkernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpm xkernel-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm "xkernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm %xkernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-core-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpm !xkernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpm xkernel-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm "xkernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm %xkernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-core-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpm xkernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpm �θ�M�
�3��~security Moderate: rsync security update �'���Bhttps://access.redhat.com/errata/RHSA-2026:6390 RHSA-2026:6390 RHSA-2026:6390 https://access.redhat.com/security/cve/CVE-2025-10158 CVE-2025-10158 CVE-2025-10158 https://bugzilla.redhat.com/2415637 2415637 https://errata.almalinux.org/9/ALSA-2026-6390.html ALSA-2026:6390 ALSA-2026:6390 �;�(rsync-3.2.5-3.el9_7.2.x86_64.rpm �;�(rsync-3.2.5-3.el9_7.2.x86_64.rpm �θ�>�
�4��@BBBBBBsecurity Important: openssh security update �'+��J�https://access.redhat.com/errata/RHSA-2026:6462 RHSA-2026:6462 RHSA-2026:6462 https://access.redhat.com/security/cve/CVE-2026-3497 CVE-2026-3497 CVE-2026-3497 https://bugzilla.redhat.com/2447085 2447085 https://errata.almalinux.org/9/ALSA-2026-6462.html ALSA-2026:6462 ALSA-2026:6462 �o�zopenssh-keycat-8.7p1-48.el9_7.alma.1.x86_64.rpm �n�zopenssh-clients-8.7p1-48.el9_7.alma.1.x86_64.rpm �p�zopenssh-server-8.7p1-48.el9_7.alma.1.x86_64.rpm �m�zopenssh-8.7p1-48.el9_7.alma.1.x86_64.rpm �o�zopenssh-keycat-8.7p1-48.el9_7.alma.1.x86_64.rpm �n�zopenssh-clients-8.7p1-48.el9_7.alma.1.x86_64.rpm �p�zopenssh-server-8.7p1-48.el9_7.alma.1.x86_64.rpm �m�zopenssh-8.7p1-48.el9_7.alma.1.x86_64.rpm ����5�
�5��HBBBsecurity Important: python3.9 security update �'+��V�Yhttps://access.redhat.com/errata/RHSA-2026:6766 RHSA-2026:6766 RHSA-2026:6766 https://access.redhat.com/security/cve/CVE-2026-4519 CVE-2026-4519 CVE-2026-4519 https://bugzilla.redhat.com/2449649 2449649 https://errata.almalinux.org/9/ALSA-2026-6766.html ALSA-2026:6766 ALSA-2026:6766 -�python3-libs-3.9.25-3.el9_7.2.i686.rpm -�python3-libs-3.9.25-3.el9_7.2.x86_64.rpm ��python3-3.9.25-3.el9_7.2.x86_64.rpm -�python3-libs-3.9.25-3.el9_7.2.i686.rpm -�python3-libs-3.9.25-3.el9_7.2.x86_64.rpm ��python3-3.9.25-3.el9_7.2.x86_64.rpm ��� � VmXZ Utils is an integrated collection of user-space file�mpress�u�@ities bas�9�the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl�[ data�i. T�W�?provide�� high��io�Y��keeping��de�%time short.
Secu�Wy Fix(es):
* gzip: arbitrary-��-w�%e vulnerab��y (CVE-2022-1271)
For mor�ota�_about��s�gissue(s� includ��im�gt,��CVSS sc�G�
cknowledgments,���j�/r rel��in�@��n,�f�to�R�� pag�m lis�,�R�&enc�Es��. �egrub2 p�u�6s�j ver�82��?Gr��Unifi�TBoot Load�z(GRUB)�ƪ�ly��nfigu�3le��customiz�b�:l�:w�ީ>dular�}ch�pcture���supp���bvarie�S��kernel �
�'��sy��m�
��ute�V�Mhardwa��vi�.
�mshim�r��t�IJrfirst-st�UEFI�that�Ondl������o�7tru��full�3un���environ������: I���Bflow�ޢ_net_recv_ip4_��ets�28733)�HCraf��PNG �yscal���nmay lead�DZ�-of-��nds ��sheap�^1-3695�]�S�R�Qd��7huffma���)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��sp� HTTP�Id�/�n4�M�[_lock�X�Br����s non-��i�D��e�*d�Q�b�-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H7�Vi�Vi IM��ed)�upd�g�yim��
�vi editor��v�]Use�.�F�<��Po�wr Offset��v���W055�4�@H��-�h��O��oc�ts�?943�?�y��420�2��4��+621�+�&-r�o�'9�'us�f�{��utf_ptr2char�51���SExpat�G C�.b�J��B�?��XML docu��e�C�0ta�,exha�D�z�v�9type�M�531���=�� ���=copySt�f��:�w��C�2��3Linux�!,�����any�ope�J
���B���C: Sma����8�[b siz�[TCP sourc��gen�^o���
�k�012)�{r���di��Q_ev�f_�ƤT�Hpriv�T� e���^�Y7���Ya�U�/�a���sub�$���l�r���t966�t�o�mIP�� ESP t�s�co�
�76�K�
Bug�`make SHA512_�
�.s�CRYPTO_USER�4��-�
(BZ#20726�SR-IOV�c
an�*> 50%��� d��3483�fix�
rrup�iau�yby dm-�-��98218�+ SC�cli�$-s�6peeloff�ns [al�(�_-9]�<404���#��n�|f��in��asymme�c�<u��itu¼8548��F�6�4 �fMultipl�jT VMs ea�B�e�vCPUs�E�N
�6spec:�����^a��tools�hd�-9�u��c����s���eeh_pser�!ob��:��vm�oi�� t�=p�d,�q kdump���ggere�n225�� �U�
��
X NIC d�jer�'��
mai���7638)���ve��
� mm�L���c�t�
��sev�l dif��t
st��7�K�r
�KGNU�r�w
pio�/ISO ��0 CD-ROM�F
.
L��is �f��Jy�'bsdtar�oy,��rip�l��u��bin�ws
su�$�yth�J��pop�d�Ektop�,�ag�� ���J:�
�
�+via�Mmpon�+ �Fx_lzma_al�_�t
�62���7�
�<�
�o8O�gW��8��*��v�k
regs�
b�()�r�xp.c�K8��
��
i�
�Embyte�D92�
�W> ���ascsi_i��
l�
049�%��tc��w_����/sched/cls_api�0�H�&Power9 - LPAR�:��Sha�G��c� ��m�9 ����se�[Hash]�w48�zH�& �up�+���nrun��� ss-� �`��ha����dFIPS���Pd�1�c��Inam���4�>338�Jfs2��=�����g�
s�Ume����ght�K730�|
i/o��iator��u�o
�:�Kwork�;dis�g�Z4.18.0-372.9.1.el8.x86_64)�[825�A����(�
esn't��3�SSATA�5974��G�/ t���re���@post��
mig�L����� �����^10��{Oop�r�l�t�x � �IRIP�8de_attr_�_lab����g��!�s�l18��l�BUG:��%
���&��t�#���xn��l�E
�fs4�ton�
�;��loo���r��lp���s�� ��: K��acc��ebad��a,�P
g: 11 [#1]�kc���+tu���Nn��t�L��(P10/ ibmvnic/�����)��30�OS�����^vm��O�U��map��\e�'���)
Enh���^�'�Bommu/vt-d:�
�,DMAR_UNITS_SUPPORTED��� ����U5326�
������~���%
������ ��dow�f�_�from �#r�� ��ou�atoc�R�Z�=, F��:DAP�8�{:�l���Dial���ti����322��;Un�5�� �mi�Fs�57�5��-KRB�7m�t��v���98� O�=SSL�� �
ki����m�;
��<���o�gLaye���:)��T������(TLS)�a�ell�a�)-��ng���-pur�e��ypt��phy���-��Z: c�
h��A�sc�C��j��+29��
�CSigne�[�����re��
n�a���hp�V���OCSP_NOCHECKS�o3��oOPEN�H_LH_flus�
br�h��L�����D47�D���� �18�GAES��B�a�0����me �s�>�P�g ��qa�*�Cy�,�n��n�}��o�mgnutls��FFDHE��8032���q�"��Z3DES�+549����pts�I �1�c���ara�/�t�|�N� ��5508�]m�U���>ECDSA�
�5
licit�k�F�� e�Z�#��s_� -g��p�ip256k1�>�[be�r X��19/X448�S6�Conv���X�8p�-on�Sl�_�? �FKAT�88�j�R��keys������on��9193�+�q�&������Y��O�Z�h���K7�[�w��su��]s�qi�5��[IBM�R
HW�$T] POWER10��e�0s���5�\�y��[���o ��view]�R-�R�*�78�*DH t� g�*5856�*EC�*7�*�S�+8�+AND�,9�,zero� ��,61�,HKDF�5mit�"�1838�b�P�acy���1
(GnuPG�lGPG��K���&���r�
��ig�hl�
na� ��lian���PGP�7S/MIME�*nd�x���
��gpg���S ��of�n�t
st�s l�?�34�@��dbus-brok�@�$������� bu���Tby�WD-Bus�'�. It�*�i�m�D�
��١�i�D$�%l�$��P�a$��or��ű�z�uexcl�jve��te�~��#���Y�n�A���r�/e�k�����J"ent���e��g�f�K���W�ka�S�Ex���~s�$l�_$�12��]n�S#p���$��Dy�X�g���Q�z�
��a���C�����. �nft_s�$e������J1��?�Y'��
�Rd�S_�йy_�e��0��y
�z
�&R��/mlx5�numb�f��c�{XLT ���q�-227�O�8,�x
t�+��ed�Qun�w-�Ye-nex�7p-ob�.�-�G5�n$�)�4��un�l�
d MSR�_�: WR��0x199��amazo�t4.32x�
�t��n941�X86/p�X�S/UV��S�>� ����UV5 �)��773�+� l�{:���2�sync s�\��soft����blk_mq_�G_��ch_����9.0�z]�13��&��NVMe/��der���o+v������%�vonic��,�nic�^77�Ad����nvme��a�j-�
�7�~ �(/tcp�9t�n�#uses����(_to_rq(�)_�)��l(��ue)��69��Im����hb���Y�&929�x� 9/ppc64�hIn��\�-�
& "C�_�
pe��"�=�a�lscpu�.�d2171�� �
*�/��d��+w ���y�~AMX fla�amx_�~8, � bf16) �H82�6��: D�mU���!4�!avf�"194��i40e�"9)�7$���#��!�sdoCont��f����xml�N�/406�|�������������.��X
����#s���� ��u
, �R��D� ��N�����O��|�
���fit e��0��o�
���x�In�N�x�����-or�!�K�M����C++, P�K,��Pike,�f� �
�.k�RSH��NUPG�+�$�*���E0�䪈fo�|���have��+p�"��a �r �*�v �:��(3.7.6),��;�8)���3�{ou���j,�_pkcs7_��y.�Q509��Q�A] [���"@�u-��r�l�P�258�xA�����K����K5�� -CBC�mg��{�>�3/��:�(*���2���<2�r��1�0) KSB�p�/�P c�[Kasbah����o�%X.�"�����MS���! i�0y���Q. �R1th�_s��$��������9�G����k���
*�/r�K��
ex�G�7�51��
��1-�q��
&ath� �%�w�,t�; �;������P$�!�`2�1̔�wuth��bypas�!� d�<��n��n���'��R's�;an��s�t�3��l ��19���p��� �����:�_Em������0�60�B�>V��ML���N78�C�z�m��a�[��8� �+��$)�Z�^)������3��1��l� ���
���* �J�8�4 � r�6eld��43���U���)�P�8:r�Q
�?��N#�
h/25�"� �(d�T�D�K�gPTRACE_SEIZE�W�3�O��!S�D�CCOMP���059���
����#�%�%��T14/G2��D�p��+(mt7921e��%56�&��v������~�-lle�{#�U0�Matrox�x a�Mscr��vVGA�z*put�
�D�i�120���nee�1o��a wa�L
�"e�a#C�
DRBG�fa�5;��y�����;���i��x�|w�dog�%����'��.#30��&�734s! [sw�/30:0]�O7���
��5.16�"�Bad���Q�p�}( qemu-kvm pfn:68a74600�?�,6f��=��E�%s���2M �6s�>879���Vh�-t 2)�9�n��N�lo��% hpilo�����* HPE RL3�
Gen�&��ARM��y.�[(��4�� �����pret�I0�a�G�.����/�����es�3s,�F
�k
��[e�g��y��l���0ynam��.�6��d���l. �����3!�K'���B�H4ll�C�pi�=�O
o�I&wind�K�u���}��-�:7��PyLong_F���7�6���� �d��gv�y �`���9��o�a��#0-��=�plua�> ����Lua���!��V�m+-we�t+�x ���>�Len���
L�w��lso��nt�d�p� ,�-�u1�k�ua��:in�G_��ms��de��.c�;��
un�xro�3r�a�*
�)�$�>�30��#�� �-�B�a,acker�) � �vor �Mmin�o�G� 's�y9��3651��� �����]_�*�}nd� �N�+@�-smb2�0_��ry_�i NULL�� �01�h'�*i�d��9��nd_�_�kicbdu�����.b��[6�{swiotlb��t1�H"�\_F�5_DEVICE�?��-�-�?3�rs����i�do�q@�N6��%�$���'-g�:UM�i10����:s��pcm_hw_���i��M�0� ��0)����%�w4�����6��o�8��/�[B�k1�0�ur��y�wb�F0�0
drm�ma�=�,�+���K/��,<s�b�*6��Y�33���pf��_���:3��
��P9k_h�B3�be_��Ocould��an�����ß67� � ��!1emu�_� n�9
�2�5�[9fa���u�fd�:t�������G�9�nf_�D�o�2�=o��>.�@�!�
�T2�g�oD�F�
��6�._sfa_�>>�� 63�`s�&-�@�p���E��!3�din�D&e���n-up���M-��/4�
�ka SBDR�N�\3�Ni�]�lGa��Dl�TS�T5�T���a�$��C�)�_DRPW�_�*po�~�0�����to�N�����c!� cho�\021�+�~:�+tBl��A�@J Sp���)�pC�[��$�[�i3�5.�s�&H��^3816, �9900�nBran�T��
C��$u���Z �b��)�L�c�<H�v#Po�!��:r�F��S���P�iȓ63�d.d�L�Jms_usb_st�
_x�?i���s/�7�/�!/�)�j283�6 �x��
�XSUNRPC�l@�589��� i�~:�u����c��i�38u32Ę958�Y�5�?��ӣ`���fqnl_m�
le���rA/nf��S
k�hu��H4��!���"��'=�al�ey �C�M�D�,0�Ds_��LB�R��0�� ��f ENOTDIR��44���~#�
�|C�H%s:�Ҥ��j�7c�%�Ti�!@�6), se�w�R� No�>��ed�j� �r��$�5�_��u�R���&8��*hr�n$z��Os��ly�>a� a��8. S�.�γǤoi�st�/�o�U$�1�R���in�q�]
��Y9�5�:��
hol���M���u� mi�� ��ol�v� t�9�n�
��p�c�8�~�}:�<8�H
IPv6�3��D��5�17�'�<7Samb�Ln�4-�I��� �AS�4M�0B�H*(SMB��[�8C�(�A�(rn��>S�IF�7�v�PC-�/l�w�;ne����,�~�Z�����C.�6d%s�,��>6.4)���V+4��G���2:�@�w?�s�?�E1�$2742�@$l�Md����-"�m���#!�%��-��'API�/�n�*$��/�'����TDB�
�k��4���(2.5.2��
�
�AD� ��
u��� +�����
add�����.���0!�}�F������#��,�-qua�F5�.�on�DWg�F4�����-�%�$�a
�[�
s�W�[re���di�7u�glyph��0ff�4����W�]U�"sf�O�B
_�NB�4�L.�>Se��iviol� a FNT_S��_R��H5�Ht�HT�B�O�G�=����4%��3.9�.�],��I24�|�
%�)'�O�/4���@!���X2a�z�se� ��1�A15��GD�^��X�
3���z�;/http/�.��G����c�&��(��1��"�>O e2fs��� G2a�7�afo�5/��=, �(7� �=�
�@�]�g�z� 2,�3���:�� ���O��/������[��Q13��:;�>MfBuzz���o�+��n,�i����h�Rb�R��Y�O�Rh�4�Uhape-f��%.c�7�M�A�D�HH�5��c�~P�C(DHCP�Y2�X�
��~
�D0�n �M�Gto ge��i� w�Nc�t�j��Ka�.���i��k��a br�c��'�dh�V:�
���{g��@ISC �� �K�9
��Dt�'�hdm�s���.��������5NS�ow�B�-�ch��iso�D��e1�220�A}ogro�*�us���b�"��r��Ylo�by��ii�u�a��H�^�9�/�Fmo�d=�n�� i��
� &��:� ���u�-��W��*��;�B��tirpc�h�k&Sun�DZ's�S�3-i��p������d�5���3I-�a�)�Z=�F�\
�7����
��e�6-���
���������:�}��lot��7��5��4682�Az�,8R�_��(�)���7 �)B�'�� 7���<�%/��&���`�AZf� �"��# �Pho�42�C"�P�oF��os��Pauth�&c�#�e�0�[��^�乍y�l�Eby e�a0nat��n�-����"�!�;�8d�B!�e�LN�����L�=�<�=��to����c�G�m�ahel��'�n�cr��r�s�"�#��Pd�� ib�$�4Le�*KDC��Akrb5� ���+
i�-
AC�v��h4�t38�f�esud��4� H/��?�1s��Do����@�F�
���2��X���&�t��
�iGs�r�N$�Z�u����<�.i�ut��]�4+g��as�g����rs�T�ho���t,�+RunA�;��,3-2�&-�X1c��"POST�PUT�|�*�j2221��U�2�E:��9 ��)�&1�{k�~��*�,�U�!��Fa�"
X88179_�beA��wUSB e�K��
.�V64�Vi91����KGP�bILB ��Zï�]9���_ ��13ï�\
�'�0�M�,�S�"�3�=g�X�� �X3�I9ò2�{
un�1��l�A���U��?smt_���n/30��K�Y��=�f-�H��v�hN�\M�iN�2<�|3�%2<5�8H�N-�O�Z���g�lt�7t�"ly�t5EMC��8st�~NDU�0�d3�3��i�@N�/�@=9�)��"�w-WARNIN�=�=�b6 PI��/3440�P�Y1/x�Qmm/��:.c:��a��_ha�Ycr_f���+0x3f/0x50�f458�2�v4:���l9�� of�4����X_��>�Y4_�3i�kg�)�&or�$��i61���|/�p���z�'+th�{R�dysf�g�`.�*�"-EINVAL�J9�S69��DE�l4�:�_'i��@�?�1�m�5R�Herc12.�J9��U*��4Jl�+P���?mon�j�!6�}4�^�E��R�-���Ybio�/e�e401�5P��a�q-�\<"Dummy��i��P��ar�/t�%4����
�M2�.8�SQ��8��e��o�z�7R����e's�]�c�alef��0z��?�*]�Z397�;0fa��K��S�{in �4e�g�s2t� -t �gof�n��g���%��5AMdCLIENT:�?�z`l�#�H^ "no�:�"�̪�mp��1�8�\52��8Az�0
:�=)I��-v�:��ECI_�5MA�@MEMORY�me�%VM�e�~�S5�]0�S z�}bam:�H��imes�?��eploy�n�Up��qg�\e�
l� ed�
�+�� � ��s16�#���TT��- O���
@760�^���B�s�id��g����E�i�l�>7) D V!-Bus is a system for sending messages between applications. It�9used both�:the�I-wide�B b�fservice, and a�sper-us�login-s�,�Z�4��facility.
