����JFIF���������
__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
SOLV � r � 0 dnf 1.0 1.2y-��� �}�QKת����~ ����� o� 8 x86_64 cve bugzilla i686 noarch 3 final packager@almalinux.org rhsa self 1 Moderate Important kernel-tools-libs-devel cross-headers Copyright 2024 AlmaLinux OS libperf Copyright 2025 AlmaLinux OS
3 AlmaLinux OS 1:11.0.16.0.8-1.el9_0 7.0.4.0.8-2.el9_0 python3-debug idle test 5.14.0-70.17.1.el9_0
22.1.el9_0 python3.11-debug idle test 1:1.8.0.342.b07-1.el9_0 25.0.2.0.10-1.el9.alma.1 Copyright 2026 AlmaLinux OS 0.8-22.el9_6 1:11.0.17.0.8-2.el9_0 8.0.10-2.el9_1 9.0.7-1.el9_1 20.0.8-2.el9 1.0.9-2.el9 2.0.7-2.el9 3.0.9-3.el9 4.0.8-2.el9 5.0.9-2.el9 7.0.10.0.7-2.el9 1.0.9-2.el9 2.0.7-2.el9 3.0.11-3.el9.alma.1 4.0.7-2.el9.alma.1 5.0.6-2.el9.alma.1 6.0.8-2.el9.alma.1 7.0.10-1.el9.alma.1 8.0.8-1.el9.alma.1 5.0.8-2.el9_0 6.0.10-3.el9_1 7.0.7-1.el9_1 8.0.7-2.el9 9.0.9-2.el9 21.0.1.0.12-2.el9.alma.1 0.0.7-1.el9.alma.1 2.0.13-1.el9.alma.1 3.0.9-1.el9.alma.1 4.0.7-1.el9.alma.1 5.0.10-3.el9.alma.1 6.0.7-1.el9.alma.1 7.0.6-1.el9.alma.1 8.0.9-1.el9.alma.1 9.0.10-1.el9.alma.1 3:10.5.16-2.el9_0 python3.12-debug idle test Copyright 2022 AlmaLinux OS 4.17.5-102.el9 3.el9_2.alma 8.6-100.el9 1.el9_3.alma.1 python3 -tkinter bind-devel 1:2.06-27.el9_0.7.alma 0.8-15.el9 20.el9 1:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9 402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.1 48.4-2.el9.alma python3.11
-tkinter libgs-devel xorg-x11-server-devel 12.0.1-11.2.el9 2.34-100.el9_4.2 25.el9_5.8.alma.1 68.el9_6.19 20 231.el9_7.10 60.el9_2.7 4.16.4-101.el9 3.el9_1 dotnet-sdk-6.0-source-built-artifacts java-17-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug 21.01.0-21.el9 3.el9_7 freerdp-devel libwinpr-devel bind-doc dotnet-sdk-8.0-source-built-artifacts java-1.8.0-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug slowdebug rc-fastdebug slowdebug 3.11.11-2.el9
_6.1 2 3-5.1.el9_7
2.el9_7
el9_7 2-2.el9_2.1 2 5-1.el9_3 7-1.el9 _4.1 3 5 6 9-7.el9 _5.1 2 3 2.1-4.el9_4.3 4 2-1.el9_7 4.el9_7 .1 2 5-2.el9 _5.1 2 3 9-1.el9 _6.1 2 9.14-1.el9 _1.1 2 6-1.el9_2.1 2 8-1.el9_3 .1 3.el9_4.1 3 5 6 9-8.el9 _5.1 21-1.el9_5 2.el9 _6.1 2 5-2.el9_7 3.el9_7 .1 2 21.01.0-13.el9 4.el9 6.0.8-1.el9_0 python3.12
-tkinter 13.18-1.el9_5 20-1.el9_5 2-1.el9_6 3-1.el9_7 2.el9_7 edk2-aarch64 tools-doc glibc-nss-devel static libsmbclient-devel wbclient-devel nss_db hesiod samba-devel unbound-devel dotnet-sdk-7.0-source-built-artifacts Low 13.10-1.el9_1 1-1.el9_2 3-1.el9_3 4-1.el9_3 6-1.el9_4 3.0.21-37.el9 40.el9_4 bind-libs xorg-x11-server-source gstreamer1-plugins-bad-free-devel java-11-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug 21-openjdk-demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug postgresql-docs private-devel server-devel tatic test upgrade-devel 3.14.0-13.el9 6.el9 7.el9_7 python3-ipatests 3.9.10-3.el9_0 edk2-tools libtiff-tools 9.54.0-10.el9_2 1.el9_2 3.el9 4.el9_3 6.el9_4 7.el9_4 8.el9_6 9.el9_6 bind9.18-devel flatpak-devel glib2-static libnetapi-devel ghttp2-devel vpx-devel poppler-cpp-devel devel glib-devel qt5-devel ython3-samba-devel qt5-qtbase-static varnish-devel xorg-x11-server-Xwayland-devel edk2-ovmf ghostscript -tools-fonts printing samba-pidl 6.0.108-1.el9_0 9.0.0-10.2.el9_2 5.0-7.el9_3.alma.1 libvirt-devel ocs mysql-devel test 1.12.8-1.el9 9-1.el9_4 3.el9_4
5 8.1-3.el9 4.el9_4 9.3-2.el9_0 3.5.3-2.el9_0 avahi-compat-howl -devel
libdns_sd -devel devel glib-devel fontforge lua-devel postgresql-test-rpm-macros rotobuf-compiler devel lite-devel wireshark-devel 1.3.3-13.el9 1.5.0-5.el9_5.alma.1 2.0.90-6.el9_1 7.el9 37.4-21.el9_7 4.0-7.el9 8.el9 :2.11.2-1.el9 7-1.el9_7.1 2 3 5 6 4.1-5.el9 32:9.16.23-11.el9 _2.1 2 4.el9_3.4 8.el9_4.1 6 24.el9_5.3 34.el9_7.1 2 5.el9_1 8.29-1.el9_5.1 4.el9_6.2 5.el9_7.2 4 4.0.2-11.el9_7 dotnet-sdk-9.0-source-built-artifacts glibc-benchtests libreoffice-sdk -doc samba-test
-libs 20230524-3.el9 4.el9_3.2.alma 1122-6.el9_4.2 4 40524-6.el9_5.3 1117-4.el9_7.3 1.2.12-2.el9 0.0.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.1 5.0-7.el9_5.alma.1 :1.9.1-12.el9_5 2.70.1-2.el9 8.0-1.el9 6-1.el9 2.el9 389-ds-base-devel :10.5.22-1.el9_2.alma.1 7-1.el9_5 9-2.el9_6
3.el9_7 5.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4 503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5 8.1.el9_5 70.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6 611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 6.1.el9_7 8.1.el9_7 41.1.el9_7 5.1.el9_7 7.1.el9_7 5.1.el9_7 8.0.30-3.el9_0 2-1.el9_2 6-1.el9_3 41-2.el9_5 3-1.el9_6 5.0-7.el9_1 bind9.18-doc libvirt-daemon-plugin-sanlock mariadb-devel embedded-devel test ingw32-glib2
-static 64-glib2
-static ysql-libs 1.3.3-10.el9 _2.1 43.0-5.el9_2.1
3.1
4.3 6.el9_7.1 :2.3.16-11.el9_4.1 7.el9 23.2.7-1.el9 3.el9_6 4.el9_6 5.el9_7 5.4.2-4.el9_0.3 4-2.el9_1 3.el9 LibRaw-devel NetworkManager-libnm-devel cups-filters-devel device-mapper-multipath-devel ovecot-devel flac-devel libarchive-devel ksba-devel nbd-devel sndfile-devel ss_nss_idmap-devel opencryptoki-devel exr-devel jpeg2-devel
tools repokey:type:id shadow-utils-subid-devel turbojpeg -devel zziplib-devel 1.20.11-11.el9 7.el9 9.el9 24.el9 6.el9 8.el9_6 31.el9_6 2.el9_7 :0.9.72-5.el9 20221207gitfff6d81270b5-9.el9_2 31122-6.el9 40524-6.el9_5 9:20200406-26.el9_2 bind9.18-libs flatpak -session-helper nghttp2 inx-mod-devel python3-samba-test xorg-x11-server-Xwayland ruby-doc yajl-devel 15.6-1.el9.alma :7.1.8.1-11.el9.alma 2.el9_3.alma 4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1
8.el9_1.alma 2.41-3.el9 32:9.16.23-1.el9_0.1 5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1 284.11.1.el9_2 25.1.el9_2 70.26.1.el9_0
30.1.el9_0 8.0.44-1.el9_7 5-1.el9_7 lua 0.11.0-7.el9 3.71-11.el9_4 2.el9 20.2-6.el9 1.1-1.el9 30.0-6.el9 1.1-65.el9 5.13-14.el9_7 8.7-20.el9 7.el9_0.1 1.0.31-8.el9 _5.2 16.2-19.el9_6.1 2.el9 3.el9 _3.1 5 8.el9_5.1 2.0-11.el9 2.1-2.el9_3 4.el9 2-3.el9 4.el9_6 5.el9_7 8.7-11.el9_2.1 7.el9_4 3.3-0.el9 2.9-1.el9_5 5.1-5.el9_0 6.el9_1 6-17.el9_6.2 9.0-10.el9_7 7.el9_2.alma.1 8.el9_5 9.el9_6 4-1.el9 :1.42.0-2.el9_4 8.10-2.el9_5.alma.1
5.el9_5 2.5.4-38.el9_7.3 3.4.10-4.el9 6.el9 8.el9_7.1 2.0.15-32.el9_5 32-5.el9_4 1.0-22.el9 5.2-1.el9 68.4-11.el9 4.el9_4.1 6.el9_6.2 8.el9_7.1 7.0-11.el9_7.3 9.4-11.el9_6.1 6.el9_4 7-4.el9_7.1 0201107-6.el9 7.el9_7 8.el9_7 :4.9-15.el9 8.el9 0.3-2.el9_6.1 3.1.1-2.el9_4.1 5.1 2.2-2.el9 3-5.el9 1.0-9.el9_3.alma.1 5.0-4.el9_7.2 3.17-13.el9 5.3-4.el9 5.15.9-10.el9_4 1.el9_6 7.el9 9.el9 39-16.el9 4.0-5.el9 72-2.el9 6.6.2-2.el9_1.1 3.el9_2.1 4.el9_3.1 6.el9_6.1 OpenIPMI-devel autotrace vahi-gobject
-devel bluez-libs-devel capstone-devel file-devel gcc-plugin-devel jq-devel lasso-devel ibfdisk-devel input-devel jose-devel ldb-devel microhttpd-devel nfsidmap-devel rabbitmq-devel smartcols-devel tdc++-static tirpc-devel udisks2-devel v-devel mpg123-devel unge-devel pmix-pmi-devel rocps-ng-devel tobuf-c-compiler devel raptor2-devel epokey:type:str speex-devel texlive-lib-devel pm2-tss-devel wavpack-devel yelp-devel 0.42.2-3.el9 1:0.36.2-8.el9 2.0.7-6.el9 bpftool dovecot flac reeradius-mysql perl ostgresql rest sqlite unixODBC kernel -abi-stablelists core debug -core
devel -matched
modules -extra vel -matched oc headers modules -extra tools -libs libvirt-client-qemu lock-sanlock ocaml-libnbd -devel perf oppler-glib-doc ython3-perf .12-setuptools-wheel qt5-devel 0.99.9-5.el9 1.0.9-1.el9 2.0-7.el9_2 11-32.el9_0 8.10-2.el9.alma 0.0.104-1.el9_7 :0.82-6.1.el9_6 1.20.1-14.el9_2.1.alma.1 3.2.7b-11.el9_7 4.04-1.el9_6 2.0.2-4.el9 1.0-21.el9 4.5-8.el9_4 9.el9_4 5.2-9.el9_5 6.1-8.el9_6 7.0-10.el9_7 52-32.el9_4.alma.1 :1.20.1-22.el9_6.2.alma.1
4.el9_7.1.alma.1 2.alma.1 3.1.9-2.el9_6 24.31-5.el9 4.4.0-10.el9 2.el9 _4.1 3.el9_6.2 5.el9_7.2 2.el9 5.el9_1 7.el9 8.el9_2 5.1.8-6.el9_1 4.0-284.18.1.el9_2 30.1.el9_2 6.0.109-1.el9_0 10-1.el9_0 3-1.el9_1 8-1.el9_2 20-1.el9_2 1-1.el9_2 2-1.el9_2 3-1.el9_2 4-1.el9_2 5-1.el9_3 6-1.el9_3 7-1.el9_3 32-1.el9_4 5-1.el9_4 7.0.100-0.5.rc2.el9_1 7-1.el9_2 9-1.el9_2 10-1.el9_2 1-1.el9_2 2-1.el9_2 3-1.el9_2 4-1.el9_3 5-1.el9_3 6-1.el9_3 7-1.el9_3 9-1.el9_4 8.0.100-2.el9_3 1-1.el9_3 2-2.el9_3 3-2.el9_3 5-1.el9_4 7-1.el9_4 8-1.el9_4 10-1.el9_4 4-1.el9_5 6-1.el9_6 7-1.el9_6 21-1.el9_6 5-1.el9_7 6-1.el9_7 2.0-18.el9_7.2 9.0.100-1.el9_5 4-1.el9_5 6-1.el9_6 7-1.el9_6 11-1.el9_6 5-1.el9_7 aspnetcore-runtime-6.0 targeting-pack-6.0 bash-devel cc-devel sdtar corosync-vqsim dotnet-apphost-pack-6.0 host fxr-6.0 runtime-6.0 sdk-10.0-source-built-artifacts 6.0 targeting-pack-6.0 emplates-6.0 xygen -doxywizard latex fwupd-devel golang-github-cpuguy83-md2man rub2-efi-x64
-cdboot pc tools -efi
xtra minimal tk3-devel-docs java-1.8.0-openjdk -demo vel headless src 1-openjdk -demo vel headless javadoc -zip mods src tatic-libs 7-openjdk -demo vel headless javadoc -zip mods src tatic-libs 25-openjdk-crypto-adapter-fastdebug slowdebug demo-fastdebug slowdebug vel-fastdebug slowdebug fastdebug headless-fastdebug slowdebug jmods-fastdebug slowdebug slowdebug rc-fastdebug slowdebug tatic-libs-fastdebug slowdebug mc libarchive fastjson-devel guestfs-devel gobject -devel input -utils webp-tools ua-guestfs mariadb -backup common embedded rrmsg gssapi-server oqgraph-engine pam server -galera utils ingw32-binutils cpp gcc -c++ libgcc 64-binutils cpp gcc -c++ libgcc netstandard-targeting-pack-2.1 ocaml-libguestfs -devel perl-JSON-XS YAML-LibYAML hp-libguestfs ython3-capstone qatzip-devel repokey:type:flexarray uby-libguestfs shim-unsigned-x64 x64 ystemd-boot-unsigned transfig zlib-static 0.34-19.1.el9_6 41.2-3.el9_7.1 1.30-6.el9 9.4-10.el9_6 3.0.4-160.el9_0 7-162.el9_4 3.el9_5 4.10.2-5.el9_3.alma.1 1.0-15.el9_4.alma.1 9.el9_4 2.2-1.el9_5.3 4.el9_6.1 5 22.el9_7.1 5.15.3-1.el9 9-1.el9 68.2.2-3.el9_4.1 5.el9_6 apache-commons-beanutils bcc-doc capstone-java grub2-common efi-aa64-modules
x64-modules pc-modules pc64le-modules java-1.8.0-openjdk-javadoc -zip libguestfs-man-pages-ja uk microhttpd-doc mingw32-pixman zlib -static 64-pixman zlib -static perl-File-Find-Rule Module-ScanDeps ython3-wheel
-wheel .12-wheel-wheel texlive-gnu-freefont virt-v2v-man-pages-ja uk 2 patch:ALBA-2022:8256 SA-2022:5099 249 52 7 695 709 36 948 6003 43 521 85 90 610 763 913 99 7007 13 90 185 314 8 23 9 958 68 70 9 8003 22 62 8 78 139 51 94 207 8 21 52 67 317 8 53 400 15 8 20 34 93 643 3:0077 194 202 10 302 4 34 40 626 951 3 7 1068 470 693 703 879 80 909 2127 65 6 248 59 61 326 40 70 3 458 9 87 519 32 82 9 92 621 3423 581 5 92 5 661 711 4 5 23 4057 60 99 158 77 8 325 77 642 4 5048 69 143 6 214 453 6 9 62 539 684 9 708 11 33 44 9 53 838 924 6242 6 65 330 40 3 69 409 31 69 82 94 508 18 44 51 66 75 621 31 2 59 67 85 705 7 12 32 8 44 6 7253 5 7 784 91 4:0141 51 2 6 249 65 6 7 466 805 7 48 951 77 10274 75 91 858 939 78 83 1111 219 32 7 42 41 86 239 309 10 427 691 750 89 818 22 5 8 2137 47 69 84 99 204 8 36 64 76 87 9 92 5 353 77 94 433 63 512 25 8 51 60 71 758 842 3 3306 39 501 619 754 835 7 8 959 99 4077 8 349 439 50 563 7 8 73 83 623 749 55 6 7 66 79 928 35 5192 231 334 63 533 83 928 99 6146 63 79 97 356 464 529 67 757 997 7346 867 9 8037 117 21 4 7 62 374 446 7 617 800 914 35 9088 93 122 8 67 81 4 7 90 2 317 71 413 39 42 9 50 1 68 543 8 605 827 5:0059 312 34 77 422 6 578 914 36 10136 48 89 379 585 837 62 7 73 1140 411 849 61 262 746 834 329 46 602 962 4420 878 5007 10 1 8 9 429 661 740 6086 398 59 70 1 81 80 7084 162 377 42 760 8149 51 281 815 21 4 9113 409 584 930 50 20518 59 838 928 54 6 60 1 1110 1 462 2405 865 3109 42 241 323 42 627 68 9 3631 4 845 52 5 937 4244 491 6977 7107 9 38 63 5 78 201 309 50 95 402 22 3 30 7 586 98 600 903 8142 83 333 7 643 55 813 7 9080 114 8 84 302 3 30 462 517 877 80 6:0126 37 445 91 700 52 93 927 8 32 3 6 1143 408 10 78 617 913 39 2039 48 212 722 76 86 3034 66 7 95 189 488 730 940 66 4165 8 216 445 7 54 6 759 828 98 5599 603 6004 153 285 6 300 40 570 628 766 7002 668 915 8075 457 69 repokey:type:relidarray Critical repokey:type:num sitory:solvables solvable:arch buildtime conflicts description evr name patchcategory
rovides summary vendor update:collection :arch evr filename name list reference :href id title ype ights severity tatus � � �$�$�(�(�����!�!�"�"���������%�%�-�-�'�'�&�&�/�/�����G�G���`�`�L�L�M�M�t�t�,�,�c�c�m�m�+�+�d�d�)�)�l�l�e�e�'�'�h�h�k�k�*�*�%�%�a�a�b�b�g�g�&�&�j�j�n�n�i�i�f�f�(�(�$�$� � �����#�#�!�!�����"�"������� � �
�
����oo||�2�2�4�4�5�5xxqq�-�-rrttwwppvv�0�0{{�/�/uu�3�3�.�.yyss�1�1zz�W�W�Y�Y�Q�Q�Z�Z�P�P�U�U�V�V�S�S�T�T�E�E�C�C�R�R�D�D�X�X��nn�����
�
�e�e���������
�
�^N���ba�~�~� � �}�}�������"�!�#���|�}�E�D�)�)�`�J�J�+�+�*�*�{�q�q�o�o���������������p�pM�l�l�tOO�^�a�a�a�]�]�]�s�sMN�;�;��;�I�I�j�j�J�J�n�n�f�f�O�O�K�K�g�g�=�=�>�>�?�?�>�=�?����*�*�)�)�(�(�T�T�TO�_�_�_���
�
�
������������� � �h�h�g�g�g�h�^�^�^�ddd���c�c�b�b�S�S�O�O�S�P�P�O�P�v�v�v�|�|�|�b�b�c�c�d�d�^�^�\�\�_�_�a�a�]�]�U�U����`�`�a�a���k�k�l�l�l�k��������������� � � �@�@�@������� � ���j�j�j���\�\�\ba����N�N�M�M�N�N�Q�Q�M�R�R�R�Q�N�_�_cc�"�#�!c����~�~����Z�Z�Z����B�B�H�H�y�y�y���|�}���w�w�w����������j�j�j� � � ����8�8�6�6�5�5�6�5�8�7�7�9�9�9�4�4�4�7�u�u�{�{�r�r�q�q�t�t�|�|�o�o�w�w�y�y�v�v�z�z�p�p�s�s�x�x���`�`�`EEGGFF�EFEG�D�c�c�c����e�e�e����b�b�,�,�b�+�+�`�`�[�[�m�m�m�o�o�o�d�d�d�t�t�~�~�~�i�i�i�f�f�f�����u�u�u�����[�[�[�m�m�m�:�:�:�^�^����q�q�q�������p�p�p�{�{�{�}�}�}����{�h�h�r�r�r� � ����l�l�l�k�k�k�i�i�r�r�F�F�;�;�<�<�7�7�>�>�:�:�B�B�C�C�A�A�9�9�6�6�E�E�?�?�D�D�8�8�@�@�=�=�z�z�s�s�z�s� � � �x�x�x���n�n�k�k�n�"�=�>�?�@��A�B�C�D�E�F�G�H�#�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�$�e�3�f�3�g�3�h�3�i�3�j�3�%�k�2�l�2�m�2�n�2�o�2�p�2�&�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� �
���
������������������'��� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:��;�<�(�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�)�kD�lD�mD�nD�oD�pD�qD�rD�sD�tD�uD�vD�wD�xD�yD�zD�{D�|D�}D�~D�D� D�D�D�D�D�D�D�*�[�\�=�>�#�?�@�W�X�a�b�Y�Z�U�V�C�D�Q�R�G�H�I�J�]�^��M�N�O�P�S�T�K�L�A�B�_�`�E�F�c�d�+��C��C� �%�
�%��C��C�
�C��C��C��C��%��%��C��C��%��%��%��%��C��C��C��C�,�-�.�/�0���1�2�3�4�5�8�9���:��W�;�<�=�>�?�@�A�B��X�C�D�E�F�G�H� �R�I�J�K�L�M��,�O�T��-�U�V�W�X�Y�Z�[�\�]�`��.�a��X�b�c�d�e�f�g�h�i�j�k�l�m�n��O�o�p�q�r�s�t�v�w�x��Y�y�|�}�~�"��#��� ��/����������P� �
���
����������#��"���0�
�1�
�2�
���0�����Q����� �!�"�$�%�&�!�0��1��2��'�K�d� �d�(�)�*�+�,�-�.�/�"��#��0�1�5�,�6�,�2�0��1��2��3�4�5�6�8��1�:�;�>�0�
�1�
�2�
�@�A�B�D�E�F�G�H�I�J�K�L�M�N�O�P��2�Q�R�S�T�U�V�W� �e�K�e�X�Y�Z�[�7�'�8�'�\��9�]�#��"��^� �h�K�h�_�b�c�d�f�g�h�i�j��R�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�"��#��|�}�~�� �����S���� �
���
������5�-�6�-��2��1��0���#��"����3���������� � �f�K�f�!�"�#�$�"��#��%��4�&�'�(�)��T�*�+�,�-�.�/�0�7��8��1��5�2�#��"��3�2��0��1��4�6�.�5�.�5�6� �Q�7�8�9�:�;�<�=�>�?�@�A�B�C�#��"��D��6�E�7� �8� �F�G�H�I�K�g� �g�J�K�!�S�L�M�N�O�P�Q�R�7�%�8�%�S�#��"��T�U��7�V�W�6�/�5�/�Z�"��#��[�8�&�7�&�\��8�]�^�_�`�a�b�c�d�e�f�g�h�i��;�k�"��#��l�8�*�7�*�m�n�p�q�r�s�t�u�v�w�x�y�z�|�}�~�� �8�+�7�+��#��"������<�����<�?�=�?� �
��B�Y��
��U�����������������B�Z�� �"�#�$�%�!�V�&�'��V�(�B�[�)�*�+�,�-�.�/�7�!�8�!�0��=�1�2�3�4�8�(�7�(�5�"��#��6�7�8�9�:�;�<��:�=�8�)�7�)�>�"�
�#�
�?�@�A�!�T�B�C�D�E�G�H�0��2��1��I�J�K�L�1��0��2��M�N�O�P�Q�R�S�T�U�V�W�X�Y�[�\�]�!�U�^�`�b�c�d�e�f�g�j�k�l�m�n�o�p�7�"�8�"�q�"��#��r��>�s�t�u�v�x�y�z� �i�K�i�{�|�}�~�� ������7�#�8�#���?��"��#��� �
���
������7�$�8�$��"��#�������@���B�\���W��� �E��F��GP�HP�IP�JP�KP�LP�MP�NP�OP�PP�P�
P�
P�QP�RP�SP�TP�P�U��V�� P�#�6�7�W��N�W�,�P�W�-�^�_�W�.�u�W�/�W�0�#�7�9�W�1�<�=�C�W�2�W�9�e��W�3�W�4�W�5�W�6�W�7�W�8�W�;�o�W�<�!�W�=�W�:�W�>�W�?��W�@��X�3�Y�3�;�3�Z�2� �U�
�U��x�@�;�A�;�<�;�=�;�>�;�?�;�I��J��G��H��[��\��]�� �V�
�V�G5�H5�e5�f5�i5�j5�]5�^5�U5�V5�O5�P5�I5�J5�Q5�R5�=5�>5�S5�T5�?5�@5�c5�d5�M5�N5�Y5�Z5�+S�,S�S� S�1S�2S�3S�4S�#S�$S�7S�8S�;S�<S�!S�"S�9S�:S�/S�0S�}#�~#�u#�v#�#�#�#�#�#�#�
#�#�#�#�#�#�#�#�y#�z#�#� #�#�#�#�#�s#�t#�^�5�_�5�`�5�a�"�b�"�c�"�d�5�e�5�G��H��I��J��f��g��h��i��j��k��l��m��n�W�o�W�p�W�q�W�r`�s`�t`�u`�v`�w`�x`�y`�z`�{`�|`�}`�~`�`�`�`� `�`� ������������������ ��
���+��+�
�+��@��@��@��@��@��@�1���&��&��&�]�X��X��X�\�X�[�X��K��K��K��K��K��c��c��c� �A�!�A�"�A�#�A�$�A�%�A�&�A�'�A�(�A�)�A�*�A�+�A�,�N�-�N�.�F�/�F�0�F�1�F�2�F�3�F�4�R�5�R�6�R�7�R�_�n�8�n�9�n�:�n�;�=�<�=�I��J��G��H��=l�>l�?l�@l�Al�Bl�Cl�Dl�El�Fl�Gl�Hl�Il�$l�J�G�K�G�L�G�j�,�k�,�g�,�h�,�i�,�l�,�m�,�M�,�N�,�O�,�f�,�P�3�Q�3�R�3�Se�Te�Ue�Ve�We�Xe�Ye�Ze�[e�\e�]e�^e�_e�`e�ae�be�Q�I�p�F�p�H�p�G�p�R��j��j��j��j�S�c�c�d�c�O�-�h�-�j�-�k�-�N�-�m�-�f�-�i�-�M�-�l�-�g�-�e�e�f�e�g�e� �W�
�W�I6�J6�M6�N6�Q6�R6�U6�V6�S6�T6�=6�>6�Y6�Z6�i6�j6�?6�@6�c6�d6�G6�H6�]6�^6�O6�P6�e6�f6�$� $�u$�v$�s$�t$�$�$�y$�z$�}$�~$�$�$�$�$�
$�$�$�$�$�$�$�$�$�$�$�$�7T�8T�;T�<T�9T�:T�!T�"T�#T�$T�+T�,T�3T�4T�T� T�1T�2T�/T�0T�,�O�-�O�h�
�i�
�j�
�k�
�I�
�J�
�G�
�H�
�l�R�m�R�^�6�_�6�`�6�I��J��G��H��M�.�k�.�j�.�i�.�g�.�h�.�N�.�m�.�f�.�O�.�l�.�n�X�o�X�q�X�p�X�n�C�o�C�p�C�q�C�r�C�s�C�I��J��G��H��.�W�/�W�$�W�%�W�*�W�+�W�&�W�'�W�,�W�-�W�(�W�)�W�G��H��I��J��Y7�Z7�M7�N7�]7�^7�Q7�R7�S7�T7�G7�H7�c7�d7�e7�f7�i7�j7�O7�P7�?7�@7�U7�V7�=7�>7�I7�J7�
%�%�%� %�%�%�%�%�%�%�%�%�%�%�%�%�%�%�%�%�}%�~%�u%�v%�y%�z%�s%�t%�1U�2U�7U�8U�/U�0U�+U�,U�U� U�3U�4U�#U�$U�!U�"U�;U�<U�9U�:U�Hm�Dm�?m�@m�Cm�Em�Bm�Fm�Gm�=m�>m�Am�Im�$m�K�w�t�w�u�w�L�w�v�\�w�\�x�\�y�\�z�\�{�\�|�\�}�\�~�\��\� �\��\�_�o�8�o�9�o�:�o�&�B�!�B� �B�(�B�%�B�'�B�#�B�"�B�$�B�)�B�*�B�+�B�]�O��O�\�O��O�[�O��N��N��N��N��N��N�,�P�-�P��'��'��'��A� �A�
�A�G��H��I��J��c�!�b�!�a�!��6��6�AI�BI�II�GI�$I�=I�>I�
I�I�EI�I�I�I�I�CI�DI�HI�I�FI�?I�@I�I�i�]�j�]�;�]�p�Y�q�Y�o�Y�n�Y�������z��<��<�{�@�<�A�<�>�<�?�<�<�<�=�<��1��1��1� �X�
�X������� ��!��"��#��$��%��&��'��c�d�d�d�j�/�k�/�g�/�h�/�l�/�m�/�N�/�O�/�M�/�i�/�f�/��z�(�z�)�z�*�z�,�Q�-�Q�(�X�)�X�,�X�-�X�.�X�/�X�$�X�%�X�*�X�+�X�&�X�'�X��&��&��&��&��&��&�9�&�:�&�I�S�J�S�c�e�d�e� �Y�
�Y��P�\�P��P�]�P�[�P�&�&�s&�t&�&�&�y&�z&�&�&�&�&�&�&�&� &�&�&�}&�~&�u&�v&�
&�&�&�&�&�&�S8�T8�c8�d8�=8�>8�U8�V8�M8�N8�Q8�R8�Y8�Z8�e8�f8�?8�@8�O8�P8�G8�H8�]8�^8�i8�j8�I8�J8�+V�,V�;V�<V�7V�8V�9V�:V�!V�"V�/V�0V�1V�2V�#V�$V�3V�4V�V� V�IJ�GJ�HJ�DJ�J�J�
J�J�J�FJ�$J�?J�@J�=J�>J�J�J�J�CJ�EJ�BJ�AJ�G��H��I��J��c�f�d�f� �Z�
�Z��L��L��L��L��L�I�T�J�T� �[�
�[�c�g�d�g�+�4�,�4�-k�.k�/k�0k�1k�2k�3k�4k�5k�6k�7k�8k�9k�:k�����!��"��&��'��#�� ��%����$��;�
�<�
�=�
�>�
�?�
�@�
�i�0�j�0�k�0�N�0�m�0�O�0�h�0�l�0�M�0�g�0�f�0�A�9�B�9�C�9�}�u�~�u��u��u��u� �u�[�Q�\�Q�]�Q��Q��Q� �\�
�\�3�9�4�9�1W�2W�7W�8W�3W�4W�W� W�9W�:W�/W�0W�+W�,W�;W�<W�!W�"W�#W�$W�}'�~'�
'�'�u'�v'�'� '�'�'�'�'�'�'�s'�t'�'�'�'�'�'�'�'�'�y'�z'�'�'�c�h�d�h�Y9�Z9�M9�N9�O9�P9�?9�@9�Q9�R9�c9�d9�]9�^9�I9�J9�S9�T9�U9�V9�i9�j9�e9�f9�G9�H9�=9�>9�D�M�E�M�F�M�G�M�H�M�e�f�f�f�g�f� �]�
�]�c�i�d�i�?��;��<��@��>��=��t�d�u�d�L�d�:�p�9�p�_�p�8�p�I��J��K��1��L�`�M�`�N�`�9�'�:�'��'��'��'��'�O�'�P�'�Q�2�R�2�
�B� �B��B�S��T��U��$����!��"��'��&��%���� ��#����h��i��j��k��V�,�W�,�X�,�Y�,�Z�,�=��@��<��?��>��;��[�F�<�F�;�F�\�v�]�v�^�v��v�,�I�-�I�_�A�`�A�a�A�b�A�c�A�d�A�e�H�f�H�g�H�h�T�i�T�j�T�g�1�h�1�l�1�m�1�N�1�O�1�f�1�j�1�k�1�M�1�i�1�K�K�K�K�CK�DK�EK�BK�IK�GK�$K�
K�K�=K�>K�K�?K�@K�HK�FK�AK�K�k�X�l�X�m�X�n�\�o�\�p�\�qQ�rQ�sQ�tQ�uQ�vQ�wQ�xQ�yQ�zQ�{Q�|Q�}Q�~Q�Q� Q�Q�Q��
��
�?�;�
�<�
�>�
�=�
�?�
�@�
�:�:�:�:�:�:� :�
:�:�:�
:�:�:�:�:�:�:�:�:�:�:�:�:�:�:�:�:�:�HL�DL�FL�GL�L�L�L�L�?L�@L�L�IL�$L�=L�>L�AL�BL�
L�L�L�EL�CL�D�N�E�N�H�N�G�N�F�N��o� �o�c�j�d�j� �^�
�^�.�Y�/�Y�$�Y�%�Y�,�Y�-�Y�(�Y�)�Y�*�Y�+�Y�&�Y�'�Y�!�,�"�,�#�,��{�c�k�d�k��p� �p� �_�
�_�<�<� <�
<�<�<�<�<�
<�<�<�<�<�<�<�<�<�<�<�<�<�<�<�<�<�<�<�<�!X�"X�9X�:X�X� X�3X�4X�+X�,X�/X�0X�7X�8X�;X�<X�#X�$X�1X�2X�(�(�(�(�(�(�(�(�y(�z(�s(�t(�}(�~(�(�(�
(�(�u(�v(�(� (�(�(�(�(�(�(�],�^,�e,�f,�=,�>,�O,�P,�Y,�Z,�c,�d,�I,�J,�G,�H,�M,�N,�?,�@,�i,�j,�U,�V,�Q,�R,�S,�T,�M�2�k�2�i�2�j�2�O�2�h�2�g�2�l�2�m�2�f�2�N�2�c�l�d�l� �`�
�`��q� �q�,�Z�-�Z�*�Z�+�Z�.�Z�/�Z�(�Z�)�Z�&�Z�'�Z�$�Z�%�Z��(��(��(�$��%��G��H��I��J��t�e�u�e�L�e�*�F�+�F�(�F�)�F�$�F�%�F�<�F�&�F�'�F�,�F�-�F�.�F�/�F��z�G��H��I��J��$��%��&�'�'�'�(�'�)�'�*�'�+�'�,�'�-�'�.�'�/�'�0�'�i�9�N�9�m�9�g�9�h�9�M�9�k�9�f�9�j�9�l�9�O�9�$����&��"��!��#�� ����%��'����L�h�t�h�u�h��*��*��*�`�1�$�2�$�3�$�a�4�4�5�4�6�4�>�=�?�=�@�=�A�=�<�=�=�=�$� �%� �I� �J� �G� �H� �7�Z�8�Z�9�Z�c�m�d�m��r� �r�h��i��j��k��g�g�f�g�e�g��)��)��)��R�\�R��R�[�R�]�R�/Y�0Y�1Y�2Y�!Y�"Y�Y� Y�9Y�:Y�3Y�4Y�+Y�,Y�#Y�$Y�7Y�8Y�;Y�<Y�)�)�s)�t)�y)�z)�)� )�)�)�)�)�)�)�})�~)�)�)�)�)�u)�v)�)�)�
)�)�)�)�I-�J-�Y-�Z-�=-�>-�O-�P-�c-�d-�i-�j-�Q-�R-�M-�N-�e-�f-�U-�V-�?-�@-�G-�H-�]-�^-�S-�T-�=�=�=�=�=�=�=�=� =�
=�=�=�=�=�
=�=�=�=�=�=�=�=�=�=�=�=�=�=�K��J��I���}�_�q�8�q�9�q�:�q�1�#�2�#�3�#�:�Y�;�Y�<�Y�=�0�>�0�?�0�@�0�A�0�B�0�C�0��H��H��H��H��H��H��m��m��m��m�O�m�P�m�K�x�t�x�u�x�L�x�N�a�M�a�L�a�#�-�"�-�!�-�,�J�-�J�#�� ��'��������&��"��%��$��!��p�D�q�D�s�D�o�D�r�D�n�D�D��E��F��G��H��I��J��$�y�%�y�G�y�H�y�I�y�J�y�yR�rR�~R�}R�wR�tR�zR�{R�R� R�qR�sR�R�uR�vR�xR�R�|R�C�C�D�C�K�b�L�b�M�b������I�q�H�q�F�q�G�q��]�S�[�S�\�S��S��S��k��k��k��k�O�k�P�k�N�N�O�N�P�N�I�z�J�z�$�z�%�z�G�z�H�z��s� �s�c�n�d�n�$�{�%�{�I�{�J�{�G�{�H�{�9f�:f�1f�2f�8f�0f�/f�3f�.f�6f�5f�4f�7f�-f�H�O�G�O�D�O�E�O�F�O�$�|�%�|�G�|�H�|�I�|�J�|��|�h��i��j��k��Q�>�R�>��y�X�-�Z�-�W�-�Y�-�V�-�?��;��<��=��@��>��#�� ����%��$����'��&��"��!����M�3�k�3�N�3�m�3�i�3�l�3�g�3�h�3�f�3�j�3�O�3�G�}�H�}�$�}�%�}�I�}�J�}� �a�
�a��t� �t�#Z�$Z�7Z�8Z�/Z�0Z�;Z�<Z�Z� Z�!Z�"Z�1Z�2Z�9Z�:Z�+Z�,Z�3Z�4Z�*�*�*�*�s*�t*�*�*�*� *�*�*�*�*�*�*�}*�~*�*�*�*�*�
*�*�y*�z*�u*�v*�S.�T.�c.�d.�M.�N.�G.�H.�Q.�R.�U.�V.�i.�j.�=.�>.�e.�f.�?.�@.�I.�J.�Y.�Z.�O.�P.�].�^.�>�>�>�>�>�>�
>�>�>�>�>�>�>�>�>�>� >�
>�>�>�>�>�>�>�>�>�>�>�I�~�J�~�G�~�H�~�$�~�%�~�N�^�M�^�L�^�L�f�t�f�u�f�j��k��h��i��S�=�T�=�U�=��l��l�O�l�P�l��l��l�&��"���� ��#������!��$��%��'��O�4�h�4�M�4�k�4�g�4�l�4�m�4�f�4�i�4�N�4�j�4�$��%��I��J��G��H��z�]�{�]� �]��]�v�]�w�]�x�]�y�]�|�]�}�]�~�]��]�Q�?�R�?�[�T�\�T��T�]�T��T��u� �u�$� �%� �G� �H� �I� �J� �0��j� �k� �h� �i� �I��J��$��%��G��H��.�[�/�[�*�[�+�[�,�[�-�[�$�[�%�[�(�[�)�[�&�[�'�[�(��)��.��'��/��,��*��+��-��0��&��i�5�f�5�j�5�k�5�l�5�m�5�N�5�g�5�h�5�M�5�O�5�&��"���� ��$������'��#��!��%��@��<��>��;��=��?��Y�.�Z�.�W�.�V�.�X�.�g�I�f�I�e�I�6�Q�5�Q�7�Q�4�Q�$��%��I��J��G��H��A�1�>�1�?�1�@�1�B�1�C�1�=�1�G��H��$��%��I��J���2��2��2� �b�
�b��v� �v�V�E�W�E�X�E�![�"[�7[�8[�+[�,[�9[�:[�[� [�;[�<[�/[�0[�1[�2[�#[�$[�3[�4[�+�+�}+�~+�y+�z+�+�+�+�+�+�+�+�+�+�+�+�+�u+�v+�+� +�s+�t+�+�+�
+�+�I/�J/�]/�^/�G/�H/�c/�d/�=/�>/�i/�j/�Q/�R/�U/�V/�O/�P/�e/�f/�S/�T/�?/�@/�M/�N/�Y/�Z/�?�?� ?�
?�?�?�?�?�
?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�?�G��H��I��J��$��%��%��'��!��"��$����&���� ����#��N�6�m�6�j�6�k�6�M�6�l�6�g�6�h�6�i�6�f�6�O�6�(� �)� �/� �*� �+� �.� �'� �,� �-� �0� �&� �$��%��G��H��I��J��Y�V�Z�V�[�V�,�K�-�K�t�g�u�g�L�g�K�y�t�y�u�y�L�y�\�S�]�S�^�S�_�S�_�r�8�r�9�r�:�r��n��n�O�n�P�n��n��n�)}�*}�+}�"}�#}� }�!}�(}�%}�.}�&}�'}�$}�`�<�a�<�b�<�c�H�d�H�e��f����/�%�)�%�.�%�'�%�*�%�+�%�,�%�0�%�(�%�&�%�-�%�#�� ��'��$����&��"��%��!������g�>�h�>�i�>�i�7�j�7�k�7�M�7�g�7�h�7�O�7�N�7�m�7�f�7�l�7�j�d�k�d�l�d�m�P�n�P�o�P�X�I�r�F�r�G�r�H�r�Y�X�/�Z�/�W�/�V�/�Y�/�#�� ��$������!��"����%��&��'��(�&�)�&�,�&�.�&�'�&�-�&�+�&�&�&�/�&�*�&�0�&�N�8�m�8�j�8�k�8�g�8�h�8�l�8�i�8�f�8�O�8�M�8�p�~�q�~�Y�W�Z�W�[�W�G��H��I��J��$��%��A�:�B�:�C�:�I�
�J�
�G�
�H�
�$�
�%�
�r�D�s�D�t�D��~�i�?�h�?�g�?�i0�j0�I0�J0�G0�H0�S0�T0�Q0�R0�U0�V0�e0�f0�M0�N0�]0�^0�=0�>0�?0�@0�Y0�Z0�c0�d0�O0�P0�@�@�@�@�@�@�
@�@�@�@�@�@�@�@� @�
@�@�@�@�@�@�@�@�@�@�@�@�@�G��H��I��J��$��%��}�v�~�v��v��v��v� �v�F�s�G�s�I�s�H�s�j�l�;�m�;�N�;�M�;�k�;�f�;�g�;�h�;�O�;�i�;�j�;�&��"��%��#�� ����!������'��$��(�*�)�*�.�*�'�*�,�*�/�*�*�*�+�*�0�*�-�*�&�*�G��H��$��%��I��J��u�7�v�7�w�7�G��H��I��J��$��%��1]�2]�;]�<]�#]�$]�/]�0]�3]�4]�]� ]�!]�"]�7]�8]�+]�,]�9]�:]�S2�T2�Q2�R2�O2�P2�Y2�Z2�=2�>2�U2�V2�i2�j2�]2�^2�e2�f2�c2�d2�I2�J2�M2�N2�G2�H2�?2�@2�B�B�B�B�B�B�B�B�B�B�B�B�B�B�B�B�B�B�B�B� B�
B�B�B�
B�B�B�B�e�J�f�J�g�J�I��J��$��%��G��H���%��%��%�$��%��I��J��G��H��I��J��G��H��$��%��$��%��G��H��I��J��0��x�o�y�o�z�o�{�o�|�o�}�o�{�~�B��B� �B��B��B��B�$��%��I��J��G��H��G��H��I��J��$��%��G��H��I��J��$��%��&�H�'�H�*�H�+�H�$�H�%�H�<�H�(�H�)�H�.�H�/�H�,�H�-�H�/�+�)�+�.�+�'�+�,�+�(�+�&�+�-�+�+�+�*�+�0�+�!��"��'��#�� ��$������&����%��G� �H� �I� �J� �$� �%� ��M��M��M�O�<�h�<�j�<�k�<�i�<�g�<�M�<�f�<�N�<�m�<�l�<�I�!�J�!�G�!�H�!�$�!�%�!�I�"�J�"�G�"�H�"�$�"�%�"�$�#�%�#�I�#�J�#�G�#�H�#�@�?�A�?�>�?�?�?�$�$�%�$�I�$�J�$�G�$�H�$�G�
�H�
�$�
�%�
�I�
�J�
��Y��Y�A�Y� �Y�
�Y�@�>�A�>�<�>�=�>�>�>�?�>��U�[�U�\�U��U�]�U�G�%�H�%�$�%�%�%�I�%�J�%�� ��;��;��I�&�J�&�G�&�H�&�$�&�%�&�.�G�/�G�<�G�$�G�%�G�,�G�-�G�&�G�'�G�(�G�)�G�*�G�+�G�G�'�H�'�$�'�%�'�I�'�J�'��z� �z�p��q��I�(�J�(�G�(�H�(�$�(�%�(�3^�4^�;^�<^�7^�8^�+^�,^�/^�0^�#^�$^�1^�2^�^� ^�9^�:^�!^�"^�e3�f3�Y3�Z3�G3�H3�=3�>3�M3�N3�U3�V3�O3�P3�?3�@3�i3�j3�c3�d3�Q3�R3�I3�J3�]3�^3�S3�T3�C�C�C�C�C�C�C�C�C�C�
C�C�C�C� C�
C�C�C�C�C�C�C�C�C�C�C�C�C�,�L�-�L�I�)�J�)�G�)�H�)�$�)�%�)��w��w�}�w�~�w��w� �w�I�*�J�*�G�*�H�*�$�*�%�*��Z��Z�A�Z�
�Z� �Z�$�:�%�:�I�:�J�:�G�:�H�:�h�S�i�S�j�S�J��I��H����P�O�O�O�N�O�,�M�-�M�_�V�^�V�]�V�\�V�:�u�9�u�_�u�8�u��V�\�V�[�V��V�]�V� �[��[�
�[�A�[��[�
�L��L��L�I�+�J�+�G�+�H�+�$�+�%�+�G�,�H�,�I�,�J�,�$�,�%�,�>��?��@��A���C� �C�
�C�I�-�J�-�G�-�H�-�$�-�%�-�*�!�+�!�0�!�,�!�/�!�)�!�-�!�(�!�&�!�'�!�.�!�N�=�m�=�j�=�k�=�i�=�g�=�h�=�l�=�M�=�O�=�f�=�$��%��I��J��G��H��p��q���w� �w�0�(�*�(�+�(�.�(�'�(�,�(�(�(�)�(�-�(�&�(�/�(�!��"��&��#�� ������'����$��%��;\�<\�+\�,\�1\�2\�!\�"\�#\�$\�3\�4\�\� \�9\�:\�/\�0\�7\�8\�M1�N1�=1�>1�Q1�R1�i1�j1�Y1�Z1�O1�P1�?1�@1�e1�f1�]1�^1�U1�V1�S1�T1�c1�d1�I1�J1�G1�H1�A�A�A�A� A�
A�A�A�A�A�A�A�A�A�A�A�A�A�A�A�A�A�A�A�
A�A�A�A�G��H��I��J��$��%��3g�.g�9g�:g�1g�2g�8g�0g�/g�4g�5g�-g�7g�6g�Q�@�R�@�M�:�k�:�g�:�h�:�j�:�N�:�m�:�i�:�l�:�f�:�O�:�.�)�'�)�,�)�-�)�+�)�(�)�)�)�0�)�&�)�*�)�/�)��
��
�#�
� �
�%�
�$�
�&�
�"�
��
�'�
�!�
����� ������������
��_�s�:�s�9�s�8�s�_�T�^�T�\�T�]�T�#�.�"�.�!�.��G��G�3�G�/�G�2�G�1�G�0�G�.�G��v�F�Q�A�R�A�3�D�4�D�=��;��<��@��>��?��$��%��I��J��G��H���U��U��U�q"�r"�"� "�|"�}"�w"�t"�z"�{"�"�"�s"�"�"�"�"�"�~"�x"�v"�"�y"�u"�>��@��<��=��?��;���x� �x�p� �q� �I��J��G��H��$��%��$��%��I��J��G��H��#�/�"�/�!�/�I��J��$��%��G��H��e�h�f�h�g�h�I��J��G��H��$��%��1h�2h�6h�5h�9h�:h�8h�0h�3h�.h�/h�4h�7h�-h��y� �y�p��q��G��H��I��J��$��%���w�Z�C�;�B�;�A�;���$��%��G��H��I��J��]�U�^�U�_�U�:�t�9�t�_�t�\�U�8�t��8��8�_�N�_�M�_�L�_��t�a�9i�:i�8i�0i�7i�2i�/i�1i�6i�5i�-i�.i�3i�4i�$��%��G��H��I��J��'~�#~�"~�.~�&~�!~�(~�%~� ~�$~�+~�*~�)~��x� �x��x��x�}�x�~�x�$�.�%�.�I�.�J�.�G�.�H�.�(�I�)�I�,�I�-�I�&�I�'�I�.�I�/�I�<�I�$�I�%�I�*�I�+�I��:��:�h��}� �}�i�$�/�%�/�I�/�J�/�G�/�H�/�e4�f4�Q4�R4�M4�N4�=4�>4�c4�d4�i4�j4�I4�J4�]4�^4�G4�H4�S4�T4�Y4�Z4�U4�V4�?4�@4�O4�P4�;�;�;�;�
;�;�;�;�;�;�;�;�;�;�;�;�;�;�;�;�;�;�;�;� ;�
;�;�;�/_�0_�;_�<_�9_�:_�3_�4_�#_�$_�7_�8_�!_�"_�_� _�1_�2_�+_�,_�! �" �# �$ �% �& �' �( �) �* �+ �, �- �. �/ �0 �1 �2 �3 �4 �5 �6 �7 �8 �9 �: �; �< �= �> �? �@ �g�K�f�K�e�K�G�0�H�0�I�0�J�0�$�0�%�0�&�"�'�"�,�"�(�"�)�"�0�"�*�"�+�"�/�"�-�"�.�"�$������ ��'��#��&��"��%����!��O�>�h�>�f�>�N�>�m�>�M�>�k�>�g�>�i�>�l�>�j�>�$�1�%�1�G�1�H�1�I�1�J�1�A�E�B�E�C�E�D�E�E�E�F�E��u�o�Q�n�Q�m�Q�w��I��I��I��I��I��I�$�2�%�2�G�2�H�2�I�2�J�2�G�3�H�3�I�3�J�3�$�3�%�3�L�i�t�i�u�i�8j�0j�9j�:j�3j�.j�7j�2j�6j�5j�-j�1j�/j�4j�G� �H� �I� �I�4�J�4�$�4�%�4�G�4�H�4��J��J��J��J��J��J�����
������������ ��Q�B�R�B�$�5�%�5�G�5�H�5�I�5�J�5�*�J�+�J�.�J�/�J�<�J�,�J�-�J�&�J�'�J�(�J�)�J�$�J�%�J�J�@�K�@�L�@�G�6�H�6�$�6�%�6�I�6�J�6�,�#�/�#�)�#�-�#�+�#�&�#�'�#�0�#�*�#�(�#�.�#�O�?�h�?�M�?�k�?�l�?�m�?�N�?�f�?�g�?�i�?�j�?�!��"��$����&��#�� ��%����'����M�7�N�7�A�8�B�8�C�8��{� �{�p��q��I�7�J�7�G�7�H�7�$�7�%�7�>��?��@��A��O�]�P�]�Q�]�R�]�S�]��]�3�E�4�E�9�[�8�[�7�[��K��K��K��K��K��K�I�8�J�8�G�8�H�8�$�8�%�8�,�$�(�$�)�$�*�$�+�$�-�$�/�$�.�$�'�$�&�$�0�$�!��"������$��%��#�� ��&��'����#�0�"�0�!�0��L��L��L��L��L��L�$�9�%�9�I�9�J�9�G�9�H�9�m�R�n�R�o�R��l�@�m�@�O�@�h�@�N�@�g�@�j�@�k�@�f�@�i�@�M�@�3�F�4�F�H�P�G�P�D�P�E�P�F�P��\��\�
�\�A�\� �\��W�\�W�]�W��W�[�W��M��M��M��M��M��M��|� �|�*�i �%�i �)�i �.�i �,�!�~�'�!�[�$�m�+� �<�i �-� �:�i �;�i �(���v�6� �7� �8� �9�i �5�m �3�i �1�i �0�i �2� �/�m �4�m �&�# NOPSTUABCDEFHIJKLMRWX�N��L��" ��Rbugfix Important: qatzip bug fix and enhancement update yhttps://access.redhat.com/errata/RHBA-2022:8256 RHBA-2022:8256 RHBA-2022:8256
https://access.redhat.com/security/cve/CVE-2022-36369 CVE-2022-36369 CVE-2022-36369 https://bugzilla.redhat.com/2170784 2170784 https://errata.almalinux.org/9/ALBA-2022-8256.html ALBA-2022:8256 ALBA-2022:8256 �l�3qatzip-devel-1.0.9-1.el9.x86_64.rpm �l�3qatzip-devel-1.0.9-1.el9.x86_64.rpm ����|�# �(�QBBBBBBBBBBBBBBBBBBBBBsecurity Important: grub2, mokutil, shim, and shim-unsigned-x64 security update Hy�|https://access.redhat.com/errata/RHSA-2022:5099 RHSA-2022:5099 RHSA-2022:5099
https://access.redhat.com/security/cve/CVE-2021-3695 CVE-2021-3695 CVE-2021-3695 https://access.redhat.com/security/cve/CVE-2021-3696 CVE-2021-3696 CVE-2021-3696 https://access.redhat.com/security/cve/CVE-2021-3697 CVE-2021-3697 CVE-2021-3697 https://access.redhat.com/security/cve/CVE-2022-28733 CVE-2022-28733 CVE-2022-28733 https://access.redhat.com/security/cve/CVE-2022-28734 CVE-2022-28734 CVE-2022-28734 https://access.redhat.com/security/cve/CVE-2022-28735 CVE-2022-28735 CVE-2022-28735 https://access.redhat.com/security/cve/CVE-2022-28736 CVE-2022-28736 CVE-2022-28736 https://access.redhat.com/security/cve/CVE-2022-28737 CVE-2022-28737 CVE-2022-28737 https://bugzilla.redhat.com/1991685 1991685 https://bugzilla.redhat.com/1991686 1991686 https://bugzilla.redhat.com/1991687 1991687 https://bugzilla.redhat.com/2083339 2083339 https://bugzilla.redhat.com/2090463 2090463 https://bugzilla.redhat.com/2090857 2090857 https://bugzilla.redhat.com/2090899 2090899 https://bugzilla.redhat.com/2092613 2092613 https://errata.almalinux.org/9/ALSA-2022-5099.html ALSA-2022:5099 ALSA-2022:5099 �o�shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �Pgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �
Pgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm �
Pgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �Pgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm �p�shim-x64-15.6-1.el9.alma.x86_64.rpm � Pgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm �o�shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �Pgrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �
Pgrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm �
Pgrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �Pgrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �Pgrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm �p�shim-x64-15.6-1.el9.alma.x86_64.rpm � Pgrub2-common-2.06-27.el9_0.7.alma.noarch.rpm ����1�$ � �VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update H�u�
https://access.redhat.com/errata/RHSA-2022:5249 RHSA-2022:5249 RHSA-2022:5249
https://access.redhat.com/security/cve/CVE-2022-1012 CVE-2022-1012 CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 CVE-2022-1729 CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 CVE-2022-1966 CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 CVE-2022-27666 CVE-2022-27666 https://bugzilla.redhat.com/2061633 2061633 https://bugzilla.redhat.com/2064604 2064604 https://bugzilla.redhat.com/2086753 2086753 https://bugzilla.redhat.com/2092427 2092427 https://errata.almalinux.org/9/ALSA-2022-5249.html ALSA-2022:5249 ALSA-2022:5249 � kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �$kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm �(kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �#kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �!kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �"kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-5.14.0-70.17.1.el9_0.x86_64.rpm �%kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �-perf-5.14.0-70.17.1.el9_0.x86_64.rpm �'kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm �&kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �/python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm � kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �$kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm �(kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �#kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �!kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �"kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-5.14.0-70.17.1.el9_0.x86_64.rpm �%kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �-perf-5.14.0-70.17.1.el9_0.x86_64.rpm �'kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm �&kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �/python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm �����% ��ABBBBB�security Moderate: libarchive security update H
�
�Xhttps://access.redhat.com/errata/RHSA-2022:5252 RHSA-2022:5252 RHSA-2022:5252
https://access.redhat.com/security/cve/CVE-2022-26280 CVE-2022-26280 CVE-2022-26280 https://bugzilla.redhat.com/2071931 2071931 https://errata.almalinux.org/9/ALSA-2022-5252.html ALSA-2022:5252 ALSA-2022:5252 �G�3libarchive-3.5.3-2.el9_0.x86_64.rpm ��3bsdtar-3.5.3-2.el9_0.x86_64.rpm �`�3libarchive-devel-3.5.3-2.el9_0.i686.rpm �`�3libarchive-devel-3.5.3-2.el9_0.x86_64.rpm �G�3libarchive-3.5.3-2.el9_0.x86_64.rpm ��3bsdtar-3.5.3-2.el9_0.x86_64.rpm �`�3libarchive-devel-3.5.3-2.el9_0.i686.rpm �`�3libarchive-devel-3.5.3-2.el9_0.x86_64.rpm ���
�& ��HBBBBB� security Moderate: libinput security update H
�b�3https://access.redhat.com/errata/RHSA-2022:5257 RHSA-2022:5257 RHSA-2022:5257
https://access.redhat.com/security/cve/CVE-2022-1215 CVE-2022-1215 CVE-2022-1215 https://bugzilla.redhat.com/2074952 2074952 https://errata.almalinux.org/9/ALSA-2022-5257.html ALSA-2022:5257 ALSA-2022:5257 �L�2libinput-1.19.3-2.el9_0.x86_64.rpm �M�2libinput-utils-1.19.3-2.el9_0.x86_64.rpm �t�2libinput-devel-1.19.3-2.el9_0.i686.rpm �t�2libinput-devel-1.19.3-2.el9_0.x86_64.rpm �L�2libinput-1.19.3-2.el9_0.x86_64.rpm �M�2libinput-utils-1.19.3-2.el9_0.x86_64.rpm �t�2libinput-devel-1.19.3-2.el9_0.i686.rpm �t�2libinput-devel-1.19.3-2.el9_0.x86_64.rpm ����' �=�OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security, bug fix, and enhancement update H��+https://access.redhat.com/errata/RHSA-2022:5695 RHSA-2022:5695 RHSA-2022:5695
https://access.redhat.com/security/cve/CVE-2022-21540 CVE-2022-21540 CVE-2022-21540 https://access.redhat.com/security/cve/CVE-2022-21541 CVE-2022-21541 CVE-2022-21541 https://access.redhat.com/security/cve/CVE-2022-34169 CVE-2022-34169 CVE-2022-34169 https://bugzilla.redhat.com/2108540 2108540 https://bugzilla.redhat.com/2108543 2108543 https://bugzilla.redhat.com/2108554 2108554 https://errata.almalinux.org/9/ALSA-2022-5695.html ALSA-2022:5695 ALSA-2022:5695 �,java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm �cjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �mjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �+java-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm �djava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �)java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm �ljava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �ejava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �'java-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm �hjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �kjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �*java-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm �%java-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm �ajava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �bjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �gjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �&java-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm �jjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �njava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �ijava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �fjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �(java-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm �$java-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm �,java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpm �cjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �mjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �+java-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpm �djava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �)java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpm �ljava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �ejava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �'java-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm �hjava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �kjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �*java-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpm �%java-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpm �ajava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �bjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �gjava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �&java-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpm �jjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �njava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �ijava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �fjava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpm �(java-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpm �$java-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm �����( ��~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security, bug fix, and enhancement update H�@�.https://access.redhat.com/errata/RHSA-2022:5709 RHSA-2022:5709 RHSA-2022:5709
https://access.redhat.com/security/cve/CVE-2022-21540 CVE-2022-21540 CVE-2022-21540 https://access.redhat.com/security/cve/CVE-2022-21541 CVE-2022-21541 CVE-2022-21541 https://access.redhat.com/security/cve/CVE-2022-34169 CVE-2022-34169 CVE-2022-34169 https://bugzilla.redhat.com/2108540 2108540 https://bugzilla.redhat.com/2108543 2108543 https://bugzilla.redhat.com/2108554 2108554 https://errata.almalinux.org/9/ALSA-2022-5709.html ALSA-2022:5709 ALSA-2022:5709 �java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm � java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �#java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm �!java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �"java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm � java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm �
java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm �java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpm � java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �#java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm �!java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �"java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm � java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpm �
java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpm �java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm �����) �
�_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security, bug fix, and enhancement update H�n�e
https://access.redhat.com/errata/RHSA-2022:5736 RHSA-2022:5736 RHSA-2022:5736
https://access.redhat.com/security/cve/CVE-2022-21540 CVE-2022-21540 CVE-2022-21540 https://access.redhat.com/security/cve/CVE-2022-21541 CVE-2022-21541 CVE-2022-21541 https://access.redhat.com/security/cve/CVE-2022-21549 CVE-2022-21549 CVE-2022-21549 https://access.redhat.com/security/cve/CVE-2022-34169 CVE-2022-34169 CVE-2022-34169 https://bugzilla.redhat.com/2108540 2108540 https://bugzilla.redhat.com/2108543 2108543 https://bugzilla.redhat.com/2108547 2108547 https://bugzilla.redhat.com/2108554 2108554 https://errata.almalinux.org/9/ALSA-2022-5736.html ALSA-2022:5736 ALSA-2022:5736 ojava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm |java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �2java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm �4java-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm �5java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm xjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm qjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �-java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm rjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm tjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm wjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm pjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm vjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �0java-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm {java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �/java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm ujava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �3java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm �.java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm yjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm sjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �1java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm zjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm ojava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm |java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �2java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm �4java-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm �5java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm xjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm qjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �-java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm rjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm tjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm wjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm pjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm vjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �0java-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm {java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �/java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm ujava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �3java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm �.java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm yjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm sjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �1java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm zjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm �����* �*�NBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update H
�S�iJhttps://access.redhat.com/errata/RHSA-2022:5948 RHSA-2022:5948 RHSA-2022:5948
https://access.redhat.com/security/cve/CVE-2021-46659 CVE-2021-46659 CVE-2021-46659 https://access.redhat.com/security/cve/CVE-2021-46661 CVE-2021-46661 CVE-2021-46661 https://access.redhat.com/security/cve/CVE-2021-46663 CVE-2021-46663 CVE-2021-46663 https://access.redhat.com/security/cve/CVE-2021-46664 CVE-2021-46664 CVE-2021-46664 https://access.redhat.com/security/cve/CVE-2021-46665 CVE-2021-46665 CVE-2021-46665 https://access.redhat.com/security/cve/CVE-2021-46668 CVE-2021-46668 CVE-2021-46668 https://access.redhat.com/security/cve/CVE-2021-46669 CVE-2021-46669 CVE-2021-46669 https://access.redhat.com/security/cve/CVE-2022-24048 CVE-2022-24048 CVE-2022-24048 https://access.redhat.com/security/cve/CVE-2022-24050 CVE-2022-24050 CVE-2022-24050 https://access.redhat.com/security/cve/CVE-2022-24051 CVE-2022-24051 CVE-2022-24051 https://access.redhat.com/security/cve/CVE-2022-24052 CVE-2022-24052 CVE-2022-24052 https://access.redhat.com/security/cve/CVE-2022-27376 CVE-2022-27376 CVE-2022-27376 https://access.redhat.com/security/cve/CVE-2022-27377 CVE-2022-27377 CVE-2022-27377 https://access.redhat.com/security/cve/CVE-2022-27378 CVE-2022-27378 CVE-2022-27378 https://access.redhat.com/security/cve/CVE-2022-27379 CVE-2022-27379 CVE-2022-27379 https://access.redhat.com/security/cve/CVE-2022-27380 CVE-2022-27380 CVE-2022-27380 https://access.redhat.com/security/cve/CVE-2022-27381 CVE-2022-27381 CVE-2022-27381 https://access.redhat.com/security/cve/CVE-2022-27382 CVE-2022-27382 CVE-2022-27382 https://access.redhat.com/security/cve/CVE-2022-27383 CVE-2022-27383 CVE-2022-27383 https://access.redhat.com/security/cve/CVE-2022-27384 CVE-2022-27384 CVE-2022-27384 https://access.redhat.com/security/cve/CVE-2022-27386 CVE-2022-27386 CVE-2022-27386 https://access.redhat.com/security/cve/CVE-2022-27387 CVE-2022-27387 CVE-2022-27387 https://access.redhat.com/security/cve/CVE-2022-27444 CVE-2022-27444 CVE-2022-27444 https://access.redhat.com/security/cve/CVE-2022-27445 CVE-2022-27445 CVE-2022-27445 https://access.redhat.com/security/cve/CVE-2022-27446 CVE-2022-27446 CVE-2022-27446 https://access.redhat.com/security/cve/CVE-2022-27447 CVE-2022-27447 CVE-2022-27447 https://access.redhat.com/security/cve/CVE-2022-27448 CVE-2022-27448 CVE-2022-27448 https://access.redhat.com/security/cve/CVE-2022-27449 CVE-2022-27449 CVE-2022-27449 https://access.redhat.com/security/cve/CVE-2022-27451 CVE-2022-27451 CVE-2022-27451 https://access.redhat.com/security/cve/CVE-2022-27452 CVE-2022-27452 CVE-2022-27452 https://access.redhat.com/security/cve/CVE-2022-27455 CVE-2022-27455 CVE-2022-27455 https://access.redhat.com/security/cve/CVE-2022-27456 CVE-2022-27456 CVE-2022-27456 https://access.redhat.com/security/cve/CVE-2022-27457 CVE-2022-27457 CVE-2022-27457 https://access.redhat.com/security/cve/CVE-2022-27458 CVE-2022-27458 CVE-2022-27458 https://access.redhat.com/security/cve/CVE-2022-31622 CVE-2022-31622 CVE-2022-31622 https://access.redhat.com/security/cve/CVE-2022-31623 CVE-2022-31623 CVE-2022-31623 https://bugzilla.redhat.com/2049302 2049302 https://bugzilla.redhat.com/2050017 2050017 https://bugzilla.redhat.com/2050022 2050022 https://bugzilla.redhat.com/2050024 2050024 https://bugzilla.redhat.com/2050026 2050026 https://bugzilla.redhat.com/2050032 2050032 https://bugzilla.redhat.com/2050034 2050034 https://bugzilla.redhat.com/2068211 2068211 https://bugzilla.redhat.com/2068233 2068233 https://bugzilla.redhat.com/2068234 2068234 https://bugzilla.redhat.com/2069833 2069833 https://bugzilla.redhat.com/2074817 2074817 https://bugzilla.redhat.com/2074947 2074947 https://bugzilla.redhat.com/2074949 2074949 https://bugzilla.redhat.com/2074951 2074951 https://bugzilla.redhat.com/2074966 2074966 https://bugzilla.redhat.com/2074981 2074981 https://bugzilla.redhat.com/2074987 2074987 https://bugzilla.redhat.com/2074996 2074996 https://bugzilla.redhat.com/2074999 2074999 https://bugzilla.redhat.com/2075005 2075005 https://bugzilla.redhat.com/2075006 2075006 https://bugzilla.redhat.com/2075691 2075691 https://bugzilla.redhat.com/2075692 2075692 https://bugzilla.redhat.com/2075693 2075693 https://bugzilla.redhat.com/2075694 2075694 https://bugzilla.redhat.com/2075695 2075695 https://bugzilla.redhat.com/2075696 2075696 https://bugzilla.redhat.com/2075697 2075697 https://bugzilla.redhat.com/2075699 2075699 https://bugzilla.redhat.com/2075700 2075700 https://bugzilla.redhat.com/2075701 2075701 https://bugzilla.redhat.com/2076144 2076144 https://bugzilla.redhat.com/2076145 2076145 https://bugzilla.redhat.com/2092354 2092354 https://bugzilla.redhat.com/2092360 2092360 https://errata.almalinux.org/9/ALSA-2022-5948.html ALSA-2022:5948 ALSA-2022:5948 �WDmariadb-pam-10.5.16-2.el9_0.x86_64.rpm �YDmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm �QDmariadb-backup-10.5.16-2.el9_0.x86_64.rpm �ZDmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm �PDmariadb-10.5.16-2.el9_0.x86_64.rpm �UDmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm �VDmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm �SDmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm �TDmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm �EDmariadb-test-10.5.16-2.el9_0.x86_64.rpm �CDmariadb-devel-10.5.16-2.el9_0.x86_64.rpm �RDmariadb-common-10.5.16-2.el9_0.x86_64.rpm �DDmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm �XDmariadb-server-10.5.16-2.el9_0.x86_64.rpm �WDmariadb-pam-10.5.16-2.el9_0.x86_64.rpm �YDmariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm �QDmariadb-backup-10.5.16-2.el9_0.x86_64.rpm �ZDmariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm �PDmariadb-10.5.16-2.el9_0.x86_64.rpm �UDmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm �VDmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm �SDmariadb-embedded-10.5.16-2.el9_0.x86_64.rpm �TDmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm �EDmariadb-test-10.5.16-2.el9_0.x86_64.rpm �CDmariadb-devel-10.5.16-2.el9_0.x86_64.rpm �RDmariadb-common-10.5.16-2.el9_0.x86_64.rpm �DDmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm �XDmariadb-server-10.5.16-2.el9_0.x86_64.rpm ��ͯo�+ ��kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security, bug fix, and enhancement update H
�<�qhttps://access.redhat.com/errata/RHSA-2022:6003 RHSA-2022:6003 RHSA-2022:6003
https://access.redhat.com/security/cve/CVE-2022-0494 CVE-2022-0494 CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1055 CVE-2022-1055 CVE-2022-1055 https://bugzilla.redhat.com/2039448 2039448 https://bugzilla.redhat.com/2070220 2070220 https://errata.almalinux.org/9/ALSA-2022-6003.html ALSA-2022:6003 ALSA-2022:6003 �'kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm � kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �#kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �$kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �%kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �&kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �"kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �!kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �(kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm �/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm �'kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm � kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �#kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �$kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �%kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �&kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �"kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �!kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �(kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm �/python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm �kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm ����B�, �,�VBBBBBBBBBBBBBBBBBBBBsecurity Moderate: .NET 6.0 security, bug fix, and enhancement update H
�-�Jhttps://access.redhat.com/errata/RHSA-2022:6043 RHSA-2022:6043 RHSA-2022:6043
https://access.redhat.com/security/cve/CVE-2022-34716 CVE-2022-34716 CVE-2022-34716 https://bugzilla.redhat.com/2115183 2115183 https://errata.almalinux.org/9/ALSA-2022-6043.html ALSA-2022:6043 ALSA-2022:6043 ��Caspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm n�%dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm ��Cdotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm ��Cdotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm �
�Cdotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm �e�%netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm ��Caspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm ��%dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm ��%dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm ��Cdotnet-host-6.0.8-1.el9_0.x86_64.rpm �
�Cdotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm ��Caspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm n�%dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm ��Cdotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm ��Cdotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm �
�Cdotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm �e�%netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm ��Caspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm ��%dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm ��%dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm ��Cdotnet-host-6.0.8-1.el9_0.x86_64.rpm �
�Cdotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm ��нi�- �-�Vsecurity Moderate: .NET 6.0 security and bugfix update H
�w�xhttps://access.redhat.com/errata/RHSA-2022:6521 RHSA-2022:6521 RHSA-2022:6521
https://access.redhat.com/security/cve/CVE-2022-38013 CVE-2022-38013 CVE-2022-38013 https://bugzilla.redhat.com/2125124 2125124 https://errata.almalinux.org/9/ALSA-2022-6521.html ALSA-2022:6521 ALSA-2022:6521 n�Udotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm n�Udotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0.x86_64.rpm �����. �.�security Moderate: ruby security, bug fix, and enhancement update H
�o�Mhttps://access.redhat.com/errata/RHSA-2022:6585 RHSA-2022:6585 RHSA-2022:6585
https://access.redhat.com/security/cve/CVE-2022-28738 CVE-2022-28738 CVE-2022-28738 https://access.redhat.com/security/cve/CVE-2022-28739 CVE-2022-28739 CVE-2022-28739 https://bugzilla.redhat.com/2075685 2075685 https://bugzilla.redhat.com/2075687 2075687 https://errata.almalinux.org/9/ALSA-2022-6585.html ALSA-2022:6585 ALSA-2022:6585 ��xruby-doc-3.0.4-160.el9_0.noarch.rpm ��xruby-doc-3.0.4-160.el9_0.noarch.rpm �����/ �/�YBBBBsecurity Moderate: mysql security, bug fix, and enhancement update H
�<�eZhttps://access.redhat.com/errata/RHSA-2022:6590 RHSA-2022:6590 RHSA-2022:6590
https://access.redhat.com/security/cve/CVE-2022-21412 CVE-2022-21412 CVE-2022-21412 https://access.redhat.com/security/cve/CVE-2022-21413 CVE-2022-21413 CVE-2022-21413 https://access.redhat.com/security/cve/CVE-2022-21414 CVE-2022-21414 CVE-2022-21414 https://access.redhat.com/security/cve/CVE-2022-21415 CVE-2022-21415 CVE-2022-21415 https://access.redhat.com/security/cve/CVE-2022-21417 CVE-2022-21417 CVE-2022-21417 https://access.redhat.com/security/cve/CVE-2022-21418 CVE-2022-21418 CVE-2022-21418 https://access.redhat.com/security/cve/CVE-2022-21423 CVE-2022-21423 CVE-2022-21423 https://access.redhat.com/security/cve/CVE-2022-21425 CVE-2022-21425 CVE-2022-21425 https://access.redhat.com/security/cve/CVE-2022-21427 CVE-2022-21427 CVE-2022-21427 https://access.redhat.com/security/cve/CVE-2022-21435 CVE-2022-21435 CVE-2022-21435 https://access.redhat.com/security/cve/CVE-2022-21436 CVE-2022-21436 CVE-2022-21436 https://access.redhat.com/security/cve/CVE-2022-21437 CVE-2022-21437 CVE-2022-21437 https://access.redhat.com/security/cve/CVE-2022-21438 CVE-2022-21438 CVE-2022-21438 https://access.redhat.com/security/cve/CVE-2022-21440 CVE-2022-21440 CVE-2022-21440 https://access.redhat.com/security/cve/CVE-2022-21444 CVE-2022-21444 CVE-2022-21444 https://access.redhat.com/security/cve/CVE-2022-21451 CVE-2022-21451 CVE-2022-21451 https://access.redhat.com/security/cve/CVE-2022-21452 CVE-2022-21452 CVE-2022-21452 https://access.redhat.com/security/cve/CVE-2022-21454 CVE-2022-21454 CVE-2022-21454 https://access.redhat.com/security/cve/CVE-2022-21455 CVE-2022-21455 CVE-2022-21455 https://access.redhat.com/security/cve/CVE-2022-21457 CVE-2022-21457 CVE-2022-21457 https://access.redhat.com/security/cve/CVE-2022-21459 CVE-2022-21459 CVE-2022-21459 https://access.redhat.com/security/cve/CVE-2022-21460 CVE-2022-21460 CVE-2022-21460 https://access.redhat.com/security/cve/CVE-2022-21462 CVE-2022-21462 CVE-2022-21462 https://access.redhat.com/security/cve/CVE-2022-21478 CVE-2022-21478 CVE-2022-21478 https://access.redhat.com/security/cve/CVE-2022-21479 CVE-2022-21479 CVE-2022-21479 https://access.redhat.com/security/cve/CVE-2022-21509 CVE-2022-21509 CVE-2022-21509 https://access.redhat.com/security/cve/CVE-2022-21515 CVE-2022-21515 CVE-2022-21515 https://access.redhat.com/security/cve/CVE-2022-21517 CVE-2022-21517 CVE-2022-21517 https://access.redhat.com/security/cve/CVE-2022-21522 CVE-2022-21522 CVE-2022-21522 https://access.redhat.com/security/cve/CVE-2022-21525 CVE-2022-21525 CVE-2022-21525 https://access.redhat.com/security/cve/CVE-2022-21526 CVE-2022-21526 CVE-2022-21526 https://access.redhat.com/security/cve/CVE-2022-21527 CVE-2022-21527 CVE-2022-21527 https://access.redhat.com/security/cve/CVE-2022-21528 CVE-2022-21528 CVE-2022-21528 https://access.redhat.com/security/cve/CVE-2022-21529 CVE-2022-21529 CVE-2022-21529 https://access.redhat.com/security/cve/CVE-2022-21530 CVE-2022-21530 CVE-2022-21530 https://access.redhat.com/security/cve/CVE-2022-21531 CVE-2022-21531 CVE-2022-21531 https://access.redhat.com/security/cve/CVE-2022-21534 CVE-2022-21534 CVE-2022-21534 https://access.redhat.com/security/cve/CVE-2022-21537 CVE-2022-21537 CVE-2022-21537 https://access.redhat.com/security/cve/CVE-2022-21538 CVE-2022-21538 CVE-2022-21538 https://access.redhat.com/security/cve/CVE-2022-21539 CVE-2022-21539 CVE-2022-21539 https://access.redhat.com/security/cve/CVE-2022-21547 CVE-2022-21547 CVE-2022-21547 https://access.redhat.com/security/cve/CVE-2022-21553 CVE-2022-21553 CVE-2022-21553 https://access.redhat.com/security/cve/CVE-2022-21556 CVE-2022-21556 CVE-2022-21556 https://access.redhat.com/security/cve/CVE-2022-21569 CVE-2022-21569 CVE-2022-21569 https://bugzilla.redhat.com/2082636 2082636 https://bugzilla.redhat.com/2082637 2082637 https://bugzilla.redhat.com/2082638 2082638 https://bugzilla.redhat.com/2082639 2082639 https://bugzilla.redhat.com/2082640 2082640 https://bugzilla.redhat.com/2082641 2082641 https://bugzilla.redhat.com/2082642 2082642 https://bugzilla.redhat.com/2082643 2082643 https://bugzilla.redhat.com/2082644 2082644 https://bugzilla.redhat.com/2082645 2082645 https://bugzilla.redhat.com/2082646 2082646 https://bugzilla.redhat.com/2082647 2082647 https://bugzilla.redhat.com/2082648 2082648 https://bugzilla.redhat.com/2082649 2082649 https://bugzilla.redhat.com/2082650 2082650 https://bugzilla.redhat.com/2082651 2082651 https://bugzilla.redhat.com/2082652 2082652 https://bugzilla.redhat.com/2082653 2082653 https://bugzilla.redhat.com/2082654 2082654 https://bugzilla.redhat.com/2082655 2082655 https://bugzilla.redhat.com/2082656 2082656 https://bugzilla.redhat.com/2082657 2082657 https://bugzilla.redhat.com/2082658 2082658 https://bugzilla.redhat.com/2082659 2082659 https://bugzilla.redhat.com/2115282 2115282 https://bugzilla.redhat.com/2115283 2115283 https://bugzilla.redhat.com/2115284 2115284 https://bugzilla.redhat.com/2115285 2115285 https://bugzilla.redhat.com/2115286 2115286 https://bugzilla.redhat.com/2115287 2115287 https://bugzilla.redhat.com/2115288 2115288 https://bugzilla.redhat.com/2115289 2115289 https://bugzilla.redhat.com/2115290 2115290 https://bugzilla.redhat.com/2115291 2115291 https://bugzilla.redhat.com/2115292 2115292 https://bugzilla.redhat.com/2115293 2115293 https://bugzilla.redhat.com/2115294 2115294 https://bugzilla.redhat.com/2115295 2115295 https://bugzilla.redhat.com/2115296 2115296 https://bugzilla.redhat.com/2115297 2115297 https://bugzilla.redhat.com/2115298 2115298 https://bugzilla.redhat.com/2115299 2115299 https://bugzilla.redhat.com/2115300 2115300 https://bugzilla.redhat.com/2115301 2115301 https://errata.almalinux.org/9/ALSA-2022-6590.html ALSA-2022:6590 ALSA-2022:6590 �*�;mysql-devel-8.0.30-3.el9_0.x86_64.rpm �J�;mysql-libs-8.0.30-3.el9_0.x86_64.rpm �+�;mysql-test-8.0.30-3.el9_0.x86_64.rpm �*�;mysql-devel-8.0.30-3.el9_0.x86_64.rpm �J�;mysql-libs-8.0.30-3.el9_0.x86_64.rpm �+�;mysql-test-8.0.30-3.el9_0.x86_64.rpm ����O�0 �0�_BBsecurity Important: kernel security, bug fix, and enhancement update H��!�=https://access.redhat.com/errata/RHSA-2022:6610 RHSA-2022:6610 RHSA-2022:6610
https://access.redhat.com/security/cve/CVE-2022-2078 CVE-2022-2078 CVE-2022-2078 https://access.redhat.com/security/cve/CVE-2022-34918 CVE-2022-34918 CVE-2022-34918 https://bugzilla.redhat.com/2096178 2096178 https://bugzilla.redhat.com/2104423 2104423 https://errata.almalinux.org/9/ALSA-2022-6610.html ALSA-2022:6610 ALSA-2022:6610 �kernel-tools-libs-devel-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-cross-headers-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-tools-libs-devel-5.14.0-70.26.1.el9_0.x86_64.rpm �kernel-cross-headers-5.14.0-70.26.1.el9_0.x86_64.rpm �����1 �2�q�sBsecurity Important: bind security update H��^�https://access.redhat.com/errata/RHSA-2022:6763 RHSA-2022:6763 RHSA-2022:6763
https://access.redhat.com/security/cve/CVE-2022-3080 CVE-2022-3080 CVE-2022-3080 https://access.redhat.com/security/cve/CVE-2022-38177 CVE-2022-38177 CVE-2022-38177 https://access.redhat.com/security/cve/CVE-2022-38178 CVE-2022-38178 CVE-2022-38178 https://bugzilla.redhat.com/2128600 2128600 https://bugzilla.redhat.com/2128601 2128601 https://bugzilla.redhat.com/2128602 2128602 https://errata.almalinux.org/9/ALSA-2022-6763.html ALSA-2022:6763 ALSA-2022:6763 O�bind-devel-9.16.23-1.el9_0.1.i686.rpm �^�bind-libs-9.16.23-1.el9_0.1.i686.rpm O�bind-devel-9.16.23-1.el9_0.1.i686.rpm �^�bind-libs-9.16.23-1.el9_0.1.i686.rpm ����~�2 �3�fsecurity Moderate: .NET 6.0 security and bugfix update H
��d�Vhttps://access.redhat.com/errata/RHSA-2022:6913 RHSA-2022:6913 RHSA-2022:6913
https://access.redhat.com/security/cve/CVE-2022-41032 CVE-2022-41032 CVE-2022-41032 https://bugzilla.redhat.com/2132614 2132614 https://errata.almalinux.org/9/ALSA-2022-6913.html ALSA-2022:6913 ALSA-2022:6913 n�Vdotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0.x86_64.rpm n�Vdotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0.x86_64.rpm ����3�3 �4�hBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update H
��:�
https://access.redhat.com/errata/RHSA-2022:6999 RHSA-2022:6999 RHSA-2022:6999
https://access.redhat.com/security/cve/CVE-2022-21618 CVE-2022-21618 CVE-2022-21618 https://access.redhat.com/security/cve/CVE-2022-21619 CVE-2022-21619 CVE-2022-21619 https://access.redhat.com/security/cve/CVE-2022-21624 CVE-2022-21624 CVE-2022-21624 https://access.redhat.com/security/cve/CVE-2022-21626 CVE-2022-21626 CVE-2022-21626 https://access.redhat.com/security/cve/CVE-2022-21628 CVE-2022-21628 CVE-2022-21628 https://access.redhat.com/security/cve/CVE-2022-39399 CVE-2022-39399 CVE-2022-39399 https://bugzilla.redhat.com/2133745 2133745 https://bugzilla.redhat.com/2133753 2133753 https://bugzilla.redhat.com/2133765 2133765 https://bugzilla.redhat.com/2133769 2133769 https://bugzilla.redhat.com/2133776 2133776 https://bugzilla.redhat.com/2133817 2133817 https://errata.almalinux.org/9/ALSA-2022-6999.html ALSA-2022:6999 ALSA-2022:6999 x5java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm s5java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm z5java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm u5java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm v5java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm t5java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm q5java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm w5java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm o5java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm p5java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm |5java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm y5java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm r5java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm {5java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm x5java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm s5java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm z5java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm u5java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm v5java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm t5java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm q5java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm w5java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm o5java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm p5java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm |5java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm y5java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm r5java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0.x86_64.rpm {5java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0.x86_64.rpm �����4 �5�DBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update H
��D�_
https://access.redhat.com/errata/RHSA-2022:7007 RHSA-2022:7007 RHSA-2022:7007
https://access.redhat.com/security/cve/CVE-2022-21619 CVE-2022-21619 CVE-2022-21619 https://access.redhat.com/security/cve/CVE-2022-21624 CVE-2022-21624 CVE-2022-21624 https://access.redhat.com/security/cve/CVE-2022-21626 CVE-2022-21626 CVE-2022-21626 https://access.redhat.com/security/cve/CVE-2022-21628 CVE-2022-21628 CVE-2022-21628 https://bugzilla.redhat.com/2133745 2133745 https://bugzilla.redhat.com/2133753 2133753 https://bugzilla.redhat.com/2133765 2133765 https://bugzilla.redhat.com/2133769 2133769 https://errata.almalinux.org/9/ALSA-2022-7007.html ALSA-2022:7007 ALSA-2022:7007
�Sjava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm � Sjava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �
Sjava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm
�Sjava-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm � Sjava-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �
Sjava-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm �Sjava-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0.x86_64.rpm ��ɷ�5 �6�XBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update H