Secur�
Fix(es):
* d�W:�-daem�;crash��wh��receiv�� wi��incor�tly ne��d parent�8es���k�brackets (CVE-2022-42010)�zan�)���y�@�varray leng��nsi�|nt�elem�type�p1�p`_�_marshal_byteswap` doesn't proc�v fds�dł"��eign" ��ann�)��u2)
F��m�3 detail�bout�殐issue(s),��lu�:� impact,��CVSS sc�G�
cknowledg��s�
o�/r��la��in��m�f,�fe�Wo�R����g�m l�<�,�R�&ences���:. T����ck��v��n��������� man�-r��Linux,�8��tibl�E�uSysV�7LSB��it��ript���v��4ggr��ve�halle��m�0pab��ie�u�{so�p�RD��a��v�
��tart�`���7of��s on-dem�æ#of ���ekeeps t�Ԣ�)e�â.�� cgroup����ddi����upport��napshot�c�Wr�Cor�q���t��m�n�rs�Iun��auto�
poi��1��� �
bor�B��ns� onal��p����y-ba�}����rol �Mc����also work�sdrop-i�plac�r�Yysv���j�/:���p overrun���_ti�lpan() fun���Q3821�PEx��.C�.�ry�<p���XML�cu���Ie�E:��-aft�dree���Iy�Ye�}d�Xru�I�Z��h��TD���m_Ex�A�Ent�gP��erC�>t�C3680���sxml2�{��develop�<oolbox�z���W�H�Jvario�^����ndard���u: ��e����flow�U��PARSE_HUGE�w0303)�Adict�pup���e��� �� cycles�M4��SQLite�Cth�W��(�ta�� �3ine. A large�bs�&�ȡ&92�N�ed�%�lete�A�!tor���H�le��sk fil�Z�^API�(�v�#�*���Tveni���e�M�x���i�
��link����t�����enjo��e��w�<�Jflexi� y����[��adm�strat�Ehass��5����f�_��er��ql��:�z� -b�ds�� if ��l��of �n a�{���Jtr�|rg���ڪK�5737�b��
�L �� B�(Bourn���� �ll��which�U�Udefault��^Alma�x���p:��heap-�{-�n��lid_��me�
_�+���}715�|A�,�[
Ab��USy��x No��On�ASN.1,�specifi�l�dX.� ITU-T �ommend�:)�����ures����D���&ui��E���/Ru�DER�yp��l90) e�"�=de��- � �tasn1: Out-of���}���4ETYPE_OK��1-46848��KSBA (��n��c�+Kasbah)�?�o��k��509 ce�
f����ja�CMS�i��
�<���s ����B���6���buil�"bl��S/MIME�TLS��k���G���e�
�7�ia�7629�;grub2�<ve�l��2�>
Gr��Un��Boot Load�z(GRUB)��high���figura�Ǣ5cus�Y
iz�b�:l�:� modu�A��ch�������O�b�#
e�ke����
�'�2�
s�u���V�Mh�X
wa�����: B�\
���_f��
_�1�_glyph�g
�Ylead��o�wr�x��po��#�bypas�[
260�d��H�l�yed�Vs�W�\�V�_�p��uni��sequ���7�O�vSSL�{�hki���
�<����s Lay���:)�!��c��(�;)�tocol���a�%ll-���?gene�I-pur��e�uyptography��ko���?
: r�:b�r�H����&���Q���tt�d�JRSA De���:�
����Idou����&c�8�\PEM_��_bio_ex�D450�D�c-�Gfol��CBIO_new_NDEF�@3-�85�@in�_ �e��
��d2i_PKCS7���M6�MNULL�B�\a�D�(p��ic�my�E7�EX.400��S�.�u�D��G� N�
�L8Ւdu�Ԥ��F���J4�2��
Bug�HMAC�[��s�
l��je�b
���s < 112�
t� r��a��d�,��xFIPS�ue�Z#214����I�,���n��a ��
mum�1�-�����PBKDF2�X��stun��,um���) a�l��me��y��p���TCP�5n�����a�����h�f �p8�ɭ8SHAKE��diges�p�-OAEP�>�g10�g�SS�VP�La�g
���5�a���p��siz���h��
���,ٙ2�� �Ua�I�79.31��d��m5�o-224,�38�512��P�56����es���
�YDRBGs��
5-16��7ު�áQ���欘�h�v9���e�^2048�_��EVP��EY_�
��u�w��517����9.1 N��\[0912] - �6or:��� 93:�it��en��e routi�::��n� ����gi�Flon����P�
��bmca�7�� ��l�oca.so.4 (��3.���9�m��Hche��um�need�3pd��6584�
���*�O�o�c�a�!,����y�op�{ng�_���E���Pl2���(��m�J_sdu�2��net/blueto�U/�'��.c�
56��gs���% do_p�B_d�vec���skip_spa�4378�Q�Q__nfs42_ssc_����fs/n�4�c���Co��mo��D��D��� �~9�~Net�N���vul���1ft�by�J
�)py_vla�1�[��7�Qi2c-�t�iv���287���W� 9.0: LTP T����+��8 a�k14 �S�hir�dapi�FPl���8280+�|3308��d1 ��� NMI watchdog's���
�� LPM����5�FMDSERVER�F:�:dp������1�*�&������K�
oa�$127�Rqla2xx�VMe-FC: WARNING: CPU: 0 PID: 124072��xs/scsi/�=�_�c:70�S_�ɹ�ne_�tn��+0x25/0x30 [�#]���X��Re�on: K�n���L��vo T4�+�cAH40 USB-C��k����V327�Sc��
r U�+a��l�2)�.79�E�4, Nx_Gzip: n��ot�� c������decr�I
��y�š�un�(�ur���7b��lpa�
�D�. (FW10�/ DL�����
�MSFT, MANA��ET P�G��-9:�� race�.��"CQ�:�n��_ip�W�Rfix�b5�0��z�vPCI�W������
�Vi-MSI�B459�BÕVM�ploy�# F�gs��R��~�F93���'��' �{�5w�o�Zim��3#K�bs390x g�L881���.�R���H�3sync�Wup��am v6.0�K6134�1CEE�phf�#�'��i���?���ORIP�I��:n��s_��q_un��ef�8��]�p41����6�:��Ц2535�py�3��$tup�"s��a co�"�g��en�� s�P�B��Xbu�t�&" a��t����7�^�N��Np���:��*���� d(ReDoS��`_i�!x.p�L$089��G��
�7�t�%
�ac��!b�^-or��e� g���3gu�p���e�#�'�Il� �ex���,�y��l�� dynam�J����d���l.���#��f� t�0�q
�#�X�C�8�$�9o�/ w���O�}����7�#via �f�V��IDNA��o���8506�4#�C�&�����
k��
e�V�&-��dump�1 re���/fs.su�6���� ��4���xd�{
���f��a����a l�9����%5���%ua���� ��ua���"���V�-we�� �V�>e���Lua��Yfr�t���d�#,��%-a�7�k��ua�����|s�
nd�d&Es�;��1�,9�4�<�1�_��um��ldo.c�Sa �H�?f�w���l�d35���7Vi�"Vi IM�0ed��n�j
d��� ��vi �
o��$vim:�����$�5ret�#�qu�}XCh�eGC(�{��702�k'��GNU tar�f�save�K
p�ai�"in�~�v��O�fro��!�z�j:�$�V���C_he����¹���g!�y���t�8�O)� !nut�
�5�3���"Gnu�%���J�� i�^gor�ms��p�\�ch�&��,����D��"����s��-ch�D1l���(�Y���a�4�+3��
��CCM��g��kb�,mi�L�f���s�9�3� ���j�5�)*� ac��cmdl�[�q]: E����� � i��z�Y���le ��s�1elf�� i��r�;0�cC�2��vo���v �qun_�_�&�#�!�ALSA: pc�rMo�:rwsem �!