��#�https://access.redhat.com/errata/RHSA-2022:7013 RHSA-2022:7013 RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21618 CVE-2022-21618 CVE-2022-21618 https://access.redhat.com/security/cve/CVE-2022-21619 CVE-2022-21619 CVE-2022-21619 https://access.redhat.com/security/cve/CVE-2022-21624 CVE-2022-21624 CVE-2022-21624 https://access.redhat.com/security/cve/CVE-2022-21626 CVE-2022-21626 CVE-2022-21626 https://access.redhat.com/security/cve/CVE-2022-21628 CVE-2022-21628 CVE-2022-21628 https://access.redhat.com/security/cve/CVE-2022-39399 CVE-2022-39399 CVE-2022-39399 https://bugzilla.redhat.com/2133745 2133745 https://bugzilla.redhat.com/2133753 2133753 https://bugzilla.redhat.com/2133765 2133765 https://bugzilla.redhat.com/2133769 2133769 https://bugzilla.redhat.com/2133776 2133776 https://bugzilla.redhat.com/2133817 2133817 https://errata.almalinux.org/9/ALSA-2022-7013.html ALSA-2022:7013 ALSA-2022:7013 �l#java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �m#java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �n#java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �g#java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �j#java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �b#java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �i#java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �f#java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �k#java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �d#java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �e#java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �h#java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �a#java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �c#java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �l#java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �m#java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �n#java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �g#java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �j#java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �b#java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �i#java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �f#java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �k#java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �d#java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �e#java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �h#java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �a#java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �c#java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0.x86_64.rpm �����6 �)�tBsecurity Important: libksba security update H��.�Yhttps://access.redhat.com/errata/RHSA-2022:7090 RHSA-2022:7090 RHSA-2022:7090
https://access.redhat.com/security/cve/CVE-2022-3515 CVE-2022-3515 CVE-2022-3515 https://bugzilla.redhat.com/2135610 2135610 https://errata.almalinux.org/9/ALSA-2022-7090.html ALSA-2022:7090 ALSA-2022:7090 �a�5libksba-devel-1.5.1-5.el9_0.i686.rpm �a�5libksba-devel-1.5.1-5.el9_0.x86_64.rpm �a�5libksba-devel-1.5.1-5.el9_0.i686.rpm �a�5libksba-devel-1.5.1-5.el9_0.x86_64.rpm ����_�7 �*�wBsecurity Important: device-mapper-multipath security update H���chttps://access.redhat.com/errata/RHSA-2022:7185 RHSA-2022:7185 RHSA-2022:7185
https://access.redhat.com/security/cve/CVE-2022-41974 CVE-2022-41974 CVE-2022-41974 https://bugzilla.redhat.com/2133988 2133988 https://errata.almalinux.org/9/ALSA-2022-7185.html ALSA-2022:7185 ALSA-2022:7185 �]�"device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpm �]�"device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpm �]�"device-mapper-multipath-devel-0.8.7-7.el9_0.1.i686.rpm �]�"device-mapper-multipath-devel-0.8.7-7.el9_0.1.x86_64.rpm ����h�8 �7�zsecurity Moderate: zlib security update H
��j�Ohttps://access.redhat.com/errata/RHSA-2022:7314 RHSA-2022:7314 RHSA-2022:7314
https://access.redhat.com/security/cve/CVE-2022-37434 CVE-2022-37434 CVE-2022-37434 https://bugzilla.redhat.com/2116639 2116639 https://errata.almalinux.org/9/ALSA-2022-7314.html ALSA-2022:7314 ALSA-2022:7314 �s�5zlib-static-1.2.11-32.el9_0.i686.rpm �s�5zlib-static-1.2.11-32.el9_0.i686.rpm ����S�9 �8�|BBsecurity Important: kernel security, bug fix, and enhancement update H��9�https://access.redhat.com/errata/RHSA-2022:7318 RHSA-2022:7318 RHSA-2022:7318
https://access.redhat.com/security/cve/CVE-2022-2585 CVE-2022-2585 CVE-2022-2585 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://bugzilla.redhat.com/2085300 2085300 https://bugzilla.redhat.com/2114874 2114874 https://errata.almalinux.org/9/ALSA-2022-7318.html ALSA-2022:7318 ALSA-2022:7318 �kernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-cross-headers-5.14.0-70.30.1.el9_0.x86_64.rpm �kernel-tools-libs-devel-5.14.0-70.30.1.el9_0.x86_64.rpm ����S�: �:�y�s�VBBBBBBsecurity Moderate: python3.9 security update H
��<�nhttps://access.redhat.com/errata/RHSA-2022:7323 RHSA-2022:7323 RHSA-2022:7323
https://access.redhat.com/security/cve/CVE-2020-10735 CVE-2020-10735 CVE-2020-10735 https://bugzilla.redhat.com/1834423 1834423 https://errata.almalinux.org/9/ALSA-2022-7323.html ALSA-2022:7323 ALSA-2022:7323 M�python3-3.9.10-3.el9_0.i686.rpm �python3-debug-3.9.10-3.el9_0.x86_64.rpm N�python3-tkinter-3.9.10-3.el9_0.i686.rpm �python3-idle-3.9.10-3.el9_0.x86_64.rpm �python3-test-3.9.10-3.el9_0.i686.rpm M�python3-3.9.10-3.el9_0.i686.rpm �python3-debug-3.9.10-3.el9_0.x86_64.rpm N�python3-tkinter-3.9.10-3.el9_0.i686.rpm �python3-idle-3.9.10-3.el9_0.x86_64.rpm �python3-test-3.9.10-3.el9_0.i686.rpm �����; �<�{�NBBsecurity Moderate: lua security update H
��*�https://access.redhat.com/errata/RHSA-2022:7329 RHSA-2022:7329 RHSA-2022:7329
https://access.redhat.com/security/cve/CVE-2022-33099 CVE-2022-33099 CVE-2022-33099 https://bugzilla.redhat.com/2104427 2104427 https://errata.almalinux.org/9/ALSA-2022-7329.html ALSA-2022:7329 ALSA-2022:7329 �;�Wlua-devel-5.4.2-4.el9_0.3.i686.rpm ��Wlua-5.4.2-4.el9_0.3.i686.rpm �;�Wlua-devel-5.4.2-4.el9_0.3.x86_64.rpm �;�Wlua-devel-5.4.2-4.el9_0.3.i686.rpm ��Wlua-5.4.2-4.el9_0.3.i686.rpm �;�Wlua-devel-5.4.2-4.el9_0.3.x86_64.rpm ����t�< �=�LBBBBBBBBBBBBBBBBsecurity Low: libguestfs security, bug fix, and enhancement update H�V��<�https://access.redhat.com/errata/RHSA-2022:7958 RHSA-2022:7958 RHSA-2022:7958
https://access.redhat.com/security/cve/CVE-2022-2211 CVE-2022-2211 CVE-2022-2211 https://bugzilla.redhat.com/2100862 2100862 https://errata.almalinux.org/9/ALSA-2022-7958.html ALSA-2022:7958 ALSA-2022:7958
�I`libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm �j`php-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �J`libguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpm �n`ruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �f`ocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �O`lua-guestfs-1.48.4-2.el9.alma.x86_64.rpm �K`libguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpm �`libguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpm �`libguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm �g`ocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm
�I`libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm �j`php-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �J`libguestfs-gobject-1.48.4-2.el9.alma.x86_64.rpm �n`ruby-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �f`ocaml-libguestfs-1.48.4-2.el9.alma.x86_64.rpm �O`lua-guestfs-1.48.4-2.el9.alma.x86_64.rpm �K`libguestfs-gobject-devel-1.48.4-2.el9.alma.x86_64.rpm �`libguestfs-man-pages-uk-1.48.4-2.el9.alma.noarch.rpm �`libguestfs-man-pages-ja-1.48.4-2.el9.alma.noarch.rpm �g`ocaml-libguestfs-devel-1.48.4-2.el9.alma.x86_64.rpm ��ܵh�= �>�^security Low: virt-v2v security, bug fix, and enhancement update H�V��L�lhttps://access.redhat.com/errata/RHSA-2022:7968 RHSA-2022:7968 RHSA-2022:7968
https://access.redhat.com/security/cve/CVE-2022-2211 CVE-2022-2211 CVE-2022-2211 https://bugzilla.redhat.com/2100862 2100862 https://errata.almalinux.org/9/ALSA-2022-7968.html ALSA-2022:7968 ALSA-2022:7968 � �virt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpm ��virt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpm � �virt-v2v-man-pages-uk-2.0.7-6.el9.noarch.rpm ��virt-v2v-man-pages-ja-2.0.7-6.el9.noarch.rpm ��ܲ�> �?�`BBBBBBBsecurity Moderate: protobuf security update H
��8�Nhttps://access.redhat.com/errata/RHSA-2022:7970 RHSA-2022:7970 RHSA-2022:7970
https://access.redhat.com/security/cve/CVE-2021-22570 CVE-2021-22570 CVE-2021-22570 https://bugzilla.redhat.com/2049429 2049429 https://errata.almalinux.org/9/ALSA-2022-7970.html ALSA-2022:7970 ALSA-2022:7970 �=�protobuf-compiler-3.14.0-13.el9.x86_64.rpm �>�protobuf-devel-3.14.0-13.el9.x86_64.rpm �?�protobuf-lite-devel-3.14.0-13.el9.x86_64.rpm �>�protobuf-devel-3.14.0-13.el9.i686.rpm �=�protobuf-compiler-3.14.0-13.el9.i686.rpm �?�protobuf-lite-devel-3.14.0-13.el9.i686.rpm �=�protobuf-compiler-3.14.0-13.el9.x86_64.rpm �>�protobuf-devel-3.14.0-13.el9.x86_64.rpm �?�protobuf-lite-devel-3.14.0-13.el9.x86_64.rpm �>�protobuf-devel-3.14.0-13.el9.i686.rpm �=�protobuf-compiler-3.14.0-13.el9.i686.rpm �?�protobuf-lite-devel-3.14.0-13.el9.i686.rpm ��ނv�? � �iBsecurity Low: speex security update H�V���8https://access.redhat.com/errata/RHSA-2022:7979 RHSA-2022:7979 RHSA-2022:7979
https://access.redhat.com/security/cve/CVE-2020-23903 CVE-2020-23903 CVE-2020-23903 https://bugzilla.redhat.com/2024250 2024250 https://errata.almalinux.org/9/ALSA-2022-7979.html ALSA-2022:7979 ALSA-2022:7979 ��+speex-devel-1.2.0-11.el9.x86_64.rpm ��+speex-devel-1.2.0-11.el9.i686.rpm ��+speex-devel-1.2.0-11.el9.x86_64.rpm ��+speex-devel-1.2.0-11.el9.i686.rpm ��ރ�@ ��lBBBBsecurity Low: libvirt security, bug fix, and enhancement update H�V��>�https://access.redhat.com/errata/RHSA-2022:8003 RHSA-2022:8003 RHSA-2022:8003
https://access.redhat.com/security/cve/CVE-2022-0897 CVE-2022-0897 CVE-2022-0897 https://bugzilla.redhat.com/2063883 2063883 https://errata.almalinux.org/9/ALSA-2022-8003.html ALSA-2022:8003 ALSA-2022:8003 �*�@libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm �)�@libvirt-docs-8.5.0-7.el9_1.x86_64.rpm �(�@libvirt-devel-8.5.0-7.el9_1.x86_64.rpm �*�@libvirt-lock-sanlock-8.5.0-7.el9_1.x86_64.rpm �)�@libvirt-docs-8.5.0-7.el9_1.x86_64.rpm �(�@libvirt-devel-8.5.0-7.el9_1.x86_64.rpm ��ܩK�A ��2security Moderate: qt5 security and bug fix update H
��N�9https://access.redhat.com/errata/RHSA-2022:8022 RHSA-2022:8022 RHSA-2022:8022
https://access.redhat.com/security/cve/CVE-2022-25255 CVE-2022-25255 CVE-2022-25255 https://bugzilla.redhat.com/2055505 2055505 https://errata.almalinux.org/9/ALSA-2022-8022.html ALSA-2022:8022 ALSA-2022:8022 �1�qt5-devel-5.15.3-1.el9.noarch.rpm �1�qt5-devel-5.15.3-1.el9.noarch.rpm ��ܣP�B ��sBsecurity Moderate: unbound security, bug fix, and enhancement update H
���5https://access.redhat.com/errata/RHSA-2022:8062 RHSA-2022:8062 RHSA-2022:8062
https://access.redhat.com/security/cve/CVE-2022-30698 CVE-2022-30698 CVE-2022-30698 https://access.redhat.com/security/cve/CVE-2022-30699 CVE-2022-30699 CVE-2022-30699 https://bugzilla.redhat.com/2116725 2116725 https://bugzilla.redhat.com/2116729 2116729 https://errata.almalinux.org/9/ALSA-2022-8062.html ALSA-2022:8062 ALSA-2022:8062 �T�&unbound-devel-1.16.2-2.el9.i686.rpm �T�&unbound-devel-1.16.2-2.el9.x86_64.rpm �T�&unbound-devel-1.16.2-2.el9.i686.rpm �T�&unbound-devel-1.16.2-2.el9.x86_64.rpm ��ބ{�C ��D�sBBBsecurity Moderate: bind security update H
��<�
https://access.redhat.com/errata/RHSA-2022:8068 RHSA-2022:8068 RHSA-2022:8068
https://access.redhat.com/security/cve/CVE-2021-25220 CVE-2021-25220 CVE-2021-25220 https://access.redhat.com/security/cve/CVE-2022-0396 CVE-2022-0396 CVE-2022-0396 https://bugzilla.redhat.com/2064512 2064512 https://bugzilla.redhat.com/2064513 2064513 https://errata.almalinux.org/9/ALSA-2022-8068.html ALSA-2022:8068 ALSA-2022:8068 �^�Xbind-libs-9.16.23-5.el9_1.i686.rpm ��Xbind-doc-9.16.23-5.el9_1.noarch.rpm O�Xbind-devel-9.16.23-5.el9_1.x86_64.rpm O�Xbind-devel-9.16.23-5.el9_1.i686.rpm �^�Xbind-libs-9.16.23-5.el9_1.i686.rpm ��Xbind-doc-9.16.23-5.el9_1.noarch.rpm O�Xbind-devel-9.16.23-5.el9_1.x86_64.rpm O�Xbind-devel-9.16.23-5.el9_1.i686.rpm ��ކ�D ��{BBBsecurity Moderate: flac security update H
��I�jhttps://access.redhat.com/errata/RHSA-2022:8078 RHSA-2022:8078 RHSA-2022:8078
https://access.redhat.com/security/cve/CVE-2021-0561 CVE-2021-0561 CVE-2021-0561 https://bugzilla.redhat.com/2057776 2057776 https://errata.almalinux.org/9/ALSA-2022-8078.html ALSA-2022:8078 ALSA-2022:8078 �_�Kflac-devel-1.3.3-10.el9.i686.rpm �_�Kflac-devel-1.3.3-10.el9.x86_64.rpm ��Kflac-1.3.3-10.el9.x86_64.rpm �_�Kflac-devel-1.3.3-10.el9.i686.rpm �_�Kflac-devel-1.3.3-10.el9.x86_64.rpm ��Kflac-1.3.3-10.el9.x86_64.rpm ��ކG�E ��@Bsecurity Low: wavpack security update H�V��3�2https://access.redhat.com/errata/RHSA-2022:8139 RHSA-2022:8139 RHSA-2022:8139
https://access.redhat.com/security/cve/CVE-2021-44269 CVE-2021-44269 CVE-2021-44269 https://bugzilla.redhat.com/2064457 2064457 https://errata.almalinux.org/9/ALSA-2022-8139.html ALSA-2022:8139 ALSA-2022:8139 �
�cwavpack-devel-5.4.0-5.el9.x86_64.rpm �
�cwavpack-devel-5.4.0-5.el9.i686.rpm �
�cwavpack-devel-5.4.0-5.el9.x86_64.rpm �
�cwavpack-devel-5.4.0-5.el9.i686.rpm ��އC�F ��CBBBBBBBBBBsecurity Moderate: poppler security and bug fix update H
��e�(https://access.redhat.com/errata/RHSA-2022:8151 RHSA-2022:8151 RHSA-2022:8151
https://access.redhat.com/security/cve/CVE-2022-27337 CVE-2022-27337 CVE-2022-27337 https://bugzilla.redhat.com/2087190 2087190 https://errata.almalinux.org/9/ALSA-2022-8151.html ALSA-2022:8151 ALSA-2022:8151 ��Apoppler-qt5-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-cpp-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-devel-21.01.0-13.el9.i686.rpm ��Apoppler-qt5-devel-21.01.0-13.el9.i686.rpm ��Apoppler-cpp-devel-21.01.0-13.el9.i686.rpm ��Apoppler-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-glib-devel-21.01.0-13.el9.i686.rpm ��Apoppler-glib-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-qt5-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-cpp-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-devel-21.01.0-13.el9.i686.rpm ��Apoppler-qt5-devel-21.01.0-13.el9.i686.rpm ��Apoppler-cpp-devel-21.01.0-13.el9.i686.rpm ��Apoppler-devel-21.01.0-13.el9.x86_64.rpm ��Apoppler-glib-devel-21.01.0-13.el9.i686.rpm ��Apoppler-glib-devel-21.01.0-13.el9.x86_64.rpm ��އc�G � �Osecurity Moderate: libtiff security update H
��
�@https://access.redhat.com/errata/RHSA-2022:8194 RHSA-2022:8194 RHSA-2022:8194
https://access.redhat.com/security/cve/CVE-2022-0561 CVE-2022-0561 CVE-2022-0561 https://access.redhat.com/security/cve/CVE-2022-0562 CVE-2022-0562 CVE-2022-0562 https://access.redhat.com/security/cve/CVE-2022-0865 CVE-2022-0865 CVE-2022-0865 https://access.redhat.com/security/cve/CVE-2022-0891 CVE-2022-0891 CVE-2022-0891 https://access.redhat.com/security/cve/CVE-2022-0908 CVE-2022-0908 CVE-2022-0908 https://access.redhat.com/security/cve/CVE-2022-0909 CVE-2022-0909 CVE-2022-0909 https://access.redhat.com/security/cve/CVE-2022-0924 CVE-2022-0924 CVE-2022-0924 https://access.redhat.com/security/cve/CVE-2022-1354 CVE-2022-1354 CVE-2022-1354 https://access.redhat.com/security/cve/CVE-2022-1355 CVE-2022-1355 CVE-2022-1355 https://access.redhat.com/security/cve/CVE-2022-22844 CVE-2022-22844 CVE-2022-22844 https://bugzilla.redhat.com/2042603 2042603 https://bugzilla.redhat.com/2054494 2054494 https://bugzilla.redhat.com/2054495 2054495 https://bugzilla.redhat.com/2064145 2064145 https://bugzilla.redhat.com/2064146 2064146 https://bugzilla.redhat.com/2064148 2064148 https://bugzilla.redhat.com/2064406 2064406 https://bugzilla.redhat.com/2064411 2064411 https://bugzilla.redhat.com/2074404 2074404 https://bugzilla.redhat.com/2074415 2074415 https://errata.almalinux.org/9/ALSA-2022-8194.html ALSA-2022:8194 ALSA-2022:8194 � �Nlibtiff-tools-4.4.0-2.el9.x86_64.rpm � �Nlibtiff-tools-4.4.0-2.el9.x86_64.rpm ��܀Z�H �
�QBBBBsecurity Low: openjpeg2 security update H�V��M�https://access.redhat.com/errata/RHSA-2022:8207 RHSA-2022:8207 RHSA-2022:8207
https://access.redhat.com/security/cve/CVE-2022-1122 CVE-2022-1122 CVE-2022-1122 https://bugzilla.redhat.com/2067052 2067052 https://errata.almalinux.org/9/ALSA-2022-8207.html ALSA-2022:8207 ALSA-2022:8207 �h�Fopenjpeg2-tools-2.4.0-7.el9.x86_64.rpm �g�Fopenjpeg2-devel-2.4.0-7.el9.i686.rpm �g�Fopenjpeg2-devel-2.4.0-7.el9.x86_64.rpm �h�Fopenjpeg2-tools-2.4.0-7.el9.i686.rpm �h�Fopenjpeg2-tools-2.4.0-7.el9.x86_64.rpm �g�Fopenjpeg2-devel-2.4.0-7.el9.i686.rpm �g�Fopenjpeg2-devel-2.4.0-7.el9.x86_64.rpm �h�Fopenjpeg2-tools-2.4.0-7.el9.i686.rpm ��ވ`�I ��K�MBBsecurity Moderate: dovecot security and enhancement update H
��h�Zhttps://access.redhat.com/errata/RHSA-2022:8208 RHSA-2022:8208 RHSA-2022:8208
https://access.redhat.com/security/cve/CVE-2022-30550 CVE-2022-30550 CVE-2022-30550 https://bugzilla.redhat.com/2105070 2105070 https://errata.almalinux.org/9/ALSA-2022-8208.html ALSA-2022:8208 ALSA-2022:8208 �^�Rdovecot-devel-2.3.16-7.el9.x86_64.rpm �^�Rdovecot-devel-2.3.16-7.el9.i686.rpm ��Rdovecot-2.3.16-7.el9.i686.rpm �^�Rdovecot-devel-2.3.16-7.el9.x86_64.rpm �^�Rdovecot-devel-2.3.16-7.el9.i686.rpm ��Rdovecot-2.3.16-7.el9.i686.rpm ��ވo�J �
�[BBsecurity Moderate: xorg-x11-server security and bug fix update H
��B�Zhttps://access.redhat.com/errata/RHSA-2022:8221 RHSA-2022:8221 RHSA-2022:8221
https://access.redhat.com/security/cve/CVE-2022-2319 CVE-2022-2319 CVE-2022-2319 https://access.redhat.com/security/cve/CVE-2022-2320 CVE-2022-2320 CVE-2022-2320 https://bugzilla.redhat.com/2106671 2106671 https://bugzilla.redhat.com/2106683 2106683 https://errata.almalinux.org/9/ALSA-2022-8221.html ALSA-2022:8221 ALSA-2022:8221 �_�nxorg-x11-server-source-1.20.11-11.el9.noarch.rpm d�nxorg-x11-server-devel-1.20.11-11.el9.x86_64.rpm d�nxorg-x11-server-devel-1.20.11-11.el9.i686.rpm �_�nxorg-x11-server-source-1.20.11-11.el9.noarch.rpm d�nxorg-x11-server-devel-1.20.11-11.el9.x86_64.rpm d�nxorg-x11-server-devel-1.20.11-11.el9.i686.rpm ��މ(�K ��_security Moderate: yajl security update H
���Uhttps://access.redhat.com/errata/RHSA-2022:8252 RHSA-2022:8252 RHSA-2022:8252
https://access.redhat.com/security/cve/CVE-2022-24795 CVE-2022-24795 CVE-2022-24795 https://bugzilla.redhat.com/2072912 2072912 https://errata.almalinux.org/9/ALSA-2022-8252.html ALSA-2022:8252 ALSA-2022:8252 ��=yajl-devel-2.1.0-21.el9.x86_64.rpm ��=yajl-devel-2.1.0-21.el9.x86_64.rpm ����3�L ��aBBsecurity Moderate: kernel security, bug fix, and enhancement update H
��q�?https://access.redhat.com/errata/RHSA-2022:8267 RHSA-2022:8267 RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2020-36516 CVE-2020-36516 CVE-2020-36516 https://access.redhat.com/security/cve/CVE-2021-3640 CVE-2021-3640 CVE-2021-3640 https://access.redhat.com/security/cve/CVE-2022-0168 CVE-2022-0168 CVE-2022-0168 https://access.redhat.com/security/cve/CVE-2022-0617 CVE-2022-0617 CVE-2022-0617 https://access.redhat.com/security/cve/CVE-2022-0854 CVE-2022-0854 CVE-2022-0854 https://access.redhat.com/security/cve/CVE-2022-1016 CVE-2022-1016 CVE-2022-1016 https://access.redhat.com/security/cve/CVE-2022-1048 CVE-2022-1048 CVE-2022-1048 https://access.redhat.com/security/cve/CVE-2022-1184 CVE-2022-1184 CVE-2022-1184 https://access.redhat.com/security/cve/CVE-2022-1280 CVE-2022-1280 CVE-2022-1280 https://access.redhat.com/security/cve/CVE-2022-1353 CVE-2022-1353 CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-1679 CVE-2022-1679 CVE-2022-1679 https://access.redhat.com/security/cve/CVE-2022-1852 CVE-2022-1852 CVE-2022-1852 https://access.redhat.com/security/cve/CVE-2022-1998 CVE-2022-1998 CVE-2022-1998 https://access.redhat.com/security/cve/CVE-2022-20368 CVE-2022-20368 CVE-2022-20368 https://access.redhat.com/security/cve/CVE-2022-21123 CVE-2022-21123 CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 CVE-2022-21125 CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 CVE-2022-21166 CVE-2022-21166 https://access.redhat.com/security/cve/CVE-2022-21499 CVE-2022-21499 CVE-2022-21499 https://access.redhat.com/security/cve/CVE-2022-23816 CVE-2022-23816 CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 CVE-2022-23825 CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-24448 CVE-2022-24448 CVE-2022-24448 https://access.redhat.com/security/cve/CVE-2022-2586 CVE-2022-2586 CVE-2022-2586 https://access.redhat.com/security/cve/CVE-2022-26373 CVE-2022-26373 CVE-2022-26373 https://access.redhat.com/security/cve/CVE-2022-2639 CVE-2022-2639 CVE-2022-2639 https://access.redhat.com/security/cve/CVE-2022-28390 CVE-2022-28390 CVE-2022-28390 https://access.redhat.com/security/cve/CVE-2022-28893 CVE-2022-28893 CVE-2022-28893 https://access.redhat.com/security/cve/CVE-2022-29581 CVE-2022-29581 CVE-2022-29581 https://access.redhat.com/security/cve/CVE-2022-29900 CVE-2022-29900 CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 CVE-2022-29901 CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-36946 CVE-2022-36946 CVE-2022-36946 https://access.redhat.com/security/cve/CVE-2022-39190 CVE-2022-39190 CVE-2022-39190 https://bugzilla.redhat.com/1980646 1980646 https://bugzilla.redhat.com/2037386 2037386 https://bugzilla.redhat.com/2051444 2051444 https://bugzilla.redhat.com/2052312 2052312 https://bugzilla.redhat.com/2053632 2053632 https://bugzilla.redhat.com/2058395 2058395 https://bugzilla.redhat.com/2059928 2059928 https://bugzilla.redhat.com/2066614 2066614 https://bugzilla.redhat.com/2066706 2066706 https://bugzilla.redhat.com/2066819 2066819 https://bugzilla.redhat.com/2070205 2070205 https://bugzilla.redhat.com/2071022 2071022 https://bugzilla.redhat.com/2073064 2073064 https://bugzilla.redhat.com/2074208 2074208 https://bugzilla.redhat.com/2084125 2084125 https://bugzilla.redhat.com/2084183 2084183 https://bugzilla.redhat.com/2084479 2084479 https://bugzilla.redhat.com/2088021 2088021 https://bugzilla.redhat.com/2089815 2089815 https://bugzilla.redhat.com/2090226 2090226 https://bugzilla.redhat.com/2090237 2090237 https://bugzilla.redhat.com/2090240 2090240 https://bugzilla.redhat.com/2090241 2090241 https://bugzilla.redhat.com/2103148 2103148 https://bugzilla.redhat.com/2103153 2103153 https://bugzilla.redhat.com/2114878 2114878 https://bugzilla.redhat.com/2115065 2115065 https://bugzilla.redhat.com/2115278 2115278 https://bugzilla.redhat.com/2123695 2123695 https://bugzilla.redhat.com/2129152 2129152 https://errata.almalinux.org/9/ALSA-2022-8267.html ALSA-2022:8267 ALSA-2022:8267 �kernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm �kernel-tools-libs-devel-5.14.0-162.6.1.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.6.1.el9_1.x86_64.rpm ��۰E�M ��eBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update H
��t�mhttps://access.redhat.com/errata/RHSA-2022:8317 RHSA-2022:8317 RHSA-2022:8317
https://access.redhat.com/security/cve/CVE-2022-32742 CVE-2022-32742 CVE-2022-32742 https://bugzilla.redhat.com/2108196 2108196 https://errata.almalinux.org/9/ALSA-2022-8317.html ALSA-2022:8317 ALSA-2022:8317 �clsamba-test-libs-4.16.4-101.el9.x86_64.rpm �blsamba-test-4.16.4-101.el9.x86_64.rpm �Slsamba-devel-4.16.4-101.el9.x86_64.rpm �Ollibsmbclient-devel-4.16.4-101.el9.x86_64.rpm �Slsamba-devel-4.16.4-101.el9.i686.rpm �Pllibwbclient-devel-4.16.4-101.el9.x86_64.rpm �Ollibsmbclient-devel-4.16.4-101.el9.i686.rpm �Pllibwbclient-devel-4.16.4-101.el9.i686.rpm �$lsamba-pidl-4.16.4-101.el9.noarch.rpm �clsamba-test-libs-4.16.4-101.el9.x86_64.rpm �blsamba-test-4.16.4-101.el9.x86_64.rpm �Slsamba-devel-4.16.4-101.el9.x86_64.rpm �Ollibsmbclient-devel-4.16.4-101.el9.x86_64.rpm �Slsamba-devel-4.16.4-101.el9.i686.rpm �Pllibwbclient-devel-4.16.4-101.el9.x86_64.rpm �Ollibsmbclient-devel-4.16.4-101.el9.i686.rpm �Pllibwbclient-devel-4.16.4-101.el9.i686.rpm �$lsamba-pidl-4.16.4-101.el9.noarch.rpm ��ދr�N �,�sBsecurity Moderate: libldb security, bug fix, and enhancement update H
��a�Lhttps://access.redhat.com/errata/RHSA-2022:8318 RHSA-2022:8318 RHSA-2022:8318
https://access.redhat.com/security/cve/CVE-2022-32746 CVE-2022-32746 CVE-2022-32746 https://bugzilla.redhat.com/2108215 2108215 https://errata.almalinux.org/9/ALSA-2022-8318.html ALSA-2022:8318 ALSA-2022:8318 �v�Glibldb-devel-2.5.2-1.el9.x86_64.rpm �v�Glibldb-devel-2.5.2-1.el9.i686.rpm �v�Glibldb-devel-2.5.2-1.el9.x86_64.rpm �v�Glibldb-devel-2.5.2-1.el9.i686.rpm ��ތ�O ��Q�]�JBBBBBBBBBsecurity Moderate: python3.9 security, bug fix, and enhancement update H
��-�5https://access.redhat.com/errata/RHSA-2022:8353 RHSA-2022:8353 RHSA-2022:8353
https://access.redhat.com/security/cve/CVE-2015-20107 CVE-2015-20107 CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2021-28861 CVE-2021-28861 CVE-2021-28861 https://bugzilla.redhat.com/2075390 2075390 https://bugzilla.redhat.com/2120642 2120642 https://errata.almalinux.org/9/ALSA-2022-8353.html ALSA-2022:8353 ALSA-2022:8353 �,python3-idle-3.9.14-1.el9.x86_64.rpm �,python3-debug-3.9.14-1.el9.x86_64.rpm N�,python3-tkinter-3.9.14-1.el9.i686.rpm �,python3-test-3.9.14-1.el9.i686.rpm �,python3-idle-3.9.14-1.el9.i686.rpm �,python3-test-3.9.14-1.el9.x86_64.rpm �,python3-debug-3.9.14-1.el9.i686.rpm M�,python3-3.9.14-1.el9.i686.rpm �,python3-idle-3.9.14-1.el9.x86_64.rpm �,python3-debug-3.9.14-1.el9.x86_64.rpm N�,python3-tkinter-3.9.14-1.el9.i686.rpm �,python3-test-3.9.14-1.el9.i686.rpm �,python3-idle-3.9.14-1.el9.i686.rpm �,python3-test-3.9.14-1.el9.x86_64.rpm �,python3-debug-3.9.14-1.el9.i686.rpm M�,python3-3.9.14-1.el9.i686.rpm ��ތ[�P �.�ABsecurity Moderate: libtirpc security update H
��b�{https://access.redhat.com/errata/RHSA-2022:8400 RHSA-2022:8400 RHSA-2022:8400
https://access.redhat.com/security/cve/CVE-2021-46828 CVE-2021-46828 CVE-2021-46828 https://bugzilla.redhat.com/2109352 2109352 https://errata.almalinux.org/9/ALSA-2022-8400.html ALSA-2022:8400 ALSA-2022:8400 �|�3libtirpc-devel-1.3.3-0.el9.i686.rpm �|�3libtirpc-devel-1.3.3-0.el9.x86_64.rpm �|�3libtirpc-devel-1.3.3-0.el9.i686.rpm �|�3libtirpc-devel-1.3.3-0.el9.x86_64.rpm ��ލW�Q ��DBBBBBBBBBBBBBBsecurity Low: mingw-gcc security and bug fix update H�V��]�.https://access.redhat.com/errata/RHSA-2022:8415 RHSA-2022:8415 RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195 CVE-2021-46195 CVE-2021-46195 https://bugzilla.redhat.com/2046300 2046300 https://errata.almalinux.org/9/ALSA-2022-8415.html ALSA-2022:8415 ALSA-2022:8415 �bemingw64-gcc-12.0.1-11.2.el9.x86_64.rpm �cemingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �demingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm �^emingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �\emingw32-cpp-12.0.1-11.2.el9.x86_64.rpm �_emingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm �aemingw64-cpp-12.0.1-11.2.el9.x86_64.rpm �]emingw32-gcc-12.0.1-11.2.el9.x86_64.rpm �bemingw64-gcc-12.0.1-11.2.el9.x86_64.rpm �cemingw64-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �demingw64-libgcc-12.0.1-11.2.el9.x86_64.rpm �^emingw32-gcc-c++-12.0.1-11.2.el9.x86_64.rpm �\emingw32-cpp-12.0.1-11.2.el9.x86_64.rpm �_emingw32-libgcc-12.0.1-11.2.el9.x86_64.rpm �aemingw64-cpp-12.0.1-11.2.el9.x86_64.rpm �]emingw32-gcc-12.0.1-11.2.el9.x86_64.rpm ����x�R ��UBBsecurity Low: mingw-glib2 security and bug fix update H�V���Yhttps://access.redhat.com/errata/RHSA-2022:8418 RHSA-2022:8418 RHSA-2022:8418
https://access.redhat.com/security/cve/CVE-2021-28153 CVE-2021-28153 CVE-2021-28153 https://bugzilla.redhat.com/1938291 1938291 https://errata.almalinux.org/9/ALSA-2022-8418.html ALSA-2022:8418 ALSA-2022:8418 �I�pmingw64-glib2-static-2.70.1-2.el9.noarch.rpm �F�pmingw32-glib2-2.70.1-2.el9.noarch.rpm �H�pmingw64-glib2-2.70.1-2.el9.noarch.rpm �G�pmingw32-glib2-static-2.70.1-2.el9.noarch.rpm �I�pmingw64-glib2-static-2.70.1-2.el9.noarch.rpm �F�pmingw32-glib2-2.70.1-2.el9.noarch.rpm �H�pmingw64-glib2-2.70.1-2.el9.noarch.rpm �G�pmingw32-glib2-static-2.70.1-2.el9.noarch.rpm ���� �S ��ZBBsecurity Important: mingw-zlib security update H��d�:https://access.redhat.com/errata/RHSA-2022:8420 RHSA-2022:8420 RHSA-2022:8420
https://access.redhat.com/security/cve/CVE-2018-25032 CVE-2018-25032 CVE-2018-25032 https://bugzilla.redhat.com/2067945 2067945 https://errata.almalinux.org/9/ALSA-2022-8420.html ALSA-2022:8420 ALSA-2022:8420 ��jmingw64-zlib-1.2.12-2.el9.noarch.rpm ��jmingw32-zlib-1.2.12-2.el9.noarch.rpm ��jmingw64-zlib-static-1.2.12-2.el9.noarch.rpm ��jmingw32-zlib-static-1.2.12-2.el9.noarch.rpm ��jmingw64-zlib-1.2.12-2.el9.noarch.rpm ��jmingw32-zlib-1.2.12-2.el9.noarch.rpm ��jmingw64-zlib-static-1.2.12-2.el9.noarch.rpm ��jmingw32-zlib-static-1.2.12-2.el9.noarch.rpm ����@�T ��_security Moderate: dotnet7.0 security, bug fix, and enhancement update H
���Ihttps://access.redhat.com/errata/RHSA-2022:8434 RHSA-2022:8434 RHSA-2022:8434
https://access.redhat.com/security/cve/CVE-2022-41032 CVE-2022-41032 CVE-2022-41032 https://bugzilla.redhat.com/2132614 2132614 https://errata.almalinux.org/9/ALSA-2022-8434.html ALSA-2022:8434 ALSA-2022:8434 �U�cdotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm �U�cdotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1.x86_64.rpm ����Z�U ��T�\�sBBBBBBBBBsecurity Important: python3.9 security update H��g�Qhttps://access.redhat.com/errata/RHSA-2022:8493 RHSA-2022:8493 RHSA-2022:8493
https://access.redhat.com/security/cve/CVE-2022-42919 CVE-2022-42919 CVE-2022-42919 https://bugzilla.redhat.com/2138705 2138705 https://errata.almalinux.org/9/ALSA-2022-8493.html ALSA-2022:8493 ALSA-2022:8493 �-python3-debug-3.9.14-1.el9_1.1.i686.rpm �-python3-idle-3.9.14-1.el9_1.1.x86_64.rpm �-python3-test-3.9.14-1.el9_1.1.x86_64.rpm M�-python3-3.9.14-1.el9_1.1.i686.rpm N�-python3-tkinter-3.9.14-1.el9_1.1.i686.rpm �-python3-idle-3.9.14-1.el9_1.1.i686.rpm �-python3-test-3.9.14-1.el9_1.1.i686.rpm �-python3-debug-3.9.14-1.el9_1.1.x86_64.rpm �-python3-debug-3.9.14-1.el9_1.1.i686.rpm �-python3-idle-3.9.14-1.el9_1.1.x86_64.rpm �-python3-test-3.9.14-1.el9_1.1.x86_64.rpm M�-python3-3.9.14-1.el9_1.1.i686.rpm N�-python3-tkinter-3.9.14-1.el9_1.1.i686.rpm �-python3-idle-3.9.14-1.el9_1.1.i686.rpm �-python3-test-3.9.14-1.el9_1.1.i686.rpm �-python3-debug-3.9.14-1.el9_1.1.x86_64.rpm ����}�V ��lBsecurity Important: varnish security update H��8�Vhttps://access.redhat.com/errata/RHSA-2022:8643 RHSA-2022:8643 RHSA-2022:8643
https://access.redhat.com/security/cve/CVE-2022-45060 CVE-2022-45060 CVE-2022-45060 https://bugzilla.redhat.com/2141844 2141844 https://errata.almalinux.org/9/ALSA-2022-8643.html ALSA-2022:8643 ALSA-2022:8643 ��evarnish-devel-6.6.2-2.el9_1.1.i686.rpm ��evarnish-devel-6.6.2-2.el9_1.1.x86_64.rpm ��evarnish-devel-6.6.2-2.el9_1.1.i686.rpm ��evarnish-devel-6.6.2-2.el9_1.1.x86_64.rpm �����W ��osecurity Moderate: .NET 6.0 security, bug fix, and enhancement update
���`https://access.redhat.com/errata/RHSA-2023:0077 RHSA-2023:0077 RHSA-2023:0077
https://access.redhat.com/security/cve/CVE-2023-21538 CVE-2023-21538 CVE-2023-21538 https://bugzilla.redhat.com/2158342 2158342 https://errata.almalinux.org/9/ALSA-2023-0077.html ALSA-2023:0077 ALSA-2023:0077 n�Wdotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm n�Wdotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1.x86_64.rpm �����X ��qBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update
��n�Hhttps://access.redhat.com/errata/RHSA-2023:0194 RHSA-2023:0194 RHSA-2023:0194
https://access.redhat.com/security/cve/CVE-2023-21835 CVE-2023-21835 CVE-2023-21835 https://access.redhat.com/security/cve/CVE-2023-21843 CVE-2023-21843 CVE-2023-21843 https://bugzilla.redhat.com/2160421 2160421 https://bugzilla.redhat.com/2160475 2160475 https://errata.almalinux.org/9/ALSA-2023-0194.html ALSA-2023:0194 ALSA-2023:0194 q6java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm r6java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm w6java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm v6java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm p6java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm o6java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm {6java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm z6java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm |6java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm y6java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm x6java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm u6java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm t6java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm s6java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm q6java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm r6java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm w6java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm v6java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm p6java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm o6java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm {6java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm z6java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm |6java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm y6java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm x6java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm u6java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1.x86_64.rpm t6java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm s6java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1.x86_64.rpm �����Y ��MBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update