s�
n�4tl_��4� ��<v��
UA� 6����u�Bsoft�Tup��TC�r���-to-��� a��26�/�P9�- zfc�+�\mi��� �Bs�n�Mus�t�6t�!��278�&1���}
_v2�_e�U7e�O�3"�
/��er��s��#��pu�1
f�y�s
sk�Sa�Ius�r��
o�쵠�37� ���%�dd����%�Qi�^�x���_-rt�bug:�]�&circ���R����
��u��(&n->��_�%->&p->����wai��860�C��S� ��.s�_�@bal����!��3��� di�_� �}+�1��!�/k�@)��� �]��'�*#��k�
�K�+�1gpio���D8se��t���
I��h�R/�*� �E5���9 ��orvs���'swiotlb ���$ �in��fiden�L��`7���>E�((�IBM �] FEAT�b��EQETH�g���n�� ���e.�'�l��6�%��l�_ SPR�AMX: I��n�f�%�D���O8�5��c�V:�������+���1�y��d�D�F�5�
��0�D�����HTTP, F��eLDAP� �}:�0�{�
������239�&�
�]�FUSE�����A-pr��<l�d���K�s esca���h
8�{��Fi��_id���Eagle��/�3����~�?����>�pped�robu�7��,x�Y�
pth�)m��()�_�`) Samb�n�#-s�3c�P�7���N�!Me�>B�= (SMB�
+��aC��A�n�2F�l
S�-(CIF�I+�$
�j PC-�Dmach�m#����u,�]�Z���P�������?C4/�M(-MD5�k!Log���1��6
�dak�b�3�
��� �2��UG�[#��#��(���$�_�C�)�$4289��-ul�|
�r�n��ULP�T�,4���" �TD���y�j�l�Gecu��beyond��con���( �Anch�Z1��/34�[�p c���.�,F�,PUT_VSCREE�
FO ��tl�z�@% OOB��/�/*�Z3365� �M
�������!tty�_��s�A146� �F�,�d-kvm_mmu_�-pc�gva�F78� �~�
p�| _���-1�`�/1�>�=�W88��nV���:IBPB��9�O�� � �1S�vr���"��y11�G�%:�m%���"_��C�+�/���D� �D�xfrm�&be_�
s����/���n0�Io��%��Wib_nh_m�I!���
ipv4/�!s�tic��34��Ȩhu�
l�Yo_�R� mm/��'2�����>�{6_re��/o�<��5��
���s���-3�����_af�;���'�P��
��opt�K�
�K�I�G�{�/�Nű�(cv_acl�L�P��(6�*�
����0�Q_pt��Sgup.c�+�uso�k�e�uy�\2�X�]��~��8v�<re�&�:��:_�f�Q��B%�7�2brcmf��<���fla�_���+��A�x�UD��?spl��2MB_gtt_����I� gvt_dma�p_���n��f70�pt�� ���>�8ra�Gal�'is��$�Y�|+�l2tp��E ��o����:_�i�
ό�d�gigm��i�Y��_mc_�]�y� �x�o�,��i� �
2-�qG�����
�6��
IMA�,15��usb_8�~_�~_xm�2������/�&��*�
2��Jn��I��:-nd���ro��>����T/KB��X�4���374�Hn�&m�n��_r� ���gm� ��^VM_PFNMAP �/s���
�(�oB�91�¢flush�5 �:mis�I� �7K�nV�_P�MPTED�m�{�o���M����t�8���vl��dfg8�<1_��_n��0
� ���416�**�f�
to���
on_vma�re���G270���]ss_����(wirel�/�1�� 72�"B�9���
��C���j��_�(�[���^&�beaco��)��n�� P2P-�P:�H����/
�n-�r�47� �tr��c���!�C�j
�H��*9�Hraw�Rp��_�p�f�@�39����9q�_g�6�D�290�G�!0��7hostn�/7i�t/�=s���q�3-119�{���Tc���e�63�Q
�A�$���@s:�Ҥ��j��c�%�Ti�E
l�BE, se��.R���Aes �Aed�Z� R�-�"����at� �C�*�;�%t�; �;��(�)�&�!��=͔:�A�J$�����J�/�C/shm�sym�`F��119�51�\� �I�1�Y��cha�+��i�xok�]-�P�,
5�L�QU�C�a-gge�b���!��x�>n��J� n�35�P�>�fw�R ��J����e&�aT�N�B�
�Q�Nfirm��`�n:�� ad�>)�<��/etc/�&/� f�k
.c���[��5�Z�0�53r�~Tty�����B3�21�-@ 2�-@ �AnD��/Ho�9C��E�~P�(DHCP�H�����"�u�����IP��
��e��i�twn�c�t�j��K�V���������a���cas�~�gFdhcp����y ��-ISC �����*i�q��en��F�N��.�����h�o��@c�@�
����R+ry�i�p�;��Dd���Z�29��b�����(�"�{@��s����E�Ih��*b�[u�!�(a� r�6�J,:� (4.17.5)�#3199��� ���&�'_rnd�Yan����g�a2�9ct����Jom�'���"5�<�IU��& C��L Cip���+NID_un�:%�����~��rI�358�@����7/p��2���?(��Esev���f�St ���K�����/,�1io�eISO 9660 CD-ROM���.���i�`no����bsd�0�,���m2��a�3b�J �v�,.��;��pop�U(�3k�C"����7� �R�L��$_��� '�9��Aberos�I��T+he���������i�(�s�qy��Sy e�/nat�~�
p���
�U�5�J�
�/�Ji�vP���ҩ�r8�
�?s���p����ea�����T:�Wp�{" �*��t�U%�(�"�#��0�w>ce��(KDC)�7�krb5 (1.20.1�0163�b�[���8�� a���FR����� S4U2P��V0-�x*4�=��/��/9�5����
�_/�C�
H�
� �
�
�BL� �FHb��f�Z?UNIX������m'��h��e��0����nec�L�����i�!���D���
h:�=�WS� � ��n��$(����_�B()�'���J��3�O13�-c�F�;�
��d�p������7�-7�-ar��b��
�a�Hh��\s DNS��om���U�i) �s����s ��Vol��k�a�v�~�H-��a UDP ��M��F�~3206���F��
��%rl�T.�ae�� J�n�D���43�^�KP�-�kB�$l���&c�� �6�{_r��6�[[�$��
x��u��~u�_�gv�GZy�nX�Zpo�
�_��/�\I�#�\�A�i�f�a��sil��
�o�<�a5�aC�Y�8�@B�;F� �?�I[I��V�
-�0-AES-XTS� �64�xV ARM�Y12�_/�$�4��W�W�4�2on�c�{�N�a�>��@�9586����W�
�y�eXor�dX�
RX�i4�i�@�L ��G�@o �J�Z�n�6IV�Ss�l\�N�V�C��d��
����/���I?s�a?-��9��z��@`��`��`��_�lg�C��l�!+fip�(�F_�F�f�s�_$��X�B����
�
�e���Z (��+?�M��@VE)�
��o)9���Y��
�o()���DHX�,�r3�v��^&�r�FEC��__�O0�(��R���__�"�r�gLe_�+���
��pairwi�o�=uc�-4�
������r�Z�L��DH�T���O�galway�Z���^l��lb�=2�A�b��;pkcs5 ��j�}�>�B1��1�B�b>��GEM�B�D�&,�W�V>�=it�ci�ǥP�4�����q/_�'�j�t�>��s�m���as�5�d�P%�x9�>��d �>�7re���[i�&7��[���_�= CIPHERS�bA��H���9�,396�r�[�Z����
_�YA_��c�D��{�WP�VD�H@E�IC�2�e4�FC�[5�.n�����]p�FWb��4�m
�/1�
<6�*
23�.K���2��n�~��zed�� �qV�j��0�$���5�k�'��rFS� �-�H1�5�H�[� "� �gi�:6�_sl��_�)_xf�I�N9�N�H� 8o_�+g�I5������2�y8� �% �qAQ�lA��=- (���D�g=768�RPL-P IOTG/�
S�
:�D��c���85� �a�g�����:��to�-R�*�kPT�l���'�!��172�j��BUG�iwlmvm��fi�0�Q��"h��F67�6�bC 9�yqck��.�G��9�m/7a0a36�f2fd6�wa54a��f�hc8�Ae9b [��9��9Fix�Q�l0un��He�}re�kvmc�1Y� �t1blk�
nvme/047��a���E����S��l��7O�hif��a�r�+��es��r��&�7�y�3l��
J2 h�
s�`70����[�F]: t�& ��Ri�颲:1778��e�M�\�Q�e��o�$���
<�pE�� �*5���9�7e�U=��E�J�5934���2.��w�8:�los��@&�occ�ձ��:�wcach�h9234�wd�zwdt�^�67��, Munexpectedly (BZ#2192585)
* ice: high CPU usage with GNSS or ptp4l�5203154�5AlmaLinux 9 "smpboot: Scheduler frequency invarianc�Vent wobbly, disabling!" on nohz_full��s aft�Elong run�}78�}Dyi�percpu kworkers cause issues�Risola��Q[a��l��-9]�P229�PFJ9.2 Bug: [REG] NFS��finite��op of COMMIT�g��and�$4ERR_DELAY reply.�Y33�^��f erro��- "ev�syntax�: 'unc_p_delayed_c_st��_abort_core5'" b'_ value too big for�mat, maximum�� 255'��7471�: Inv�d charac�fdet� by rpmins�,�� Documen��ion/transl�s/zh_CN/process/magic-number.rst��8242��cifs: backp�� sm�Cpat�0s�� br��u��lose�9.1�0�1commit aea02fc40a7f�Tfix wro�>nlock bef�4��turn��om�)_tree�Onn�ܥ�904����x86_64, kdump 2��^nel���r��om�Gpanic�g"kvm-08-g�wt25.hv2"�_10614) The "l�'" utility��a text��le��ows��that��sembl�"m��", bu��ll�# us�� move�wards��t�f�Mas�k��s�!�. Si����do�]no�kad�8��ire�Fput�E��tartup, i�so�s �� quick���n�(dinary��edit��.
Secur��Fix(es):
�m��: cr��d data�Tn��ul�w�� -R"������� ANSI escape s�a��s�S��ơ(m���CVE-2022-46663)
F�0����ail��bout�5s���=(s), �-lud�t� imp�+,��CV�s���
cknowledg�$s,�o�/r���{�D���3,�f�㤩���Cg�m lis�,�R�&��c�:. Samba�5�kpen-sourc��le����AServ�iM�E��B�(SMB) ��toco��+��C�a�AInt��t��l�Hy��m�LIFS�;, which�� PC-��p��b�1machin��s�b���p��t���%�ou����-s���\MB2�0cke��ign��i��e�Dc��when����$= ���d"�0set�3-3347�
��1�otrus���hip�twee�Gis �5s�5�
��m����ai�:ail�y��23600) Libe�Cf��7�flex���H�igura�libr�o��rs�!man��key=���2���/. I�s� snippets��dif�t� r�ories�ibuilds��f��K�Bit����:�ck-base�X�r ov���in��_�Q()��7/get��>t�.c�x22652��h��xml2��d��lop���lbox�=vi»��XML�knd����u: NULL�nr������
ma�1upCo�jxTy�4�848��
�IHash��o� mpty�Mc��ys��n't�* �`�i��946�I
��python-�s�`�p����a�
����de�aed�ake HTTP �9easy�
�e��t: Uni�2d�\leak��Proxy-Au�)riz�4h�r����2681�����{s�9e�1�}������]
�vow�a���R����G
��s��s�
��, F��eLDAP���}�ZDN�$dc�� m���y�³$Im�fp�C�� fica�[
V����32��V��POST-�-PUT�����6�R�o���|�3��!,����!any��d����s� ���E: ipvlan: �%-of-�-nds�T
��U�u�(ea�W kb->cb�v�G
)�Ocls_�er�S�[l_� _gen�_opt�5�P5788�QKVM:�
/mmu: ���e��N�_�f_fa�E�N�58��N��u� �B
po�
�Cdo_prli�t���:/�P��0�[�YS�:��v2�
T m��g��cbl�L�<199�<�O�SSH�� �a��sup���La �,����, UNIX��s�vlar���
� e�� ����������bo���!��cli��_���^
ssh:��mot�bd�x�*�m�-ag�MPKCS#11����840��D-Bu������Zsen��m�^s�Xappl����d���:���I-w���B�O�urv���a�sp����-logi���,���4��ac����d�W:�-dae��:�X�P����ure�4a ����c������=��dri�^��{b��l�ed�49�
subscrip�-�
r��grams����
�u�#��
�U�4y��Bos���;�o�e�t�R p����5ɷ: �d�e
�ya�J
of�b.�k.RHSM1 � � f�t��Oal��y�\�
9�
�!��in��!UP�!�����p�*��r����p
p��I���(throu���-Get-��Y����dm�t����P���������l 64���It����h�w����� BIO�Ext�/�Firm�7�D�0(EFI),�Xp�4o�����?/DMI��.�is�stypi�ny�t���}��uf���r,����nam�zse�nl�^,�����g�Z�tag,�(��� ɰ�p�n���s�;-b��o�%�
a�9�x�?63��_f�����$� ����$
��Aic�N��e��hw��md: Cross-P��'L�'�40593�4�Vfo����Yha�y�� up���� ��r �yt�m�t:��(5.14.0)�
�UAF��nf�>s� �
�0�kup_glob�G�gg�y �0h�bl���
d��nonym�Es�0�Xb���3��n�t�7nf_���o�;�Hin��a�� �
c��a�� �h�jNFT_MSG_NEWRULE�x61�x/s�K�Jw�pon���(b�ploit��s �8�c��
��cf_c��in�A f�� 776�����nf�7���i��e� re���i��pipapo_���j4004�
\_newrul�d�]a �� �BA_�<_CHAIN_ID�\�Ű�y1���y���3�īݶibyid�1248�O�"��-�a�Ybyte�)er_e�4��001�Vs�e/r�����MSRs���S3��
s��*���Q163���&��bypass�`��d������e�S�a� �� �Q110��g[�6 9.3 BU�5"[SPR][EM�FHF] ACPI:�1����w�5up�+ 802��[D��"�TM��!�!���j"��WD19TBS��S��wi�'VGA/DVI���-C��ng�s�j���rtmu��H�M�B��i�bwok�����)ue��in �"�3_adj�a_p��1���*21��
AWS ARM�gs�+�D�Mic��hif��2���s3��!.x�adat��
SEV-SNP �|!��>��L��U# ��u���
ne��� b�)��blk��ush_�m��562�<bpf_ji��$�
��g�-�dpy_�6��7�1�;69�o"��ep�c�j�cmsgr2��"fram�
����ng��� ck�707�Tem�����D�i���FIP�$teg�S�U��ould�=zeroiz�6�7%�]76��I�\���avf�g�ơeJu��Ӧ1815��i40e/� ]��$C�!�m�AMAC/�mi�41e:b7:e2:02:b1:aa/0��ifn��X4f0 ��0��� t��il�ava�:ble����lv� ve�--sp�rca�I,�
��
�s ��hu��H48����%: ���5 �`un�
PMU�s3017��NVIDIA�G�: Ba��$i2c: ���� ��$�� d�#�fw��S483�S�nPEC���%MBUS�� ��X�*[Hy�kV][�i]in��le�6fc_���m��in �vsc�,s�{
��O�Aim��&���K3�&��K�"
�A o��CONFIG_CRYPTO_STATS���@(e�����$is�0h�j(��185�,�ק�Ex� �Shv_�������b�wsrb�'�E
SRB��US_INTERNAL_�(OR (0x��
�{9�N
�z-�}'WARNING�'���&al�)d�'!�A�H��drm/as�b
��
��)���t6.4�M3��Lenov�a'��] �&��&��M#echo c > ��'� rq-�x".�\70�h�f)bz20��69�/��/��ral�;(reg-suit�
�)aarch� (�s[pid]/w��
�)'��d392�eE����(�FEAT] �,*�*��_p���n�<HWP IO ��*s�3��,�l��7����Y- New MB�,AMP�*� C�~��Maya���}+a��o�d)�X896�X���ZMDRA��
- U��������k
�G�e ���� Add����5��-�+����1����#�r'��w�"�4���IX.1��t er�� 6)�[a��15 �M�ie� �!�&�����Ov�k#_�_��dup�G260�3�>Me�o
y��
��p�!�#c�t�E�
6�
�g� ����p C�(�/�ʬ��%��;),�Am���%m)�ڢi���� �s� (nscd)�y m�ip�,�Ho��� With��se�q����c�����
l�$�):��%ld.��*�a��o�v�ge�*l��i91�0�QS�$
�H�Ug�Qddr��no-a� ���K527�Kp�i
���u��P�r806�Baih_i��@��P�[$����pre�3,��v��obj�1-�zn�Q��m��l��u�p�*���u��*cl�T�ex���Q
,�y�Y1l�% dy�ic��,�
����ng. ����|�?y��ll�C����.�Aw����W�%: TLS�M��ke��0217�&c�h%a�&p��*��SOCKS5�pxy���q85��Sc��i�j����n�u��8�X���nghttp2�������,��0T�
�pP��"�� 2 (��/2�_/�{C���,������web�?�vul�3�
t�dDDoS�1�_(Rap�LRes�L���448���#C ����s�u����s���.����
mar�F�3�Tf�%��.�M3��Bcrypt�ph��3�4�z���$i�I�<uth�Cc��ma��ԢI��7igita�d�E+a�W���$��7��Q4��
kcs�]rdos_�_�*� rc_����
97�0Ad�(�G�m
s:�Ҥ��j�ߤ%�Ti�;le�F�7��R� No�m�Wked���b�;t�G�Ua c�L�]of�)�q��Zma��0���(� ��in�K���0��� 'ar,�, g��f,��
, nm�������an�T��a�Lf,��z��.�p���m
2lin�] ���
�/�l)_bfd_�t_ge��ymbol���[_�������)����)2��:�>��r��:�;.ac�4��rol�2so�e��(R) PROS�?Wi��)WiFi�+276�;�A\ 40964�\�,��me��ism��a 63�<ʾ�9v�R/in�] 3�1�]�2R�D;A��.Pre�3���{�"����;���v056�H� 807�
���'�
��n2�#�����=��dAc�C�*.�/�!��@/�@.�/3424�o4�m�6�x�o?�~�*C��"6ty'�PyCA'��I��
�������i����Ci��b�v��6�|:����via���2�� �l2393�Be��A-� 'C��%�Goo�>!�Q�B�y���[:�c�(9������=_�' _me�3��8468�<�G����%��2�9>�?�4��s��2��6te�C�
�]�
���-GNOME���s?�kF��y�n �#g���������<�0c��ms�
@�,���#: GVa�G�af�$-�e�
�t��*�\�"��i�'����&�=9�� �Wg_v�X�'swa���(t��4&��ime��� n�9�Y �
�)26�i��de�-� ����Dm� �E'�'�[��Y6�AK�7(-���-����#�M�n
�zword�[��(���,��X�4�Tuser�|g�+2p��
oun�:�º�E�1"��
�yl�Z��'�d(1)�Q�Y46�B*
c-ar����@f�Fa�eKch�J�sDN�D��DN��) �.�4��re�@Lv�{API.�6
/��(1.1�#)�A#103�!���3���2%_s�q
��()�+mis�y�?�K(�^90�
�aB�aUnd�2in ��_���
��)�311�2�D��)�Fic�p;�0Kn��J�#�f�����IDs�Q�&�Q��oToo�.���CARES_RANDOM_FI�T/���R*�)mpi�F�\� �:��|�=��I�,���
� >�( ��0� to�.�=�^<�)���m� re�~H��palg�2hm�G,�6�/166���Z�8:�i�}i�n_�T_��� 28�Q!�}z��!�4���3.9 (�.18�7����: �1P��K�Ky�65�c�E�07�$5�*=�$ g��R���?GNU M�r"��&arbit�
p���� a�e��s,�����s��C���};�ff�#�����o���)���H��4l�0� �B�OR�C�s1-4�^7�=A�ӎR�4@s�,(4�:.6�<1�x1�i�s��Ro�<I�I*in��� AUTH�1AP���z5��@i��Xi�dssvc RP�I#�+��s�*li�%�'��D6�K���n�wK�L �#�� -s�u���0;�;�E�=��D�)G��d��g�(�[ea�4��n�� ��0��6�753�դCTELNET�q4IAC � )�43�4SF��P��~��%���9a�E1�:4�:�J����re��st�}3�=�A�tpm2-ts� �%�5�=3��T�WW�bPl�H�;��
(TPM) 2.0�A��7�5��D�C�2(�����K�J�*#�����"3�TSS2_RC_D�F�74�=�pi�5�M�k������st�7%��Koft�`%�M�,.�@6n��4f��'�VP��I�x� PI�r��r����8acr�C �%�P��3��ei��"P�5I��s�Xs�a��z"���y
n���(new ����rout�<�p�`�L_-�@D�dB���hod��8�kc�Jb�e���r��o�]9�_m�2�
������u-�����fo����ic���xI��c��*�T,�'ut��0��E��8�j��
�Z�8to�>�x��:�R@a�N���;��-��va�/m� �!�z��e�`�9�E6�<��]>�qos�n�R�0�/��K��i�(v�~�s��y���Eby e�Bn�
�~n�-���}c�hI�4S�6s��/�Jin une�$0��orm�"�tP�s���V�w��e�each�ֻ��ahel�fa�`�hi�p�
1y�} �#���
��bu�ce�D(KDC��Irb5: Den�^8����O�d'��un���}B���
60�`h�Pdou�=�'�� TGS�8 c�3997�A��l�LQ���a �"����T�R��#�wp�P��,�XZ�,�G�g�L
�n�Vt�[,�T��F��Ovm��?��,�F��!��pwdx����:�s�A�H4��>�<GAvahi�.�V
� S�4Di�0v�\� �#7c��B�#��#�;^i��$Z��.�{UN�Qi�n�@�&Xat���dd�do���Q�. ���~� -aw� ��%�m����I��u������mnd,�R9���,�� �peo�8to���
���n�����<��[�Y�P���1a�����3-���l-�6Yy-�8������%l�T/�6/�C�bY/so�g�P1��SH�ir��
�Y�L�_�6os�g �!_�Z�,Ms�uj�D�&�do ��HEly-�˺�?�>s5�D��®�K
�=shed� D��W�198�=� ���jsmbd�� �}4to�& x�i�N�C�@�Q�Qoo�f96�)�3k�6
�u�Jt�5�
d-on��n�[
�b]��?9�R"rpc�H" ��g�!��d�
�Uslee�)�76�T4D �� �h�z)�'[c�S@l�k�l� �
��v��X����5�~���A���<o�IPIN�L(��
�Dk�_ks��P��w�]Z����6�>N�T�MK�{����#B-� (en��<l��)�T1�To�� MyE�N�4N�l������?�7r�k�^�]53���ahL�=�Gki��a�)S�L � ��� L�;(�:)�������8(�I����(a �5{-�s"��-�]Q-purp�Jy��8���gDs�=�X��8�2���IV�H.�J�53�iwT���HM��f(R�����Z5��-�����7����P�f ���,�
�
v�8,�
�/� ��d�&����{�� OCTOU�)mi��
�BX��u�^f�Bm�
�%9�1\�A�:�3��wn/ch�/�Q���\����U8�Uш����/p��o��%�e
m�v@��1��u�a�|s�:��3�R� �;���ks�G��o�T"p��ע��f P�POST abilities.