��6�lhttps://access.redhat.com/errata/RHSA-2023:0202 RHSA-2023:0202 RHSA-2023:0202
https://access.redhat.com/security/cve/CVE-2023-21835 CVE-2023-21835 CVE-2023-21835 https://access.redhat.com/security/cve/CVE-2023-21843 CVE-2023-21843 CVE-2023-21843 https://bugzilla.redhat.com/2160421 2160421 https://bugzilla.redhat.com/2160475 2160475 https://errata.almalinux.org/9/ALSA-2023-0202.html ALSA-2023:0202 ALSA-2023:0202 �e$java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �m$java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �c$java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �f$java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �d$java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �l$java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �a$java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �k$java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �b$java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �j$java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �i$java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �g$java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �n$java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �h$java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �e$java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �m$java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �c$java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �f$java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �d$java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �l$java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �a$java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �k$java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �b$java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �j$java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �i$java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �g$java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �n$java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �h$java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1.x86_64.rpm �����Z ��iBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security and bug fix update
��"�xhttps://access.redhat.com/errata/RHSA-2023:0210 RHSA-2023:0210 RHSA-2023:0210
https://access.redhat.com/security/cve/CVE-2023-21830 CVE-2023-21830 CVE-2023-21830 https://access.redhat.com/security/cve/CVE-2023-21843 CVE-2023-21843 CVE-2023-21843 https://bugzilla.redhat.com/2160475 2160475 https://bugzilla.redhat.com/2160490 2160490 https://errata.almalinux.org/9/ALSA-2023-0210.html ALSA-2023:0210 ALSA-2023:0210
�
Tjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm � Tjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm
�
Tjava-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm � Tjava-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �Tjava-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1.x86_64.rpm �����[ ��}security Moderate: libtiff security update
���{https://access.redhat.com/errata/RHSA-2023:0302 RHSA-2023:0302 RHSA-2023:0302
https://access.redhat.com/security/cve/CVE-2022-2056 CVE-2022-2056 CVE-2022-2056 https://access.redhat.com/security/cve/CVE-2022-2057 CVE-2022-2057 CVE-2022-2057 https://access.redhat.com/security/cve/CVE-2022-2058 CVE-2022-2058 CVE-2022-2058 https://access.redhat.com/security/cve/CVE-2022-2519 CVE-2022-2519 CVE-2022-2519 https://access.redhat.com/security/cve/CVE-2022-2520 CVE-2022-2520 CVE-2022-2520 https://access.redhat.com/security/cve/CVE-2022-2521 CVE-2022-2521 CVE-2022-2521 https://access.redhat.com/security/cve/CVE-2022-2953 CVE-2022-2953 CVE-2022-2953 https://bugzilla.redhat.com/2103222 2103222 https://bugzilla.redhat.com/2122789 2122789 https://bugzilla.redhat.com/2122792 2122792 https://bugzilla.redhat.com/2122799 2122799 https://bugzilla.redhat.com/2134432 2134432 https://errata.almalinux.org/9/ALSA-2023-0302.html ALSA-2023:0302 ALSA-2023:0302 � �Olibtiff-tools-4.4.0-5.el9_1.x86_64.rpm � �Olibtiff-tools-4.4.0-5.el9_1.x86_64.rpm ����K�\ ��BBsecurity Moderate: libreoffice security update
���z
https://access.redhat.com/errata/RHSA-2023:0304 RHSA-2023:0304 RHSA-2023:0304
https://access.redhat.com/security/cve/CVE-2022-26305 CVE-2022-26305 CVE-2022-26305 https://access.redhat.com/security/cve/CVE-2022-26306 CVE-2022-26306 CVE-2022-26306 https://access.redhat.com/security/cve/CVE-2022-26307 CVE-2022-26307 CVE-2022-26307 https://access.redhat.com/security/cve/CVE-2022-3140 CVE-2022-3140 CVE-2022-3140 https://bugzilla.redhat.com/2118610 2118610 https://bugzilla.redhat.com/2118611 2118611 https://bugzilla.redhat.com/2118613 2118613 https://bugzilla.redhat.com/2134697 2134697 https://errata.almalinux.org/9/ALSA-2023-0304.html ALSA-2023:0304 ALSA-2023:0304 �`�
libreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpm �a�
libreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpm �`�
libreoffice-sdk-7.1.8.1-8.el9_1.alma.x86_64.rpm �a�
libreoffice-sdk-doc-7.1.8.1-8.el9_1.alma.x86_64.rpm ����Y�] ��CBBsecurity Important: kernel security and bug fix update ���;https://access.redhat.com/errata/RHSA-2023:0334 RHSA-2023:0334 RHSA-2023:0334
https://access.redhat.com/security/cve/CVE-2022-2959 CVE-2022-2959 CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 CVE-2022-2964 CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://access.redhat.com/security/cve/CVE-2022-3077 CVE-2022-3077 CVE-2022-3077 https://access.redhat.com/security/cve/CVE-2022-4139 CVE-2022-4139 CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945 CVE-2022-43945 CVE-2022-43945 https://bugzilla.redhat.com/2067482 2067482 https://bugzilla.redhat.com/2085300 2085300 https://bugzilla.redhat.com/2103681 2103681 https://bugzilla.redhat.com/2123309 2123309 https://bugzilla.redhat.com/2141752 2141752 https://bugzilla.redhat.com/2147572 2147572 https://errata.almalinux.org/9/ALSA-2023-0334.html ALSA-2023:0334 ALSA-2023:0334 �
kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm �
kernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm �
kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm �
kernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm ����M�^ �0�Gsecurity Moderate: bash security update
��J�}https://access.redhat.com/errata/RHSA-2023:0340 RHSA-2023:0340 RHSA-2023:0340
https://access.redhat.com/security/cve/CVE-2022-3715 CVE-2022-3715 CVE-2022-3715 https://bugzilla.redhat.com/2126720 2126720 https://errata.almalinux.org/9/ALSA-2023-0340.html ALSA-2023:0340 ALSA-2023:0340 ��Rbash-devel-5.1.8-6.el9_1.x86_64.rpm ��Rbash-devel-5.1.8-6.el9_1.x86_64.rpm �����_ �1�IBsecurity Important: libksba security update ��G�Jhttps://access.redhat.com/errata/RHSA-2023:0626 RHSA-2023:0626 RHSA-2023:0626
https://access.redhat.com/security/cve/CVE-2022-47629 CVE-2022-47629 CVE-2022-47629 https://bugzilla.redhat.com/2161571 2161571 https://errata.almalinux.org/9/ALSA-2023-0626.html ALSA-2023:0626 ALSA-2023:0626 �a�6libksba-devel-1.5.1-6.el9_1.i686.rpm �a�6libksba-devel-1.5.1-6.el9_1.x86_64.rpm �a�6libksba-devel-1.5.1-6.el9_1.i686.rpm �a�6libksba-devel-1.5.1-6.el9_1.x86_64.rpm ����x�` ��LBBsecurity Important: kernel security and bug fix update ���~https://access.redhat.com/errata/RHSA-2023:0951 RHSA-2023:0951 RHSA-2023:0951
https://access.redhat.com/security/cve/CVE-2022-2873 CVE-2022-2873 CVE-2022-2873 https://access.redhat.com/security/cve/CVE-2022-3564 CVE-2022-3564 CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-4378 CVE-2022-4378 CVE-2022-4378 https://access.redhat.com/security/cve/CVE-2022-4379 CVE-2022-4379 CVE-2022-4379 https://access.redhat.com/security/cve/CVE-2023-0179 CVE-2023-0179 CVE-2023-0179 https://bugzilla.redhat.com/2119048 2119048 https://bugzilla.redhat.com/2150999 2150999 https://bugzilla.redhat.com/2152548 2152548 https://bugzilla.redhat.com/2152807 2152807 https://bugzilla.redhat.com/2161713 2161713 https://errata.almalinux.org/9/ALSA-2023-0951.html ALSA-2023:0951 ALSA-2023:0951 �kernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm �kernel-tools-libs-devel-5.14.0-162.18.1.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.18.1.el9_1.x86_64.rpm �����a � �_�T�_BBBBBBBBBsecurity Moderate: python3.9 security update
���9https://access.redhat.com/errata/RHSA-2023:0953 RHSA-2023:0953 RHSA-2023:0953
https://access.redhat.com/security/cve/CVE-2022-45061 CVE-2022-45061 CVE-2022-45061 https://bugzilla.redhat.com/2144072 2144072 https://errata.almalinux.org/9/ALSA-2023-0953.html ALSA-2023:0953 ALSA-2023:0953 �.python3-idle-3.9.14-1.el9_1.2.i686.rpm �.python3-idle-3.9.14-1.el9_1.2.x86_64.rpm N�.python3-tkinter-3.9.14-1.el9_1.2.i686.rpm �.python3-debug-3.9.14-1.el9_1.2.x86_64.rpm �.python3-test-3.9.14-1.el9_1.2.x86_64.rpm M�.python3-3.9.14-1.el9_1.2.i686.rpm �.python3-debug-3.9.14-1.el9_1.2.i686.rpm �.python3-test-3.9.14-1.el9_1.2.i686.rpm �.python3-idle-3.9.14-1.el9_1.2.i686.rpm �.python3-idle-3.9.14-1.el9_1.2.x86_64.rpm N�.python3-tkinter-3.9.14-1.el9_1.2.i686.rpm �.python3-debug-3.9.14-1.el9_1.2.x86_64.rpm �.python3-test-3.9.14-1.el9_1.2.x86_64.rpm M�.python3-3.9.14-1.el9_1.2.i686.rpm �.python3-debug-3.9.14-1.el9_1.2.i686.rpm �.python3-test-3.9.14-1.el9_1.2.i686.rpm ����E�b �"�a�{BBsecurity Moderate: lua security update
��H�8https://access.redhat.com/errata/RHSA-2023:0957 RHSA-2023:0957 RHSA-2023:0957
https://access.redhat.com/security/cve/CVE-2021-43519 CVE-2021-43519 CVE-2021-43519 https://access.redhat.com/security/cve/CVE-2021-44964 CVE-2021-44964 CVE-2021-44964 https://bugzilla.redhat.com/2047672 2047672 https://bugzilla.redhat.com/2064772 2064772 https://errata.almalinux.org/9/ALSA-2023-0957.html ALSA-2023:0957 ALSA-2023:0957 �;�Xlua-devel-5.4.4-2.el9_1.i686.rpm �;�Xlua-devel-5.4.4-2.el9_1.x86_64.rpm ��Xlua-5.4.4-2.el9_1.i686.rpm �;�Xlua-devel-5.4.4-2.el9_1.i686.rpm �;�Xlua-devel-5.4.4-2.el9_1.x86_64.rpm ��Xlua-5.4.4-2.el9_1.i686.rpm ����Z�c �#�_BBBBsecurity Moderate: libjpeg-turbo security update
�� �.https://access.redhat.com/errata/RHSA-2023:1068 RHSA-2023:1068 RHSA-2023:1068
https://access.redhat.com/security/cve/CVE-2021-46822 CVE-2021-46822 CVE-2021-46822 https://bugzilla.redhat.com/2100044 2100044 https://errata.almalinux.org/9/ALSA-2023-1068.html ALSA-2023:1068 ALSA-2023:1068 �k�Cturbojpeg-2.0.90-6.el9_1.x86_64.rpm �l�Cturbojpeg-devel-2.0.90-6.el9_1.x86_64.rpm �l�Cturbojpeg-devel-2.0.90-6.el9_1.i686.rpm �k�Cturbojpeg-2.0.90-6.el9_1.i686.rpm �k�Cturbojpeg-2.0.90-6.el9_1.x86_64.rpm �l�Cturbojpeg-devel-2.0.90-6.el9_1.x86_64.rpm �l�Cturbojpeg-devel-2.0.90-6.el9_1.i686.rpm �k�Cturbojpeg-2.0.90-6.el9_1.i686.rpm �����d �$�eBBsecurity Important: kernel security, bug fix, and enhancement update ��.�Yhttps://access.redhat.com/errata/RHSA-2023:1470 RHSA-2023:1470 RHSA-2023:1470
https://access.redhat.com/security/cve/CVE-2022-4269 CVE-2022-4269 CVE-2022-4269 https://access.redhat.com/security/cve/CVE-2022-4744 CVE-2022-4744 CVE-2022-4744 https://access.redhat.com/security/cve/CVE-2023-0266 CVE-2023-0266 CVE-2023-0266 https://bugzilla.redhat.com/2150272 2150272 https://bugzilla.redhat.com/2156322 2156322 https://bugzilla.redhat.com/2163379 2163379 https://errata.almalinux.org/9/ALSA-2023-1470.html ALSA-2023:1470 ALSA-2023:1470 �kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm �kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.22.2.el9_1.x86_64.rpm ����8�e �%�iBBBBBBBBBBsecurity Moderate: postgresql security update
���jhttps://access.redhat.com/errata/RHSA-2023:1693 RHSA-2023:1693 RHSA-2023:1693
https://access.redhat.com/security/cve/CVE-2022-2625 CVE-2022-2625 CVE-2022-2625 https://access.redhat.com/security/cve/CVE-2022-41862 CVE-2022-41862 CVE-2022-41862 https://bugzilla.redhat.com/2113825 2113825 https://bugzilla.redhat.com/2165722 2165722 https://errata.almalinux.org/9/ALSA-2023-1693.html ALSA-2023:1693 ALSA-2023:1693 ��Wpostgresql-server-devel-13.10-1.el9_1.x86_64.rpm �~�Wpostgresql-private-devel-13.10-1.el9_1.x86_64.rpm ��Wpostgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm � �Wpostgresql-static-13.10-1.el9_1.x86_64.rpm ��Wpostgresql-test-13.10-1.el9_1.x86_64.rpm �}�Wpostgresql-docs-13.10-1.el9_1.x86_64.rpm ��Wpostgresql-server-devel-13.10-1.el9_1.x86_64.rpm �~�Wpostgresql-private-devel-13.10-1.el9_1.x86_64.rpm ��Wpostgresql-upgrade-devel-13.10-1.el9_1.x86_64.rpm � �Wpostgresql-static-13.10-1.el9_1.x86_64.rpm ��Wpostgresql-test-13.10-1.el9_1.x86_64.rpm �}�Wpostgresql-docs-13.10-1.el9_1.x86_64.rpm �����f �&�uBBsecurity Important: kernel security and bug fix update ��q�4https://access.redhat.com/errata/RHSA-2023:1703 RHSA-2023:1703 RHSA-2023:1703
https://access.redhat.com/security/cve/CVE-2023-0386 CVE-2023-0386 CVE-2023-0386 https://bugzilla.redhat.com/2159505 2159505 https://errata.almalinux.org/9/ALSA-2023-1703.html ALSA-2023:1703 ALSA-2023:1703 �kernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpm �kernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm �kernel-cross-headers-5.14.0-162.23.1.el9_1.x86_64.rpm �kernel-tools-libs-devel-5.14.0-162.23.1.el9_1.x86_64.rpm �����g �'�yBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security and bug fix update ��%�https://access.redhat.com/errata/RHSA-2023:1879 RHSA-2023:1879 RHSA-2023:1879
https://access.redhat.com/security/cve/CVE-2023-21930 CVE-2023-21930 CVE-2023-21930 https://access.redhat.com/security/cve/CVE-2023-21937 CVE-2023-21937 CVE-2023-21937 https://access.redhat.com/security/cve/CVE-2023-21938 CVE-2023-21938 CVE-2023-21938 https://access.redhat.com/security/cve/CVE-2023-21939 CVE-2023-21939 CVE-2023-21939 https://access.redhat.com/security/cve/CVE-2023-21954 CVE-2023-21954 CVE-2023-21954 https://access.redhat.com/security/cve/CVE-2023-21967 CVE-2023-21967 CVE-2023-21967 https://access.redhat.com/security/cve/CVE-2023-21968 CVE-2023-21968 CVE-2023-21968 https://bugzilla.redhat.com/2187435 2187435 https://bugzilla.redhat.com/2187441 2187441 https://bugzilla.redhat.com/2187704 2187704 https://bugzilla.redhat.com/2187724 2187724 https://bugzilla.redhat.com/2187758 2187758 https://bugzilla.redhat.com/2187790 2187790 https://bugzilla.redhat.com/2187802 2187802 https://errata.almalinux.org/9/ALSA-2023-1879.html ALSA-2023:1879 ALSA-2023:1879 {7java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm r7java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm u7java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm w7java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm p7java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm x7java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm y7java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm s7java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm z7java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm t7java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm |7java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm v7java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm o7java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm q7java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm {7java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm r7java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm u7java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm w7java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm p7java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm x7java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm y7java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm s7java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm z7java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm t7java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm |7java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1.x86_64.rpm v7java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm o7java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm q7java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1.x86_64.rpm �����h �(�UBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security update ��A�2https://access.redhat.com/errata/RHSA-2023:1880 RHSA-2023:1880 RHSA-2023:1880
https://access.redhat.com/security/cve/CVE-2023-21930 CVE-2023-21930 CVE-2023-21930 https://access.redhat.com/security/cve/CVE-2023-21937 CVE-2023-21937 CVE-2023-21937 https://access.redhat.com/security/cve/CVE-2023-21938 CVE-2023-21938 CVE-2023-21938 https://access.redhat.com/security/cve/CVE-2023-21939 CVE-2023-21939 CVE-2023-21939 https://access.redhat.com/security/cve/CVE-2023-21954 CVE-2023-21954 CVE-2023-21954 https://access.redhat.com/security/cve/CVE-2023-21967 CVE-2023-21967 CVE-2023-21967 https://access.redhat.com/security/cve/CVE-2023-21968 CVE-2023-21968 CVE-2023-21968 https://bugzilla.redhat.com/2187435 2187435 https://bugzilla.redhat.com/2187441 2187441 https://bugzilla.redhat.com/2187704 2187704 https://bugzilla.redhat.com/2187724 2187724 https://bugzilla.redhat.com/2187758 2187758 https://bugzilla.redhat.com/2187790 2187790 https://bugzilla.redhat.com/2187802 2187802 https://errata.almalinux.org/9/ALSA-2023-1880.html ALSA-2023:1880 ALSA-2023:1880 �b%java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �e%java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �i%java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �g%java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �f%java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �k%java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �j%java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �h%java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �a%java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �n%java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �l%java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �m%java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �d%java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �c%java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �b%java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �e%java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �i%java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �g%java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �f%java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �k%java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �j%java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �h%java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �a%java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �n%java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �l%java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �m%java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �d%java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1.x86_64.rpm �c%java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1.x86_64.rpm ����w�i �)�qBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security and bug fix update ��s�Thttps://access.redhat.com/errata/RHSA-2023:1909 RHSA-2023:1909 RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21930 CVE-2023-21930 CVE-2023-21930 https://access.redhat.com/security/cve/CVE-2023-21937 CVE-2023-21937 CVE-2023-21937 https://access.redhat.com/security/cve/CVE-2023-21938 CVE-2023-21938 CVE-2023-21938 https://access.redhat.com/security/cve/CVE-2023-21939 CVE-2023-21939 CVE-2023-21939 https://access.redhat.com/security/cve/CVE-2023-21954 CVE-2023-21954 CVE-2023-21954 https://access.redhat.com/security/cve/CVE-2023-21967 CVE-2023-21967 CVE-2023-21967 https://access.redhat.com/security/cve/CVE-2023-21968 CVE-2023-21968 CVE-2023-21968 https://bugzilla.redhat.com/2187435 2187435 https://bugzilla.redhat.com/2187441 2187441 https://bugzilla.redhat.com/2187704 2187704 https://bugzilla.redhat.com/2187724 2187724 https://bugzilla.redhat.com/2187758 2187758 https://bugzilla.redhat.com/2187790 2187790 https://bugzilla.redhat.com/2187802 2187802 https://errata.almalinux.org/9/ALSA-2023-1909.html ALSA-2023:1909 ALSA-2023:1909
�Ujava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �
Ujava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm � Ujava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm
�Ujava-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �
Ujava-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm � Ujava-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm �Ujava-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1.x86_64.rpm ��ƷI�j �*�EBBBBBBBBBBBBsecurity Important: samba security update ��G�https://access.redhat.com/errata/RHSA-2023:2127 RHSA-2023:2127 RHSA-2023:2127
https://access.redhat.com/security/cve/CVE-2022-38023 CVE-2022-38023 CVE-2022-38023 https://bugzilla.redhat.com/2154362 2154362 https://errata.almalinux.org/9/ALSA-2023-2127.html ALSA-2023:2127 ALSA-2023:2127 �Omlibsmbclient-devel-4.16.4-103.el9_1.i686.rpm �bmsamba-test-4.16.4-103.el9_1.x86_64.rpm �Omlibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpm �Smsamba-devel-4.16.4-103.el9_1.i686.rpm �Pmlibwbclient-devel-4.16.4-103.el9_1.x86_64.rpm �cmsamba-test-libs-4.16.4-103.el9_1.x86_64.rpm �Smsamba-devel-4.16.4-103.el9_1.x86_64.rpm �Pmlibwbclient-devel-4.16.4-103.el9_1.i686.rpm �$msamba-pidl-4.16.4-103.el9_1.noarch.rpm �Omlibsmbclient-devel-4.16.4-103.el9_1.i686.rpm �bmsamba-test-4.16.4-103.el9_1.x86_64.rpm �Omlibsmbclient-devel-4.16.4-103.el9_1.x86_64.rpm �Smsamba-devel-4.16.4-103.el9_1.i686.rpm �Pmlibwbclient-devel-4.16.4-103.el9_1.x86_64.rpm �cmsamba-test-libs-4.16.4-103.el9_1.x86_64.rpm �Smsamba-devel-4.16.4-103.el9_1.x86_64.rpm �Pmlibwbclient-devel-4.16.4-103.el9_1.i686.rpm �$msamba-pidl-4.16.4-103.el9_1.noarch.rpm ��ӿ(�k �+�SBBsecurity Important: edk2 security, bug fix, and enhancement update ��[�https://access.redhat.com/errata/RHSA-2023:2165 RHSA-2023:2165 RHSA-2023:2165
https://access.redhat.com/security/cve/CVE-2021-38578 CVE-2021-38578 CVE-2021-38578 https://access.redhat.com/security/cve/CVE-2022-4304 CVE-2022-4304 CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 CVE-2022-4450 CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 CVE-2023-0215 CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0286 CVE-2023-0286 CVE-2023-0286 https://bugzilla.redhat.com/1960321 1960321 https://bugzilla.redhat.com/2164440 2164440 https://bugzilla.redhat.com/2164487 2164487 https://bugzilla.redhat.com/2164492 2164492 https://bugzilla.redhat.com/2164494 2164494 https://errata.almalinux.org/9/ALSA-2023-2165.html ALSA-2023:2165 ALSA-2023:2165 �K�wedk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm ��wedk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm �L�wedk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm �K�wedk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm ��wedk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm �L�wedk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm �����l �,�WBBBBBBBBBBsecurity Moderate: freeradius security and bug fix update
��j�fhttps://access.redhat.com/errata/RHSA-2023:2166 RHSA-2023:2166 RHSA-2023:2166
https://access.redhat.com/security/cve/CVE-2022-41859 CVE-2022-41859 CVE-2022-41859 https://access.redhat.com/security/cve/CVE-2022-41860 CVE-2022-41860 CVE-2022-41860 https://access.redhat.com/security/cve/CVE-2022-41861 CVE-2022-41861 CVE-2022-41861 https://bugzilla.redhat.com/2078483 2078483 https://bugzilla.redhat.com/2078485 2078485 https://bugzilla.redhat.com/2078487 2078487 https://errata.almalinux.org/9/ALSA-2023-2166.html ALSA-2023:2166 ALSA-2023:2166 ��\freeradius-sqlite-3.0.21-37.el9.x86_64.rpm ��\freeradius-perl-3.0.21-37.el9.x86_64.rpm ��\freeradius-rest-3.0.21-37.el9.x86_64.rpm ��\freeradius-unixODBC-3.0.21-37.el9.x86_64.rpm ��\freeradius-postgresql-3.0.21-37.el9.x86_64.rpm ��\freeradius-mysql-3.0.21-37.el9.x86_64.rpm ��\freeradius-sqlite-3.0.21-37.el9.x86_64.rpm ��\freeradius-perl-3.0.21-37.el9.x86_64.rpm ��\freeradius-rest-3.0.21-37.el9.x86_64.rpm ��\freeradius-unixODBC-3.0.21-37.el9.x86_64.rpm ��\freeradius-postgresql-3.0.21-37.el9.x86_64.rpm ��\freeradius-mysql-3.0.21-37.el9.x86_64.rpm ����:�m �-�cBBsecurity Moderate: xorg-x11-server security and bug fix update
��P�Ohttps://access.redhat.com/errata/RHSA-2023:2248 RHSA-2023:2248 RHSA-2023:2248
https://access.redhat.com/security/cve/CVE-2022-3550 CVE-2022-3550 CVE-2022-3550 https://access.redhat.com/security/cve/CVE-2022-3551 CVE-2022-3551 CVE-2022-3551 https://access.redhat.com/security/cve/CVE-2022-4283 CVE-2022-4283 CVE-2022-4283 https://access.redhat.com/security/cve/CVE-2022-46340 CVE-2022-46340 CVE-2022-46340 https://access.redhat.com/security/cve/CVE-2022-46341 CVE-2022-46341 CVE-2022-46341 https://access.redhat.com/security/cve/CVE-2022-46342 CVE-2022-46342 CVE-2022-46342 https://access.redhat.com/security/cve/CVE-2022-46343 CVE-2022-46343 CVE-2022-46343 https://access.redhat.com/security/cve/CVE-2022-46344 CVE-2022-46344 CVE-2022-46344 https://access.redhat.com/security/cve/CVE-2023-0494 CVE-2023-0494 CVE-2023-0494 https://bugzilla.redhat.com/2140698 2140698 https://bugzilla.redhat.com/2140701 2140701 https://bugzilla.redhat.com/2151755 2151755 https://bugzilla.redhat.com/2151756 2151756 https://bugzilla.redhat.com/2151757 2151757 https://bugzilla.redhat.com/2151758 2151758 https://bugzilla.redhat.com/2151760 2151760 https://bugzilla.redhat.com/2151761 2151761 https://bugzilla.redhat.com/2165995 2165995 https://errata.almalinux.org/9/ALSA-2023-2248.html ALSA-2023:2248 ALSA-2023:2248 �_�oxorg-x11-server-source-1.20.11-17.el9.noarch.rpm d�oxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpm d�oxorg-x11-server-devel-1.20.11-17.el9.i686.rpm �_�oxorg-x11-server-source-1.20.11-17.el9.noarch.rpm d�oxorg-x11-server-devel-1.20.11-17.el9.x86_64.rpm d�oxorg-x11-server-devel-1.20.11-17.el9.i686.rpm ����>�n �.�gBBBBBBBBBBsecurity Moderate: poppler security and bug fix update
���https://access.redhat.com/errata/RHSA-2023:2259 RHSA-2023:2259 RHSA-2023:2259
https://access.redhat.com/security/cve/CVE-2022-38784 CVE-2022-38784 CVE-2022-38784 https://bugzilla.redhat.com/2124527 2124527 https://errata.almalinux.org/9/ALSA-2023-2259.html ALSA-2023:2259 ALSA-2023:2259 ��Bpoppler-qt5-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-qt5-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-cpp-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-cpp-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-glib-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-glib-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-qt5-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-qt5-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-cpp-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-cpp-devel-21.01.0-14.el9.x86_64.rpm ��Bpoppler-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-glib-devel-21.01.0-14.el9.i686.rpm ��Bpoppler-glib-devel-21.01.0-14.el9.x86_64.rpm ����S�o �0�o�EBBBsecurity Moderate: bind security and bug fix update
��8�J
https://access.redhat.com/errata/RHSA-2023:2261 RHSA-2023:2261 RHSA-2023:2261
https://access.redhat.com/security/cve/CVE-2022-2795 CVE-2022-2795 CVE-2022-2795 https://access.redhat.com/security/cve/CVE-2022-3094 CVE-2022-3094 CVE-2022-3094 https://access.redhat.com/security/cve/CVE-2022-3736 CVE-2022-3736 CVE-2022-3736 https://access.redhat.com/security/cve/CVE-2022-3924 CVE-2022-3924 CVE-2022-3924 https://bugzilla.redhat.com/2128584 2128584 https://bugzilla.redhat.com/2164032 2164032 https://bugzilla.redhat.com/2164038 2164038 https://bugzilla.redhat.com/2164039 2164039 https://errata.almalinux.org/9/ALSA-2023-2261.html ALSA-2023:2261 ALSA-2023:2261 �^�Obind-libs-9.16.23-11.el9.i686.rpm O�Obind-devel-9.16.23-11.el9.x86_64.rpm ��Obind-doc-9.16.23-11.el9.noarch.rpm O�Obind-devel-9.16.23-11.el9.i686.rpm �^�Obind-libs-9.16.23-11.el9.i686.rpm O�Obind-devel-9.16.23-11.el9.x86_64.rpm ��Obind-doc-9.16.23-11.el9.noarch.rpm O�Obind-devel-9.16.23-11.el9.i686.rpm ����[�p �1�xBBBBsecurity Moderate: freerdp security update
���fhttps://access.redhat.com/errata/RHSA-2023:2326 RHSA-2023:2326 RHSA-2023:2326
https://access.redhat.com/security/cve/CVE-2022-39282 CVE-2022-39282 CVE-2022-39282 https://access.redhat.com/security/cve/CVE-2022-39283 CVE-2022-39283 CVE-2022-39283 https://access.redhat.com/security/cve/CVE-2022-39316 CVE-2022-39316 CVE-2022-39316 https://access.redhat.com/security/cve/CVE-2022-39317 CVE-2022-39317 CVE-2022-39317 https://access.redhat.com/security/cve/CVE-2022-39318 CVE-2022-39318 CVE-2022-39318 https://access.redhat.com/security/cve/CVE-2022-39319 CVE-2022-39319 CVE-2022-39319 https://access.redhat.com/security/cve/CVE-2022-39320 CVE-2022-39320 CVE-2022-39320 https://access.redhat.com/security/cve/CVE-2022-39347 CVE-2022-39347 CVE-2022-39347 https://access.redhat.com/security/cve/CVE-2022-41877 CVE-2022-41877 CVE-2022-41877 https://bugzilla.redhat.com/2134713 2134713 https://bugzilla.redhat.com/2134717 2134717 https://bugzilla.redhat.com/2143642 2143642 https://bugzilla.redhat.com/2143643 2143643 https://bugzilla.redhat.com/2143644 2143644 https://bugzilla.redhat.com/2143645 2143645 https://bugzilla.redhat.com/2143646 2143646 https://bugzilla.redhat.com/2143647 2143647 https://bugzilla.redhat.com/2143648 2143648 https://errata.almalinux.org/9/ALSA-2023-2326.html ALSA-2023:2326 ALSA-2023:2326 �Nfreerdp-devel-2.4.1-5.el9.x86_64.rpm � �Nlibwinpr-devel-2.4.1-5.el9.x86_64.rpm � �Nlibwinpr-devel-2.4.1-5.el9.i686.rpm �Nfreerdp-devel-2.4.1-5.el9.i686.rpm �Nfreerdp-devel-2.4.1-5.el9.x86_64.rpm � �Nlibwinpr-devel-2.4.1-5.el9.x86_64.rpm � �Nlibwinpr-devel-2.4.1-5.el9.i686.rpm �Nfreerdp-devel-2.4.1-5.el9.i686.rpm ����%�q �2�~security Moderate: libtiff security update
��h�>https://access.redhat.com/errata/RHSA-2023:2340 RHSA-2023:2340 RHSA-2023:2340
https://access.redhat.com/security/cve/CVE-2022-3570 CVE-2022-3570 CVE-2022-3570 https://access.redhat.com/security/cve/CVE-2022-3597 CVE-2022-3597 CVE-2022-3597 https://access.redhat.com/security/cve/CVE-2022-3598 CVE-2022-3598 CVE-2022-3598 https://access.redhat.com/security/cve/CVE-2022-3599 CVE-2022-3599 CVE-2022-3599 https://access.redhat.com/security/cve/CVE-2022-3626 CVE-2022-3626 CVE-2022-3626 https://access.redhat.com/security/cve/CVE-2022-3627 CVE-2022-3627 CVE-2022-3627 https://access.redhat.com/security/cve/CVE-2022-3970 CVE-2022-3970 CVE-2022-3970 https://access.redhat.com/security/cve/CVE-2022-4645 CVE-2022-4645 CVE-2022-4645 https://access.redhat.com/security/cve/CVE-2023-30774 CVE-2023-30774 CVE-2023-30774 https://access.redhat.com/security/cve/CVE-2023-30775 CVE-2023-30775 CVE-2023-30775 https://bugzilla.redhat.com/2142734 2142734 https://bugzilla.redhat.com/2142736 2142736 https://bugzilla.redhat.com/2142738 2142738 https://bugzilla.redhat.com/2142740 2142740 https://bugzilla.redhat.com/2142741 2142741 https://bugzilla.redhat.com/2142742 2142742 https://bugzilla.redhat.com/2148918 2148918 https://bugzilla.redhat.com/2176220 2176220 https://bugzilla.redhat.com/2187139 2187139 https://bugzilla.redhat.com/2187141 2187141 https://errata.almalinux.org/9/ALSA-2023-2340.html ALSA-2023:2340 ALSA-2023:2340 � �Plibtiff-tools-4.4.0-7.el9.x86_64.rpm � �Plibtiff-tools-4.4.0-7.el9.x86_64.rpm ����4�r �3�@Bsecurity Moderate: unbound security update
��&�9https://access.redhat.com/errata/RHSA-2023:2370 RHSA-2023:2370 RHSA-2023:2370
https://access.redhat.com/security/cve/CVE-2022-3204 CVE-2022-3204 CVE-2022-3204 https://bugzilla.redhat.com/2128947 2128947 https://errata.almalinux.org/9/ALSA-2023-2370.html ALSA-2023:2370 ALSA-2023:2370 �T�'unbound-devel-1.16.2-3.el9.x86_64.rpm �T�'unbound-devel-1.16.2-3.el9.i686.rpm �T�'unbound-devel-1.16.2-3.el9.x86_64.rpm �T�'unbound-devel-1.16.2-3.el9.i686.rpm ����E�s �4�CBsecurity Moderate: wireshark security and bug fix update
��_�4https://access.redhat.com/errata/RHSA-2023:2373 RHSA-2023:2373 RHSA-2023:2373
https://access.redhat.com/security/cve/CVE-2022-3190 CVE-2022-3190 CVE-2022-3190 https://bugzilla.redhat.com/2152061 2152061 https://errata.almalinux.org/9/ALSA-2023-2373.html ALSA-2023:2373 ALSA-2023:2373 �@�Awireshark-devel-3.4.10-4.el9.i686.rpm �@�Awireshark-devel-3.4.10-4.el9.x86_64.rpm �@�Awireshark-devel-3.4.10-4.el9.i686.rpm �@�Awireshark-devel-3.4.10-4.el9.x86_64.rpm �����t �5�FBBsecurity Important: kernel security, bug fix, and enhancement update ���SRhttps://access.redhat.com/errata/RHSA-2023:2458 RHSA-2023:2458 RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2021-26341 CVE-2021-26341 CVE-2021-26341 https://access.redhat.com/security/cve/CVE-2021-33655 CVE-2021-33655 CVE-2021-33655 https://access.redhat.com/security/cve/CVE-2022-1462 CVE-2022-1462 CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-1789 CVE-2022-1789 CVE-2022-1789 https://access.redhat.com/security/cve/CVE-2022-1882 CVE-2022-1882 CVE-2022-1882 https://access.redhat.com/security/cve/CVE-2022-20141 CVE-2022-20141 CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-21505 CVE-2022-21505 CVE-2022-21505 https://access.redhat.com/security/cve/CVE-2022-2196 CVE-2022-2196 CVE-2022-2196 https://access.redhat.com/security/cve/CVE-2022-2663 CVE-2022-2663 CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-28388 CVE-2022-28388 CVE-2022-28388 https://access.redhat.com/security/cve/CVE-2022-3028 CVE-2022-3028 CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-33743 CVE-2022-33743 CVE-2022-33743 https://access.redhat.com/security/cve/CVE-2022-3435 CVE-2022-3435 CVE-2022-3435 https://access.redhat.com/security/cve/CVE-2022-3522 CVE-2022-3522 CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3524 CVE-2022-3524 CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3566 CVE-2022-3566 CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3567 CVE-2022-3567 CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3619 CVE-2022-3619 CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 CVE-2022-3623 CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3625 CVE-2022-3625 CVE-2022-3625 https://access.redhat.com/security/cve/CVE-2022-3628 CVE-2022-3628 CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-3640 CVE-2022-3640 CVE-2022-3640 https://access.redhat.com/security/cve/CVE-2022-3707 CVE-2022-3707 CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-39188 CVE-2022-39188 CVE-2022-39188 https://access.redhat.com/security/cve/CVE-2022-39189 CVE-2022-39189 CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-4128 CVE-2022-4128 CVE-2022-4128 https://access.redhat.com/security/cve/CVE-2022-4129 CVE-2022-4129 CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-41674 CVE-2022-41674 CVE-2022-41674 https://access.redhat.com/security/cve/CVE-2022-42703 CVE-2022-42703 CVE-2022-42703 https://access.redhat.com/security/cve/CVE-2022-42720 CVE-2022-42720 CVE-2022-42720 https://access.redhat.com/security/cve/CVE-2022-42721 CVE-2022-42721 CVE-2022-42721 https://access.redhat.com/security/cve/CVE-2022-42722 CVE-2022-42722 CVE-2022-42722 https://access.redhat.com/security/cve/CVE-2022-42896 CVE-2022-42896 CVE-2022-42896 https://access.redhat.com/security/cve/CVE-2022-43750 CVE-2022-43750 CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 CVE-2022-47929 CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 CVE-2023-0394 CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-0461 CVE-2023-0461 CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-0590 CVE-2023-0590 CVE-2023-0590 https://access.redhat.com/security/cve/CVE-2023-1195 CVE-2023-1195 CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1382 CVE-2023-1382 CVE-2023-1382 https://bugzilla.redhat.com/2061703 2061703 https://bugzilla.redhat.com/2073091 2073091 https://bugzilla.redhat.com/2078466 2078466 https://bugzilla.redhat.com/2089701 2089701 https://bugzilla.redhat.com/2090723 2090723 https://bugzilla.redhat.com/2106830 2106830 https://bugzilla.redhat.com/2107924 2107924 https://bugzilla.redhat.com/2108691 2108691 https://bugzilla.redhat.com/2114937 2114937 https://bugzilla.redhat.com/2122228 2122228 https://bugzilla.redhat.com/2123056 2123056 https://bugzilla.redhat.com/2124788 2124788 https://bugzilla.redhat.com/2130141 2130141 https://bugzilla.redhat.com/2133483 2133483 https://bugzilla.redhat.com/2133490 2133490 https://bugzilla.redhat.com/2134377 2134377 https://bugzilla.redhat.com/2134380 2134380 https://bugzilla.redhat.com/2134451 2134451 https://bugzilla.redhat.com/2134506 2134506 https://bugzilla.redhat.com/2134517 2134517 https://bugzilla.redhat.com/2134528 2134528 https://bugzilla.redhat.com/2137979 2137979 https://bugzilla.redhat.com/2139610 2139610 https://bugzilla.redhat.com/2143893 2143893 https://bugzilla.redhat.com/2143943 2143943 https://bugzilla.redhat.com/2144720 2144720 https://bugzilla.redhat.com/2147364 2147364 https://bugzilla.redhat.com/2150947 2150947 https://bugzilla.redhat.com/2150960 2150960 https://bugzilla.redhat.com/2150979 2150979 https://bugzilla.redhat.com/2151270 2151270 https://bugzilla.redhat.com/2154171 2154171 https://bugzilla.redhat.com/2154235 2154235 https://bugzilla.redhat.com/2160023 2160023 https://bugzilla.redhat.com/2162120 2162120 https://bugzilla.redhat.com/2165721 2165721 https://bugzilla.redhat.com/2165741 2165741 https://bugzilla.redhat.com/2168246 2168246 https://bugzilla.redhat.com/2176192 2176192 https://bugzilla.redhat.com/2177371 2177371 https://errata.almalinux.org/9/ALSA-2023-2458.html ALSA-2023:2458 ALSA-2023:2458 �kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm �kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm �kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm �kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm ����C�u �3�JBsecurity Moderate: device-mapper-multipath security and bug fix update
��f�]https://access.redhat.com/errata/RHSA-2023:2459 RHSA-2023:2459 RHSA-2023:2459
https://access.redhat.com/security/cve/CVE-2022-41973 CVE-2022-41973 CVE-2022-41973 https://bugzilla.redhat.com/2123894 2123894 https://errata.almalinux.org/9/ALSA-2023-2459.html ALSA-2023:2459 ALSA-2023:2459 �]�!device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm �]�!device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm �]�!device-mapper-multipath-devel-0.8.7-20.el9.x86_64.rpm �]�!device-mapper-multipath-devel-0.8.7-20.el9.i686.rpm �����v �6�Msecurity Moderate: fwupd security and bug fix update
��C�M
https://access.redhat.com/errata/RHSA-2023:2487 RHSA-2023:2487 RHSA-2023:2487
https://access.redhat.com/security/cve/CVE-2022-3287 CVE-2022-3287 CVE-2022-3287 https://access.redhat.com/security/cve/CVE-2022-34301 CVE-2022-34301 CVE-2022-34301 https://access.redhat.com/security/cve/CVE-2022-34302 CVE-2022-34302 CVE-2022-34302 https://access.redhat.com/security/cve/CVE-2022-34303 CVE-2022-34303 CVE-2022-34303 https://bugzilla.redhat.com/2120687 2120687 https://bugzilla.redhat.com/2120699 2120699 https://bugzilla.redhat.com/2120701 2120701 https://bugzilla.redhat.com/2129904 2129904 https://errata.almalinux.org/9/ALSA-2023-2487.html ALSA-2023:2487 ALSA-2023:2487 ��6fwupd-devel-1.8.10-2.el9.alma.x86_64.rpm ��6fwupd-devel-1.8.10-2.el9.alma.x86_64.rpm ����}�w �7�OBBBBBBBBBBBBBBBBBBBBsecurity Low: samba security, bug fix, and enhancement update �V���https://access.redhat.com/errata/RHSA-2023:2519 RHSA-2023:2519 RHSA-2023:2519
https://access.redhat.com/security/cve/CVE-2022-1615 CVE-2022-1615 CVE-2022-1615 https://bugzilla.redhat.com/2122649 2122649 https://errata.almalinux.org/9/ALSA-2023-2519.html ALSA-2023:2519 ALSA-2023:2519 �SIsamba-devel-4.17.5-102.el9.x86_64.rpm �PIlibwbclient-devel-4.17.5-102.el9.i686.rpm �$Isamba-pidl-4.17.5-102.el9.noarch.rpm �cIsamba-test-libs-4.17.5-102.el9.x86_64.rpm �Ipython3-samba-devel-4.17.5-102.el9.i686.rpm �SIsamba-devel-4.17.5-102.el9.i686.rpm �Ilibnetapi-devel-4.17.5-102.el9.x86_64.rpm � Ipython3-samba-test-4.17.5-102.el9.x86_64.rpm �OIlibsmbclient-devel-4.17.5-102.el9.x86_64.rpm �OIlibsmbclient-devel-4.17.5-102.el9.i686.rpm �Ilibnetapi-devel-4.17.5-102.el9.i686.rpm �PIlibwbclient-devel-4.17.5-102.el9.x86_64.rpm �bIsamba-test-4.17.5-102.el9.x86_64.rpm �Ipython3-samba-devel-4.17.5-102.el9.x86_64.rpm �SIsamba-devel-4.17.5-102.el9.x86_64.rpm �PIlibwbclient-devel-4.17.5-102.el9.i686.rpm �$Isamba-pidl-4.17.5-102.el9.noarch.rpm �cIsamba-test-libs-4.17.5-102.el9.x86_64.rpm �Ipython3-samba-devel-4.17.5-102.el9.i686.rpm �SIsamba-devel-4.17.5-102.el9.i686.rpm �Ilibnetapi-devel-4.17.5-102.el9.x86_64.rpm � Ipython3-samba-test-4.17.5-102.el9.x86_64.rpm �OIlibsmbclient-devel-4.17.5-102.el9.x86_64.rpm �OIlibsmbclient-devel-4.17.5-102.el9.i686.rpm �Ilibnetapi-devel-4.17.5-102.el9.i686.rpm �PIlibwbclient-devel-4.17.5-102.el9.x86_64.rpm �bIsamba-test-4.17.5-102.el9.x86_64.rpm �Ipython3-samba-devel-4.17.5-102.el9.x86_64.rpm ����f�x �8�eBsecurity Low: libarchive security update �V���Yhttps://access.redhat.com/errata/RHSA-2023:2532 RHSA-2023:2532 RHSA-2023:2532
https://access.redhat.com/security/cve/CVE-2022-36227 CVE-2022-36227 CVE-2022-36227 https://bugzilla.redhat.com/2144972 2144972 https://errata.almalinux.org/9/ALSA-2023-2532.html ALSA-2023:2532 ALSA-2023:2532 �`�]libarchive-devel-3.5.3-4.el9.x86_64.rpm �`�]libarchive-devel-3.5.3-4.el9.i686.rpm �`�]libarchive-devel-3.5.3-4.el9.x86_64.rpm �`�]libarchive-devel-3.5.3-4.el9.i686.rpm �����y �:�y�pBBsecurity Low: lua security update �V��m�Rhttps://access.redhat.com/errata/RHSA-2023:2582 RHSA-2023:2582 RHSA-2023:2582
https://access.redhat.com/security/cve/CVE-2022-28805 CVE-2022-28805 CVE-2022-28805 https://bugzilla.redhat.com/2073884 2073884 https://errata.almalinux.org/9/ALSA-2023-2582.html ALSA-2023:2582 ALSA-2023:2582 ��Ylua-5.4.4-3.el9.i686.rpm �;�Ylua-devel-5.4.4-3.el9.x86_64.rpm �;�Ylua-devel-5.4.4-3.el9.i686.rpm ��Ylua-5.4.4-3.el9.i686.rpm �;�Ylua-devel-5.4.4-3.el9.x86_64.rpm �;�Ylua-devel-5.4.4-3.el9.i686.rpm ����o�z �/�lBsecurity Moderate: autotrace security update
��?�yhttps://access.redhat.com/errata/RHSA-2023:2589 RHSA-2023:2589 RHSA-2023:2589
https://access.redhat.com/security/cve/CVE-2022-32323 CVE-2022-32323 CVE-2022-32323 https://bugzilla.redhat.com/2107471 2107471 https://errata.almalinux.org/9/ALSA-2023-2589.html ALSA-2023:2589 ALSA-2023:2589 �j�autotrace-0.31.1-65.el9.x86_64.rpm �j�autotrace-0.31.1-65.el9.i686.rpm �j�autotrace-0.31.1-65.el9.x86_64.rpm �j�autotrace-0.31.1-65.el9.i686.rpm ����`�{ �2�psecurity Moderate: golang-github-cpuguy83-md2man security, bug fix, and enhancement update
��8�chttps://access.redhat.com/errata/RHSA-2023:2592 RHSA-2023:2592 RHSA-2023:2592
https://access.redhat.com/security/cve/CVE-2022-41715 CVE-2022-41715 CVE-2022-41715 https://bugzilla.redhat.com/2132872 2132872 https://errata.almalinux.org/9/ALSA-2023-2592.html ALSA-2023:2592 ALSA-2023:2592 ��<golang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm ��<golang-github-cpuguy83-md2man-2.0.2-4.el9.x86_64.rpm ����o�| �;�sBBBBsecurity Important: mysql security update ���Lhttps://access.redhat.com/errata/RHSA-2023:2621 RHSA-2023:2621 RHSA-2023:2621
https://access.redhat.com/security/cve/CVE-2022-21594 CVE-2022-21594 CVE-2022-21594 https://access.redhat.com/security/cve/CVE-2022-21599 CVE-2022-21599 CVE-2022-21599 https://access.redhat.com/security/cve/CVE-2022-21604 CVE-2022-21604 CVE-2022-21604 https://access.redhat.com/security/cve/CVE-2022-21608 CVE-2022-21608 CVE-2022-21608 https://access.redhat.com/security/cve/CVE-2022-21611 CVE-2022-21611 CVE-2022-21611 https://access.redhat.com/security/cve/CVE-2022-21617 CVE-2022-21617 CVE-2022-21617 https://access.redhat.com/security/cve/CVE-2022-21625 CVE-2022-21625 CVE-2022-21625 https://access.redhat.com/security/cve/CVE-2022-21632 CVE-2022-21632 CVE-2022-21632 https://access.redhat.com/security/cve/CVE-2022-21633 CVE-2022-21633 CVE-2022-21633 https://access.redhat.com/security/cve/CVE-2022-21637 CVE-2022-21637 CVE-2022-21637 https://access.redhat.com/security/cve/CVE-2022-21640 CVE-2022-21640 CVE-2022-21640 https://access.redhat.com/security/cve/CVE-2022-39400 CVE-2022-39400 CVE-2022-39400 https://access.redhat.com/security/cve/CVE-2022-39408 CVE-2022-39408 CVE-2022-39408 https://access.redhat.com/security/cve/CVE-2022-39410 CVE-2022-39410 CVE-2022-39410 https://access.redhat.com/security/cve/CVE-2023-21836 CVE-2023-21836 CVE-2023-21836 https://access.redhat.com/security/cve/CVE-2023-21863 CVE-2023-21863 CVE-2023-21863 https://access.redhat.com/security/cve/CVE-2023-21864 CVE-2023-21864 CVE-2023-21864 https://access.redhat.com/security/cve/CVE-2023-21865 CVE-2023-21865 CVE-2023-21865 https://access.redhat.com/security/cve/CVE-2023-21867 CVE-2023-21867 CVE-2023-21867 https://access.redhat.com/security/cve/CVE-2023-21868 CVE-2023-21868 CVE-2023-21868 https://access.redhat.com/security/cve/CVE-2023-21869 CVE-2023-21869 CVE-2023-21869 https://access.redhat.com/security/cve/CVE-2023-21870 CVE-2023-21870 CVE-2023-21870 https://access.redhat.com/security/cve/CVE-2023-21871 CVE-2023-21871 CVE-2023-21871 https://access.redhat.com/security/cve/CVE-2023-21873 CVE-2023-21873 CVE-2023-21873 https://access.redhat.com/security/cve/CVE-2023-21874 CVE-2023-21874 CVE-2023-21874 https://access.redhat.com/security/cve/CVE-2023-21875 CVE-2023-21875 CVE-2023-21875 https://access.redhat.com/security/cve/CVE-2023-21876 CVE-2023-21876 CVE-2023-21876 https://access.redhat.com/security/cve/CVE-2023-21877 CVE-2023-21877 CVE-2023-21877 https://access.redhat.com/security/cve/CVE-2023-21878 CVE-2023-21878 CVE-2023-21878 https://access.redhat.com/security/cve/CVE-2023-21879 CVE-2023-21879 CVE-2023-21879 https://access.redhat.com/security/cve/CVE-2023-21880 CVE-2023-21880 CVE-2023-21880 https://access.redhat.com/security/cve/CVE-2023-21881 CVE-2023-21881 CVE-2023-21881 https://access.redhat.com/security/cve/CVE-2023-21882 CVE-2023-21882 CVE-2023-21882 https://access.redhat.com/security/cve/CVE-2023-21883 CVE-2023-21883 CVE-2023-21883 https://access.redhat.com/security/cve/CVE-2023-21887 CVE-2023-21887 CVE-2023-21887 https://access.redhat.com/security/cve/CVE-2023-21912 CVE-2023-21912 CVE-2023-21912 https://access.redhat.com/security/cve/CVE-2023-21917 CVE-2023-21917 CVE-2023-21917 https://bugzilla.redhat.com/2142861 2142861 https://bugzilla.redhat.com/2142863 2142863 https://bugzilla.redhat.com/2142865 2142865 https://bugzilla.redhat.com/2142868 2142868 https://bugzilla.redhat.com/2142869 2142869 https://bugzilla.redhat.com/2142870 2142870 https://bugzilla.redhat.com/2142871 2142871 https://bugzilla.redhat.com/2142872 2142872 https://bugzilla.redhat.com/2142873 2142873 https://bugzilla.redhat.com/2142875 2142875 https://bugzilla.redhat.com/2142877 2142877 https://bugzilla.redhat.com/2142879 2142879 https://bugzilla.redhat.com/2142880 2142880 https://bugzilla.redhat.com/2142881 2142881 https://bugzilla.redhat.com/2162268 2162268 https://bugzilla.redhat.com/2162270 2162270 https://bugzilla.redhat.com/2162271 2162271 https://bugzilla.redhat.com/2162272 2162272 https://bugzilla.redhat.com/2162274 2162274 https://bugzilla.redhat.com/2162275 2162275 https://bugzilla.redhat.com/2162276 2162276 https://bugzilla.redhat.com/2162277 2162277 https://bugzilla.redhat.com/2162278 2162278 https://bugzilla.redhat.com/2162280 2162280 https://bugzilla.redhat.com/2162281 2162281 https://bugzilla.redhat.com/2162282 2162282 https://bugzilla.redhat.com/2162283 2162283 https://bugzilla.redhat.com/2162284 2162284 https://bugzilla.redhat.com/2162285 2162285 https://bugzilla.redhat.com/2162286 2162286 https://bugzilla.redhat.com/2162287 2162287 https://bugzilla.redhat.com/2162288 2162288 https://bugzilla.redhat.com/2162289 2162289 https://bugzilla.redhat.com/2162290 2162290 https://bugzilla.redhat.com/2162291 2162291 https://bugzilla.redhat.com/2188110 2188110 https://bugzilla.redhat.com/2188112 2188112 https://errata.almalinux.org/9/ALSA-2023-2621.html ALSA-2023:2621 ALSA-2023:2621 �*�<mysql-devel-8.0.32-1.el9_2.x86_64.rpm �+�<mysql-test-8.0.32-1.el9_2.x86_64.rpm �J�<mysql-libs-8.0.32-1.el9_2.x86_64.rpm �*�<mysql-devel-8.0.32-1.el9_2.x86_64.rpm �+�<mysql-test-8.0.32-1.el9_2.x86_64.rpm �J�<mysql-libs-8.0.32-1.el9_2.x86_64.rpm ����h�} �<�yBsecurity Important: cups-filters security update ���ihttps://access.redhat.com/errata/RHSA-2023:3423 RHSA-2023:3423 RHSA-2023:3423
https://access.redhat.com/security/cve/CVE-2023-24805 CVE-2023-24805 CVE-2023-24805 https://bugzilla.redhat.com/2203051 2203051 https://errata.almalinux.org/9/ALSA-2023-3423.html ALSA-2023:3423 ALSA-2023:3423 �\�1cups-filters-devel-1.28.7-11.el9_2.1.i686.rpm �\�1cups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm �\�1cups-filters-devel-1.28.7-11.el9_2.1.i686.rpm �\�1cups-filters-devel-1.28.7-11.el9_2.1.x86_64.rpm �����~ �=�|security Important: .NET 6.0 security, bug fix, and enhancement update ���
https://access.redhat.com/errata/RHSA-2023:3581 RHSA-2023:3581 RHSA-2023:3581
https://access.redhat.com/security/cve/CVE-2023-24936 CVE-2023-24936 CVE-2023-24936 https://access.redhat.com/security/cve/CVE-2023-29331 CVE-2023-29331 CVE-2023-29331 https://access.redhat.com/security/cve/CVE-2023-29337 CVE-2023-29337 CVE-2023-29337 https://access.redhat.com/security/cve/CVE-2023-33128 CVE-2023-33128 CVE-2023-33128 https://bugzilla.redhat.com/2192438 2192438 https://bugzilla.redhat.com/2212617 2212617 https://bugzilla.redhat.com/2212618 2212618 https://bugzilla.redhat.com/2213703 2213703 https://errata.almalinux.org/9/ALSA-2023-3581.html ALSA-2023:3581 ALSA-2023:3581 n�Xdotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm n�Xdotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2.x86_64.rpm ����.� � �~B�@BBBBBBBBBsecurity Important: python3.11 security update ���yhttps://access.redhat.com/errata/RHSA-2023:3585 RHSA-2023:3585 RHSA-2023:3585
https://access.redhat.com/security/cve/CVE-2023-24329 CVE-2023-24329 CVE-2023-24329 https://bugzilla.redhat.com/2173917 2173917 https://errata.almalinux.org/9/ALSA-2023-3585.html ALSA-2023:3585 ALSA-2023:3585 �python3.11-idle-3.11.2-2.el9_2.1.i686.rpm �python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm �python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm �python3.11-test-3.11.2-2.el9_2.1.i686.rpm �python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpm b�python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm �python3.11-debug-3.11.2-2.el9_2.1.i686.rpm a�python3.11-3.11.2-2.el9_2.1.i686.rpm �python3.11-idle-3.11.2-2.el9_2.1.i686.rpm �python3.11-test-3.11.2-2.el9_2.1.x86_64.rpm �python3.11-debug-3.11.2-2.el9_2.1.x86_64.rpm �python3.11-test-3.11.2-2.el9_2.1.i686.rpm �python3.11-idle-3.11.2-2.el9_2.1.x86_64.rpm b�python3.11-tkinter-3.11.2-2.el9_2.1.i686.rpm �python3.11-debug-3.11.2-2.el9_2.1.i686.rpm a�python3.11-3.11.2-2.el9_2.1.i686.rpm ����� ��Isecurity Important: .NET 7.0 security, bug fix, and enhancement update ���https://access.redhat.com/errata/RHSA-2023:3592 RHSA-2023:3592 RHSA-2023:3592
https://access.redhat.com/security/cve/CVE-2023-24936 CVE-2023-24936 CVE-2023-24936 https://access.redhat.com/security/cve/CVE-2023-29331 CVE-2023-29331 CVE-2023-29331 https://access.redhat.com/security/cve/CVE-2023-29337 CVE-2023-29337 CVE-2023-29337 https://access.redhat.com/security/cve/CVE-2023-32032 CVE-2023-32032 CVE-2023-32032 https://access.redhat.com/security/cve/CVE-2023-33128 CVE-2023-33128 CVE-2023-33128 https://bugzilla.redhat.com/2192438 2192438 https://bugzilla.redhat.com/2212615 2212615 https://bugzilla.redhat.com/2212617 2212617 https://bugzilla.redhat.com/2212618 2212618 https://bugzilla.redhat.com/2213703 2213703 https://errata.almalinux.org/9/ALSA-2023-3592.html ALSA-2023:3592 ALSA-2023:3592 �U�ddotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm �U�ddotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2.x86_64.rpm ����� ��B�s�XBBBBBBBBBsecurity Important: python3.9 security update ���+https://access.redhat.com/errata/RHSA-2023:3595 RHSA-2023:3595 RHSA-2023:3595
https://access.redhat.com/security/cve/CVE-2023-24329 CVE-2023-24329 CVE-2023-24329 https://bugzilla.redhat.com/2173917 2173917 https://errata.almalinux.org/9/ALSA-2023-3595.html ALSA-2023:3595 ALSA-2023:3595 �/python3-idle-3.9.16-1.el9_2.1.x86_64.rpm �/python3-debug-3.9.16-1.el9_2.1.x86_64.rpm �/python3-test-3.9.16-1.el9_2.1.i686.rpm �/python3-test-3.9.16-1.el9_2.1.x86_64.rpm �/python3-debug-3.9.16-1.el9_2.1.i686.rpm �/python3-idle-3.9.16-1.el9_2.1.i686.rpm N�/python3-tkinter-3.9.16-1.el9_2.1.i686.rpm M�/python3-3.9.16-1.el9_2.1.i686.rpm �/python3-idle-3.9.16-1.el9_2.1.x86_64.rpm �/python3-debug-3.9.16-1.el9_2.1.x86_64.rpm �/python3-test-3.9.16-1.el9_2.1.i686.rpm �/python3-test-3.9.16-1.el9_2.1.x86_64.rpm �/python3-debug-3.9.16-1.el9_2.1.i686.rpm �/python3-idle-3.9.16-1.el9_2.1.i686.rpm N�/python3-tkinter-3.9.16-1.el9_2.1.i686.rpm M�/python3-3.9.16-1.el9_2.1.i686.rpm ����x� ��VBBsecurity Important: texlive security update ��A�
https://access.redhat.com/errata/RHSA-2023:3661 RHSA-2023:3661 RHSA-2023:3661
https://access.redhat.com/security/cve/CVE-2023-32700 CVE-2023-32700 CVE-2023-32700 https://bugzilla.redhat.com/2208943 2208943 https://errata.almalinux.org/9/ALSA-2023-3661.html ALSA-2023:3661 ALSA-2023:3661 ��ztexlive-gnu-freefont-20200406-26.el9_2.noarch.rpm ��ztexlive-lib-devel-20200406-26.el9_2.x86_64.rpm ��ztexlive-lib-devel-20200406-26.el9_2.i686.rpm ��ztexlive-gnu-freefont-20200406-26.el9_2.noarch.rpm ��ztexlive-lib-devel-20200406-26.el9_2.x86_64.rpm ��ztexlive-lib-devel-20200406-26.el9_2.i686.rpm ��y� ��Zsecurity Moderate: libtiff security update
��N�phttps://access.redhat.com/errata/RHSA-2023:3711 RHSA-2023:3711 RHSA-2023:3711
https://access.redhat.com/security/cve/CVE-2022-48281 CVE-2022-48281 CVE-2022-48281 https://access.redhat.com/security/cve/CVE-2023-0795 CVE-2023-0795 CVE-2023-0795 https://access.redhat.com/security/cve/CVE-2023-0796 CVE-2023-0796 CVE-2023-0796 https://access.redhat.com/security/cve/CVE-2023-0797 CVE-2023-0797 CVE-2023-0797 https://access.redhat.com/security/cve/CVE-2023-0798 CVE-2023-0798 CVE-2023-0798 https://access.redhat.com/security/cve/CVE-2023-0799 CVE-2023-0799 CVE-2023-0799 https://access.redhat.com/security/cve/CVE-2023-0800 CVE-2023-0800 CVE-2023-0800 https://access.redhat.com/security/cve/CVE-2023-0801 CVE-2023-0801 CVE-2023-0801 https://access.redhat.com/security/cve/CVE-2023-0802 CVE-2023-0802 CVE-2023-0802 https://access.redhat.com/security/cve/CVE-2023-0803 CVE-2023-0803 CVE-2023-0803 https://access.redhat.com/security/cve/CVE-2023-0804 CVE-2023-0804 CVE-2023-0804 https://bugzilla.redhat.com/2163606 2163606 https://bugzilla.redhat.com/2170119 2170119 https://bugzilla.redhat.com/2170146 2170146 https://bugzilla.redhat.com/2170151 2170151 https://bugzilla.redhat.com/2170157 2170157 https://bugzilla.redhat.com/2170162 2170162 https://bugzilla.redhat.com/2170167 2170167 https://bugzilla.redhat.com/2170172 2170172 https://bugzilla.redhat.com/2170178 2170178 https://bugzilla.redhat.com/2170187 2170187 https://bugzilla.redhat.com/2170192 2170192 https://errata.almalinux.org/9/ALSA-2023-3711.html ALSA-2023:3711 ALSA-2023:3711 � �Qlibtiff-tools-4.4.0-8.el9_2.x86_64.rpm � �Qlibtiff-tools-4.4.0-8.el9_2.x86_64.rpm ���i� ��\BBBBBBBBBBsecurity Moderate: postgresql security update
��>�Shttps://access.redhat.com/errata/RHSA-2023:3714 RHSA-2023:3714 RHSA-2023:3714
https://access.redhat.com/security/cve/CVE-2023-2454 CVE-2023-2454 CVE-2023-2454 https://access.redhat.com/security/cve/CVE-2023-2455 CVE-2023-2455 CVE-2023-2455 https://bugzilla.redhat.com/2207568 2207568 https://bugzilla.redhat.com/2207569 2207569 https://errata.almalinux.org/9/ALSA-2023-3714.html ALSA-2023:3714 ALSA-2023:3714 �}�Xpostgresql-docs-13.11-1.el9_2.x86_64.rpm ��Xpostgresql-test-13.11-1.el9_2.x86_64.rpm ��Xpostgresql-server-devel-13.11-1.el9_2.x86_64.rpm �~�Xpostgresql-private-devel-13.11-1.el9_2.x86_64.rpm ��Xpostgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm � �Xpostgresql-static-13.11-1.el9_2.x86_64.rpm �}�Xpostgresql-docs-13.11-1.el9_2.x86_64.rpm ��Xpostgresql-test-13.11-1.el9_2.x86_64.rpm ��Xpostgresql-server-devel-13.11-1.el9_2.x86_64.rpm �~�Xpostgresql-private-devel-13.11-1.el9_2.x86_64.rpm ��Xpostgresql-upgrade-devel-13.11-1.el9_2.x86_64.rpm � �Xpostgresql-static-13.11-1.el9_2.x86_64.rpm ����� ��hBBBBBBsecurity Moderate: libvirt security update
���}https://access.redhat.com/errata/RHSA-2023:3715 RHSA-2023:3715 RHSA-2023:3715
https://access.redhat.com/security/cve/CVE-2023-2700 CVE-2023-2700 CVE-2023-2700 https://bugzilla.redhat.com/2203653 2203653 https://errata.almalinux.org/9/ALSA-2023-3715.html ALSA-2023:3715 ALSA-2023:3715 �*�&libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm �(�&libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm �)�&libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm �)�&libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm �*�&libvirt-lock-sanlock-9.0.0-10.2.el9_2.x86_64.rpm �(�&libvirt-devel-9.0.0-10.2.el9_2.x86_64.rpm �)�&libvirt-docs-9.0.0-10.2.el9_2.x86_64.rpm �)�&libvirt-client-qemu-9.0.0-10.2.el9_2.x86_64.rpm ����� ��psecurity Important: kernel security and bug fix update ���https://access.redhat.com/errata/RHSA-2023:3723 RHSA-2023:3723 RHSA-2023:3723
https://access.redhat.com/security/cve/CVE-2023-2002 CVE-2023-2002 CVE-2023-2002 https://access.redhat.com/security/cve/CVE-2023-2124 CVE-2023-2124 CVE-2023-2124 https://access.redhat.com/security/cve/CVE-2023-2194 CVE-2023-2194 CVE-2023-2194 https://access.redhat.com/security/cve/CVE-2023-2235 CVE-2023-2235 CVE-2023-2235 https://access.redhat.com/security/cve/CVE-2023-28466 CVE-2023-28466 CVE-2023-28466 https://access.redhat.com/security/cve/CVE-2023-32233 CVE-2023-32233 CVE-2023-32233 https://bugzilla.redhat.com/2179000 2179000 https://bugzilla.redhat.com/2187308 2187308 https://bugzilla.redhat.com/2187439 2187439 https://bugzilla.redhat.com/2188396 2188396 https://bugzilla.redhat.com/2192589 2192589 https://bugzilla.redhat.com/2196105 2196105 https://errata.almalinux.org/9/ALSA-2023-3723.html ALSA-2023:3723 ALSA-2023:3723 �Skernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm �Skernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm ����V� � �rsecurity Important: .NET 7.0 security, bug fix, and enhancement update ���Ehttps://access.redhat.com/errata/RHSA-2023:4057 RHSA-2023:4057 RHSA-2023:4057
https://access.redhat.com/security/cve/CVE-2023-33170 CVE-2023-33170 CVE-2023-33170 https://bugzilla.redhat.com/2221854 2221854 https://errata.almalinux.org/9/ALSA-2023-4057.html ALSA-2023:4057 ALSA-2023:4057 �U�edotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm �U�edotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2.x86_64.rpm ����B� �
�tsecurity Important: .NET 6.0 security, bug fix, and enhancement update ��a�Fhttps://access.redhat.com/errata/RHSA-2023:4060 RHSA-2023:4060 RHSA-2023:4060
https://access.redhat.com/security/cve/CVE-2023-33170 CVE-2023-33170 CVE-2023-33170 https://bugzilla.redhat.com/2221854 2221854 https://errata.almalinux.org/9/ALSA-2023-4060.html ALSA-2023:4060 ALSA-2023:4060 n�Ydotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm n�Ydotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2.x86_64.rpm ����9� ��K�lBBBsecurity Important: bind security update ��'�Nhttps://access.redhat.com/errata/RHSA-2023:4099 RHSA-2023:4099 RHSA-2023:4099
https://access.redhat.com/security/cve/CVE-2023-2828 CVE-2023-2828 CVE-2023-2828 https://bugzilla.redhat.com/2216227 2216227 https://errata.almalinux.org/9/ALSA-2023-4099.html ALSA-2023:4099 ALSA-2023:4099 O�Pbind-devel-9.16.23-11.el9_2.1.x86_64.rpm ��Pbind-doc-9.16.23-11.el9_2.1.noarch.rpm �^�Pbind-libs-9.16.23-11.el9_2.1.i686.rpm O�Pbind-devel-9.16.23-11.el9_2.1.i686.rpm O�Pbind-devel-9.16.23-11.el9_2.1.x86_64.rpm ��Pbind-doc-9.16.23-11.el9_2.1.noarch.rpm �^�Pbind-libs-9.16.23-11.el9_2.1.i686.rpm O�Pbind-devel-9.16.23-11.el9_2.1.i686.rpm ��ٟ
�
�
�{BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update
��u�"https://access.redhat.com/errata/RHSA-2023:4158 RHSA-2023:4158 RHSA-2023:4158
https://access.redhat.com/security/cve/CVE-2023-22006 CVE-2023-22006 CVE-2023-22006 https://access.redhat.com/security/cve/CVE-2023-22036 CVE-2023-22036 CVE-2023-22036 https://access.redhat.com/security/cve/CVE-2023-22041 CVE-2023-22041 CVE-2023-22041 https://access.redhat.com/security/cve/CVE-2023-22045 CVE-2023-22045 CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 CVE-2023-22049 CVE-2023-22049 https://access.redhat.com/security/cve/CVE-2023-25193 CVE-2023-25193 CVE-2023-25193 https://bugzilla.redhat.com/2167254 2167254 https://bugzilla.redhat.com/2221626 2221626 https://bugzilla.redhat.com/2221634 2221634 https://bugzilla.redhat.com/2221645 2221645 https://bugzilla.redhat.com/2221647 2221647 https://bugzilla.redhat.com/2223207 2223207 https://errata.almalinux.org/9/ALSA-2023-4158.html ALSA-2023:4158 ALSA-2023:4158 �h&java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �c&java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �n&java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �d&java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �i&java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �a&java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �f&java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �e&java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �g&java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �l&java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �m&java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �b&java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �j&java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �k&java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �h&java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �c&java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �n&java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �d&java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �i&java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �a&java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �f&java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �e&java-11-openjdk-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �g&java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �l&java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �m&java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm �b&java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �j&java-11-openjdk-slowdebug-11.0.20.0.8-2.el9.x86_64.rpm �k&java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9.x86_64.rpm ��� � ��WBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update
���Nhttps://access.redhat.com/errata/RHSA-2023:4177 RHSA-2023:4177 RHSA-2023:4177
https://access.redhat.com/security/cve/CVE-2023-22006 CVE-2023-22006 CVE-2023-22006 https://access.redhat.com/security/cve/CVE-2023-22036 CVE-2023-22036 CVE-2023-22036 https://access.redhat.com/security/cve/CVE-2023-22041 CVE-2023-22041 CVE-2023-22041 https://access.redhat.com/security/cve/CVE-2023-22044 CVE-2023-22044 CVE-2023-22044 https://access.redhat.com/security/cve/CVE-2023-22045 CVE-2023-22045 CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 CVE-2023-22049 CVE-2023-22049 https://access.redhat.com/security/cve/CVE-2023-25193 CVE-2023-25193 CVE-2023-25193 https://bugzilla.redhat.com/2167254 2167254 https://bugzilla.redhat.com/2221626 2221626 https://bugzilla.redhat.com/2221634 2221634 https://bugzilla.redhat.com/2221642 2221642 https://bugzilla.redhat.com/2221645 2221645 https://bugzilla.redhat.com/2221647 2221647 https://bugzilla.redhat.com/2223207 2223207 https://errata.almalinux.org/9/ALSA-2023-4177.html ALSA-2023:4177 ALSA-2023:4177 p8java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm y8java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm o8java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm v8java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm r8java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm w8java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm {8java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm s8java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm |8java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm t8java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm x8java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm u8java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm z8java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm q8java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm p8java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm y8java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm o8java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm v8java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm r8java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm w8java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm {8java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm s8java-17-openjdk-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm |8java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm t8java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm x8java-17-openjdk-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm u8java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm z8java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9.x86_64.rpm q8java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9.x86_64.rpm ���{� ��sBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security and bug fix update
��e�yhttps://access.redhat.com/errata/RHSA-2023:4178 RHSA-2023:4178 RHSA-2023:4178
https://access.redhat.com/security/cve/CVE-2023-22045 CVE-2023-22045 CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 CVE-2023-22049 CVE-2023-22049 https://bugzilla.redhat.com/2221645 2221645 https://bugzilla.redhat.com/2221647 2221647 https://errata.almalinux.org/9/ALSA-2023-4178.html ALSA-2023:4178 ALSA-2023:4178