Security Fix(es):
* python-urllib3: Cookie request header isn't stripped d�Gng cross-origin�1directs (CVE-2023-43804)�e�^R�Wbody no�Saft�h�E from 303� atus changes��me��d to GET�r5803)
For more details� out the s�issue(s), includ�Ӣ impact, a CVSS sc�G�
cknowledgments�nd o�/��lat��information,�f����R�� pag�m lis�,�R�&enc��s���:. SQLite���� �9rary�-at��le��� �( database en��e. A larg��ubset of�&92�Nsuppor�}�%co�Kte�A�!tor��a s�l�isk fil�ZT��API�(design�*f�iconveni�ƫe�M�xus��pplic�s��link again�ɥ�c��enjo��e pow�<�Jflexi��y�Q��wi���admini�Q�kve hassl�V�5����a�fpara�server�"sql��:�p-buf��-o�/flow ��sess��fuzz�71���P���n�'��pre�3,�ac�g, obj�1�en�Qprogramm��l��u�p, which��dmodu��, cl���excep�%, �^y high level dynamic�� type��d���l. ����s��fa�ԩ many sy��m�nll�C�^i��as well��.v�ous�bndow�̤;�K: Pars�.error�� em��/_p��Pdr.py��a��or��value�. �(�Z �5��tup���a2704���Qgrub2 p�ua���>vide��W 2���'Gr��Unifi�TBo�>Lo�(GRUB)�Ʋ3ly�figurabl�cu��miz�b�:l�:�@��a�prch��ctur�����S�b�e�kern���
�'�%�%,�`u���V�Mhardwa��vic���: bypass��� �
wor�k�X�'fea�`�001� nutl��!�NU T�s��Lay�h�I(GnuTLS�g�C��Ecrypt�ph�Halgor�m��]ocol���6�SSL, �R��D� ����: ti�s��-���0��SA-PSK au�
nt�$�598���K�+�fix�z�+�:4-0553�:re���e�f�je�T ���d�7ibu��tru��J67�FNet�/k�S��i�"(NS� �k �. ����s� �a�
p������elop���m�c-en�nd��i����j a� �@ns��vulne����Min�?a�L�"�Tk�?6135� sudo���ta�1�ut�
����ows�
�
�to�=� �Fusers��Qpermis�y�,ex� te
priv��g��omm��s,�o�X�C� �^� ���purpo���
hav�]o�g��a����Bug��REn��c�H(��8487� : S�do��T
escape�'rol��� ��in�0re���utp���S6�S ��m����N42465�NT���C��u�� �,Reg���St�� V�|��s��OpenSC��/���
�������i��sm�G c�ws.�Tfocuse�"n� ��B�oper���z���ir���q��, �� �ТI��#d�/tal �Z����������s�z�j�=�k
�c PKCS#1�.d���M92�lugg�A�4M�O (PAM)��a����Aup�lpo��A�Ine����o�i���@h���V
�H. � �� *��m: Im�Ep��Host�e I�S
��in�(_acc�L� �oA�C�zB�
�1096���
���P��Linux�!,����y����o �����K�]pf:� ��runn�@���k������w41009)�IUSB:��ia�mos7840:� crash�h�Wume�F2244�Fcxl/����\-�-fre���t�-of-�er��co�shut�n�_50226�tu� �� �� ��%����s �U�*�x�1lect�Mro��� )�x: `sc�pt_��`����`�}�-��j��arbit��,s�Td��
��2336)�si�5san��z�*��`�>�_�K` ��me�J�/� cre��()`�7�p7�)<net/smc��il�#
��rmb_d�2 �u���SMC-D��n�dump�26615�block�
��aliz�teg����-zero bef��wri��it�m�Ma�i385�ii��
u���� �
�ur��_�-
�_�_fault()�V499�V��T��: �&t����x�� ���> �O5018�O����,�� �do����&e�U��n�_���"ctx h���b669�l��: avoid�t����und���Sq�$c_pkt_len_�̩�[
UFO�\�9�nft�y�~:�Ӳ�f��!l���S����kb_���=�}��51��k�
��qVirtua�iviron�w(v�
) �8�3�~�=quot��th�K
9287)�[�
v��d�}IPv6�ӡFu�x�e�
1168��v�t�L��Qr�h�
�W �T�004�\�c��:
�2� ��h�����[���X����3
s���s�����p�;�HTTP, F��eLDAP���}�2� �~��j�8
explo��a mix�c��flaw��3��21����SH�� �]�������"a numbe�L�? UNIX��s���� �rIt� ����7��� ���%�bo�4�����Tsh�(��4
t�r�at� � Bin�eP��@P��(BPP)��87��*��n�T����j�r
via ���vme�h���P51�$
�3�c
B��to���w2�1�null-ptr-de�բ��_��_� e�Z�u2739�@
�Ad�PF_PROG_TYPE_CGROUP_SKB�:h���G�6�l�3LINK_CREATE�i��64�i�va�Bv���rr��in�#�
afe��
0�
fs��
�����4�Dttr_�s.���
����ed ��7͢����_u�be_m�i_�k"_�Ĭ7675�sdiv�
����;988�arm64: �ys�O
mov�roken��R (�D"ral) ���e�V5�N�xfr��Bone���-�*��in��N���O11��SCO��UAF�p��_s�o� ��H25�HIS�His�H�nKVM�&S�Ign��nCR3[4:0]���<�pPDPTE�qme�
y��š�:�
�[ w SA'��xle��[SA fa�y�r�m.�is��� �k42�
bne��wild-��-��_unr��X�Virq�: p/gic-v�_D��_a VMOVP�ra���VPE�O9Шhci���_�
_�M_�]cs�\25�qsc�E
/�ra��W��f��&
�j���ask_�8_���23��o��nd�Ir�4'n t�a
_�k_n�W_key�P6���
���ki���?#.11��1��',�: e�IBM C�N�, �� ��/4�ϡ5��M���x
���; ��}�G58�e�YCo���o�
���firm�)#�#d)��JeS�L�M�-l��MFC 4960�#�1S�
p�L�D Exp��2�:0863��
7�E�=z)��AP A�s��ĔF�� � �V3�V�K�n$��also�K��soft�t�[�
�c�K)b��_�����$��) Sl�Da����pkc�R)otd�ge�H�"
�d,���#�������v1.5 ����ipher�-�Mar�F��091�r)�a� a�+�O�;(��XML�cu���pe�E:�3�,�/s�t�-ger�7�+���"�B�O3�4��N�zE���l��n�]�~�957)�"l�C"�;���� � '� ws� ���fm�I"��", b����!
�!to �M ��w��@�M�H�'�.�1�Y����
���8�r�+put�Et��
r�c)��so��=�*quickl�-��G��
���d�Z"����: ����u����
��LESSCLOSE�
�d2-�!2���"��'�)�%�(83�1�N��a
�_1�'bu�G
�/�
�(�M��%him���8� st-���UEFI�+�C�s�0�/t����(���x
�3����,�7������
CE��http�:��m�O%��-�?e�,��U4054���P�"��m�E���p0����� ify_sbat_�A
�32-�hs���r8�rO�6�prin��.��%�C6�C����_��;�mal�,����t
�]9�]�\�����B50�B���d ��
�MZ b��i���L�7L
��GSM �vp�3n�D#ac��di����N)�W(l���*�k�Y�U����(�1�, �R3��,�4133�6932�,9198�51�j1�779�80��{5�2658�� BR/E�PIN��i�p�
d�B�9 �ka���)on�4�1��0�l��cg��)li�>$����-8IX�
�t �sl��kexha�O�2-0480��NULL����2-�-89�6622�15�2754�6� �257��841�4�l�\!�k��N2_�|8�r���!b��/�#�J
c��459���a� _�!s��K�*�"_�� ��604�|GC'�.�0���� �����,unix_�6*e�g(����
ic()����o���31�hO�\��zp�9�Wroup()��,��&l�0�67�)ev�'�_s�!�u9�u�3F���C�|��6y A��� D�tn���,40�Nird�������,�;57�2K�;dou���}�8��#_c�Ln��vb���9���W84��HCI: glob�
�)���sync��d86�S�b�"1e�!�pUARTSET�gTO�I�G���ua�$tty_ioct�*3��f������H745�y�89�9��12������ IP��_CMD_ADD���SWAP����U�/k�"���f�&_�_�w!���[586�Csmb:�c��9OOB��/mb2�h8���+�5��mm/s�1���V�in�a��n
->u�
�V8��$���C��c&tea�����v#_pe�1dic���2�8�F��[
�?�A�258�V���]dge:��#�/in�-��"_�h_f�h)_f�W2hƯ78�]/�:��DETH_P_1588 �d�P
�^�î0�P�i: �f
_c�d�&����l,ooo ��g�6�CIFS�� �j�De�M0�I�,V�$����Co�E��*�V�y��f�r�:��%_�ed_�*d���&�9���u6����6����a��������wet �&!�� 3�L�R#�X��2g�����
�j@s�G4֔tx�x2�u��՚� lxsw��p�
ru�0l_tc��#F���� c�D3�K�i2c�801�<�Q*�_
��a�t�ha����9�}��m�arri�@���u-e ����'�F n�;_�/�]60��� �8 QUEUE/DROP��+t��
��,s�W�local�s�%���zt�@walk�,pychunk�*617�O�/x86/lbr�R�� v��K�'��D���8.�7�anonym�O$��*���lip6_tun��NEXTHDR_FRAGMENT�b���,nl�*tlv��_��,�O3�Z2 �Ad���
Ch�JD��֤��n�6�'�Xi�l��B,�W��Alma�-R� N�s �r �w�͒
Squ��v��>mp�@�-on��
���r�
��7�/m�c,pu�c���vfs�U���,-�W
��un�Nd�?�<*���y.���Gdesti��R1�b1�<�]�&D�F�����a�"�$ymb�6)�`�Q107��6���g� HarfB��D�-�e���&T�o$��i�F�Mh�Rb�R:�;����O(n^2) g�#�!��con����E��9��.��:�Avahi�
�DNS�??���0v�B/� M��*t�#���Z�2C�C�T�?i�T/It �B/�at���dd�d�/a��n�7�`H���~� -a��b?����|l�e=��H�C��2�R�K,�/no���,���I$�peo�to��t�0��O�٣���fi�
har�E�~<�P����a���^&�3�+��0r�Fin�_dns_�� #ap��d_�O.��-3�i46�n�O�=_label�C70�Cdbus�3_h�Z4�6�C1އr�
��B2�Ba�t ��Ώ�=N�ex��)p��0���s�����.n� p�exFAT�/���k:�w�s�r�C�H��z�s*�:�B3�H�43�un�D�"�O�Nan����Qsp��E
23���:N�q1L�>
�Ak���"Q�<�S�~s�M"(�:��&�g"�d"�-",�h$a�T -�G�9� '-��E�"y �"�f�1�AES-SIV��&�z �/a� ���'�D��;i�=-empty�oci����en�+�99���~Ex��d�� nt�O;��DH �H+s�2� y�:4� ���Oq�H�N�1�#!��G�a� �Xly�
n�'9.42��or�e�*���!b�vN�9�.
���;8ÎPOLY1305 MAC��s�I����-�� P��RPC�[�9��i��")p�|���P23�;��'�V
�-���N�=���&��P�-��-����8g��,ab��,b���
(pse�WJ-)�#*�10��$�Q�$�ca�es/ntfs��%un��Mc��e���
692�]�N
���\�8�AY���F���-�H
�� �M�n�:�š��7�0�/V�7LSB ��A �C?���s��Xgr��O�D�K�?p�,�
����RD-Bus���?���r,�泌s, o��&�;�3��9�#�b�/��keeps���A:f��e�<�fc�!��n�����,��@snapsho�
��q���P�[e��L�m����ao�
�$��� ��el���Y�a����y-�Y��!�ic����-�� d�-����N�9�Yysv�����/-��olv�]U��$re�%
ns��z�7i�S%�U�n1�c(D�RREC=ye�7008�@ ��erout�y�-��P���;IP�)�o��i�� t�J����(���+�) �1�>��:���2�=lin����316�<�l
s�^!�
�>3�0�<�D@�K�45�N
�.�$�U��:�?xyC�/�J�I�Ys��?�bma�����th�W�F�~�60�_a�lMi�#�(H���I�`
��R�� �Y)�A��%�As�Zden�"����-�N�[��?���H�T�q���R�wHdif����4��H��#�3L�ϣF� (ELF)�/�}s,���HRPM�u ��v�z3�o�1�$�\:��"����0-�/�%�!�o�unc�\�55��L�>�wpa�>���� �d�y80�_<X�,X�%�=�;WE��FWPA��Y;IEEE�71i /��N)�W�:GE�c)���P�k<y�key�goti�'�|a�h�fo�����
i��W�T
�,a�:���ƌ��a���WLAN�
i�����P�5�b�d��Q�5452160�A��8��2��8�?�x�'`�?SSSD) �� �\����e���^t��2+d��$i�7�K�����A�����g��N�
�!S���A��`�M�!�l�P�Q1����ha�-!�J�&+-end��=��T���-����s�k!c��ss�$HR�/�}�l�?6GPO��a,�/in�.$��ntl�!F�H05��
�`_�{��JIRA:�Q��a3*�5ss�hc�To�"�P:a�et��W�4O�=816�� �I� �s72�*���xml2��
�b�3box�Y���#��?�-� ��u:� �I�?Re���550�E�5� � �3��!�;n9�C��,�������4d��/�u���=�U6�743 h�.am��Ins�.�ra��W#VC�QU� �9�FAMD-SN-3�,�L2��`,���ffdhe*�:ti�:i� �s.��0a2e5b909���B.fips_�Qed=1 l���@"w���9cy t��>��]�3mglru�I-u�1>�e�2\�Rcache�B92��B[EMR] [TBOOT OS] SUT �ld�1go�nS��p�s��9.2 T�OS O�>CPU ��-16 �^BUSYɄ6��$����F ����t�
- NMI���v+�E30��E�g0� :6f:00.��^PTP�� ��get��C�L
�l�[f�m/�I*��7d�h�unbin�Z�x/��O664�$1��/�V���[� "1�3�@Zl�
3��4�^
��;in���E��s�m7���S0�R0�.�9�1pe�nX�t�^m�+�N�s��gl�aU��d�4��F� �/���<����p�),�Am�R7�%m�X�i�:�J��� (nsc��H�#��p�9$o���tW�o$se�q�����v�0���� l�"�)�_;��Lic�gs ��2�z�}O�r2-CN-��1
�9��S�e��<������F335�P�G��M���u��Oin�)
�Y��Y�2ma�rm�B0����'l��V�r�L�Z1�Zas�cs N�0�3�� �K#n-��[g�4�T��ng�D�v�$� ��Hyp�kK��p�V� (��X/2�(%�{C���y�p8ONTINUATION �N9s��PS�P18�
�4K�](�U�1K �S�8��r���+K���KOS��X�f2487�'ipv6��r�{=�
���S�7��
�Ufs:���F� >���9in�_br�_�� e_�0��S89�
#����c-a���Odefi�|h�<h�RJ�� �
3(Dom�����) �a<�����n � ���S�N�~�.�6�_�C��56�u(�8��`�HC�pi�v6�e�!��q�X��/� ��#a�(b�}�f�g#�c�3�q�=��Xg�o+st���g��SE�itr�Dsho��O�7ter��-� �:|�%������:� 9��E��sos�� W[rt with a crafted name (CVE-2024-2947) The hsakmt packages include�:thunk library for AMD's Heterogeneous System Architectur�gHSA) Linux kernel driver (amdkfd).