�Vjava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �
Vjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm � Vjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm
�Vjava-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �
Vjava-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm �Vjava-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9.x86_64.rpm � Vjava-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9.x86_64.rpm ���-�
��GBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security and bug fix update
��^�https://access.redhat.com/errata/RHSA-2023:4325 RHSA-2023:4325 RHSA-2023:4325
https://access.redhat.com/security/cve/CVE-2023-3347 CVE-2023-3347 CVE-2023-3347 https://bugzilla.redhat.com/2222792 2222792 https://errata.almalinux.org/9/ALSA-2023-4325.html ALSA-2023:4325 ALSA-2023:4325 �PJlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �OJlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �Jlibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm �Jpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm �Jpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpm �PJlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �$Jsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpm �bJsamba-test-4.17.5-103.el9_2.alma.x86_64.rpm �cJsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm �Jlibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm � Jpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpm �OJlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �SJsamba-devel-4.17.5-103.el9_2.alma.i686.rpm �SJsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm �PJlibwbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �OJlibsmbclient-devel-4.17.5-103.el9_2.alma.i686.rpm �Jlibnetapi-devel-4.17.5-103.el9_2.alma.x86_64.rpm �Jpython3-samba-devel-4.17.5-103.el9_2.alma.i686.rpm �Jpython3-samba-devel-4.17.5-103.el9_2.alma.x86_64.rpm �PJlibwbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �$Jsamba-pidl-4.17.5-103.el9_2.alma.noarch.rpm �bJsamba-test-4.17.5-103.el9_2.alma.x86_64.rpm �cJsamba-test-libs-4.17.5-103.el9_2.alma.x86_64.rpm �Jlibnetapi-devel-4.17.5-103.el9_2.alma.i686.rpm � Jpython3-samba-test-4.17.5-103.el9_2.alma.x86_64.rpm �OJlibsmbclient-devel-4.17.5-103.el9_2.alma.x86_64.rpm �SJsamba-devel-4.17.5-103.el9_2.alma.i686.rpm �SJsamba-devel-4.17.5-103.el9_2.alma.x86_64.rpm ����<� ��]BBsecurity Important: kernel security, bug fix, and enhancement update ��f�0https://access.redhat.com/errata/RHSA-2023:4377 RHSA-2023:4377 RHSA-2023:4377
https://access.redhat.com/security/cve/CVE-2022-45869 CVE-2022-45869 CVE-2022-45869 https://access.redhat.com/security/cve/CVE-2023-0458 CVE-2023-0458 CVE-2023-0458 https://access.redhat.com/security/cve/CVE-2023-1998 CVE-2023-1998 CVE-2023-1998 https://access.redhat.com/security/cve/CVE-2023-3090 CVE-2023-3090 CVE-2023-3090 https://access.redhat.com/security/cve/CVE-2023-35788 CVE-2023-35788 CVE-2023-35788 https://bugzilla.redhat.com/2151317 2151317 https://bugzilla.redhat.com/2187257 2187257 https://bugzilla.redhat.com/2193219 2193219 https://bugzilla.redhat.com/2215768 2215768 https://bugzilla.redhat.com/2218672 2218672 https://errata.almalinux.org/9/ALSA-2023-4377.html ALSA-2023:4377 ALSA-2023:4377 �kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm �kernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm �kernel-cross-headers-5.14.0-284.25.1.el9_2.x86_64.rpm �kernel-tools-libs-devel-5.14.0-284.25.1.el9_2.x86_64.rpm ���0� ��asecurity Important: .NET 7.0 security, bug fix, and enhancement update ���https://access.redhat.com/errata/RHSA-2023:4642 RHSA-2023:4642 RHSA-2023:4642
https://access.redhat.com/security/cve/CVE-2023-35390 CVE-2023-35390 CVE-2023-35390 https://access.redhat.com/security/cve/CVE-2023-38180 CVE-2023-38180 CVE-2023-38180 https://bugzilla.redhat.com/2228621 2228621 https://bugzilla.redhat.com/2228622 2228622 https://errata.almalinux.org/9/ALSA-2023-4642.html ALSA-2023:4642 ALSA-2023:4642 �U�fdotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm �U�fdotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2.x86_64.rpm ���� ��csecurity Important: .NET 6.0 security, bug fix, and enhancement update ��-�https://access.redhat.com/errata/RHSA-2023:4644 RHSA-2023:4644 RHSA-2023:4644
https://access.redhat.com/security/cve/CVE-2023-35390 CVE-2023-35390 CVE-2023-35390 https://access.redhat.com/security/cve/CVE-2023-38180 CVE-2023-38180 CVE-2023-38180 https://bugzilla.redhat.com/2228621 2228621 https://bugzilla.redhat.com/2228622 2228622 https://errata.almalinux.org/9/ALSA-2023-4644.html ALSA-2023:4644 ALSA-2023:4644 n�Zdotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm n�Zdotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2.x86_64.rpm ����/� ��eBBBsecurity Important: flac security update ��D�whttps://access.redhat.com/errata/RHSA-2023:5048 RHSA-2023:5048 RHSA-2023:5048
https://access.redhat.com/security/cve/CVE-2020-22219 CVE-2020-22219 CVE-2020-22219 https://bugzilla.redhat.com/2235489 2235489 https://errata.almalinux.org/9/ALSA-2023-5048.html ALSA-2023:5048 ALSA-2023:5048 ��Lflac-1.3.3-10.el9_2.1.x86_64.rpm �_�Lflac-devel-1.3.3-10.el9_2.1.i686.rpm �_�Lflac-devel-1.3.3-10.el9_2.1.x86_64.rpm ��Lflac-1.3.3-10.el9_2.1.x86_64.rpm �_�Lflac-devel-1.3.3-10.el9_2.1.i686.rpm �_�Lflac-devel-1.3.3-10.el9_2.1.x86_64.rpm ����5� ��jsecurity Important: kernel security, bug fix, and enhancement update ��;�_https://access.redhat.com/errata/RHSA-2023:5069 RHSA-2023:5069 RHSA-2023:5069
https://access.redhat.com/security/cve/CVE-2023-1637 CVE-2023-1637 CVE-2023-1637 https://access.redhat.com/security/cve/CVE-2023-20593 CVE-2023-20593 CVE-2023-20593 https://access.redhat.com/security/cve/CVE-2023-21102 CVE-2023-21102 CVE-2023-21102 https://access.redhat.com/security/cve/CVE-2023-31248 CVE-2023-31248 CVE-2023-31248 https://access.redhat.com/security/cve/CVE-2023-3390 CVE-2023-3390 CVE-2023-3390 https://access.redhat.com/security/cve/CVE-2023-35001 CVE-2023-35001 CVE-2023-35001 https://access.redhat.com/security/cve/CVE-2023-3610 CVE-2023-3610 CVE-2023-3610 https://access.redhat.com/security/cve/CVE-2023-3776 CVE-2023-3776 CVE-2023-3776 https://access.redhat.com/security/cve/CVE-2023-4004 CVE-2023-4004 CVE-2023-4004 https://access.redhat.com/security/cve/CVE-2023-4147 CVE-2023-4147 CVE-2023-4147 https://bugzilla.redhat.com/2181891 2181891 https://bugzilla.redhat.com/2213260 2213260 https://bugzilla.redhat.com/2213455 2213455 https://bugzilla.redhat.com/2217845 2217845 https://bugzilla.redhat.com/2220892 2220892 https://bugzilla.redhat.com/2220893 2220893 https://bugzilla.redhat.com/2225097 2225097 https://bugzilla.redhat.com/2225198 2225198 https://bugzilla.redhat.com/2225239 2225239 https://bugzilla.redhat.com/2225275 2225275 https://errata.almalinux.org/9/ALSA-2023-5069.html ALSA-2023:5069 ALSA-2023:5069 �Tkernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm �Tkernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm ����x� ��lsecurity Moderate: .NET 6.0 security update
���Rhttps://access.redhat.com/errata/RHSA-2023:5143 RHSA-2023:5143 RHSA-2023:5143
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317 https://errata.almalinux.org/9/ALSA-2023-5143.html ALSA-2023:5143 ALSA-2023:5143 n�[dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm n�[dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2.x86_64.rpm ����}� ��nsecurity Moderate: .NET 7.0 security update
��l�Rhttps://access.redhat.com/errata/RHSA-2023:5146 RHSA-2023:5146 RHSA-2023:5146
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317 https://errata.almalinux.org/9/ALSA-2023-5146.html ALSA-2023:5146 ALSA-2023:5146 �U�gdotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm �U�gdotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2.x86_64.rpm ����n� ��psecurity Important: libwebp security update ��>�-https://access.redhat.com/errata/RHSA-2023:5214 RHSA-2023:5214 RHSA-2023:5214
https://access.redhat.com/security/cve/CVE-2023-4863 CVE-2023-4863 CVE-2023-4863 https://bugzilla.redhat.com/2238431 2238431 https://errata.almalinux.org/9/ALSA-2023-5214.html ALSA-2023:5214 ALSA-2023:5214 �N�4libwebp-tools-1.2.0-7.el9_2.x86_64.rpm �N�4libwebp-tools-1.2.0-7.el9_2.x86_64.rpm ����]� ��rBBBBBBBBBBBBsecurity Important: glibc security update ��k�
https://access.redhat.com/errata/RHSA-2023:5453 RHSA-2023:5453 RHSA-2023:5453
https://access.redhat.com/security/cve/CVE-2023-4527 CVE-2023-4527 CVE-2023-4527 https://access.redhat.com/security/cve/CVE-2023-4806 CVE-2023-4806 CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-4813 CVE-2023-4813 CVE-2023-4813 https://access.redhat.com/security/cve/CVE-2023-4911 CVE-2023-4911 CVE-2023-4911 https://bugzilla.redhat.com/2234712 2234712 https://bugzilla.redhat.com/2237782 2237782 https://bugzilla.redhat.com/2237798 2237798 https://bugzilla.redhat.com/2238352 2238352 https://errata.almalinux.org/9/ALSA-2023-5453.html ALSA-2023:5453 ALSA-2023:5453 �Mkglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpm �Nkglibc-static-2.34-60.el9_2.7.i686.rpm �Qknss_db-2.34-60.el9_2.7.i686.rpm �Mkglibc-nss-devel-2.34-60.el9_2.7.i686.rpm �Rknss_hesiod-2.34-60.el9_2.7.x86_64.rpm �Rknss_hesiod-2.34-60.el9_2.7.i686.rpm �Qknss_db-2.34-60.el9_2.7.x86_64.rpm �Nkglibc-static-2.34-60.el9_2.7.x86_64.rpm �_kglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm �Mkglibc-nss-devel-2.34-60.el9_2.7.x86_64.rpm �Nkglibc-static-2.34-60.el9_2.7.i686.rpm �Qknss_db-2.34-60.el9_2.7.i686.rpm �Mkglibc-nss-devel-2.34-60.el9_2.7.i686.rpm �Rknss_hesiod-2.34-60.el9_2.7.x86_64.rpm �Rknss_hesiod-2.34-60.el9_2.7.i686.rpm �Qknss_db-2.34-60.el9_2.7.x86_64.rpm �Nkglibc-static-2.34-60.el9_2.7.x86_64.rpm �_kglibc-benchtests-2.34-60.el9_2.7.x86_64.rpm ����m� ��ZB�fBBBBBBBBBsecurity Important: python3.11 security update ��w�ihttps://access.redhat.com/errata/RHSA-2023:5456 RHSA-2023:5456 RHSA-2023:5456
https://access.redhat.com/security/cve/CVE-2023-40217 CVE-2023-40217 CVE-2023-40217 https://bugzilla.redhat.com/2235789 2235789 https://errata.almalinux.org/9/ALSA-2023-5456.html ALSA-2023:5456 ALSA-2023:5456 �python3.11-idle-3.11.2-2.el9_2.2.i686.rpm �python3.11-debug-3.11.2-2.el9_2.2.x86_64.rpm �python3.11-debug-3.11.2-2.el9_2.2.i686.rpm a�python3.11-3.11.2-2.el9_2.2.i686.rpm �python3.11-test-3.11.2-2.el9_2.2.i686.rpm b�python3.11-tkinter-3.11.2-2.el9_2.2.i686.rpm �python3.11-test-3.11.2-2.el9_2.2.x86_64.rpm �python3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm �python3.11-idle-3.11.2-2.el9_2.2.i686.rpm �python3.11-debug-3.11.2-2.el9_2.2.x86_64.rpm �python3.11-debug-3.11.2-2.el9_2.2.i686.rpm a�python3.11-3.11.2-2.el9_2.2.i686.rpm �python3.11-test-3.11.2-2.el9_2.2.i686.rpm b�python3.11-tkinter-3.11.2-2.el9_2.2.i686.rpm �python3.11-test-3.11.2-2.el9_2.2.x86_64.rpm �python3.11-idle-3.11.2-2.el9_2.2.x86_64.rpm ����=� � �]BB�mBBBBsecurity Important: ghostscript security update ��`�https://access.redhat.com/errata/RHSA-2023:5459 RHSA-2023:5459 RHSA-2023:5459
https://access.redhat.com/security/cve/CVE-2023-36664 CVE-2023-36664 CVE-2023-36664 https://bugzilla.redhat.com/2217798 2217798 https://errata.almalinux.org/9/ALSA-2023-5459.html ALSA-2023:5459 ALSA-2023:5459 c�
libgs-devel-9.54.0-10.el9_2.i686.rpm �"�
ghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm �#�
ghostscript-tools-printing-9.54.0-10.el9_2.i686.rpm �!�
ghostscript-9.54.0-10.el9_2.i686.rpm c�
libgs-devel-9.54.0-10.el9_2.x86_64.rpm c�
libgs-devel-9.54.0-10.el9_2.i686.rpm �"�
ghostscript-tools-fonts-9.54.0-10.el9_2.i686.rpm �#�
ghostscript-tools-printing-9.54.0-10.el9_2.i686.rpm �!�
ghostscript-9.54.0-10.el9_2.i686.rpm c�
libgs-devel-9.54.0-10.el9_2.x86_64.rpm ����\� �"�a�U�]BBBBBBBBBsecurity Important: python3.9 security update ��q�https://access.redhat.com/errata/RHSA-2023:5462 RHSA-2023:5462 RHSA-2023:5462
https://access.redhat.com/security/cve/CVE-2023-40217 CVE-2023-40217 CVE-2023-40217 https://bugzilla.redhat.com/2235789 2235789 https://errata.almalinux.org/9/ALSA-2023-5462.html ALSA-2023:5462 ALSA-2023:5462 N�0python3-tkinter-3.9.16-1.el9_2.2.i686.rpm �0python3-idle-3.9.16-1.el9_2.2.x86_64.rpm �0python3-test-3.9.16-1.el9_2.2.x86_64.rpm �0python3-debug-3.9.16-1.el9_2.2.i686.rpm �0python3-test-3.9.16-1.el9_2.2.i686.rpm �0python3-idle-3.9.16-1.el9_2.2.i686.rpm �0python3-debug-3.9.16-1.el9_2.2.x86_64.rpm M�0python3-3.9.16-1.el9_2.2.i686.rpm N�0python3-tkinter-3.9.16-1.el9_2.2.i686.rpm �0python3-idle-3.9.16-1.el9_2.2.x86_64.rpm �0python3-test-3.9.16-1.el9_2.2.x86_64.rpm �0python3-debug-3.9.16-1.el9_2.2.i686.rpm �0python3-test-3.9.16-1.el9_2.2.i686.rpm �0python3-idle-3.9.16-1.el9_2.2.i686.rpm �0python3-debug-3.9.16-1.el9_2.2.x86_64.rpm M�0python3-3.9.16-1.el9_2.2.i686.rpm ����I� �#�\Bsecurity Important: libvpx security update ���https://access.redhat.com/errata/RHSA-2023:5539 RHSA-2023:5539 RHSA-2023:5539
https://access.redhat.com/security/cve/CVE-2023-44488 CVE-2023-44488 CVE-2023-44488 https://access.redhat.com/security/cve/CVE-2023-5217 CVE-2023-5217 CVE-2023-5217 https://bugzilla.redhat.com/2241191 2241191 https://bugzilla.redhat.com/2241806 2241806 https://errata.almalinux.org/9/ALSA-2023-5539.html ALSA-2023:5539 ALSA-2023:5539 ��9libvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm ��9libvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm ��9libvpx-devel-1.9.0-7.el9_2.alma.1.i686.rpm ��9libvpx-devel-1.9.0-7.el9_2.alma.1.x86_64.rpm ����x� �$�_BBBBsecurity Important: galera and mariadb security update ���Uhttps://access.redhat.com/errata/RHSA-2023:5684 RHSA-2023:5684 RHSA-2023:5684
https://access.redhat.com/security/cve/CVE-2022-32081 CVE-2022-32081 CVE-2022-32081 https://access.redhat.com/security/cve/CVE-2022-32082 CVE-2022-32082 CVE-2022-32082 https://access.redhat.com/security/cve/CVE-2022-32084 CVE-2022-32084 CVE-2022-32084 https://access.redhat.com/security/cve/CVE-2022-32089 CVE-2022-32089 CVE-2022-32089 https://access.redhat.com/security/cve/CVE-2022-32091 CVE-2022-32091 CVE-2022-32091 https://access.redhat.com/security/cve/CVE-2022-38791 CVE-2022-38791 CVE-2022-38791 https://access.redhat.com/security/cve/CVE-2022-47015 CVE-2022-47015 CVE-2022-47015 https://access.redhat.com/security/cve/CVE-2023-5157 CVE-2023-5157 CVE-2023-5157 https://bugzilla.redhat.com/2106028 2106028 https://bugzilla.redhat.com/2106030 2106030 https://bugzilla.redhat.com/2106034 2106034 https://bugzilla.redhat.com/2106035 2106035 https://bugzilla.redhat.com/2106042 2106042 https://bugzilla.redhat.com/2130105 2130105 https://bugzilla.redhat.com/2163609 2163609 https://bugzilla.redhat.com/2240246 2240246 https://errata.almalinux.org/9/ALSA-2023-5684.html ALSA-2023:5684 ALSA-2023:5684 �E�umariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm �D�umariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm �C�umariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm �E�umariadb-test-10.5.22-1.el9_2.alma.1.x86_64.rpm �D�umariadb-embedded-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm �C�umariadb-devel-10.5.22-1.el9_2.alma.1.x86_64.rpm ����0� �&�e�ABBBsecurity Important: bind security update ��e�Ehttps://access.redhat.com/errata/RHSA-2023:5689 RHSA-2023:5689 RHSA-2023:5689
https://access.redhat.com/security/cve/CVE-2023-3341 CVE-2023-3341 CVE-2023-3341 https://bugzilla.redhat.com/2239621 2239621 https://errata.almalinux.org/9/ALSA-2023-5689.html ALSA-2023:5689 ALSA-2023:5689 O�Qbind-devel-9.16.23-11.el9_2.2.i686.rpm �^�Qbind-libs-9.16.23-11.el9_2.2.i686.rpm ��Qbind-doc-9.16.23-11.el9_2.2.noarch.rpm O�Qbind-devel-9.16.23-11.el9_2.2.x86_64.rpm O�Qbind-devel-9.16.23-11.el9_2.2.i686.rpm �^�Qbind-libs-9.16.23-11.el9_2.2.i686.rpm ��Qbind-doc-9.16.23-11.el9_2.2.noarch.rpm O�Qbind-devel-9.16.23-11.el9_2.2.x86_64.rpm ����~� �'�jsecurity Important: dotnet6.0 security update ��*�ohttps://access.redhat.com/errata/RHSA-2023:5708 RHSA-2023:5708 RHSA-2023:5708
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5708.html ALSA-2023:5708 ALSA-2023:5708 n�\dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm n�\dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2.x86_64.rpm ����p� �(�lsecurity Moderate: nginx security update
���Qhttps://access.redhat.com/errata/RHSA-2023:5711 RHSA-2023:5711 RHSA-2023:5711
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5711.html ALSA-2023:5711 ALSA-2023:5711 ��9nginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm ��9nginx-mod-devel-1.20.1-14.el9_2.1.alma.1.x86_64.rpm ����;� �)�nBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update
��j�Ehttps://access.redhat.com/errata/RHSA-2023:5733 RHSA-2023:5733 RHSA-2023:5733
https://access.redhat.com/security/cve/CVE-2022-40433 CVE-2022-40433 CVE-2022-40433 https://access.redhat.com/security/cve/CVE-2023-22067 CVE-2023-22067 CVE-2023-22067 https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2237709 2237709 https://bugzilla.redhat.com/2243627 2243627 https://bugzilla.redhat.com/2243637 2243637 https://errata.almalinux.org/9/ALSA-2023-5733.html ALSA-2023:5733 ALSA-2023:5733
�Wjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �
Wjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm � Wjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm
�Wjava-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �
Wjava-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm � Wjava-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm �Wjava-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9.x86_64.rpm ���� �*�BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security and bug fix update
��/�&https://access.redhat.com/errata/RHSA-2023:5744 RHSA-2023:5744 RHSA-2023:5744
https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2243627 2243627 https://errata.almalinux.org/9/ALSA-2023-5744.html ALSA-2023:5744 ALSA-2023:5744 �l'java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �b'java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �m'java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �e'java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �f'java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �a'java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �h'java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �c'java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �k'java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �g'java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �i'java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �j'java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �d'java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �n'java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �l'java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �b'java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �m'java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �e'java-11-openjdk-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �f'java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �a'java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �h'java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �c'java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �k'java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9.x86_64.rpm �g'java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �i'java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �j'java-11-openjdk-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �d'java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm �n'java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9.x86_64.rpm ��˶
�! �+�^security Important: .NET 7.0 security update ��U�ohttps://access.redhat.com/errata/RHSA-2023:5749 RHSA-2023:5749 RHSA-2023:5749
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5749.html ALSA-2023:5749 ALSA-2023:5749 �U�hdotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm �U�hdotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2.x86_64.rpm �����" �,�`BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security and bug fix update
��D�<https://access.redhat.com/errata/RHSA-2023:5753 RHSA-2023:5753 RHSA-2023:5753
https://access.redhat.com/security/cve/CVE-2023-22025 CVE-2023-22025 CVE-2023-22025 https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2243627 2243627 https://bugzilla.redhat.com/2243805 2243805 https://errata.almalinux.org/9/ALSA-2023-5753.html ALSA-2023:5753 ALSA-2023:5753 {9java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm r9java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm t9java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm |9java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm w9java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm y9java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm u9java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm q9java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm p9java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm v9java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm z9java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm s9java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm x9java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm o9java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm {9java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm r9java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm t9java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm |9java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm w9java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm y9java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm u9java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm q9java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm p9java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm v9java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm z9java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm s9java-17-openjdk-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm x9java-17-openjdk-slowdebug-17.0.9.0.9-2.el9.x86_64.rpm o9java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9.x86_64.rpm ��˩n�# �6�|BBBsecurity Important: nghttp2 security update �� �-https://access.redhat.com/errata/RHSA-2023:5838 RHSA-2023:5838 RHSA-2023:5838
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5838.html ALSA-2023:5838 ALSA-2023:5838 �~�Mnghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��Mlibnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm ��Mlibnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm �~�Mnghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��Mlibnghttp2-devel-1.43.0-5.el9_2.1.x86_64.rpm ��Mlibnghttp2-devel-1.43.0-5.el9_2.1.i686.rpm ��Ù1�$ �-�ABsecurity Important: varnish security update ��-�https://access.redhat.com/errata/RHSA-2023:5924 RHSA-2023:5924 RHSA-2023:5924
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5924.html ALSA-2023:5924 ALSA-2023:5924 ��fvarnish-devel-6.6.2-3.el9_2.1.i686.rpm ��fvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpm ��fvarnish-devel-6.6.2-3.el9_2.1.i686.rpm ��fvarnish-devel-6.6.2-3.el9_2.1.x86_64.rpm ����z�% �.�Dsecurity Moderate: .NET 6.0 security update
��=�Qhttps://access.redhat.com/errata/RHSA-2023:6242 RHSA-2023:6242 RHSA-2023:6242
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317 https://errata.almalinux.org/9/ALSA-2023-6242.html ALSA-2023:6242 ALSA-2023:6242 n�]dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm n�]dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2.x86_64.rpm �����&�! �/�Fsecurity Moderate: .NET 7.0 security update
���Qhttps://access.redhat.com/errata/RHSA-2023:6246 RHSA-2023:6246 RHSA-2023:6246
https://access.redhat.com/security/cve/CVE-2023-36799 CVE-2023-36799 CVE-2023-36799 https://bugzilla.redhat.com/2237317 2237317 https://errata.almalinux.org/9/ALSA-2023-6246.html ALSA-2023:6246 ALSA-2023:6246 �U�idotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm �U�idotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2.x86_64.rpm ����I�' �3�pBB�WBBBBsecurity Important: ghostscript security update ��_�https://access.redhat.com/errata/RHSA-2023:6265 RHSA-2023:6265 RHSA-2023:6265
https://access.redhat.com/security/cve/CVE-2023-43115 CVE-2023-43115 CVE-2023-43115 https://bugzilla.redhat.com/2241108 2241108 https://errata.almalinux.org/9/ALSA-2023-6265.html ALSA-2023:6265 ALSA-2023:6265 �!�ghostscript-9.54.0-11.el9_2.i686.rpm c�libgs-devel-9.54.0-11.el9_2.i686.rpm c�libgs-devel-9.54.0-11.el9_2.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm �"�ghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm �!�ghostscript-9.54.0-11.el9_2.i686.rpm c�libgs-devel-9.54.0-11.el9_2.i686.rpm c�libgs-devel-9.54.0-11.el9_2.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-11.el9_2.i686.rpm �"�ghostscript-tools-fonts-9.54.0-11.el9_2.i686.rpm ����~�( �6�tB�ZBsecurity Moderate: edk2 security, bug fix, and enhancement update
��`�Bhttps://access.redhat.com/errata/RHSA-2023:6330 RHSA-2023:6330 RHSA-2023:6330
https://access.redhat.com/security/cve/CVE-2019-14560 CVE-2019-14560 CVE-2019-14560 https://access.redhat.com/security/cve/CVE-2023-2650 CVE-2023-2650 CVE-2023-2650 https://bugzilla.redhat.com/1858038 1858038 https://bugzilla.redhat.com/2207947 2207947 https://errata.almalinux.org/9/ALSA-2023-6330.html ALSA-2023:6330 ALSA-2023:6330 ��dedk2-tools-20230524-3.el9.x86_64.rpm �K�dedk2-aarch64-20230524-3.el9.noarch.rpm �L�dedk2-tools-doc-20230524-3.el9.noarch.rpm � �dedk2-ovmf-20230524-3.el9.noarch.rpm ��dedk2-tools-20230524-3.el9.x86_64.rpm �K�dedk2-aarch64-20230524-3.el9.noarch.rpm �L�dedk2-tools-doc-20230524-3.el9.noarch.rpm � �dedk2-ovmf-20230524-3.el9.noarch.rpm ����) �7�QBBsecurity Moderate: xorg-x11-server security and bug fix update
��"�https://access.redhat.com/errata/RHSA-2023:6340 RHSA-2023:6340 RHSA-2023:6340
https://access.redhat.com/security/cve/CVE-2023-1393 CVE-2023-1393 CVE-2023-1393 https://bugzilla.redhat.com/2180288 2180288 https://errata.almalinux.org/9/ALSA-2023-6340.html ALSA-2023:6340 ALSA-2023:6340 d�pxorg-x11-server-devel-1.20.11-19.el9.i686.rpm �_�pxorg-x11-server-source-1.20.11-19.el9.noarch.rpm d�pxorg-x11-server-devel-1.20.11-19.el9.x86_64.rpm d�pxorg-x11-server-devel-1.20.11-19.el9.i686.rpm �_�pxorg-x11-server-source-1.20.11-19.el9.noarch.rpm d�pxorg-x11-server-devel-1.20.11-19.el9.x86_64.rpm ����P�* �8�UBsecurity Moderate: LibRaw security update
��&�Ghttps://access.redhat.com/errata/RHSA-2023:6343 RHSA-2023:6343 RHSA-2023:6343
https://access.redhat.com/security/cve/CVE-2021-32142 CVE-2021-32142 CVE-2021-32142 https://bugzilla.redhat.com/2172004 2172004 https://errata.almalinux.org/9/ALSA-2023-6343.html ALSA-2023:6343 ALSA-2023:6343 �Z�LibRaw-devel-0.20.2-6.el9.x86_64.rpm �Z�LibRaw-devel-0.20.2-6.el9.i686.rpm �Z�LibRaw-devel-0.20.2-6.el9.x86_64.rpm �Z�LibRaw-devel-0.20.2-6.el9.i686.rpm �����+ �9�XBBsecurity Moderate: qt5 security and bug fix update
��m�https://access.redhat.com/errata/RHSA-2023:6369 RHSA-2023:6369 RHSA-2023:6369
https://access.redhat.com/security/cve/CVE-2023-32573 CVE-2023-32573 CVE-2023-32573 https://access.redhat.com/security/cve/CVE-2023-33285 CVE-2023-33285 CVE-2023-33285 https://access.redhat.com/security/cve/CVE-2023-34410 CVE-2023-34410 CVE-2023-34410 https://access.redhat.com/security/cve/CVE-2023-37369 CVE-2023-37369 CVE-2023-37369 https://access.redhat.com/security/cve/CVE-2023-38197 CVE-2023-38197 CVE-2023-38197 https://bugzilla.redhat.com/2208135 2208135 https://bugzilla.redhat.com/2209488 2209488 https://bugzilla.redhat.com/2212747 2212747 https://bugzilla.redhat.com/2222767 2222767 https://bugzilla.redhat.com/2232173 2232173 https://errata.almalinux.org/9/ALSA-2023-6369.html ALSA-2023:6369 ALSA-2023:6369 �1�qt5-devel-5.15.9-1.el9.noarch.rpm ��`qt5-qtbase-static-5.15.9-7.el9.x86_64.rpm ��`qt5-qtbase-static-5.15.9-7.el9.i686.rpm �1�qt5-devel-5.15.9-1.el9.noarch.rpm ��`qt5-qtbase-static-5.15.9-7.el9.x86_64.rpm ��`qt5-qtbase-static-5.15.9-7.el9.i686.rpm ����]�, �:�\BBBBBBsecurity Moderate: libvirt security, bug fix, and enhancement update
��
�https://access.redhat.com/errata/RHSA-2023:6409 RHSA-2023:6409 RHSA-2023:6409
https://access.redhat.com/security/cve/CVE-2023-3750 CVE-2023-3750 CVE-2023-3750 https://bugzilla.redhat.com/2222210 2222210 https://errata.almalinux.org/9/ALSA-2023-6409.html ALSA-2023:6409 ALSA-2023:6409 �)�'libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm �(�'libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm �)�'libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm �B�'libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm �)�'libvirt-client-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm �(�'libvirt-devel-9.5.0-7.el9_3.alma.1.x86_64.rpm �)�'libvirt-docs-9.5.0-7.el9_3.alma.1.x86_64.rpm �B�'libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3.alma.1.x86_64.rpm ����O�- �;�dsecurity Moderate: libfastjson security update
���[https://access.redhat.com/errata/RHSA-2023:6431 RHSA-2023:6431 RHSA-2023:6431
https://access.redhat.com/security/cve/CVE-2020-12762 CVE-2020-12762 CVE-2020-12762 https://bugzilla.redhat.com/1835253 1835253 https://errata.almalinux.org/9/ALSA-2023-6431.html ALSA-2023:6431 ALSA-2023:6431 �H�2libfastjson-devel-0.99.9-5.el9.x86_64.rpm �H�2libfastjson-devel-0.99.9-5.el9.x86_64.rpm ����v�. �<�fBsecurity Moderate: wireshark security update
��t�Ghttps://access.redhat.com/errata/RHSA-2023:6469 RHSA-2023:6469 RHSA-2023:6469
https://access.redhat.com/security/cve/CVE-2023-0666 CVE-2023-0666 CVE-2023-0666 https://access.redhat.com/security/cve/CVE-2023-0668 CVE-2023-0668 CVE-2023-0668 https://access.redhat.com/security/cve/CVE-2023-2855 CVE-2023-2855 CVE-2023-2855 https://access.redhat.com/security/cve/CVE-2023-2856 CVE-2023-2856 CVE-2023-2856 https://access.redhat.com/security/cve/CVE-2023-2858 CVE-2023-2858 CVE-2023-2858 https://access.redhat.com/security/cve/CVE-2023-2952 CVE-2023-2952 CVE-2023-2952 https://bugzilla.redhat.com/2210822 2210822 https://bugzilla.redhat.com/2210824 2210824 https://bugzilla.redhat.com/2210829 2210829 https://bugzilla.redhat.com/2210832 2210832 https://bugzilla.redhat.com/2210835 2210835 https://bugzilla.redhat.com/2211406 2211406 https://errata.almalinux.org/9/ALSA-2023-6469.html ALSA-2023:6469 ALSA-2023:6469 �@�Bwireshark-devel-3.4.10-6.el9.x86_64.rpm �@�Bwireshark-devel-3.4.10-6.el9.i686.rpm �@�Bwireshark-devel-3.4.10-6.el9.x86_64.rpm �@�Bwireshark-devel-3.4.10-6.el9.i686.rpm �����/ �=�iBsecurity Moderate: librabbitmq security update
��;�Whttps://access.redhat.com/errata/RHSA-2023:6482 RHSA-2023:6482 RHSA-2023:6482
https://access.redhat.com/security/cve/CVE-2023-35789 CVE-2023-35789 CVE-2023-35789 https://bugzilla.redhat.com/2215762 2215762 https://errata.almalinux.org/9/ALSA-2023-6482.html ALSA-2023:6482 ALSA-2023:6482 �y�librabbitmq-devel-0.11.0-7.el9.i686.rpm �y�librabbitmq-devel-0.11.0-7.el9.x86_64.rpm �y�librabbitmq-devel-0.11.0-7.el9.i686.rpm �y�librabbitmq-devel-0.11.0-7.el9.x86_64.rpm �����0 � �~B�nBBBBBBBBBsecurity Moderate: python3.11 security update
���bhttps://access.redhat.com/errata/RHSA-2023:6494 RHSA-2023:6494 RHSA-2023:6494
https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://access.redhat.com/security/cve/CVE-2023-41105 CVE-2023-41105 CVE-2023-41105 https://bugzilla.redhat.com/2235795 2235795 https://bugzilla.redhat.com/263261 263261 https://errata.almalinux.org/9/ALSA-2023-6494.html ALSA-2023:6494 ALSA-2023:6494 �python3.11-idle-3.11.5-1.el9_3.x86_64.rpm �python3.11-debug-3.11.5-1.el9_3.x86_64.rpm a�python3.11-3.11.5-1.el9_3.i686.rpm �python3.11-debug-3.11.5-1.el9_3.i686.rpm b�python3.11-tkinter-3.11.5-1.el9_3.i686.rpm �python3.11-test-3.11.5-1.el9_3.x86_64.rpm �python3.11-test-3.11.5-1.el9_3.i686.rpm �python3.11-idle-3.11.5-1.el9_3.i686.rpm �python3.11-idle-3.11.5-1.el9_3.x86_64.rpm �python3.11-debug-3.11.5-1.el9_3.x86_64.rpm a�python3.11-3.11.5-1.el9_3.i686.rpm �python3.11-debug-3.11.5-1.el9_3.i686.rpm b�python3.11-tkinter-3.11.5-1.el9_3.i686.rpm �python3.11-test-3.11.5-1.el9_3.x86_64.rpm �python3.11-test-3.11.5-1.el9_3.i686.rpm �python3.11-idle-3.11.5-1.el9_3.i686.rpm ����?�1 ��wBBsecurity Moderate: libreoffice security update
��t�/
https://access.redhat.com/errata/RHSA-2023:6508 RHSA-2023:6508 RHSA-2023:6508
https://access.redhat.com/security/cve/CVE-2022-38745 CVE-2022-38745 CVE-2022-38745 https://access.redhat.com/security/cve/CVE-2023-0950 CVE-2023-0950 CVE-2023-0950 https://access.redhat.com/security/cve/CVE-2023-1183 CVE-2023-1183 CVE-2023-1183 https://access.redhat.com/security/cve/CVE-2023-2255 CVE-2023-2255 CVE-2023-2255 https://bugzilla.redhat.com/2182044 2182044 https://bugzilla.redhat.com/2208506 2208506 https://bugzilla.redhat.com/2210185 2210185 https://bugzilla.redhat.com/2210186 2210186 https://errata.almalinux.org/9/ALSA-2023-6508.html ALSA-2023:6508 ALSA-2023:6508 �`�libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm �`�libreoffice-sdk-7.1.8.1-11.el9.alma.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-11.el9.alma.x86_64.rpm �����2 ��BB�yBBBsecurity Moderate: flatpak security, bug fix, and enhancement update