Security Fix(es):
* python-idna: potential DoS via resource consumption�spec�(ly��inputs to �L.encode()�3651) P�q is an�4��pre�@,�act��, obj��-orien�^p�ramming langu�<, which�Bs modules, class�exce����y high lev�"y��ic dat�|ype��d���l. ��support����face��many s��c��C��i��as well��.v���window�̤;s��: Pa�^tra��s�����5pfile.T�o�3Dir�3o��t3-6597)�G��zi�8�.��vuln�{b�
���-bombs�(ad���deni�xf servic��0450)
F��mo��detai�
bout��e�3��issue(s)��]h��mp��,�CVSS sc�G�
cknowledgm��M�\o�/r��la�w�)ma��,�f��O���cg�j��s�)�R�#����sec�7. OpenSSH��� �otocol��le�}�b��Nby��numb�q��}, UNIX��simila�p�Yt�� It����� ��s ne��s� bo���!��cl��_��er�7o�0ssh�8ossi��rem�� ����3��du���a��di�i��ign��h�ll����6387�y�o� ���+����Ȥ3�M,������. � �� *�K:��t/mlx5e:�"�D�spr��d�� bug���j timestamp�hnapi_po�P��ext��52626)�kBlueto�A: Avoid��use-�r-free�mhci_error_�e�Y�6801�Ycrypto: qat -�(lve�Ed� ��AER ��o��U974�Uxen-�fr�ܡ�dd mi���akb_mark_f��cycl�`7393�K�gf�ga��dou���fs_��_cre�b_groups�W67�[smb:���]UAF�3mb2��onn�h_���5870̨��r�
�U�pk�w�� ru��v��t���O96�O: hns3:�� no�/llow��_nic_�%_�%��p��dl�1-4740��
B����ci��-�>n�.��_�_�_se�DJIRA:Alma�1-2894��BUG: un�t�fe�� fault� addr��cf16bf752f593ff8 [a�Tl�T9.4.z]�k35672�k[HPE �& ��]�qu�Q merg���g �i�cnsl��� pat�f��i���x6220�x�9]�/�� �4�\/�_de��.c:51!�\68���: DPLL-���ݡ71�)CNB95��sched��pda�(TC�����t�m v6.�y764�.IPv6: SR: b�e������m�X�S69�TRFE] B�Ot� s��swap�u�o�
�U825�#I��D��s�,u�w�s�p ��5���O����gfun�^�8�� ��� d.ۈ595�ީ�]�auto��c VF�bet��Tx MDD ��
nt��9083�MC�»REGRESSION] �Nbos��:�
brok�'�z10+ sockets��495�ybnx2x�*�1sh�� PCI �q�e,�s�|
k��432���
��
aff�0�P���
409�'�
TIPC m�����=mb��$
���=il�b�688�
e�7�is�/c���_dsaf_�� c� �;array �@
f���
�/ge_sr�Fby_��l ��548ā� �c���whclgevf��nd_mbx_msg�V9��v�
mem���lap�when��le��char���buf�,�Y2-4862�j
ca�"j1939:�!��Madl��ch��Y�#_�s_���rw� ��
3�mm/vms�f�u��+
��akeup_k�\d�[��w�g zon�?dex��7�n�s�Us���%b��i�,e�B� PTP WQ xmit��b�on� ck��oc��s ���pul��Mm�����'pÐ85����B�
f_t�
��use�l
��� �<��ze��"�S�a�|7�avm�w�
��f������Ad tag�c���W435� �e��;in� ���jcript����ehavior�)�tcp���c�9 _�Q_��_z�r�cp_twsk_uniqu��.��90��
��
�( _hmm.c:��src_pfn�c��������\854�Ir8169����b�I�u� �Rra��cTx�R��a��`�r��g�iv�c���fr���#�8841�^� ��yt��xy�i�Wu�f�.�/s���2is��d��h���v3�+�
octe�0x2��: a��off-by-��r�7�ys�Hpa�O95��blk-c������d�K�
��io �1
�663�z� � �
Libndp� �(�C� NetworkMan�Pr)�Eat� vi�_ �,� er�$�a�
�4�b�Dis�P�� � also�D��l�U�idp�
�n�&���NDP���Yl��:�9�[r�����<�ng�field��5564�t �_firmwa���| �8�e �B�$�.��r�T��
������� e���oR��i�'g�� sp���Tm� �sb����*i��ize�3-31346�Comm�����(in�o�(CUPS)�-�
�Yp�*lay���(
��c�: C�d�M�*n�bit�ch�W 0140777�~2����$�� �4�d�p��kr�es�,4032�'�b���k ull� ��Ar����i�) l.c�
����ogic�t�B�z�{e��Zgn�[524�P�4�w ��
ng�M���= �I�W ���5_�1try_b�:f��m
��U
7�J
bp�� �
ac�d��7
�_�
r_��
cel_a�������c3� dm:�6���{um�f
ho�
�Y�suspend�K88� �ip����;ip6_�y_mp���ify�8��USqu�Nfs���
��n��is�&�v��d �u�h�8�^98�^nf�
� ������>��s����}���{
sepa��^rs��[�(s�O3�Uicmp��SNULL���|�-_build_�b�!58��b�bige�����irq�;�NAPI �~�s0�Rsto� ��.shut�_nĚ8� scsi�mf�d�������fc_l�
_ptp_�up���8�G�h��c��_���o�
�Ī�rx_k�p�]�,���`�X5�`��p��Rel�}�ba��ef���$_�l���_þ��
24�]Mov�PIV'���@unregist�to���#��n up�h5�*�9�o$-xgb�����aund�e�I��7��e��:��
b�Xer��"life�����d�E0�/ph��6����m�iple�aws�6808, �7065���99��e���?:�R2�awifiԄ97Ą52�4���51ä78¤�4��4��937��941�22���r���6�igc�!5�Admae�e/idxd�,182�,��R741�����903��6�,"��5ǂe���!��6sw�#�eep���$4�<�5�!91ŭp��/x86�*�6�\i40�M602Ÿrt�<l��!�'1�1�x���7�t7�G�V606�W5���2�5��pvl���t�a��1�!7�e!��ir���$��tls�48�uxl/�ođ839őbo��%948�]n�r� 8�3���1��2� �����7�����n lo��)���.
��s �
!��s�HTTP, F��eLDAP�>r���0/2 push h��g�-��239����l-�t
�s���c��,��enh�
���x��d� ib�~��i�=��%���5v�+�������7�^�N�;��pa/���
��.�H�
#���d_�/�{,n�\�6345�(f*f��� ��_rb�;(skip ��
v�/
����gc�z6581�I�;t_li�:�"����figu�I��I%e�lge�g�d6��vfio/pc�L�
� e�hINTx�s�p� 1�
����._brid�V ��� �%/�*�*so�!�x���o�*p.�^�%�^�r�mut�<�
�}gc��q_�ͫ�ab��
�>�e25�e�%�
-�#�__�nexpr_�l�u!t�7��$c �;�b19�b�S�c:��i��(p��e�\�H6�H��:��rm� cas�3e��pa�,��m��tack�j415�j�+l��
s�v�f!����A����a��
3��x�A�~�
��di�L"r�� ���
g�R*���ba�$h��#on�l7�l���� �y4����ec��n�O��co�c'�O�X��]�I96�v�a�LAG�J�)�de���Yy�Y�*_vf�00��
���� e���T�<v�;r���ҦZ�77�ty��_gsm�x� CAP_NET_ADMIN� t��h N_GSM0710 l���X���hqla2xxx���z ��&$�_edif_��^�* s� � ��-1netif�d �/�J�@86�P�0bcm�.��ar��me�_+�A57�ORDMA/rx��eg�.in �_�=_�ue_pkt�J4�c
�+t��shif��d��[�#in�*qp�_�c_�a_hwq�a���Xx�m�(�re�� have�~.e��e�%�l�:yt�X�-&d/raid�2.���&����%&ai��itself�Q�Cr�,_SB_CHANGE_PENDING�o9���\��k��#�fib6_d�41_pcpu_��O��
�b�?cfg8�61�_wi�k�R���_�e��O�,�ac�O�����eee�Rs�&ps_���9���^�[�'hug��
��1n'�5��s������6lio�O���iwl��v���8n_�^�r ��acce�� ��Y2�u�^w�Aio�\� ��
��l �gi�_/s��
�� �{3��!'�h�������$p�ۢ�mfua� �J��[4���ܶma��%�����*�NF_HOOK����End.DX���6���5�`�4��0�/����}9� 2fs��
e�R7��'ip�@+�N)a�j'���'��do�V���)��-��tap�5_�sh��1�'� :41���Uun�%U �u��$S�)SOCK_RCU_FREE �zl�h*in�!_�S���/,�Q�NFSv�����*�� s4�W
�_label�N����ntb�C:��_�?�()�7�u�����__��o�f�vm�q�N-���,�:o�I0ctrl�q� s� ish��c�v�7���3���<�!����6��+poo�0�
��POST �/i�T�v:�oxy-��3h�/#z�� �6�����I(d��cr���e#gi�2d�=���1��s$c�t$�em�R��doesn'�*�i:quo�� �k:l�
��0�,�U��n�h�6�a3�gKerbe�Q�i�r�g ���3�=�|�Gc��m�0�o���y�;�E�
e�)n����n�-�o��c�
��+�s�8ds�/�/�J��n���ed ���0,��s�5�T���
���|0e��
�G���ahelp�y� u�-thir�M rty��#key�Mce�� (KDC�mDkrb�7G����*t�Y8��
�$��3 � �Bub��2. (/usr/bin/b�)���" �t���l
�r�-l�g��:�d���
�;s�Sa �li�l���4n�,s� �)��k.�!0�if��pa��A�+���s��0s�s�&box�����Gp���nt= (--���4��9��G�40�L���l�M�� (or� ���-�����l,�tC���]��_�0�-GNOME��m�qlo�w%�X:,�n�*�?�j<f�"������ng��c�-�s�6�H�1g��2���9��5�4�
�D8����4�]5�%�Z�C�S"f�RO���9u�/�Q�3
V�u��m
�i<����*��3�afsd�`RELEASE_L�{
OWN��C�����0m�[*ch�i����D�'�Vlk�S�
)�.�$e�l@�5di�*� 5�.1 wb_dir�
���� g���b7���REa��
��B�;k�{)s�_"�*copy�_�"�*�b��5n��:e�B�d9�h*KVM�i�Fl�cp�s�' kvm->�o�(�Dvm_�Q�e�
8���"�&� �� �>m�P:s�>��Cc�S �Z�see��R� �RDRAND�CoCo��V8�J%�=tlb���LF��&;���Nv��;��S��i��uf��F�P����do�as_i�k�spli� 7pt_a���S�\Gn���-of-b�.s���ops�ê8���m�ap��_�Hc�7in�&�_�'�O��xusb-stora�ealaud�:C�G�\�A�l��a�O�,86� ��ms��$�=9��V�c-En��Spied��6��� �N�ŗ5�+xh�H�t
�ED���Ѳ=�%��D���O�-��=��$�[� �Bi����'_������]��E�T�����I��a��h�F�����7��lai��-as-LCP but a��a�O�C�e�"��V�{�#�>�Ln�0�t��<_�4_���}�BD/MSI��Dmsi��0p�@�(�6�7x�6��"��
WARN�gx�.�{�_mo��p0�00����.p�r6��g�N��ro�%��JƕRe�
t ��4;�2��I�s10�o�6<�!���N�B�%t�.�'3�J3���?�L�pK ���;R�3y�)$���2�[Expat�
C�z'�'par�-XML�cu����;e�H:�*<ga�� L��P�FV�wCin�2�R54�y�NI�#O�#��Wra���e�;1�;��#�-�
��FL���&ki�����-
�l
���o�L�]:(�:)��T�\1���(TL�:t�A)��a�g
ll-�D����Ural-pur��e��g����W�=�~G��&�I�X.509�V��~'1��%v
u�-��gQ��yO�k�W
� �#��a�JPmirr���'t�r�b� �'�
we� �*y�s���3����7�dAR�9��"/�f�'�i��>�
is�B�>or�-m��F������"�:���v��c�=�<'�K�X�K�_o��ha��vp�F��X0�X fc���E��f�i: d���?(�%
�vma �ql� is�����P'���
�)
��hD��l��%&��(�>��P/pf,��M�;P� �� v����� �_���I*�]�v%� �~$�����V�"0�KSe���* gpio����T�w�~
�w���_�2Ied�a:�Y�4�Y�W"f���;i��� ���fPal�A�����&-�eC����L�;�����J�r<���$�cppc_���W�J��<�P5�O<�b 2�H�&(g����o��hQ�P�N�!nl�#A�=��Gc�I�U�9.�Tof ����K�+.���g�'I�'�y����%a�5V�'�����o�</��<���f��&�ACPICA����
I�\�m��BAR�uHY��K����.��}!��#�_$�3E�i1�ht7�V�*�tW�@��_�4=422� �',�dnr�"Re�EPERM���#�K�L �xs_�oJ�0��L�X�j��D�{ l�uqFhw:�;:IOMMU����"s��r���
�y�^a�ps���F�$��
�O205���w �xn�}+��f#�t<�ASEV���k�AC�4�p�F5�+�$�
Lo�C����-��u�_n�Dl(R) At�s)R�����&3��Y7�n�>2�_�&,� �w�x�&i�J���H�gL��C274�C-��L�b[B��e����ch�r/�����4c�Q�cy��3<�s'�o;: �p;�Fo�2�#rmm�3C��z\CPU�g:��9� 9hwm�9w83792d)�[��2�����u�b�5ry� ��K�::3�[A��c��9e�9sn�* x����
�����������_� ��
OOB ����!_t�� �
�(���9Y�Q�c�R��t�-�Om�L�2�[85��:�J���vNMI + ��#�/
f�s��xr�6$t�4���:�~=o�?]��
n��'��_�t395�xfrm6�
p6_d�C�ա8re��n��D�b�+��,���R��
� 55�%_�_��
�Q20���ct�R*ke c�5f��d�}�p���cTs_ht_�q"�W��Y�W�*R��n��'������ _�)��2�_��on�Z�Z��e�6' � ��3'�D't�:i�<ReDo�b���ve��^�V�-���+'�}�T2��K�
�v�U��.
�����Na�Bran��Hi�y��(BHI���a1�.���+san�q�sto��3�J��A66�'�&���re-�)�@?tale��"��:8�e�L �aW�vg�OPag�6�
>or��K���U�p()�T�)á�75�.���6ec �I���G���Z:�n�-_�(�r�}�b��C�4���w�6�H�Jc�0h��,��r��?���W��X�(�F ��9�5�
im�(bl�����"�N��0r��U<n�+nimum�o�Lr�/i��t�Zt�=�qf����C��x�i#�kog ��f�dU���N�F�l���8h_��8�fI94���@inn�9��a�h�[��h�BŷUSB:���Dc-w�M�~�
�3����=�o����jV�D0�Z�T
�e�T
���~�6��L�)rt6� �L40�@g��O�;g�h EA�B�"�A#����#�3��V��G��d�og��sk�-��op�<�_�;�&�0
�Pinf�W��o�Zcf�
r_���[8����
n��`�c�+7e�S$�__��P��l_���
i�k���K�|�(c�b�_�gB�$���P1�TJ��� 6�D&�:�}�������Q�V13�V�?�k�g�2x�
���r�_�X�R�:�u���a��J�p�\��
��5�)
�/���n#�b�:�=�1?�qse�����_��O501�3G�[�!�Y
n�d/�"�lm�(s��d������tte�$s�k�J�����:�.v�!�avail����+���"�+�o���UE�n�]wi�s�tmob�x
�gadb��(WWAN��!�PPPoE���#�:,�TVPN�g���a�Aet��0dif�Ft�+��I�d��~S��765� �V��Ad���C�bs��֤��n���'�Xi� , se��i�RN�3�Ye�*��Co�#kit�0bb����/�2d�s��GNU/�`��Ia�*b�Vw��m.o�s����E,�in�&��gn� ��
re��
,���itr�V��9o�-��-� s�*
����vc�����2d��0�3ki���������pam��*v'�*_�nv���1��@��8�5�
'�V5M��<��/�/�e/l��e�/p�_rmt�H�Z�Fg�pi�k5sealv3�N�S�Nkdc/ndr�=2�B��'�
��'Un�ed�4gr�h����^8�[��v1.3�t5�D�UE��y�.nt�DSA����ZB�06���s���
F�v!���U��]_��A74Ɣ�-se�A�0@xt_�k��e�Z2�B55�b�K A�ed from the References section.
Python is a�nterpreted,�a�'ve, obj�2-orient�Tprogramming languag�%which�8clud�emodules, class�excep�y�very high level dynamic data type��d���l. ��supports��fa��to many system call�Clibra���uas well��.v�ou�indow�̤;s.
Security Fix(es):� * p��: c�I�*t�?o�� a��lic�ZZIP file�y��ad�wDenial of Service (CVE-2024-8088)
For�Are detai��bout��s��issue(s)���t��� imp��,��CVSS sc�G�
cknowledgm�Ū�o�/r rela��informa��,�f����R�� p��m�Os�,�W�(Addi���Ch�"es�?�֤��n �c�'�X����eas��see�jAlmaLinux�t� Not�0link��Th��icrocode_ctl p�a�p��vid� upda�Yf��I�bl�,AMD�+�Wsor�$kernel: local�5iv��ge es���[�w�(R) Xeon��3-22655)�^L�^�Hdisclosur�MAtom����X8746�X i��ome�]�U3857ŮPossib��¬P�N9368�$� �KD©with�"SGX due��Morr�9�Dcu�������43490��i�K-�$: Ra��con�
���7��45733�QUnexp����behavi���U�PC��(TM) Ultra�_6103�Fc�mgcrypt�wy�^s gen�(l-purpos�Cle�(��s�
��A�dph�algor���
��{: vul�l�k�^Ma�dn�t���m2236�B Vim (Vi IM��ed)�c �Xd�
�8�� s��f�Pvi e��or��vim: heap-b���uf�B�flow�il�=��1�G�H�bluez�Y�����foll�e
ut��ie�_u� n B�9too�app�>
���ci�l,�a��h�
�Yfig,�p�6�l2�$��tart��ript���)��pcm�J �Aur��
�]� q��: unau�
riz�HID�n��Pn�s a��s��Prok��j���arbit�comm�s��v� � 86��Z: A��o���TAVRCP I�Gp�IV�vd��f Arr�sInde��m����E�hV�!� 7���v��p����ook���Q������r�t�/��v�t51596�tOBEX�D��-of-���,r�I���`4�`a�L��avrcp��rse_m�a_��d���2z 2�z e��3{ 89�{�m_�m�Qribute_�s�4n 0�n��s�y�2(44431�^��0�`t 29�F��-dns��s�8��|���at�
s�NDNS���������3defin�Zer� symbol��
c�&ta�Ju�)y�P,��ch�d��,��@�d�op�=� �&�d�hs�h��tub�Qsol��948�G tpm2-���ps�5�(set��� ��"��+�z��Tru�P�;�� M��(TP�2.0�s��us�Msp��9��:�qu����go und�'�y�5_check�)�Q4�Q03��Zpcr��l� value� not� ��W��P�e��T�CGNU nano�
smal�f�dl��ext��
�E: runn�p`ch�`�K�own`�̢��2��e�2�;���Zrepl�H�-�rg��y�U�#�o�^��6a r�-�k���-�A5742�B@Bub�rw� (/usr/bin/b�� �%�eng���un�%d�er�Eworks��,ui�vin�n�
�����7�R���2f��pak�
�� ���
�
s�s��box������p���nt= (--�)�c4247�d�5"��V:�cDos�a���
v�D��tr��_�"le��
h�
���!s�\623�[� C� ��UNIX������S��(CUPS�]�@a ����p�*lay����,�I��simila�~
pe���cup�F�ppd: �
� �����k��r��ed����PPD�v�Kerberos��net� �e����\��c�.�����
your�E�?
elim��t��n�-���_��n�p�*�8ds�m�/�J��un������.��Z�
���
�]o���,ea���H�
help���x�x�<rd��ty,�"�#���)�X�ce� (KDC)��re��diu����g��c�3�(�RExp�Qs���y���XML docu���6�>e�N: �DoS���C_Res�CP��r�
060�B� �T�u�� �!��� ������l�|�t�x��p:�g�
al��m�eld�d
dump�å(��422�m�Si�euf�uRequi��ri�������a�l_inv��e_�� �]6824�]mptcp�|�7�� uaf��__ti�U_d��
�Jsync�F58�)&p�| /aux�sAUX����0�<�q71�RDMA/bnxt_re�Ga�E�+ ���up L�(
-2 PBL���M0�?!mlxsw:��'rum_ipip�_me���$k�ee�6
�e�IPv6�r�4�d52�uc�> ���?ub�c�a��in�&_rcv_�_adju�5312�r�d��y �b�.e�
��.y��*hron�Y�
�R$l�Hr��ro��.�9
�.�Y��oi�a�Rbeca�t�only�[�if��in��h��ad�whol��. ����lso����mirror����L�K�dfo�㱓��U�Z�td S�%Cont���71��5�7N�zM�r�8��
�����1�>s�����,�^mp�{
o��ep ���:�.v�!�
ava�Y���^
s�p�������UE��K,��rel�0,��b�broadb��(WWAN)�APPPoE��,��
�TVPN ��g�� �et�d��t�+��H �m�Hf�oRout� �m
�Kt�Bin are��5d�rea�[a�Al�2-9.5.z] (JIRA:�X-730���i�U��er�Wsto�in��u����#�s�i�e�ipv4.�'e-�%ڂ1�Z�y�do���@�\��-r���qs�g7�g��3661 ���
H�%��op���D
�Gipu�M�����^���8ff�؊6��8�h
��/dc�Don'� � p�K()��eqsk_queu�� n�}(�=
�j15�� arm64/sve�^i�h*�
�c�CPU� te��ha����S�t����)i40�Rf�r��(�{�n�Al��'�n��te��x����,��#zip2�Ca��ly�',��-qua�
�#���> �J���bo���dal�c�'�p��de��4�(�h�E�Y�h�'����#��:�D���x����T����(�hd�-���il��19�900��)�!T�! �'�*s�Q� �b��e�p��=0�S5-�#��PBy�)�O�*�Q��o��y�m�k�(o���1di�.�
�O
718�kE�db�}�v����_5�P.�i#�EA�w�Le�Gt�8�~l�h�m#�S51��K�&���)�
���W�/���zgets��1��'J� 6�Oc��
:�ke��RCU�At����igmp6_�
()�|2175�'�Oovl��UAF�9�_de��y_�,�nv�Z��mov��dput��+�_up�d887�d�&atm�i�af�[�!�H�!ɬ200��udf�s�R-o�'���in�*_f�_��X2-498��2vmx��3�al�&�a���iz��in�'_p�S1_xd�37799����p��#P�Tra��:�b,in�+�*�=�,�%7�,�Ijq�l��twe��nflex�6�Q-l� !JSON�E�Y��=lik��d�F�"�
. You��:/�sl��,�,��p,��ns�� s��ctu�O�Q��s�{#��!�Zs��awk, g�w#�D�F�/�R���f�� $�-jq:��ha�-ig�#� e�&+�Wjv.c:jvp_a��._���2333�h�OA�Sa�z�N�o,�j-�Xq_fuzz_�"�Sj�qt�_vfm�!��8�#���xml2�
��d�hop�� ����"�a���5���"��
����{: He�$� (�z)�<�D�*(���97��/�WTy�Y�fu��L 6�L��
I��O�3�BuildQN�,�OL�b�tB���1�o�k6�{4�)� x86/�:/�<�� � ����-�p NUMA���� 99�GL�.�=�s��
����b�<k�
������mte�MC���� �[���-GNOME���%loop�D,�n l�;
�,�un�դ�����-�V
����xg��:�1i�_��_ms�o�Y525�}<�?��Und�@o��rth�� �&/g��.c��� g�[��"rt��icha� �����g�j�
vc��o�: m�s$d���po���80�!�Fsunrp�b�e�C_GARBAGE� �svc�*$� ��i���
8089�:���dou�8�9�t����79�6�Kw�'�<wl��k&���d�c��,FW��!0�� �8 5���M_s�� �|� ���i�G�'4��� �s7�_x�7�:o�Cd�'��_�x�*12�Zavo�&-j�j'na�sb�~=��<if� �
de�:y�+�_��!���-�� -���r��/�;��
8�Un�s��#d��fsc���v�B�5���u��}mm/hug�U9m��oder��>�E$�$d��N�9�Z9�$Ų:�"9�������O.�<mii_nw��re�<�+6�Z/m� :b�(�eo����
���
�P45�7/�%
�y�a11��SQL���2(�7n �(�(b���a0. A�qub�t�&92�N�<ed�%�����A�!�a ��sk�.��!API�B����*v��ǫ�e��s���p ���N aga�\"������enjo�&power�J�E��n���
1�4adm��st���h�<��"f�����g�x)��D���ql���5
T��3�s
i����
96�"���rn�L�|3�4����Uni�%GICU�Q�Er���
ull-f�b��7��!�{icu:�� �
��SRBR�5::�Tag�
�52�T&�m�sl���U�A�F��� �x&�"at�rrup�.��A��Pt�J
�6�2�"Wrequ�1 �-�; ��H.�(rc��ials�*��9URL�-708�*��Ski�C�Ifr�y8�g��U�HVS_UNDEFINED�ӡ9�~C����+��'�p�� �����y�44e�Z�2�/��G:��l-ish-hi�� ��y�[�$tp_�&_�.ve�r928�+_ �Y�ccl�b���)�5�W�[8���Ee�{'�"u�oF��`6��.��-5�3;�x�{1b�D�q���n�'_drv���e2�/�e�'/vmw_v�I���:fo��i�ci_host_do_�m!e�B_���2�78�
�p�Pne��as�
�Q q�G�i
7890��
ti�Z��� R���%_a�_e��6��ne�]80�\0�]���^ �ztap�{_� _��*�1+�7�nO�8*SSL�� �� ki����=�>�o�� s L�;:(�:)��T�.��+��m(TL�:t�~l�������`
�jth��P��Py�
��o���
�FC7250����(ke���L��c�H�
�,n't��rt���*S�_�%9���T��iV��� ��{��M��B������241�! ���;b�;�S�maIDCFillN�^T�n6�N�gcc�q���[mp� r�C, C++, J�/, F�+�, O�z�!C��Ada 95 �H�����3�0i�
�j��Un�@?�O�<�~
> ta�r(HTM��9s�3t��!OM�j$�3�,hod��0-��2�N�o�:� O
�XI�y�t%N���}�g04� ��[�� �����K:�\if_��h -����_�p�i7�����P���# 12k�#���&����?�G2�W�'�bpf,��6_�����_skb_pkt_�1��8�=;�'�d�R�!�'�$G c�xI�l3��2895�U� tlb��[�8�M�Y<�V�)(sp�,�<bef��34�Y�b�r �P _�f��vs GUP-�@�D:�P�!���d1g�6@�!se�3�>+pu�fE��qg�Y�S1�D� rtw88�[��'��'�C��"to�:"�R ����Y�c�Q3��]�]_�N���� � flush���z5�Ai2c/�Wwa�C�
�@���P�H3�$t��Tl�!��
f�!�/�c<�"��so�rI�L47�3�� ar�v��]�e
�p ��6���$sev���@��a�7�K��s���LT��",�s7io��ISO 9660 CD-R��im�. L����
�#�{��y��bsdt�7)�(*,�=��_����R�ws �CY��Y��po�H�)Sskt�*�
9�?��R��>�at�_�9��_�Y_�^Sk��?6�&�K
�..�U59���%��D�5������<�K.�p205�)�3�H��t��Yi�$����c�_@es�A�=O�X
�Hi��$scen��
���:�' ��u'�I��J�/������8�z���7BMMIO �'�f���}(�in�1��e�0hw�0���)iwc��L�a��F�Q!� �4c��J�@A�A/�6�b1�H*�]A�6��=�Hc����K��b�Aes �UG�U3���� ���n_��%46�Bv��K�6�P* TOCTOU�:��xfrm���!�y �?�L�r
_�4*�=�<�i5���AC����
e�3�3�1"��@�;81��6�:lugg�$A�*VM�!c(PA�`���Kto ��up�bVpo��$e�g�nee�r�E�� ��E���1�H�
� n�.Ipa�L�
��A��<�6� �<In�L,�Qf�|�0��94�*�%udma���a�����+����-�Q��0��dp�Xc��-rt����Y�4mutex���3in�]7���+Gdrm/vk�]$u�;<��|
�eit�5�|3��%scs� 4pf�}Us�i��b��BIOS�p���s]�F��!ix-cpu-�L�Yi�#Lbe��?�jL��)_�)_�)(�p"��V��3��#��f�`�"Wr���GEM�s���(���4��m��7@^
��,�5B^N�P�~8�>���Ң���Fp� io���U>�Zo �o�>���583�
�d�Y�I�a��p�H��b�R�?�@
�=
��HDelay put�R6c->i���mld�ޢ�H��55�B( Qgdata types and dynamic�ing. Python supports interfac�.to many system call�Clibraries, as well��.v�ou�indow�_�;s.
Security Fix(es):� * p��-cryptography: NULL-deref�nce when load�WPKCS7 certificat��(CVE-2023-49083)
For more detai��bout the s��issue(s),��clu�]� impact�� CVSS sc�G�
cknowledgment� �o�/r rel��d�Fformation, ����R�� pag�m�Cs�,�R��s���:.