��#�whttps://access.redhat.com/errata/RHSA-2023:6518 RHSA-2023:6518 RHSA-2023:6518
https://access.redhat.com/security/cve/CVE-2023-28100 CVE-2023-28100 CVE-2023-28100 https://access.redhat.com/security/cve/CVE-2023-28101 CVE-2023-28101 CVE-2023-28101 https://bugzilla.redhat.com/2179219 2179219 https://bugzilla.redhat.com/2179220 2179220 https://errata.almalinux.org/9/ALSA-2023-6518.html ALSA-2023:6518 ALSA-2023:6518 ��,flatpak-devel-1.12.8-1.el9.i686.rpm �|�,flatpak-1.12.8-1.el9.i686.rpm �}�,flatpak-session-helper-1.12.8-1.el9.i686.rpm ��,flatpak-devel-1.12.8-1.el9.x86_64.rpm ��,flatpak-devel-1.12.8-1.el9.i686.rpm �|�,flatpak-1.12.8-1.el9.i686.rpm �}�,flatpak-session-helper-1.12.8-1.el9.i686.rpm ��,flatpak-devel-1.12.8-1.el9.x86_64.rpm ����T�3 ��EBB�zBBBBsecurity Moderate: ghostscript security and bug fix update
���rhttps://access.redhat.com/errata/RHSA-2023:6544 RHSA-2023:6544 RHSA-2023:6544
https://access.redhat.com/security/cve/CVE-2023-28879 CVE-2023-28879 CVE-2023-28879 https://access.redhat.com/security/cve/CVE-2023-38559 CVE-2023-38559 CVE-2023-38559 https://bugzilla.redhat.com/2184585 2184585 https://bugzilla.redhat.com/2224367 2224367 https://errata.almalinux.org/9/ALSA-2023-6544.html ALSA-2023:6544 ALSA-2023:6544 �"�ghostscript-tools-fonts-9.54.0-13.el9.i686.rpm c�libgs-devel-9.54.0-13.el9.x86_64.rpm �!�ghostscript-9.54.0-13.el9.i686.rpm �#�ghostscript-tools-printing-9.54.0-13.el9.i686.rpm c�libgs-devel-9.54.0-13.el9.i686.rpm �"�ghostscript-tools-fonts-9.54.0-13.el9.i686.rpm c�libgs-devel-9.54.0-13.el9.x86_64.rpm �!�ghostscript-9.54.0-13.el9.i686.rpm �#�ghostscript-tools-printing-9.54.0-13.el9.i686.rpm c�libgs-devel-9.54.0-13.el9.i686.rpm �����4 � �FBsecurity Moderate: yajl security update
���,https://access.redhat.com/errata/RHSA-2023:6551 RHSA-2023:6551 RHSA-2023:6551
https://access.redhat.com/security/cve/CVE-2023-33460 CVE-2023-33460 CVE-2023-33460 https://bugzilla.redhat.com/2221249 2221249 https://errata.almalinux.org/9/ALSA-2023-6551.html ALSA-2023:6551 ALSA-2023:6551 ��Fyajl-devel-2.1.0-22.el9.i686.rpm ��Fyajl-devel-2.1.0-22.el9.x86_64.rpm ��Fyajl-devel-2.1.0-22.el9.i686.rpm ��Fyajl-devel-2.1.0-22.el9.x86_64.rpm �����5 �
�IBBsecurity Moderate: libmicrohttpd security update
��8�~https://access.redhat.com/errata/RHSA-2023:6566 RHSA-2023:6566 RHSA-2023:6566
https://access.redhat.com/security/cve/CVE-2023-27371 CVE-2023-27371 CVE-2023-27371 https://bugzilla.redhat.com/2174313 2174313 https://errata.almalinux.org/9/ALSA-2023-6566.html ALSA-2023:6566 ALSA-2023:6566 �w�vlibmicrohttpd-devel-0.9.72-5.el9.i686.rpm �w�vlibmicrohttpd-devel-0.9.72-5.el9.x86_64.rpm ��vlibmicrohttpd-doc-0.9.72-5.el9.noarch.rpm �w�vlibmicrohttpd-devel-0.9.72-5.el9.i686.rpm �w�vlibmicrohttpd-devel-0.9.72-5.el9.x86_64.rpm ��vlibmicrohttpd-doc-0.9.72-5.el9.noarch.rpm ����V�6 ��Msecurity Moderate: libtiff security update
��6�Nhttps://access.redhat.com/errata/RHSA-2023:6575 RHSA-2023:6575 RHSA-2023:6575
https://access.redhat.com/security/cve/CVE-2023-26965 CVE-2023-26965 CVE-2023-26965 https://access.redhat.com/security/cve/CVE-2023-26966 CVE-2023-26966 CVE-2023-26966 https://access.redhat.com/security/cve/CVE-2023-2731 CVE-2023-2731 CVE-2023-2731 https://access.redhat.com/security/cve/CVE-2023-3316 CVE-2023-3316 CVE-2023-3316 https://access.redhat.com/security/cve/CVE-2023-3576 CVE-2023-3576 CVE-2023-3576 https://bugzilla.redhat.com/2207635 2207635 https://bugzilla.redhat.com/2215206 2215206 https://bugzilla.redhat.com/2216080 2216080 https://bugzilla.redhat.com/2218749 2218749 https://bugzilla.redhat.com/2219340 2219340 https://errata.almalinux.org/9/ALSA-2023-6575.html ALSA-2023:6575 ALSA-2023:6575 � �Ilibtiff-tools-4.4.0-10.el9.x86_64.rpm � �Ilibtiff-tools-4.4.0-10.el9.x86_64.rpm ����}�7 �7�OBBBBsecurity Moderate: protobuf-c security update
���}https://access.redhat.com/errata/RHSA-2023:6621 RHSA-2023:6621 RHSA-2023:6621
https://access.redhat.com/security/cve/CVE-2022-48468 CVE-2022-48468 CVE-2022-48468 https://bugzilla.redhat.com/2186673 2186673 https://errata.almalinux.org/9/ALSA-2023-6621.html ALSA-2023:6621 ALSA-2023:6621 ��Aprotobuf-c-devel-1.3.3-13.el9.i686.rpm ��Aprotobuf-c-compiler-1.3.3-13.el9.x86_64.rpm ��Aprotobuf-c-devel-1.3.3-13.el9.x86_64.rpm ��Aprotobuf-c-compiler-1.3.3-13.el9.i686.rpm ��Aprotobuf-c-devel-1.3.3-13.el9.i686.rpm ��Aprotobuf-c-compiler-1.3.3-13.el9.x86_64.rpm ��Aprotobuf-c-devel-1.3.3-13.el9.x86_64.rpm ��Aprotobuf-c-compiler-1.3.3-13.el9.i686.rpm ����_�8 ��UBsecurity Low: glib2 security and bug fix update �V���ohttps://access.redhat.com/errata/RHSA-2023:6631 RHSA-2023:6631 RHSA-2023:6631
https://access.redhat.com/security/cve/CVE-2023-29499 CVE-2023-29499 CVE-2023-29499 https://access.redhat.com/security/cve/CVE-2023-32611 CVE-2023-32611 CVE-2023-32611 https://access.redhat.com/security/cve/CVE-2023-32665 CVE-2023-32665 CVE-2023-32665 https://bugzilla.redhat.com/2211827 2211827 https://bugzilla.redhat.com/2211828 2211828 https://bugzilla.redhat.com/2211829 2211829 https://errata.almalinux.org/9/ALSA-2023-6631.html ALSA-2023:6631 ALSA-2023:6631 ��Hglib2-static-2.68.4-11.el9.x86_64.rpm ��Hglib2-static-2.68.4-11.el9.i686.rpm ��Hglib2-static-2.68.4-11.el9.x86_64.rpm ��Hglib2-static-2.68.4-11.el9.i686.rpm �����9 �8�XBsecurity Low: shadow-utils security and bug fix update �V��p�Yhttps://access.redhat.com/errata/RHSA-2023:6632 RHSA-2023:6632 RHSA-2023:6632
https://access.redhat.com/security/cve/CVE-2023-4641 CVE-2023-4641 CVE-2023-4641 https://bugzilla.redhat.com/2215945 2215945 https://errata.almalinux.org/9/ALSA-2023-6632.html ALSA-2023:6632 ALSA-2023:6632 �j�Tshadow-utils-subid-devel-4.9-8.el9.i686.rpm �j�Tshadow-utils-subid-devel-4.9-8.el9.x86_64.rpm �j�Tshadow-utils-subid-devel-4.9-8.el9.i686.rpm �j�Tshadow-utils-subid-devel-4.9-8.el9.x86_64.rpm �����: ��M�m�cBBBBBBBBBsecurity Moderate: python3.9 security update
��I� https://access.redhat.com/errata/RHSA-2023:6659 RHSA-2023:6659 RHSA-2023:6659
https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://bugzilla.redhat.com/263261 263261 https://errata.almalinux.org/9/ALSA-2023-6659.html ALSA-2023:6659 ALSA-2023:6659 �1python3-debug-3.9.18-1.el9_3.x86_64.rpm �1python3-test-3.9.18-1.el9_3.i686.rpm �1python3-test-3.9.18-1.el9_3.x86_64.rpm �1python3-debug-3.9.18-1.el9_3.i686.rpm M�1python3-3.9.18-1.el9_3.i686.rpm �1python3-idle-3.9.18-1.el9_3.x86_64.rpm �1python3-idle-3.9.18-1.el9_3.i686.rpm N�1python3-tkinter-3.9.18-1.el9_3.i686.rpm �1python3-debug-3.9.18-1.el9_3.x86_64.rpm �1python3-test-3.9.18-1.el9_3.i686.rpm �1python3-test-3.9.18-1.el9_3.x86_64.rpm �1python3-debug-3.9.18-1.el9_3.i686.rpm M�1python3-3.9.18-1.el9_3.i686.rpm �1python3-idle-3.9.18-1.el9_3.x86_64.rpm �1python3-idle-3.9.18-1.el9_3.i686.rpm N�1python3-tkinter-3.9.18-1.el9_3.i686.rpm ����E�; ��fBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update
��i�K
https://access.redhat.com/errata/RHSA-2023:6667 RHSA-2023:6667 RHSA-2023:6667
https://access.redhat.com/security/cve/CVE-2022-2127 CVE-2022-2127 CVE-2022-2127 https://access.redhat.com/security/cve/CVE-2023-34966 CVE-2023-34966 CVE-2023-34966 https://access.redhat.com/security/cve/CVE-2023-34967 CVE-2023-34967 CVE-2023-34967 https://access.redhat.com/security/cve/CVE-2023-34968 CVE-2023-34968 CVE-2023-34968 https://bugzilla.redhat.com/2222791 2222791 https://bugzilla.redhat.com/2222793 2222793 https://bugzilla.redhat.com/2222794 2222794 https://bugzilla.redhat.com/2222795 2222795 https://errata.almalinux.org/9/ALSA-2023-6667.html ALSA-2023:6667 ALSA-2023:6667 � Kpython3-samba-test-4.18.6-100.el9.x86_64.rpm �Klibnetapi-devel-4.18.6-100.el9.i686.rpm �OKlibsmbclient-devel-4.18.6-100.el9.x86_64.rpm �SKsamba-devel-4.18.6-100.el9.i686.rpm �PKlibwbclient-devel-4.18.6-100.el9.i686.rpm �$Ksamba-pidl-4.18.6-100.el9.noarch.rpm �Kpython3-samba-devel-4.18.6-100.el9.i686.rpm �cKsamba-test-libs-4.18.6-100.el9.x86_64.rpm �Kpython3-samba-devel-4.18.6-100.el9.x86_64.rpm �bKsamba-test-4.18.6-100.el9.x86_64.rpm �OKlibsmbclient-devel-4.18.6-100.el9.i686.rpm �PKlibwbclient-devel-4.18.6-100.el9.x86_64.rpm �SKsamba-devel-4.18.6-100.el9.x86_64.rpm �Klibnetapi-devel-4.18.6-100.el9.x86_64.rpm � Kpython3-samba-test-4.18.6-100.el9.x86_64.rpm �Klibnetapi-devel-4.18.6-100.el9.i686.rpm �OKlibsmbclient-devel-4.18.6-100.el9.x86_64.rpm �SKsamba-devel-4.18.6-100.el9.i686.rpm �PKlibwbclient-devel-4.18.6-100.el9.i686.rpm �$Ksamba-pidl-4.18.6-100.el9.noarch.rpm �Kpython3-samba-devel-4.18.6-100.el9.i686.rpm �cKsamba-test-libs-4.18.6-100.el9.x86_64.rpm �Kpython3-samba-devel-4.18.6-100.el9.x86_64.rpm �bKsamba-test-4.18.6-100.el9.x86_64.rpm �OKlibsmbclient-devel-4.18.6-100.el9.i686.rpm �PKlibwbclient-devel-4.18.6-100.el9.x86_64.rpm �SKsamba-devel-4.18.6-100.el9.x86_64.rpm �Klibnetapi-devel-4.18.6-100.el9.x86_64.rpm ����0�< �:�|Bsecurity Low: tpm2-tss security and enhancement update �V��4�Rhttps://access.redhat.com/errata/RHSA-2023:6685 RHSA-2023:6685 RHSA-2023:6685
https://access.redhat.com/security/cve/CVE-2023-22745 CVE-2023-22745 CVE-2023-22745 https://bugzilla.redhat.com/2162610 2162610 https://errata.almalinux.org/9/ALSA-2023-6685.html ALSA-2023:6685 ALSA-2023:6685 � �Xtpm2-tss-devel-3.2.2-2.el9.i686.rpm � �Xtpm2-tss-devel-3.2.2-2.el9.x86_64.rpm � �Xtpm2-tss-devel-3.2.2-2.el9.i686.rpm � �Xtpm2-tss-devel-3.2.2-2.el9.x86_64.rpm ���� �= �;�Bsecurity Low: procps-ng security and bug fix update �V���Hhttps://access.redhat.com/errata/RHSA-2023:6705 RHSA-2023:6705 RHSA-2023:6705
https://access.redhat.com/security/cve/CVE-2023-4016 CVE-2023-4016 CVE-2023-4016 https://bugzilla.redhat.com/2228494 2228494 https://errata.almalinux.org/9/ALSA-2023-6705.html ALSA-2023:6705 ALSA-2023:6705 ��\procps-ng-devel-3.3.17-13.el9.x86_64.rpm ��\procps-ng-devel-3.3.17-13.el9.i686.rpm ��\procps-ng-devel-3.3.17-13.el9.x86_64.rpm ��\procps-ng-devel-3.3.17-13.el9.i686.rpm ����#�> ��BBBBBBBBBBBBBBBBBsecurity Moderate: avahi security update
��N�https://access.redhat.com/errata/RHSA-2023:6707 RHSA-2023:6707 RHSA-2023:6707
https://access.redhat.com/security/cve/CVE-2021-3468 CVE-2021-3468 CVE-2021-3468 https://access.redhat.com/security/cve/CVE-2021-3502 CVE-2021-3502 CVE-2021-3502 https://access.redhat.com/security/cve/CVE-2023-1981 CVE-2023-1981 CVE-2023-1981 https://bugzilla.redhat.com/1939614 1939614 https://bugzilla.redhat.com/1946914 1946914 https://bugzilla.redhat.com/2185911 2185911 https://errata.almalinux.org/9/ALSA-2023-6707.html ALSA-2023:6707 ALSA-2023:6707 �8Qavahi-devel-0.8-15.el9.x86_64.rpm �6Qavahi-compat-libdns_sd-0.8-15.el9.i686.rpm �5Qavahi-compat-howl-devel-0.8-15.el9.i686.rpm �6Qavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm �5Qavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm �8Qavahi-devel-0.8-15.el9.i686.rpm �7Qavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm �9Qavahi-glib-devel-0.8-15.el9.i686.rpm �9Qavahi-glib-devel-0.8-15.el9.x86_64.rpm �4Qavahi-compat-howl-0.8-15.el9.i686.rpm �4Qavahi-compat-howl-0.8-15.el9.x86_64.rpm �7Qavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm �8Qavahi-devel-0.8-15.el9.x86_64.rpm �6Qavahi-compat-libdns_sd-0.8-15.el9.i686.rpm �5Qavahi-compat-howl-devel-0.8-15.el9.i686.rpm �6Qavahi-compat-libdns_sd-0.8-15.el9.x86_64.rpm �5Qavahi-compat-howl-devel-0.8-15.el9.x86_64.rpm �8Qavahi-devel-0.8-15.el9.i686.rpm �7Qavahi-compat-libdns_sd-devel-0.8-15.el9.x86_64.rpm �9Qavahi-glib-devel-0.8-15.el9.i686.rpm �9Qavahi-glib-devel-0.8-15.el9.x86_64.rpm �4Qavahi-compat-howl-0.8-15.el9.i686.rpm �4Qavahi-compat-howl-0.8-15.el9.x86_64.rpm �7Qavahi-compat-libdns_sd-devel-0.8-15.el9.i686.rpm �����? ��Tsecurity Moderate: python-wheel security update
��_�?https://access.redhat.com/errata/RHSA-2023:6712 RHSA-2023:6712 RHSA-2023:6712
https://access.redhat.com/security/cve/CVE-2022-40898 CVE-2022-40898 CVE-2022-40898 https://bugzilla.redhat.com/2165864 2165864 https://errata.almalinux.org/9/ALSA-2023-6712.html ALSA-2023:6712 ALSA-2023:6712 ��
python3-wheel-wheel-0.36.2-8.el9.noarch.rpm ��
python3-wheel-0.36.2-8.el9.noarch.rpm ��
python3-wheel-wheel-0.36.2-8.el9.noarch.rpm ��
python3-wheel-0.36.2-8.el9.noarch.rpm ����&�@ ��QBB�EBBBBsecurity Important: ghostscript security update ���https://access.redhat.com/errata/RHSA-2023:6732 RHSA-2023:6732 RHSA-2023:6732
https://access.redhat.com/security/cve/CVE-2023-43115 CVE-2023-43115 CVE-2023-43115 https://bugzilla.redhat.com/2241108 2241108 https://errata.almalinux.org/9/ALSA-2023-6732.html ALSA-2023:6732 ALSA-2023:6732 c�
libgs-devel-9.54.0-14.el9_3.i686.rpm �#�
ghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm �"�
ghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm �!�
ghostscript-9.54.0-14.el9_3.i686.rpm c�
libgs-devel-9.54.0-14.el9_3.x86_64.rpm c�
libgs-devel-9.54.0-14.el9_3.i686.rpm �#�
ghostscript-tools-printing-9.54.0-14.el9_3.i686.rpm �"�
ghostscript-tools-fonts-9.54.0-14.el9_3.i686.rpm �!�
ghostscript-9.54.0-14.el9_3.i686.rpm c�
libgs-devel-9.54.0-14.el9_3.x86_64.rpm �����A ��]BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security and bug fix update
���https://access.redhat.com/errata/RHSA-2023:6738 RHSA-2023:6738 RHSA-2023:6738
https://access.redhat.com/security/cve/CVE-2023-22025 CVE-2023-22025 CVE-2023-22025 https://access.redhat.com/security/cve/CVE-2023-22081 CVE-2023-22081 CVE-2023-22081 https://bugzilla.redhat.com/2243627 2243627 https://bugzilla.redhat.com/2243805 2243805 https://errata.almalinux.org/9/ALSA-2023-6738.html ALSA-2023:6738 ALSA-2023:6738 �u:java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �{:java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �r:java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �q:java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �t:java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �|:java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �o:java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �w:java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �y:java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �v:java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �z:java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �p:java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �s:java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �x:java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �u:java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �{:java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �r:java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �q:java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �t:java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �|:java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �o:java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �w:java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �y:java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �v:java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �z:java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �p:java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �s:java-21-openjdk-fastdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �x:java-21-openjdk-slowdebug-21.0.1.0.12-2.el9.alma.1.x86_64.rpm �����B ��yBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security update
��9�Yhttps://access.redhat.com/errata/RHSA-2023:6744 RHSA-2023:6744 RHSA-2023:6744
https://access.redhat.com/security/cve/CVE-2023-3961 CVE-2023-3961 CVE-2023-3961 https://access.redhat.com/security/cve/CVE-2023-4091 CVE-2023-4091 CVE-2023-4091 https://access.redhat.com/security/cve/CVE-2023-42669 CVE-2023-42669 CVE-2023-42669 https://bugzilla.redhat.com/2241881 2241881 https://bugzilla.redhat.com/2241882 2241882 https://bugzilla.redhat.com/2241884 2241884 https://errata.almalinux.org/9/ALSA-2023-6744.html ALSA-2023:6744 ALSA-2023:6744 �OLlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �PLlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �Llibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm � Lpython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �bLsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �Llibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpm �PLlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �$Lsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpm �cLsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �SLsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �Lpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �Lpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �SLsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �OLlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �OLlibsmbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �PLlibwbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �Llibnetapi-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm � Lpython3-samba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �bLsamba-test-4.18.6-101.el9_3.alma.1.x86_64.rpm �Llibnetapi-devel-4.18.6-101.el9_3.alma.1.i686.rpm �PLlibwbclient-devel-4.18.6-101.el9_3.alma.1.i686.rpm �$Lsamba-pidl-4.18.6-101.el9_3.alma.1.noarch.rpm �cLsamba-test-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �SLsamba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �Lpython3-samba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �Lpython3-samba-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �SLsamba-devel-4.18.6-101.el9_3.alma.1.i686.rpm �OLlibsmbclient-devel-4.18.6-101.el9_3.alma.1.x86_64.rpm �����C �<�OBBBsecurity Important: nghttp2 security update ���-https://access.redhat.com/errata/RHSA-2023:6746 RHSA-2023:6746 RHSA-2023:6746
https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-6746.html ALSA-2023:6746 ALSA-2023:6746 �~�Nnghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��Nlibnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm ��Nlibnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm �~�Nnghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��Nlibnghttp2-devel-1.43.0-5.el9_3.1.i686.rpm ��Nlibnghttp2-devel-1.43.0-5.el9_3.1.x86_64.rpm ����l�D ��Tsecurity Moderate: dotnet8.0 security update
��?�https://access.redhat.com/errata/RHSA-2023:7253 RHSA-2023:7253 RHSA-2023:7253
https://access.redhat.com/security/cve/CVE-2023-36049 CVE-2023-36049 CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36558 CVE-2023-36558 CVE-2023-36558 https://bugzilla.redhat.com/2247750 2247750 https://bugzilla.redhat.com/2248883 2248883 https://errata.almalinux.org/9/ALSA-2023-7253.html ALSA-2023:7253 ALSA-2023:7253 ��odotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm ��odotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3.x86_64.rpm ��ٍ�E ��Vsecurity Moderate: dotnet7.0 security update
��[�1https://access.redhat.com/errata/RHSA-2023:7255 RHSA-2023:7255 RHSA-2023:7255
https://access.redhat.com/security/cve/CVE-2023-36049 CVE-2023-36049 CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36558 CVE-2023-36558 CVE-2023-36558 https://bugzilla.redhat.com/2247750 2247750 https://bugzilla.redhat.com/2248883 2248883 https://errata.almalinux.org/9/ALSA-2023-7255.html ALSA-2023:7255 ALSA-2023:7255 �U�jdotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm �U�jdotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3.x86_64.rpm ����r�F ��Xsecurity Moderate: dotnet6.0 security update
���.https://access.redhat.com/errata/RHSA-2023:7257 RHSA-2023:7257 RHSA-2023:7257
https://access.redhat.com/security/cve/CVE-2023-36049 CVE-2023-36049 CVE-2023-36049 https://access.redhat.com/security/cve/CVE-2023-36558 CVE-2023-36558 CVE-2023-36558 https://bugzilla.redhat.com/2247750 2247750 https://bugzilla.redhat.com/2248883 2248883 https://errata.almalinux.org/9/ALSA-2023-7257.html ALSA-2023:7257 ALSA-2023:7257 n�^dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm n�^dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3.x86_64.rpm ��و9�G ��ZBBBBBBBBBBsecurity Important: postgresql security update ��:�
https://access.redhat.com/errata/RHSA-2023:7784 RHSA-2023:7784 RHSA-2023:7784
https://access.redhat.com/security/cve/CVE-2023-39417 CVE-2023-39417 CVE-2023-39417 https://access.redhat.com/security/cve/CVE-2023-5868 CVE-2023-5868 CVE-2023-5868 https://access.redhat.com/security/cve/CVE-2023-5869 CVE-2023-5869 CVE-2023-5869 https://access.redhat.com/security/cve/CVE-2023-5870 CVE-2023-5870 CVE-2023-5870 https://bugzilla.redhat.com/2228111 2228111 https://bugzilla.redhat.com/2247168 2247168 https://bugzilla.redhat.com/2247169 2247169 https://bugzilla.redhat.com/2247170 2247170 https://errata.almalinux.org/9/ALSA-2023-7784.html ALSA-2023:7784 ALSA-2023:7784 ��Ypostgresql-server-devel-13.13-1.el9_3.x86_64.rpm �~�Ypostgresql-private-devel-13.13-1.el9_3.x86_64.rpm ��Ypostgresql-test-13.13-1.el9_3.x86_64.rpm �}�Ypostgresql-docs-13.13-1.el9_3.x86_64.rpm ��Ypostgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm � �Ypostgresql-static-13.13-1.el9_3.x86_64.rpm ��Ypostgresql-server-devel-13.13-1.el9_3.x86_64.rpm �~�Ypostgresql-private-devel-13.13-1.el9_3.x86_64.rpm ��Ypostgresql-test-13.13-1.el9_3.x86_64.rpm �}�Ypostgresql-docs-13.13-1.el9_3.x86_64.rpm ��Ypostgresql-upgrade-devel-13.13-1.el9_3.x86_64.rpm � �Ypostgresql-static-13.13-1.el9_3.x86_64.rpm ����b�H ��fBsecurity Important: gstreamer1-plugins-bad-free security update ��@�https://access.redhat.com/errata/RHSA-2023:7791 RHSA-2023:7791 RHSA-2023:7791
https://access.redhat.com/security/cve/CVE-2023-44429 CVE-2023-44429 CVE-2023-44429 https://access.redhat.com/security/cve/CVE-2023-44446 CVE-2023-44446 CVE-2023-44446 https://bugzilla.redhat.com/2250247 2250247 https://bugzilla.redhat.com/2250249 2250249 https://errata.almalinux.org/9/ALSA-2023-7791.html ALSA-2023:7791 ALSA-2023:7791 �`�,gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm �`�,gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm �`�,gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm �`�,gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm ���M�I ��)security Moderate: ipa security update
��]�4https://access.redhat.com/errata/RHSA-2024:0141 RHSA-2024:0141 RHSA-2024:0141
https://access.redhat.com/security/cve/CVE-2023-5455 CVE-2023-5455 CVE-2023-5455 https://bugzilla.redhat.com/2242828 2242828 https://errata.almalinux.org/9/ALSA-2024-0141.html ALSA-2024:0141 ALSA-2024:0141 ��{python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm ��{python3-ipatests-4.10.2-5.el9_3.alma.1.noarch.rpm ����[�J ��jsecurity Important: .NET 7.0 security update ���ghttps://access.redhat.com/errata/RHSA-2024:0151 RHSA-2024:0151 RHSA-2024:0151
https://access.redhat.com/security/cve/CVE-2024-0056 CVE-2024-0056 CVE-2024-0056 https://access.redhat.com/security/cve/CVE-2024-0057 CVE-2024-0057 CVE-2024-0057 https://access.redhat.com/security/cve/CVE-2024-21319 CVE-2024-21319 CVE-2024-21319 https://bugzilla.redhat.com/2255384 2255384 https://bugzilla.redhat.com/2255386 2255386 https://bugzilla.redhat.com/2257566 2257566 https://errata.almalinux.org/9/ALSA-2024-0151.html ALSA-2024:0151 ALSA-2024:0151 �U�kdotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm �U�kdotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3.x86_64.rpm ����S�K ��lsecurity Important: .NET 8.0 security update ��x�fhttps://access.redhat.com/errata/RHSA-2024:0152 RHSA-2024:0152 RHSA-2024:0152
https://access.redhat.com/security/cve/CVE-2024-0056 CVE-2024-0056 CVE-2024-0056 https://access.redhat.com/security/cve/CVE-2024-0057 CVE-2024-0057 CVE-2024-0057 https://access.redhat.com/security/cve/CVE-2024-21319 CVE-2024-21319 CVE-2024-21319 https://bugzilla.redhat.com/2255384 2255384 https://bugzilla.redhat.com/2255386 2255386 https://bugzilla.redhat.com/2257566 2257566 https://errata.almalinux.org/9/ALSA-2024-0152.html ALSA-2024:0152 ALSA-2024:0152 ��pdotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm ��pdotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3.x86_64.rpm �����L ��nsecurity Important: .NET 6.0 security update ��^�ghttps://access.redhat.com/errata/RHSA-2024:0156 RHSA-2024:0156 RHSA-2024:0156
https://access.redhat.com/security/cve/CVE-2024-0056 CVE-2024-0056 CVE-2024-0056 https://access.redhat.com/security/cve/CVE-2024-0057 CVE-2024-0057 CVE-2024-0057 https://access.redhat.com/security/cve/CVE-2024-21319 CVE-2024-21319 CVE-2024-21319 https://bugzilla.redhat.com/2255384 2255384 https://bugzilla.redhat.com/2255386 2255386 https://bugzilla.redhat.com/2257566 2257566 https://errata.almalinux.org/9/ALSA-2024-0156.html ALSA-2024:0156 ALSA-2024:0156 n�_dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm n�_dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3.x86_64.rpm ����v�M � �pBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update ��E�!https://access.redhat.com/errata/RHSA-2024:0249 RHSA-2024:0249 RHSA-2024:0249
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257728 2257728 https://bugzilla.redhat.com/2257837 2257837 https://bugzilla.redhat.com/2257853 2257853 https://bugzilla.redhat.com/2257859 2257859 https://bugzilla.redhat.com/2257874 2257874 https://errata.almalinux.org/9/ALSA-2024-0249.html ALSA-2024:0249 ALSA-2024:0249 �w<java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �q<java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �u<java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �r<java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �|<java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �x<java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �v<java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �t<java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �s<java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �{<java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �p<java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �y<java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �o<java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �z<java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �w<java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �q<java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �u<java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �r<java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �|<java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �x<java-21-openjdk-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �v<java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �t<java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �s<java-21-openjdk-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �{<java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �p<java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �y<java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �o<java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �z<java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9.alma.1.x86_64.rpm �����N �!�LBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security and bug fix update ��f�1https://access.redhat.com/errata/RHSA-2024:0265 RHSA-2024:0265 RHSA-2024:0265
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20926 CVE-2024-20926 CVE-2024-20926 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257728 2257728 https://bugzilla.redhat.com/2257837 2257837 https://bugzilla.redhat.com/2257850 2257850 https://bugzilla.redhat.com/2257853 2257853 https://bugzilla.redhat.com/2257859 2257859 https://bugzilla.redhat.com/2257874 2257874 https://errata.almalinux.org/9/ALSA-2024-0265.html ALSA-2024:0265 ALSA-2024:0265
�Xjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm � Xjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �
Xjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm
�Xjava-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm � Xjava-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �
Xjava-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9.x86_64.rpm �Xjava-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9.x86_64.rpm �����O �"�`BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security update ���phttps://access.redhat.com/errata/RHSA-2024:0266 RHSA-2024:0266 RHSA-2024:0266
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20926 CVE-2024-20926 CVE-2024-20926 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257728 2257728 https://bugzilla.redhat.com/2257837 2257837 https://bugzilla.redhat.com/2257850 2257850 https://bugzilla.redhat.com/2257853 2257853 https://bugzilla.redhat.com/2257859 2257859 https://bugzilla.redhat.com/2257874 2257874 https://errata.almalinux.org/9/ALSA-2024-0266.html ALSA-2024:0266 ALSA-2024:0266 �h(java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �g(java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �j(java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �a(java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �d(java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �c(java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �l(java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �f(java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �b(java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �m(java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �e(java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �i(java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �n(java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �k(java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �h(java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �g(java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �j(java-11-openjdk-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �a(java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �d(java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �c(java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �l(java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �f(java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �b(java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �m(java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �e(java-11-openjdk-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm �i(java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �n(java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9.x86_64.rpm �k(java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9.x86_64.rpm ����C�P �#�|BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security and bug fix update ���*https://access.redhat.com/errata/RHSA-2024:0267 RHSA-2024:0267 RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20918 CVE-2024-20918 CVE-2024-20918 https://access.redhat.com/security/cve/CVE-2024-20919 CVE-2024-20919 CVE-2024-20919 https://access.redhat.com/security/cve/CVE-2024-20921 CVE-2024-20921 CVE-2024-20921 https://access.redhat.com/security/cve/CVE-2024-20932 CVE-2024-20932 CVE-2024-20932 https://access.redhat.com/security/cve/CVE-2024-20945 CVE-2024-20945 CVE-2024-20945 https://access.redhat.com/security/cve/CVE-2024-20952 CVE-2024-20952 CVE-2024-20952 https://bugzilla.redhat.com/2257720 2257720 https://bugzilla.redhat.com/2257728 2257728 https://bugzilla.redhat.com/2257837 2257837 https://bugzilla.redhat.com/2257853 2257853 https://bugzilla.redhat.com/2257859 2257859 https://bugzilla.redhat.com/2257874 2257874 https://errata.almalinux.org/9/ALSA-2024-0267.html ALSA-2024:0267 ALSA-2024:0267 u,java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm s,java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm o,java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm t,java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm {,java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm y,java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm q,java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm x,java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm r,java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm |,java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm z,java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm v,java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm w,java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm p,java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm u,java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm s,java-17-openjdk-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm o,java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm t,java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm {,java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm y,java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm q,java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm x,java-17-openjdk-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm r,java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm |,java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm z,java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm v,java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9.x86_64.rpm w,java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm p,java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9.x86_64.rpm ����3�Q �%�d�Z�\BBBBBBBBBsecurity Moderate: python3.9 security update