T�gnut��p�w�8�rovide�4GNU Trans�� Lay�i�c(GnuTLS�h��y,�?ich��le�� �o�algo�9hm��htocols��6��SSL, �R��D� ����: Vulnerabil�nn ����tool � p�:��rs�~��5-32990)�NSCT extensi���J89�J��Name SAN�T�_�I8�I�� po�< ��T_�$_figure_common_cip�dsuite()�\6395��Bug�Q�oEnha�P��(�3dBZ#235962�+`�F1�)\�E2�<X�X7675�U�kernel�con�ɤ4Linux�!,��� of ���op��t����K: net: usb: smsc75xx:�Omit��et length��skb->l��53125)�P�Kdwc3: gadg�^check��at ev�K��u�do��not�*ce� �buf�G�v�7810�jdo_c�;ge_�(�ܩ�use���
�"n unm�oed/�lours �s�]8498�]s390/sclp:�<�$CB�;es����>9694�)�mm�ig��: f�n�8�D�"orr�����pp�d�N���7��24�^�*fil��
f_�sntr����crash���iremoval�tuninitia�ٺϡ2y�c72�cmb�li�*�Y��-af�v-fre�cifs_oplock_break�Q527�Qct��line�
ze�\on��gso��s�T�%_rcv�K71����h��l�A��zero-���ords�d�{rx_���8��io_��/fute�l�uure��_wait��cle� up� ��ly�ef�¢-�y8�)��/key��slab-�<-of-b�)d�3�_task_�fm�I�p4-50301��KVM: x86/hy�2-v: Skip���
a�ica�^
dd�Ss����PV�B flus�835�_w�
: ath12��Decr�D
TID�+RX pe��frag��t�Jerr�%���E761�Eiput���Fbas�
���f���o�wa��work���I�
G�o:�x��
g��ov�nlow�f4896�&Vim (Vi IM�ed)���o�d�h�z��� ver�*���Pvi ed�s��vim�h�gpa�|
ra�F�.�K5� 6)�,i�-�*'HID:�L�
arde�C32ton(��g�~s��n���0 bi�b55���T��pol�
F�wemi-un�r�r���f�D614�DALSA�v-a��o� ��� UAC3 c�H�bse����scrip��Ü975�I�D� qiv -���6e EBUSY� �
l���
37��Vssh���b�a�=SSH�L. It ca�ee�� d�{�.�� ��serv����l���r�B��: ��
��sf�� ���l��* nfsd�`n't ign�U�^r�Frn�ed�esvc_�c_reg��r�2���firmwa�Darm_scp�E� �_�9�y�a�b gn�!�9�h�\f�Ŧd2�w 08�unrpc��ys�Y���zale��71�K�?�ƣW�K6��fi�Ff�*���d
�#_d�pa��81���
cfg80211�P
e:��p���
�i�Q_�#��
�a_�v
ult��`49� csi�O
pfc����
/���rd��cd��r�eiv���]1�)�ipv6��r��MAC �#is�rb�j�ant-tim�:70�����UAF/GPF��g��nil�~mdt_�)tro���l36�%x���#4�+(�� l�
via��
���ex�@�v�so�AMD�Hc�r� 4-3635�^�4U �0�v�jap�Add�7di�\�IBPB m�
g���4�_�*�� : �)���pot���%
C��$���p�xra��0�)�'2��83�,so� q��imd-d��M�sha�me��y�kWC,��WB�&4668�wSqu�c�san���rsymbol���k�~ze�F74�v����b��een�wice�lo�����f���()&����]�kŤ��td���"in-��MMIO"�$�@72�rx�]�>aĢso�}s����I/O��
c��4-�6��i��G we���r�
hedule�y��{��06���Mm_�pc�dd ��H�_cl� _�(�I�?in�� /�1e�� d�� �2��posix-c��'�d��spec64��n��_�)_s�=m���1��~�V�>�cau��_��#!�M29�o/rw�s�SNOWAIT���vO_DIRE�u��#write�[305�a�6
������4�P��ir�%/v�K�dc��_queu����E�G11����VMX: Bu�0I��l PT�_u�lz��gu�1/ho�m�H)��hi��CONFIG_BROKEN�j3�xe�PX���3�t�]�Ysafe�j��ul�vve� t�I���6�Advis��4��s2�
�sRDMA/rxe�"�sqp��n���req�G2�&b����af��Erq�@l�Pt�tags� 7��
�ease�i
�Q�/�
o�8i�cu_�Ĝ16�N�af��do��Z�? d����sk�in��_�i�G6603�k-cgrou�+�R
�@�cg_un�E_on��H7���nfi��vm��oc�#
R��)_�(_�a
�T6�Tbpf���. ����ch����g/�Fh�RCU��av������Lj1939�_se�_new��Mkb�2� ��x�X4�X�Up��XC� � l�$di�\�=%pa�
&_���+el�j�-��p�*� +iowq�kill�2bef��:ƾ70� rtc�H__�_�_�was�z$�-
ful�Z��r�����'73�j��put���
'�@%g���M&�is �5�
de�O�� �\8�*ig��/�" inv�T����� gb_��_��ul��233�pv�u
B�?�4zed��5�`p_vs���f�k�d368�9���mp�?ximum��shtable�C ��INT_MAX�Z�164�!�2��Hk��d������,(�bulk �Nai�=s��
�u!�a� �D, bfq�'wak��q����_spl�v����R3��z��L���K���0��B��~��g���r�@ ����M��� zswap:��synchr�ze�\�c� �"�@� CPU�\t�Qlug�c9�ca���L�W�D� ��ics �������U�����d-wp�E/P�
�U�m#m�� ap�9�cpfifo_�
_en��� �8�
et�ȱj�t$�$==�T�U������| ��in�c�K�B�o
6�powe�
/x��H���$�Jicp� a��O4������:���NAPI��om d��3�iuc�9���9��papr�>�����{ s��s�'0'��d���_353�v� ���|������Mima�J��!�@���N6�0
l�/d���Vdi�3+by��L�� DIM�D��� �\�s��1�����b�
œ26���a�1����ra�#_m�� u�î4��/�x���%�bmap ���>��B�Oe�1D�
��G
�m-��UEFI�Le Bo�)��
T2��c�
����8�X
ta-��ar�$ ep->rdl�%#�8����J
h�)����=�Ll�.�=�In�&:�^ap��-���$�aen��p�-th��gh �,�l4��NFS��L�#���4_shut�#/n_�b���F���Se���a����p/��A !p�m���72��p������_�:��_r�6���Y44�Blueto���trt�K����+in��up�� ��� 79���brcm�c�T��
r��)�c�Wwl�nhy_iqc�}�!��
ms_n��d80�&ûbc�@���},���_�z(_bo��_na�C7� .�W�=mlx5�P��ic�ODP� ���&�Ɵdrm/xe/���PTP�
�Uk���495���hid���ma��Q�����_�\by�{���� ����j��rtw8�
�1��c��.l_hw_s�����le�/ 7�X�`mt76�925�g��ln��,vi���
798�`�I%�'���x��
��F�h��OPP��i�� x��]ert� void����$
f���u�,ı�ad��tin�&_�[_�T�to_v��i����� acl_�/�
��a�B�m��<�B����H�Uu�U���s�)���`�r�7�7�Vs�_3���C�U
P�p���]�8���u�som�(�T1�]� ����b��sf�����.we���\���E�%he�e�������r#����o���hR�l�M��ip����.u�|
�>Log�c(Co��]
���E:���g�re���d���?vrf:���A��u��l3m�l_l3_o�W��fte�
b��e�uEAM_OPTION_TYPE_STRING ��&���]�0xh����w2�
���w�p2�p�Z���3ūvxl�O
��_vni�� ���u����off���,���17�c����6��ip6��_ad�s�6�ASoC�OF�[ t�hda-dai�DAI���1��8�/�®�?��L�G @��T'�?b�8���ý�X�
l���.�[.��weight��ways�<�+��-�L80���l��un� %�_buddy��j.����
�4�颎pm�_p_�bw_*���
b���X��(���;�a6�1iw��mv�a����O��d�
��'t�p� ��'�@�(��ac�"���1�up���STA��8�
�Ex�y �2��ify �\��v�6i�/���kv�� vcpu�7
8���1�xs��j�
�Is�Vof��eld_�&5�����4���O�Zs��p����so�
�
�H����.��$�c�]��!�ra�
�������a� �v�h%�V�L�8�^
"��xe_��0up+0x12c/�70 [rd��]"�
�u�a:����DR6�Q�e�L��y�e���|.��_ru�*lo�S�f�*��_��� ly��py SQEs at �z�}�W��!�6soft�|��L
r�0_�u_� �j64k�_�9��0ibmv�0���l�&� sen�!o VIOS�O��A4�N"�n��:_�h i��&_�m�ed_�)%d��
��8�D � �+hol����z���3��m��!�8�h�E���-i�C��c� nul�f_i�msg_� Ƕ�tc�Ad�T�"�'a�'#��!����? ��r�?��-dst�X6��d�s��<�� �r��]��Mt:��, las�6��U���7mm/�;8�i �S�;�
f�."o���� LRU�H �5�p�I�X6���,��:op�+��6�Tfp�F�fp�!��rl���1��8�M�t_�m��Ngene��opt�)B�f�� on��ƨ20�����o���a�� �@hea�*�� �8� ���c��disp���� ����3��
������ ��+1�4��j�5�$�ke_�k&�C$(�B$x�i�m�
LSM��S�c3�
��& �Y&A�=�]�js�p&�֤��n�\
�'�X� �� ,�W�Alma��&R�� No��ed��W'grub2�V'p�PC�22�4Gr�Uni� d���a�GRUB)�Yh��n�@�n�5cu��m�٢b�:l�:���'r�
�e
�". �����E�b�REety���o �.��f�,"�`E,�&u���V��h��P/�L�K1�!:�-�5/g�bx�g��
�l����He��OOB W�.��457�h
�C��8)�D-��8�;�1g�I�*�
�QUNIX��w��Fs��P���,��G�9ana�&us�{nd �����.�9�:�:�*��|�g���n�_�W�L/etc/lo�w.��2 ld���Ǻ romi��4�!433�A�SQL� �6C���
6�{� 6���(��b�`e�/)�'A l�~�et���&92�#�ed�%�e�A�!to�6,� �]�*isk���P�Eis �9�$4�ni�N����of���i�q6����Q(���enjo���
w��flexi�L
�-����kadm�[st���h�p���44���sa�g���S4��sqli�"C�T���i���I*�sH9��8�8�k�=S���:S��i�&Daem�i
SSSD)���Y$��6�d�'� P��O
t��E��W*ori�7n��uthent��!�sis�OI�2�XE�g��� L��S�c�NSS�#
�!P�&g�@A�[M�C)�/
PAM�.0t�Pwar�<��i��J�-�E!�#�-��8��� ��f�[t�� �b'�vs��] ��Kerb�!�3���w�|�$leg�s��AD-joi���3���115�COpen�WP��Nki���;�=�d$S��2s��P(�:�0�Q�Q������
a f�6-�B�u��--pur�O2e�Qy�Q� o�������&��RFC 3�� KEK�awra�}92�55�'�6�}*slub��,�5k�K+�|e���,_� �{�|�A���Ds���
�
�QXML�cu���Xe�K�� � �w�^���Z3�U ��rig�r
���mV�/�(s���q�1�����b��+��³�937��Vxml2����d�lop��box�?����4f�|W�����
xsl�ۢ��1if��e �=6a�1�&Dyn�9F�J�rf�in��"/��.c����&�'��[%�,��P�)_l���X0���\*��#i� Bn�OC��7�A9�
�"B��fOm��,�!�1�e1000e�Dh��&���_eep�Z�J��&��"�N��,c��,u��$�C9�O��Cl�&t�/sk(sk)->fa�@�_rs�(��?�
��9�R�)*MGMT��7s�~+�%s�?�$i�=$u/vt-d�is�K�Vty ��%i�coh�
����l�^%40058�X����%p��r��xa�mQ�Ԥ�.�6P40���pd��������
�r����ha�d-���v�r
V�7LSB �!�>J��a
gg��O�D�7�#
��@��R]u��O��=�RD-Bus act��E�����<�H��
, o��"�5]�&�#��
�fk�xs�e�p��es ��<���������*^s�,/s�h4�n�y)s�&O���P�3,�Ki�r�XW�2�7o�
�����ilabo��� � �depend��y-����r�)�!c����(���-���
la�X[�Yysv����
�5�d�p):��,c��5��� �cl�( �v�Z0a SUI�l!�8����.�1�t�K�G�\�W�t�5�+�S��} NETDEV_UNREGISTER�%if���+����Z�v�/fs,���<��]�J��J�HB�(���W�T)at��2�H(ke �-�'��h�CAP_SYS_ADMIN��r��)��n�49� &��f������#��Y��XP9�L�VX��W�
��$�3�D�i�G
�Lls_��p�"�{$�'��76�L�d�L�pre�4,��#e� b�v)-�n�R�^m��l�
u�q�c��e��V,�I,��p^�d,�y���evel����]e��
�d-�)�T�}�%may ��De�C�q2-��%NPN�w�#�W�U��+c�f��HTMLP��I�Gd��c�: �"���60�*9�C�Kzip�;E�Yf C��
�ND��LEOC��L��
o�wc�� ����*�;%��5-�H*��lQʦi�Zs.�6.�ndv���� �-�ll�]t�cc���bin�f ��
��c�:2��b����' �[m�p�&�(�� �'�~�ߥ���F���Kar�, g��f, ld�0Jm���+��" ,�8�Q���#lf,�:,�O)i�E�p�=�e[2�-���Z�:�gB�!L�r��
��11�h�CH��Z����@8�*mb�ff�W
�"��s��?� %�� �,�"ne�.��bo�
������h:�?:�5�Ucha�i�k
in�am��a��-�"���f-��ProxyC�24� 1�p)�rNul�o�n�// URI�(o �G��c�W���á20 ��Zy1�K�@������
7�)�ACPI�+t��8��4�<�f6� �M�M/�(M�#�,���K�cocc�1/���sk->��= �X�9��9�Bd�5�d��M�:�I3��D���>�kK�4��_�w����92� �F�
9i��c_p��_��G_no��)N��0�]�:��>o�<��DEx��Sy��M���*�m9�8�m�U�A�F����s61� I�7S���� �>�$Sn�@fE����[�l0�IE���x.�};�A!�:!�"_n�;se�n_�_����:�s�9�l��2�I�'p��Re�
�
�SE��C���qD� �"^�F�8�[�h���9�K�A$s�?7i� ��V�&�5�?$g�lc�1������g(�/��POS��0�Y�p�),�Am�*�%m)�ۢi��
�Y�O�L (nsc��*u��y�=(�n��m�W�-�f�q�L�@��D�a!c�#_�?��:�o�a�C�g�E's�iF�5�|v��%�URL�f����ed�V0u��b�8�"qdom� ��H93� ��8��r/jpeg�X�8�JPEG�L �C�8��K��Gs/�R�AMi��<�=f��P#�P5�P�(]9���Z�f96�afs/�:K E� OOB write in the heap (CVE-2024-45781)
* grub2: fs/hfs+: refcount can be decremented twice�F3�Fcommand/gpg: Use-after-fre�Iue to hooks not�]ing �]ov�\on module unload�g5-0622�fUFS: I��ger �=rflow may lead�e��bas�Xut-of-b��ds�when h��l��sym����r77�rr�X�s�h�Q90)
For��r�Ytails ab�8��secu�5y issue(s),��clud��� impact, a CVSS sc�G�
cknowledg��s�n���/r��la��information,�����R�� pag�m lis�,�R�&ences���:.
Addi�al C�Ages:��֤��n��c�'�Xis��e��,�We�jAlmaLinuxR� Not�/���MfromΑ
OpenSSH is ��� protocol�.l����suppor��by�Bnumb��f �z, UNIX�<simila�per�;�"�ms. It�������� f����e��sary f�b���!��clie�W�_er�@�NS��Fix(es)�L�wo�6ssh: Machine-in-�N-midd�$att�� if VerifyHostKeyDNS� enab���~26465�AT�micr�qde_ctl p�a�o��vid� upda�Y� �Kl�+AMD�+�=ors��j�m�8p�Ninp��valid����UEFI��rmwar�2804���Nnsuffic��granu����%ac����ntr�\�_39279�_���á�zͫOutOfB�XML��_1157�A�Pyth���Jin�pre��,�a�'v�jobj�2-or�&�T�Ա+mm�Zl��u�,�cich�t�e�ũQclass�excep�y��y high�Mv�dyna�; ��a type��d���l. �����t�a�թ��y���ll�Clibra�����ell��.v�ou�indow�� �request��subs��;��same�s�=gn��cert��i�m����519�F�rsync util�=�(��u���copy��*hroniz��lo�H�r�Jross�Hetwork. S�.��wi��oi��as��
caus��only���.
��dif�����q�j
��f��yad��:��whol��. ���lso��d��a�rr���*ool���K: Pa��rav�$��vuln�b�an�r��1208�d�A--safe-�jop�"bypass�B�zp�e�N8�NRac��on�b��H��Symbol�-L���K7��?_IPTraf-�!�r�*s��-�
��mo��|���*�|IP���/�iTCP�PUDP �C��nd�"LAN s��stic�u��$E����, FDDI, ISDN, SLIP, PPP�Iloopb�a�R�.�built-�waw socket�-���$�J k�p�gip��<:�Y��evia����.�b52949�A�Ker�os�ƶ�auth������.i��
v�~�w�your�Eb�tli�+ at��n�-e�H �b �<����8d� �+��rypt�ө���ows�p���q�b���ea������ahelp����u���drd��rty,�"�#key�stribu�ce� (KDC)��krb5:����_cul�ulog blo��s���4528�E" gnutls���4GNU T�s�K Lay����(GnuTLS���cy�������.ph��algor�tm���s��6�gSSL, �R��D� �Q��: �����e��Ine��DER De��
�G��tasn1 L�� �mo�!DoS�:243�AwA�3�"at�rs Abst��\tax�R��On�ASN.1,�(spec�K
��eX.680 ITU-T����P�:)��s�����ct�}s�/�B�}�n�D��ish�WEn�/R�� (�C�y���l�� e�"�=d�_fun���G��:��P�fn�O��13�B��+�� �+�a��� �4�-�W���b�0�K: io_u�A/sqpol�z� sqd->th���tctx e��
��216�
�M�
: q�"�
�A: Avoi�;�����X�r�l�@�
8007�Ztp�T����kv�c()����nt��/acpi��
�H5�Hrt��pcf85063:��x p����PCF�$ NVMEM���Z69�Znvme-tcp�Ume�,y��ru��]�,_�,_�Sv_pdu���\��]iscsi_ibft:�� UBS�hif�A�1arn��._��r_show_nic�f9����vahi�c�;��=
��S��
Di���'��Mul��
st�#���^Z��figur�TN�7i�9�&�P
�~��Md�d�/a�������~� -a�appl�z�{����lug��\�e���Snd,�vn�w��,�
ew�zpeopl�Ac��0�pr�r�<����fi��h����Ln�P����a��:��W�-A�O�rP�Uict�>�
a�� ID�j52616�Vim (Vi IM��
d)����d�z�
d��s��vi ed��jvi�)u�2in�< �$_��l_get_exp��4/v���p3-4752�oExpat�}C�
��� �docu���W e�N: ��3Re��^���SE��C�n��D�h���F��817���g�v�4:�Iep�Wbi��un��Qd��u���756�hdm-fla��g���u���_b�I byt�<ea��d6�b��pp�dd� �eck����skb��n�'_�_txmu��Y377��i8��s����#�pl�H�M�Wa�$gmax�h��$�w��4�)�Us� � F��2%_s��ext_�s���0o��ni�2-3424�q� � RCU� ��g�_�Q_�y�"7�+���gs�
�
own��hi�u__udp_����
�5v� :��c��'derly��de�s���A0�Axsk��� ����xp_cre�y_��_a��gn_u��5
�
��Xgen�����ng���g�H205���4�I��s���dotdot�_r�8�Hw��: �12������#�W�#in�"_d�x_h_�Vcap_n�@�b943�g� c��������-
ie��/)��OSIX ��p�),�Am��%m)�ۢin��!�-cache��em�Rnsc��d�m�p��#�|
����Wi�"�����q�ż��"n�/+�
��ly���:�
c �uid�c �Kdl�_(�*in�O�$ar�xLD_LIBRARY_PATH�N4802�)Uet��)bnx�v��
e��f�Ob-xdp-�!c��1�(Blue�!�OL2CAP�,slab-�ER��i�2� �W_cmd�]��a dir�a �q��cfg�N11:��c��wiphy_�&ef�r���c��S7���UUAF���,in�(�
�>md�<md� uaf��it���h_�s�c�1��smb:��O/y�!��&����50�)h���de�l*�CV��� �l$�88�c�/fair�L�c�1�\fs_rq_on_�&191�u�\v��E�)�|���hex�81mp�210�&�~of�Oy-o���s� p���C31�_�C�(x�|���en�,��38��[�!�IRC4-HMAC-MD5��sum V�L(E�)�M�N1�8Spoof��%�8��i�s�5�� � iv�<
�Z-���������
sev�@l�B*t��ea�7�K��s����!tar�-pio��ISO �0 CD-ROM��.����2��
no��A
��bsdt�43��',�=rip��.��s��!p�--��pop�0�ktop����
��R�+ �O'O���*�q�#57��Qip����#��)�����f���)����z/�
|�o: S�O���77���zTime�mp���C����o�4726�{P�g�8A�oM�#1 (PAM)��a�to s�up�p��,�����ne��o �"p��to�8e�H�
Q� �m:� �
�����
T�-5-60����|V� ��f�E�!bu�� �W�157�+`Squash��
�����Tan�9��m��_id�����3�[.�4&��sud�X2� ���0�X��adm�=�(to�c!���5�F�44�U��mis�9�wx�!t��iv�g���!?s,�or�x4d�>�u�( purpo�-7��hav�^o �-in�E r�����PE�C�6�3246�{��
��2save��#�>n� ��r�����'�!�c�p: T�u��45�0A58�a��
�Va�L��*����m����Por�H$�% G�.� NG)������p�G3���?�N3��Q
��3�@B�85018�8o��'�i� ng_��_���#os� B6629�qC���Z�PA�'&in��S��(CUPS��
�|p��p�*l�V0�3�
,��A� �t����'den����J �cupsd.�'��%���o�m6����9�x� ��A��un���8������-��A�843�*P$HID:��to�`� ���Emt����_�*up�$39�+,�#au��'�h��� ����_d�_��X4�|mm/�Q-f���(�dVM_BUG_ON�GE(P�KPoiso�S(��))�funp���k��tp:��)��-NULL der���unk�p�is ��n��'��
�0P� acy Gu�
��4PG��=GP���,=�e����nd��dig�U,�&��T&s, �)ia�+�FPG��:S/MIME�����:�I��,los�d�V�arbit�9�D�
�1����H6897��c�drm/x��M�(�(a-f����G�?�r���870���`le�rB�0d�v�H��_�s��<���"��mai�n0_��7�
��vmwgfx���hFe���/ der�9aga�@ SVGA_CMD_MAX_DATASIZE�?7�#usb�hwc��1F�r�I=c��?b�
e�on�wr�j�+_�CL_�tC�l�A��828�o�}ep�)�2�-ha�`m��a�>osd_ma�-�\5�*G��� �
��0�>���;������1�Ste��C��]�PF���-GNOME�����?�!�'2,�n �
g�^�4���}��y��
��7��� Ni��g_es�\!e�5_�i�13601��!Hurl�R3:�Un�ne�#:mpr�H#���"���.��Uc�haus�{�o64��a S�API�7��0ly�s�Ily �|���H�]71�]�=l�[���Gmb��g�D ��E�T
fo�Z��HTTP �>4�H�s®�66�0!44�6�g~�Y�Si�$�CE�er�S�t�&z�U�'
���1���r� G��9�:�E34�#�7 �vm_�7_ioctl��"u�y�O�C�$ 3ь�o2��S��#�48�
p�4:�2�_�?$����&�4��OĬO� ��W�' MGMT���������s"��É9�u/�-atla���fra�)��[��RX�l � 30��(hc�&�3�F8v�V�Ai��3���2������a5�c�Z��[�
���:� ���or d�/�6W����$u��p�gC���I��eLDAP�d���A�C���xo�0>��c��Wie�#908����UL�!ki���8�D�=�H���s�;E(�:)���UE�RE��a��
ll-�A�
��0r���7�nEy�D���.ss�����6�?�v�Xt�Ough�y�d PKCS#12�#�111�
�q��B�nD�n�>�����xd���)��}��CMS �;:��546τ�k�0�l�&�8�dQUIC����o8�o� �m-���: �V`�+ dgst`����sil�?��n�
�o9�� �Q�w�� �-��a5�[���WG1.3��s?e�H
�~6619�~ o��IO�C�v(�160�a��6�{$e��$���B@ ��-�dOCB��on/�-�-��9��?��8p�i/�p�Z��mal���^21�%^ ��%S��%�`=pon��0�Y0��"6�u�b����<�X5�� �f7����U�l���"�c��*: ��Quad�
��L�~xml.dom.�["d� ��� �� U�-�:/�
�
qp������tc e��\y� ;385���aASoC�"��U@cr_rt5640����9qui��/�]�y�W40��W��J: r���>���`� $�in�&_�"_��4s_�9Aoy�[25�O��JXux�G���et�"���d��,��%�aa�l�/���O�H�=g��s��s�-����f�nk�H�|H�;�
�%���6�>��:�H�"��pw�$�m�v�256-��B�&������U4�B�~l�TJ�
ic�
lo��^�
���s�z�8a�b��3o�+Fa���D�c��o��WZ77�R, H��m�1�P2��r�,���u5�J�)� J�l���>�a�s�ib����ly�Iil���Lme��b��ds�L#�6p�..�def�� b��f�>�n�N.�0Sc�vy�-s�b��:�� � �F��P5�p#�+lG���vs���#ne����5��Bd�Vt() ac�� �@��irqc�1B/g��v2�����W8�%9RDMA/��H"KA�CO:�
�<ib_�t._��"�
bl�&��0�Zj�ãyrxeԼ��D�v!�~4�~M�e:��-�
i�?�*Y�FY�p4�&�b���c��Clear����*����s�G�Y�W;�]:3��$�< ���~
��ATM CL�]��e�\nf�f�}��s��59�f��<����� ���G�'�]Snet�b� ��o0�� �q#�USB��0� r
976�p��us�
st��_rc�R��k�Gu�Eap�!�
17�Fipv6�eG�>p6_xmit�83�=���88����(��>���(F��n_�9�N�<ˇ�0�*Ɖ�=��� �|+�v_�@�;�/ ���7��.Å27� �ALSA���(o��i� �8�H�=�'��A�l�2c����B�Ld�9#ue_o���W3���(ttb_hw_�q�J� ��U���%_�6mw�CK����3303�2sm�W�m__pne��*�>�c_n�#�I06�
���fb�&C�
B���,�[30ӗ� ��*�wfont��#yph�����NFSv4/pN�r�/�
_INO_LAYOUTCOMMIT�qn�Bmark_��.�}_�Geid_��g6�svcr�0(�
rc_�����cpy ��
��'�K81���X�����*t��X��%��X�xve�7��99��$�9�'mem��g�$�C3�~ �A����P�W������\-�7u�
�C�ry�V�1�Ow�h�*W��WRDE_REUSE�y�APPEND�"re���J/��
ed�O/1�wd�*�$��_p���� �b]yc�<#in_���w$2�/K�D�$��AexFAT�!��� a 3820�]D�7���i��in���,�d��)��8�$ƀD�e�{�����88-�i�8��sh_�6��|�8��!��8�W�)
��x�%i6-25�w�)��Z�K_�`V_�cg���qmc_cl� rfx_��c�5��0����5�@p��V��]a��O1�h�Er�^c�p�sUk����?�b710�OT�
��a�ad�>��hu��lb�+io�5g��Y30�KU�Y�-�X�G�
a� ��D����F�| ��:�)�$e�(���s�
�Ys��2�~p�Ǣ��wtha����
��f���[�Z�
��?��s��sse�� Ialso contain the mount.nfs, u�and show� programs.
Security Fix(es):� * �9-utils: rpc.�;d �h��Mivilege escalation (CVE-2025-12801)
For��re de���8about�Ls��issue(s),�fcluding� impact�� CVSS sc�G�
cknowledgment��o�/r re��e��form��,�f�to�R�� pag�m lis�,�R�&ences���:.
T�kernel p�w�8s�xLinux�!,��� of��y�oper����sy�pm��~�K:�Y io_�-ng�o�l�|�<�� disclosu�0��deni�7��service via use-after-free�38106)Ïmacvlan: fix possible UAF�?�_�ward_source()�R6-230�Pyth�^is�d�(�;pre�4,�a�'v�rbj�2-orien�R�{m�ȩ(gu�q, which��emodule��class�excep�y�very high lev�dynamic data type��d���l. ��supports��fa�թm���� �Hl�Clibra���Js well��.v�ou�indow��s��cp��: IMAP�!mm�ein�#���pus���Yroll�0�$s�R536���PPOP3�*P 7�Pem�� head�"�Pdue��unquo��newline�M6��99��gnut������vide�4GNU Trans�M Lay�i��(GnuTLS�h�@y��mple�� crypt�ph��algo�9hm�w�htocols���6�sSSL, �R��D� �i��: St��-bas��Buf�Ov��low���&_pkcs11_token_init�Fun���'9820)�^��: D�VS�V���ve��� �3sump�Kr��certific���ۤ
�x1483�*DHID: ��l-thc-hid�:�6�,orr����� a��et����I2C��g��av�"9818�"lxsw: sp�Mrum_mr�b�fwhe�pd��mult��st r�ҩ�tat�68800�Wrub2�V��s��2��@Gr��Un���oot��(GRUB)���ly�Ffigura��5customiz�b�:l�:w���aa��chit��� . �����(�b��e�T������(file�,�Zpu�9�V�Nh� � ����(�!: Mi�>��un�y�[r�� gettext��may�ad��� 61662�D�Z�fve�T �q�'n�ce�T��r�sev�<l�f�Tt�d��7�K�����tar,�io��ISO 9660 CD-ROM��3.����
u�unot��y��bsdt�x�;
�c,�=rip� �
b�T ���-��pop���:
ktop����Kr�g�R� �Ani�/Lo�D����RAR5���r�������B_�d_�
�>�-�� 411��Vim (Vi��
�ed)����;�zim�����vi editor��vim: V�Arbit��ode�U�2� �{'help��'���u�v�,�u
574�
�n�=
ki�G�D.11�qPKCS#�API,�
�j�GIBM C�Nc�s,�u�4764�ϡ5�
�'�-s�/�
�8�\�}�G58�e��
CoP��o���ªfirm�.�d)� �Je���@�MAccel� �MFC 49�on�1S��
p�L�D Ex��2�:0863�*�
7�E�=z)��AP A�ls��Ĕ�B�K3�V�K�s����b�"a soft�����)that��be�t�O���7
�i���
Sl�/Daem���s���gen�u�i�
��۬ki:�
P�E�:�ED�������Sym�fk F���o�P893�5a: U�; A�; F�; vul��b���ATM��b�+��0�drm/sched�p�1nt�Udou�
� in�'_�'_job_add_��v_de�-d�'ie�4009������%
e�!�(
k�yDAMON�,fs�gsetu�@�=�y�c144�s�5�q
in�sn�]��� aus�.��ash��a���~71�~scs�A�J �: i�� d
in�t�Nc_s�_us�__c���1�K�h��erro��co�i����X�k�T209�Tnet�c�u3���kb_�s_�_ca�Uul�Q�ALSA:�3� ��y���a �PCM trigger���Xrsync�W en�
s�2��copy���*hronize�-s�f�X
y��cro�3��work.�}�.���o� f�be�ܤonly���e���o���Ƥq�A��f���ad���;whol���)���s
�$��a��mi����ool���K: R�O��yb�ds��ra�=�negat���x�10158�AO�jSSH��� ��k�� �Oby�$umb�u�:�, UNIX��simi�
���It������ne�t��P bo�
��cl�I�_�� �~ssh:�?GSS���
�9�#�"�����6d��c�N3497�����C�-���webbrows�������g�f�LURL�X451