��1�chttps://access.redhat.com/errata/RHSA-2024:0466 RHSA-2024:0466 RHSA-2024:0466
https://access.redhat.com/security/cve/CVE-2023-27043 CVE-2023-27043 CVE-2023-27043 https://bugzilla.redhat.com/2196183 2196183 https://errata.almalinux.org/9/ALSA-2024-0466.html ALSA-2024:0466 ALSA-2024:0466 �2python3-idle-3.9.18-1.el9_3.1.i686.rpm N�2python3-tkinter-3.9.18-1.el9_3.1.i686.rpm �2python3-idle-3.9.18-1.el9_3.1.x86_64.rpm �2python3-debug-3.9.18-1.el9_3.1.i686.rpm �2python3-debug-3.9.18-1.el9_3.1.x86_64.rpm �2python3-test-3.9.18-1.el9_3.1.i686.rpm M�2python3-3.9.18-1.el9_3.1.i686.rpm �2python3-test-3.9.18-1.el9_3.1.x86_64.rpm �2python3-idle-3.9.18-1.el9_3.1.i686.rpm N�2python3-tkinter-3.9.18-1.el9_3.1.i686.rpm �2python3-idle-3.9.18-1.el9_3.1.x86_64.rpm �2python3-debug-3.9.18-1.el9_3.1.i686.rpm �2python3-debug-3.9.18-1.el9_3.1.x86_64.rpm �2python3-test-3.9.18-1.el9_3.1.i686.rpm M�2python3-3.9.18-1.el9_3.1.i686.rpm �2python3-test-3.9.18-1.el9_3.1.x86_64.rpm ��ˤ�R �&�csecurity Important: dotnet7.0 security update ���xhttps://access.redhat.com/errata/RHSA-2024:0805 RHSA-2024:0805 RHSA-2024:0805
https://access.redhat.com/security/cve/CVE-2024-21386 CVE-2024-21386 CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21404 CVE-2024-21404 CVE-2024-21404 https://bugzilla.redhat.com/2263085 2263085 https://bugzilla.redhat.com/2263086 2263086 https://errata.almalinux.org/9/ALSA-2024-0805.html ALSA-2024:0805 ALSA-2024:0805 �U�ldotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm �U�ldotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3.x86_64.rpm ����@�S �'�esecurity Important: dotnet6.0 security update ���xhttps://access.redhat.com/errata/RHSA-2024:0807 RHSA-2024:0807 RHSA-2024:0807
https://access.redhat.com/security/cve/CVE-2024-21386 CVE-2024-21386 CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21404 CVE-2024-21404 CVE-2024-21404 https://bugzilla.redhat.com/2263085 2263085 https://bugzilla.redhat.com/2263086 2263086 https://errata.almalinux.org/9/ALSA-2024-0807.html ALSA-2024:0807 ALSA-2024:0807 n�`dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm n�`dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3.x86_64.rpm ����2�T �(�gsecurity Important: .NET 8.0 security update ���whttps://access.redhat.com/errata/RHSA-2024:0848 RHSA-2024:0848 RHSA-2024:0848
https://access.redhat.com/security/cve/CVE-2024-21386 CVE-2024-21386 CVE-2024-21386 https://access.redhat.com/security/cve/CVE-2024-21404 CVE-2024-21404 CVE-2024-21404 https://bugzilla.redhat.com/2263085 2263085 https://bugzilla.redhat.com/2263086 2263086 https://errata.almalinux.org/9/ALSA-2024-0848.html ALSA-2024:0848 ALSA-2024:0848 ��qdotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm ��qdotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3.x86_64.rpm ����
�U �)�iBBBBBBBBBBsecurity Important: postgresql security update ��{� https://access.redhat.com/errata/RHSA-2024:0951 RHSA-2024:0951 RHSA-2024:0951
https://access.redhat.com/security/cve/CVE-2024-0985 CVE-2024-0985 CVE-2024-0985 https://bugzilla.redhat.com/2263384 2263384 https://errata.almalinux.org/9/ALSA-2024-0951.html ALSA-2024:0951 ALSA-2024:0951 ��Zpostgresql-test-13.14-1.el9_3.x86_64.rpm ��Zpostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm ��Zpostgresql-server-devel-13.14-1.el9_3.x86_64.rpm �}�Zpostgresql-docs-13.14-1.el9_3.x86_64.rpm � �Zpostgresql-static-13.14-1.el9_3.x86_64.rpm �~�Zpostgresql-private-devel-13.14-1.el9_3.x86_64.rpm ��Zpostgresql-test-13.14-1.el9_3.x86_64.rpm ��Zpostgresql-upgrade-devel-13.14-1.el9_3.x86_64.rpm ��Zpostgresql-server-devel-13.14-1.el9_3.x86_64.rpm �}�Zpostgresql-docs-13.14-1.el9_3.x86_64.rpm � �Zpostgresql-static-13.14-1.el9_3.x86_64.rpm �~�Zpostgresql-private-devel-13.14-1.el9_3.x86_64.rpm ���� �V �*�uBsecurity Important: unbound security update ���[https://access.redhat.com/errata/RHSA-2024:0977 RHSA-2024:0977 RHSA-2024:0977
https://access.redhat.com/security/cve/CVE-2023-50387 CVE-2023-50387 CVE-2023-50387 https://access.redhat.com/security/cve/CVE-2023-50868 CVE-2023-50868 CVE-2023-50868 https://bugzilla.redhat.com/2263914 2263914 https://bugzilla.redhat.com/2263917 2263917 https://errata.almalinux.org/9/ALSA-2024-0977.html ALSA-2024:0977 ALSA-2024:0977 �T�(unbound-devel-1.16.2-3.el9_3.1.i686.rpm �T�(unbound-devel-1.16.2-3.el9_3.1.x86_64.rpm �T�(unbound-devel-1.16.2-3.el9_3.1.i686.rpm �T�(unbound-devel-1.16.2-3.el9_3.1.x86_64.rpm �����W �+�xBBBBsecurity Moderate: kernel security update
��_�https://access.redhat.com/errata/RHSA-2024:10274 RHSA-2024:10274 RHSA-2024:10274
https://access.redhat.com/security/cve/CVE-2024-41009 CVE-2024-41009 CVE-2024-41009 https://access.redhat.com/security/cve/CVE-2024-42244 CVE-2024-42244 CVE-2024-42244 https://access.redhat.com/security/cve/CVE-2024-50226 CVE-2024-50226 CVE-2024-50226 https://bugzilla.redhat.com/2298412 2298412 https://bugzilla.redhat.com/2324876 2324876 https://errata.almalinux.org/9/ALSA-2024-10274.html ALSA-2024:10274 ALSA-2024:10274 �libperf-5.14.0-503.15.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpm �libperf-5.14.0-503.15.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.15.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.15.1.el9_5.x86_64.rpm ����n�X �.�lB�RBsecurity Important: edk2 security update ��~�6https://access.redhat.com/errata/RHSA-2024:1075 RHSA-2024:1075 RHSA-2024:1075
https://access.redhat.com/security/cve/CVE-2023-45230 CVE-2023-45230 CVE-2023-45230 https://access.redhat.com/security/cve/CVE-2023-45234 CVE-2023-45234 CVE-2023-45234 https://bugzilla.redhat.com/2258685 2258685 https://bugzilla.redhat.com/2258697 2258697 https://errata.almalinux.org/9/ALSA-2024-1075.html ALSA-2024:1075 ALSA-2024:1075 ��eedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm � �eedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm �L�eedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm �K�eedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm ��eedk2-tools-20230524-4.el9_3.2.alma.x86_64.rpm � �eedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm �L�eedk2-tools-doc-20230524-4.el9_3.2.alma.noarch.rpm �K�eedk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpm ����O�Y �/�ABBBBBBBBBBBsecurity Important: postgresql security update ��4�`https://access.redhat.com/errata/RHSA-2024:10791 RHSA-2024:10791 RHSA-2024:10791
https://access.redhat.com/security/cve/CVE-2024-10976 CVE-2024-10976 CVE-2024-10976 https://access.redhat.com/security/cve/CVE-2024-10978 CVE-2024-10978 CVE-2024-10978 https://access.redhat.com/security/cve/CVE-2024-10979 CVE-2024-10979 CVE-2024-10979 https://bugzilla.redhat.com/2326251 2326251 https://bugzilla.redhat.com/2326253 2326253 https://bugzilla.redhat.com/2326263 2326263 https://errata.almalinux.org/9/ALSA-2024-10791.html ALSA-2024:10791 ALSA-2024:10791 ��Fpostgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpm �}�Fpostgresql-docs-13.18-1.el9_5.x86_64.rpm �~�Fpostgresql-private-devel-13.18-1.el9_5.x86_64.rpm �<�Fpostgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm � �Fpostgresql-static-13.18-1.el9_5.x86_64.rpm ��Fpostgresql-test-13.18-1.el9_5.x86_64.rpm ��Fpostgresql-server-devel-13.18-1.el9_5.x86_64.rpm ��Fpostgresql-upgrade-devel-13.18-1.el9_5.x86_64.rpm �}�Fpostgresql-docs-13.18-1.el9_5.x86_64.rpm �~�Fpostgresql-private-devel-13.18-1.el9_5.x86_64.rpm �<�Fpostgresql-test-rpm-macros-13.18-1.el9_5.noarch.rpm � �Fpostgresql-static-13.18-1.el9_5.x86_64.rpm ��Fpostgresql-test-13.18-1.el9_5.x86_64.rpm ��Fpostgresql-server-devel-13.18-1.el9_5.x86_64.rpm ����y�Z �0�security Important: ruby security update ���%https://access.redhat.com/errata/RHSA-2024:10858 RHSA-2024:10858 RHSA-2024:10858
https://access.redhat.com/security/cve/CVE-2024-49761 CVE-2024-49761 CVE-2024-49761 https://bugzilla.redhat.com/2322153 2322153 https://errata.almalinux.org/9/ALSA-2024-10858.html ALSA-2024:10858 ALSA-2024:10858 ��zruby-doc-3.0.7-163.el9_5.noarch.rpm ��zruby-doc-3.0.7-163.el9_5.noarch.rpm ���
�[ �1�OBBBBsecurity Moderate: kernel security update
��9�Ahttps://access.redhat.com/errata/RHSA-2024:10939 RHSA-2024:10939 RHSA-2024:10939
https://access.redhat.com/security/cve/CVE-2024-26615 CVE-2024-26615 CVE-2024-26615 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-44994 CVE-2024-44994 CVE-2024-44994 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://access.redhat.com/security/cve/CVE-2024-46695 CVE-2024-46695 CVE-2024-46695 https://access.redhat.com/security/cve/CVE-2024-49949 CVE-2024-49949 CVE-2024-49949 https://access.redhat.com/security/cve/CVE-2024-50251 CVE-2024-50251 CVE-2024-50251 https://bugzilla.redhat.com/2267355 2267355 https://bugzilla.redhat.com/2309857 2309857 https://bugzilla.redhat.com/2311715 2311715 https://bugzilla.redhat.com/2312083 2312083 https://bugzilla.redhat.com/2320505 2320505 https://bugzilla.redhat.com/2324886 2324886 https://errata.almalinux.org/9/ALSA-2024-10939.html ALSA-2024:10939 ALSA-2024:10939 �kernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpm �libperf-5.14.0-503.16.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.16.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.16.1.el9_5.x86_64.rpm �libperf-5.14.0-503.16.1.el9_5.x86_64.rpm ����(�\ �4�rB�cBBBBBBBBBsecurity Important: python3.12 security update ��z�-https://access.redhat.com/errata/RHSA-2024:10978 RHSA-2024:10978 RHSA-2024:10978
https://access.redhat.com/security/cve/CVE-2024-12254 CVE-2024-12254 CVE-2024-12254 https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440 https://bugzilla.redhat.com/2330804 2330804 https://errata.almalinux.org/9/ALSA-2024-10978.html ALSA-2024:10978 ALSA-2024:10978 E�'python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm G�'python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm F�'python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm �E�'python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm F�'python3.12-idle-3.12.5-2.el9_5.2.i686.rpm E�'python3.12-debug-3.12.5-2.el9_5.2.i686.rpm G�'python3.12-test-3.12.5-2.el9_5.2.i686.rpm �D�'python3.12-3.12.5-2.el9_5.2.i686.rpm E�'python3.12-debug-3.12.5-2.el9_5.2.x86_64.rpm G�'python3.12-test-3.12.5-2.el9_5.2.x86_64.rpm F�'python3.12-idle-3.12.5-2.el9_5.2.x86_64.rpm �E�'python3.12-tkinter-3.12.5-2.el9_5.2.i686.rpm F�'python3.12-idle-3.12.5-2.el9_5.2.i686.rpm E�'python3.12-debug-3.12.5-2.el9_5.2.i686.rpm G�'python3.12-test-3.12.5-2.el9_5.2.i686.rpm �D�'python3.12-3.12.5-2.el9_5.2.i686.rpm �����] �6�u�J�cBBBBBBBBBsecurity Moderate: python3.9:3.9.21 security update
��'�https://access.redhat.com/errata/RHSA-2024:10983 RHSA-2024:10983 RHSA-2024:10983
https://access.redhat.com/security/cve/CVE-2024-11168 CVE-2024-11168 CVE-2024-11168 https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440 https://bugzilla.redhat.com/2325776 2325776 https://errata.almalinux.org/9/ALSA-2024-10983.html ALSA-2024:10983 ALSA-2024:10983 N�9python3-tkinter-3.9.21-1.el9_5.i686.rpm �9python3-test-3.9.21-1.el9_5.x86_64.rpm �9python3-debug-3.9.21-1.el9_5.x86_64.rpm �9python3-idle-3.9.21-1.el9_5.i686.rpm M�9python3-3.9.21-1.el9_5.i686.rpm �9python3-idle-3.9.21-1.el9_5.x86_64.rpm �9python3-test-3.9.21-1.el9_5.i686.rpm �9python3-debug-3.9.21-1.el9_5.i686.rpm N�9python3-tkinter-3.9.21-1.el9_5.i686.rpm �9python3-test-3.9.21-1.el9_5.x86_64.rpm �9python3-debug-3.9.21-1.el9_5.x86_64.rpm �9python3-idle-3.9.21-1.el9_5.i686.rpm M�9python3-3.9.21-1.el9_5.i686.rpm �9python3-idle-3.9.21-1.el9_5.x86_64.rpm �9python3-test-3.9.21-1.el9_5.i686.rpm �9python3-debug-3.9.21-1.el9_5.i686.rpm ����I�^ �9�wB�tBBBBBBBBBsecurity Moderate: python3.11 security update
��E�Mhttps://access.redhat.com/errata/RHSA-2024:11111 RHSA-2024:11111 RHSA-2024:11111
https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440 https://errata.almalinux.org/9/ALSA-2024-11111.html ALSA-2024:11111 ALSA-2024:11111 �python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.2.i686.rpm �python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.2.i686.rpm �python3.11-test-3.11.9-7.el9_5.2.x86_64.rpm b�python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpm a�python3.11-3.11.9-7.el9_5.2.i686.rpm �python3.11-idle-3.11.9-7.el9_5.2.i686.rpm �python3.11-idle-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.2.i686.rpm �python3.11-debug-3.11.9-7.el9_5.2.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.2.i686.rpm �python3.11-test-3.11.9-7.el9_5.2.x86_64.rpm b�python3.11-tkinter-3.11.9-7.el9_5.2.i686.rpm a�python3.11-3.11.9-7.el9_5.2.i686.rpm �python3.11-idle-3.11.9-7.el9_5.2.i686.rpm ����}�_ �<�zB�|Bsecurity Moderate: edk2:20240524 security update
���Bhttps://access.redhat.com/errata/RHSA-2024:11219 RHSA-2024:11219 RHSA-2024:11219
https://access.redhat.com/security/cve/CVE-2024-38796 CVE-2024-38796 CVE-2024-38796 https://bugzilla.redhat.com/2315390 2315390 https://errata.almalinux.org/9/ALSA-2024-11219.html ALSA-2024:11219 ALSA-2024:11219 �L�hedk2-tools-doc-20240524-6.el9_5.3.noarch.rpm � �hedk2-ovmf-20240524-6.el9_5.3.noarch.rpm �K�hedk2-aarch64-20240524-6.el9_5.3.noarch.rpm ��hedk2-tools-20240524-6.el9_5.3.x86_64.rpm �L�hedk2-tools-doc-20240524-6.el9_5.3.noarch.rpm � �hedk2-ovmf-20240524-6.el9_5.3.noarch.rpm �K�hedk2-aarch64-20240524-6.el9_5.3.noarch.rpm ��hedk2-tools-20240524-6.el9_5.3.x86_64.rpm ����V�` �<�yBsecurity Moderate: unbound:1.16.2 security update
��T�https://access.redhat.com/errata/RHSA-2024:11232 RHSA-2024:11232 RHSA-2024:11232
https://access.redhat.com/security/cve/CVE-2024-8508 CVE-2024-8508 CVE-2024-8508 https://bugzilla.redhat.com/2316321 2316321 https://errata.almalinux.org/9/ALSA-2024-11232.html ALSA-2024:11232 ALSA-2024:11232 �T�*unbound-devel-1.16.2-8.el9_5.1.i686.rpm �T�*unbound-devel-1.16.2-8.el9_5.1.x86_64.rpm �T�*unbound-devel-1.16.2-8.el9_5.1.i686.rpm �T�*unbound-devel-1.16.2-8.el9_5.1.x86_64.rpm ����~�a � �}Bsecurity Moderate: libsndfile:1.0.31 security update
��_�+https://access.redhat.com/errata/RHSA-2024:11237 RHSA-2024:11237 RHSA-2024:11237
https://access.redhat.com/security/cve/CVE-2024-50612 CVE-2024-50612 CVE-2024-50612 https://bugzilla.redhat.com/2322057 2322057 https://errata.almalinux.org/9/ALSA-2024-11237.html ALSA-2024:11237 ALSA-2024:11237 �c�$libsndfile-devel-1.0.31-8.el9_5.2.i686.rpm �c�$libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm �c�$libsndfile-devel-1.0.31-8.el9_5.2.i686.rpm �c�$libsndfile-devel-1.0.31-8.el9_5.2.x86_64.rpm ����:�b �=�ABsecurity Moderate: mpg123:1.32.9 security update
��
�qhttps://access.redhat.com/errata/RHSA-2024:11242 RHSA-2024:11242 RHSA-2024:11242
https://access.redhat.com/security/cve/CVE-2024-10573 CVE-2024-10573 CVE-2024-10573 https://bugzilla.redhat.com/2322980 2322980 https://errata.almalinux.org/9/ALSA-2024-11242.html ALSA-2024:11242 ALSA-2024:11242 ��4mpg123-devel-1.32.9-1.el9_5.i686.rpm ��4mpg123-devel-1.32.9-1.el9_5.x86_64.rpm ��4mpg123-devel-1.32.9-1.el9_5.i686.rpm ��4mpg123-devel-1.32.9-1.el9_5.x86_64.rpm �����c �>�DBBBBsecurity Moderate: mysql security update
��{�t�https://access.redhat.com/errata/RHSA-2024:1141 RHSA-2024:1141 RHSA-2024:1141
https://access.redhat.com/security/cve/CVE-2022-4899 CVE-2022-4899 CVE-2022-4899 https://access.redhat.com/security/cve/CVE-2023-21911 CVE-2023-21911 CVE-2023-21911 https://access.redhat.com/security/cve/CVE-2023-21919 CVE-2023-21919 CVE-2023-21919 https://access.redhat.com/security/cve/CVE-2023-21920 CVE-2023-21920 CVE-2023-21920 https://access.redhat.com/security/cve/CVE-2023-21929 CVE-2023-21929 CVE-2023-21929 https://access.redhat.com/security/cve/CVE-2023-21933 CVE-2023-21933 CVE-2023-21933 https://access.redhat.com/security/cve/CVE-2023-21935 CVE-2023-21935 CVE-2023-21935 https://access.redhat.com/security/cve/CVE-2023-21940 CVE-2023-21940 CVE-2023-21940 https://access.redhat.com/security/cve/CVE-2023-21945 CVE-2023-21945 CVE-2023-21945 https://access.redhat.com/security/cve/CVE-2023-21946 CVE-2023-21946 CVE-2023-21946 https://access.redhat.com/security/cve/CVE-2023-21947 CVE-2023-21947 CVE-2023-21947 https://access.redhat.com/security/cve/CVE-2023-21953 CVE-2023-21953 CVE-2023-21953 https://access.redhat.com/security/cve/CVE-2023-21955 CVE-2023-21955 CVE-2023-21955 https://access.redhat.com/security/cve/CVE-2023-21962 CVE-2023-21962 CVE-2023-21962 https://access.redhat.com/security/cve/CVE-2023-21966 CVE-2023-21966 CVE-2023-21966 https://access.redhat.com/security/cve/CVE-2023-21972 CVE-2023-21972 CVE-2023-21972 https://access.redhat.com/security/cve/CVE-2023-21976 CVE-2023-21976 CVE-2023-21976 https://access.redhat.com/security/cve/CVE-2023-21977 CVE-2023-21977 CVE-2023-21977 https://access.redhat.com/security/cve/CVE-2023-21980 CVE-2023-21980 CVE-2023-21980 https://access.redhat.com/security/cve/CVE-2023-21982 CVE-2023-21982 CVE-2023-21982 https://access.redhat.com/security/cve/CVE-2023-22005 CVE-2023-22005 CVE-2023-22005 https://access.redhat.com/security/cve/CVE-2023-22007 CVE-2023-22007 CVE-2023-22007 https://access.redhat.com/security/cve/CVE-2023-22008 CVE-2023-22008 CVE-2023-22008 https://access.redhat.com/security/cve/CVE-2023-22032 CVE-2023-22032 CVE-2023-22032 https://access.redhat.com/security/cve/CVE-2023-22033 CVE-2023-22033 CVE-2023-22033 https://access.redhat.com/security/cve/CVE-2023-22038 CVE-2023-22038 CVE-2023-22038 https://access.redhat.com/security/cve/CVE-2023-22046 CVE-2023-22046 CVE-2023-22046 https://access.redhat.com/security/cve/CVE-2023-22048 CVE-2023-22048 CVE-2023-22048 https://access.redhat.com/security/cve/CVE-2023-22053 CVE-2023-22053 CVE-2023-22053 https://access.redhat.com/security/cve/CVE-2023-22054 CVE-2023-22054 CVE-2023-22054 https://access.redhat.com/security/cve/CVE-2023-22056 CVE-2023-22056 CVE-2023-22056 https://access.redhat.com/security/cve/CVE-2023-22057 CVE-2023-22057 CVE-2023-22057 https://access.redhat.com/security/cve/CVE-2023-22058 CVE-2023-22058 CVE-2023-22058 https://access.redhat.com/security/cve/CVE-2023-22059 CVE-2023-22059 CVE-2023-22059 https://access.redhat.com/security/cve/CVE-2023-22064 CVE-2023-22064 CVE-2023-22064 https://access.redhat.com/security/cve/CVE-2023-22065 CVE-2023-22065 CVE-2023-22065 https://access.redhat.com/security/cve/CVE-2023-22066 CVE-2023-22066 CVE-2023-22066 https://access.redhat.com/security/cve/CVE-2023-22068 CVE-2023-22068 CVE-2023-22068 https://access.redhat.com/security/cve/CVE-2023-22070 CVE-2023-22070 CVE-2023-22070 https://access.redhat.com/security/cve/CVE-2023-22078 CVE-2023-22078 CVE-2023-22078 https://access.redhat.com/security/cve/CVE-2023-22079 CVE-2023-22079 CVE-2023-22079 https://access.redhat.com/security/cve/CVE-2023-22084 CVE-2023-22084 CVE-2023-22084 https://access.redhat.com/security/cve/CVE-2023-22092 CVE-2023-22092 CVE-2023-22092 https://access.redhat.com/security/cve/CVE-2023-22097 CVE-2023-22097 CVE-2023-22097 https://access.redhat.com/security/cve/CVE-2023-22103 CVE-2023-22103 CVE-2023-22103 https://access.redhat.com/security/cve/CVE-2023-22104 CVE-2023-22104 CVE-2023-22104 https://access.redhat.com/security/cve/CVE-2023-22110 CVE-2023-22110 CVE-2023-22110 https://access.redhat.com/security/cve/CVE-2023-22111 CVE-2023-22111 CVE-2023-22111 https://access.redhat.com/security/cve/CVE-2023-22112 CVE-2023-22112 CVE-2023-22112 https://access.redhat.com/security/cve/CVE-2023-22113 CVE-2023-22113 CVE-2023-22113 https://access.redhat.com/security/cve/CVE-2023-22114 CVE-2023-22114 CVE-2023-22114 https://access.redhat.com/security/cve/CVE-2023-22115 CVE-2023-22115 CVE-2023-22115 https://access.redhat.com/security/cve/CVE-2024-20960 CVE-2024-20960 CVE-2024-20960 https://access.redhat.com/security/cve/CVE-2024-20961 CVE-2024-20961 CVE-2024-20961 https://access.redhat.com/security/cve/CVE-2024-20962 CVE-2024-20962 CVE-2024-20962 https://access.redhat.com/security/cve/CVE-2024-20963 CVE-2024-20963 CVE-2024-20963 https://access.redhat.com/security/cve/CVE-2024-20964 CVE-2024-20964 CVE-2024-20964 https://access.redhat.com/security/cve/CVE-2024-20965 CVE-2024-20965 CVE-2024-20965 https://access.redhat.com/security/cve/CVE-2024-20966 CVE-2024-20966 CVE-2024-20966 https://access.redhat.com/security/cve/CVE-2024-20967 CVE-2024-20967 CVE-2024-20967 https://access.redhat.com/security/cve/CVE-2024-20968 CVE-2024-20968 CVE-2024-20968 https://access.redhat.com/security/cve/CVE-2024-20969 CVE-2024-20969 CVE-2024-20969 https://access.redhat.com/security/cve/CVE-2024-20970 CVE-2024-20970 CVE-2024-20970 https://access.redhat.com/security/cve/CVE-2024-20971 CVE-2024-20971 CVE-2024-20971 https://access.redhat.com/security/cve/CVE-2024-20972 CVE-2024-20972 CVE-2024-20972 https://access.redhat.com/security/cve/CVE-2024-20973 CVE-2024-20973 CVE-2024-20973 https://access.redhat.com/security/cve/CVE-2024-20974 CVE-2024-20974 CVE-2024-20974 https://access.redhat.com/security/cve/CVE-2024-20976 CVE-2024-20976 CVE-2024-20976 https://access.redhat.com/security/cve/CVE-2024-20977 CVE-2024-20977 CVE-2024-20977 https://access.redhat.com/security/cve/CVE-2024-20978 CVE-2024-20978 CVE-2024-20978 https://access.redhat.com/security/cve/CVE-2024-20981 CVE-2024-20981 CVE-2024-20981 https://access.redhat.com/security/cve/CVE-2024-20982 CVE-2024-20982 CVE-2024-20982 https://access.redhat.com/security/cve/CVE-2024-20983 CVE-2024-20983 CVE-2024-20983 https://access.redhat.com/security/cve/CVE-2024-20984 CVE-2024-20984 CVE-2024-20984 https://access.redhat.com/security/cve/CVE-2024-20985 CVE-2024-20985 CVE-2024-20985 https://bugzilla.redhat.com/2179864 2179864 https://bugzilla.redhat.com/2188109 2188109 https://bugzilla.redhat.com/2188113 2188113 https://bugzilla.redhat.com/2188115 2188115 https://bugzilla.redhat.com/2188116 2188116 https://bugzilla.redhat.com/2188117 2188117 https://bugzilla.redhat.com/2188118 2188118 https://bugzilla.redhat.com/2188119 2188119 https://bugzilla.redhat.com/2188120 2188120 https://bugzilla.redhat.com/2188121 2188121 https://bugzilla.redhat.com/2188122 2188122 https://bugzilla.redhat.com/2188123 2188123 https://bugzilla.redhat.com/2188124 2188124 https://bugzilla.redhat.com/2188125 2188125 https://bugzilla.redhat.com/2188127 2188127 https://bugzilla.redhat.com/2188128 2188128 https://bugzilla.redhat.com/2188129 2188129 https://bugzilla.redhat.com/2188130 2188130 https://bugzilla.redhat.com/2188131 2188131 https://bugzilla.redhat.com/2188132 2188132 https://bugzilla.redhat.com/2224211 2224211 https://bugzilla.redhat.com/2224212 2224212 https://bugzilla.redhat.com/2224213 2224213 https://bugzilla.redhat.com/2224214 2224214 https://bugzilla.redhat.com/2224215 2224215 https://bugzilla.redhat.com/2224216 2224216 https://bugzilla.redhat.com/2224217 2224217 https://bugzilla.redhat.com/2224218 2224218 https://bugzilla.redhat.com/2224219 2224219 https://bugzilla.redhat.com/2224220 2224220 https://bugzilla.redhat.com/2224221 2224221 https://bugzilla.redhat.com/2224222 2224222 https://bugzilla.redhat.com/2245014 2245014 https://bugzilla.redhat.com/2245015 2245015 https://bugzilla.redhat.com/2245016 2245016 https://bugzilla.redhat.com/2245017 2245017 https://bugzilla.redhat.com/2245018 2245018 https://bugzilla.redhat.com/2245019 2245019 https://bugzilla.redhat.com/2245020 2245020 https://bugzilla.redhat.com/2245021 2245021 https://bugzilla.redhat.com/2245022 2245022 https://bugzilla.redhat.com/2245023 2245023 https://bugzilla.redhat.com/2245024 2245024 https://bugzilla.redhat.com/2245026 2245026 https://bugzilla.redhat.com/2245027 2245027 https://bugzilla.redhat.com/2245028 2245028 https://bugzilla.redhat.com/2245029 2245029 https://bugzilla.redhat.com/2245030 2245030 https://bugzilla.redhat.com/2245031 2245031 https://bugzilla.redhat.com/2245032 2245032 https://bugzilla.redhat.com/2245033 2245033 https://bugzilla.redhat.com/2245034 2245034 https://bugzilla.redhat.com/2258771 2258771 https://bugzilla.redhat.com/2258772 2258772 https://bugzilla.redhat.com/2258773 2258773 https://bugzilla.redhat.com/2258774 2258774 https://bugzilla.redhat.com/2258775 2258775 https://bugzilla.redhat.com/2258776 2258776 https://bugzilla.redhat.com/2258777 2258777 https://bugzilla.redhat.com/2258778 2258778 https://bugzilla.redhat.com/2258779 2258779 https://bugzilla.redhat.com/2258780 2258780 https://bugzilla.redhat.com/2258781 2258781 https://bugzilla.redhat.com/2258782 2258782 https://bugzilla.redhat.com/2258783 2258783 https://bugzilla.redhat.com/2258784 2258784 https://bugzilla.redhat.com/2258785 2258785 https://bugzilla.redhat.com/2258787 2258787 https://bugzilla.redhat.com/2258788 2258788 https://bugzilla.redhat.com/2258789 2258789 https://bugzilla.redhat.com/2258790 2258790 https://bugzilla.redhat.com/2258791 2258791 https://bugzilla.redhat.com/2258792 2258792 https://bugzilla.redhat.com/2258793 2258793 https://bugzilla.redhat.com/2258794 2258794 https://errata.almalinux.org/9/ALSA-2024-1141.html ALSA-2024:1141 ALSA-2024:1141 �+�=mysql-test-8.0.36-1.el9_3.x86_64.rpm �*�=mysql-devel-8.0.36-1.el9_3.x86_64.rpm �J�=mysql-libs-8.0.36-1.el9_3.x86_64.rpm �+�=mysql-test-8.0.36-1.el9_3.x86_64.rpm �*�=mysql-devel-8.0.36-1.el9_3.x86_64.rpm �J�=mysql-libs-8.0.36-1.el9_3.x86_64.rpm ����y�d �?�JBBBBsecurity Moderate: kernel security update
��o�c$https://access.redhat.com/errata/RHSA-2024:11486 RHSA-2024:11486 RHSA-2024:11486
https://access.redhat.com/security/cve/CVE-2024-27399 CVE-2024-27399 CVE-2024-27399 https://access.redhat.com/security/cve/CVE-2024-38564 CVE-2024-38564 CVE-2024-38564 https://access.redhat.com/security/cve/CVE-2024-45020 CVE-2024-45020 CVE-2024-45020 https://access.redhat.com/security/cve/CVE-2024-46697 CVE-2024-46697 CVE-2024-46697 https://access.redhat.com/security/cve/CVE-2024-47675 CVE-2024-47675 CVE-2024-47675 https://access.redhat.com/security/cve/CVE-2024-49888 CVE-2024-49888 CVE-2024-49888 https://access.redhat.com/security/cve/CVE-2024-50099 CVE-2024-50099 CVE-2024-50099 https://access.redhat.com/security/cve/CVE-2024-50110 CVE-2024-50110 CVE-2024-50110 https://access.redhat.com/security/cve/CVE-2024-50115 CVE-2024-50115 CVE-2024-50115 https://access.redhat.com/security/cve/CVE-2024-50124 CVE-2024-50124 CVE-2024-50124 https://access.redhat.com/security/cve/CVE-2024-50125 CVE-2024-50125 CVE-2024-50125 https://access.redhat.com/security/cve/CVE-2024-50142 CVE-2024-50142 CVE-2024-50142 https://access.redhat.com/security/cve/CVE-2024-50148 CVE-2024-50148 CVE-2024-50148 https://access.redhat.com/security/cve/CVE-2024-50192 CVE-2024-50192 CVE-2024-50192 https://access.redhat.com/security/cve/CVE-2024-50223 CVE-2024-50223 CVE-2024-50223 https://access.redhat.com/security/cve/CVE-2024-50255 CVE-2024-50255 CVE-2024-50255 https://access.redhat.com/security/cve/CVE-2024-50262 CVE-2024-50262 CVE-2024-50262 https://bugzilla.redhat.com/2280462 2280462 https://bugzilla.redhat.com/2293429 2293429 https://bugzilla.redhat.com/2311717 2311717 https://bugzilla.redhat.com/2312085 2312085 https://bugzilla.redhat.com/2320254 2320254 https://bugzilla.redhat.com/2320517 2320517 https://bugzilla.redhat.com/2323904 2323904 https://bugzilla.redhat.com/2323930 2323930 https://bugzilla.redhat.com/2323937 2323937 https://bugzilla.redhat.com/2323944 2323944 https://bugzilla.redhat.com/2323955 2323955 https://bugzilla.redhat.com/2324315 2324315 https://bugzilla.redhat.com/2324332 2324332 https://bugzilla.redhat.com/2324612 2324612 https://bugzilla.redhat.com/2324867 2324867 https://bugzilla.redhat.com/2324868 2324868 https://bugzilla.redhat.com/2324892 2324892 https://errata.almalinux.org/9/ALSA-2024-11486.html ALSA-2024:11486 ALSA-2024:11486 � libperf-5.14.0-503.19.1.el9_5.x86_64.rpm � kernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpm � kernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpm � libperf-5.14.0-503.19.1.el9_5.x86_64.rpm � kernel-tools-libs-devel-5.14.0-503.19.1.el9_5.x86_64.rpm � kernel-cross-headers-5.14.0-503.19.1.el9_5.x86_64.rpm ����a�e �?�PBsecurity Moderate: opencryptoki security update
��R�Whttps://access.redhat.com/errata/RHSA-2024:1239 RHSA-2024:1239 RHSA-2024:1239
https://access.redhat.com/security/cve/CVE-2024-0914 CVE-2024-0914 CVE-2024-0914 https://bugzilla.redhat.com/2260407 2260407 https://errata.almalinux.org/9/ALSA-2024-1239.html ALSA-2024:1239 ALSA-2024:1239 �e�Zopencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm �e�Zopencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm �e�Zopencryptoki-devel-3.21.0-9.el9_3.alma.1.x86_64.rpm �e�Zopencryptoki-devel-3.21.0-9.el9_3.alma.1.i686.rpm ����D�f � �Ssecurity Moderate: .NET 7.0 security update
��)�Fhttps://access.redhat.com/errata/RHSA-2024:1309 RHSA-2024:1309 RHSA-2024:1309
https://access.redhat.com/security/cve/CVE-2024-21392 CVE-2024-21392 CVE-2024-21392 https://bugzilla.redhat.com/2268266 2268266 https://errata.almalinux.org/9/ALSA-2024-1309.html ALSA-2024:1309 ALSA-2024:1309 �U�mdotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm �U�mdotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3.x86_64.rpm ��˥s�g ��Usecurity Moderate: .NET 8.0 security update
��o�Ehttps://access.redhat.com/errata/RHSA-2024:1310 RHSA-2024:1310 RHSA-2024:1310
https://access.redhat.com/security/cve/CVE-2024-21392 CVE-2024-21392 CVE-2024-21392 https://bugzilla.redhat.com/2268266 2268266 https://errata.almalinux.org/9/ALSA-2024-1310.html ALSA-2024:1310 ALSA-2024:1310 ��rdotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm ��rdotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3.x86_64.rpm ����e�h ��WBBsecurity Important: libreoffice security update ��4�https://access.redhat.com/errata/RHSA-2024:1427 RHSA-2024:1427 RHSA-2024:1427
https://access.redhat.com/security/cve/CVE-2023-6185 CVE-2023-6185 CVE-2023-6185 https://access.redhat.com/security/cve/CVE-2023-6186 CVE-2023-6186 CVE-2023-6186 https://bugzilla.redhat.com/2254003 2254003 https://bugzilla.redhat.com/2254005 2254005 https://errata.almalinux.org/9/ALSA-2024-1427.html ALSA-2024:1427 ALSA-2024:1427 �`�libreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpm �`�libreoffice-sdk-7.1.8.1-12.el9_3.alma.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-12.el9_3.alma.x86_64.rpm ����z�i ��[Bsecurity Important: varnish security update ��G�thttps://access.redhat.com/errata/RHSA-2024:1691 RHSA-2024:1691 RHSA-2024:1691
https://access.redhat.com/security/cve/CVE-2024-30156 CVE-2024-30156 CVE-2024-30156 https://bugzilla.redhat.com/2271486 2271486 https://errata.almalinux.org/9/ALSA-2024-1691.html ALSA-2024:1691 ALSA-2024:1691 ��gvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpm ��gvarnish-devel-6.6.2-4.el9_3.1.i686.rpm ��gvarnish-devel-6.6.2-4.el9_3.1.x86_64.rpm ��gvarnish-devel-6.6.2-4.el9_3.1.i686.rpm ����=�j ��^Bsecurity Important: unbound security update ��;�6https://access.redhat.com/errata/RHSA-2024:1750 RHSA-2024:1750 RHSA-2024:1750
https://access.redhat.com/security/cve/CVE-2024-1488 CVE-2024-1488 CVE-2024-1488 https://bugzilla.redhat.com/2264183 2264183 https://errata.almalinux.org/9/ALSA-2024-1750.html ALSA-2024:1750 ALSA-2024:1750 �T�)unbound-devel-1.16.2-3.el9_3.5.x86_64.rpm �T�)unbound-devel-1.16.2-3.el9_3.5.i686.rpm �T�)unbound-devel-1.16.2-3.el9_3.5.x86_64.rpm �T�)unbound-devel-1.16.2-3.el9_3.5.i686.rpm ���F�k ��E�]BBBsecurity Important: bind security update ��q�Ghttps://access.redhat.com/errata/RHSA-2024:1789 RHSA-2024:1789 RHSA-2024:1789
https://access.redhat.com/security/cve/CVE-2023-4408 CVE-2023-4408 CVE-2023-4408 https://access.redhat.com/security/cve/CVE-2023-50387 CVE-2023-50387 CVE-2023-50387 https://access.redhat.com/security/cve/CVE-2023-50868 CVE-2023-50868 CVE-2023-50868 https://access.redhat.com/security/cve/CVE-2023-5517 CVE-2023-5517 CVE-2023-5517 https://access.redhat.com/security/cve/CVE-2023-5679 CVE-2023-5679 CVE-2023-5679 https://access.redhat.com/security/cve/CVE-2023-6516 CVE-2023-6516 CVE-2023-6516 https://bugzilla.redhat.com/2263896 2263896 https://bugzilla.redhat.com/2263897 2263897 https://bugzilla.redhat.com/2263909 2263909 https://bugzilla.redhat.com/2263911 2263911 https://bugzilla.redhat.com/2263914 2263914 https://bugzilla.redhat.com/2263917 2263917 https://errata.almalinux.org/9/ALSA-2024-1789.html ALSA-2024:1789 ALSA-2024:1789 O�Rbind-devel-9.16.23-14.el9_3.4.x86_64.rpm ��Rbind-doc-9.16.23-14.el9_3.4.noarch.rpm O�Rbind-devel-9.16.23-14.el9_3.4.i686.rpm �^�Rbind-libs-9.16.23-14.el9_3.4.i686.rpm O�Rbind-devel-9.16.23-14.el9_3.4.x86_64.rpm ��Rbind-doc-9.16.23-14.el9_3.4.noarch.rpm O�Rbind-devel-9.16.23-14.el9_3.4.i686.rpm �^�Rbind-libs-9.16.23-14.el9_3.4.i686.rpm �����l ��fBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update
��8�
https://access.redhat.com/errata/RHSA-2024:1818 RHSA-2024:1818 RHSA-2024:1818
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://access.redhat.com/security/cve/CVE-2024-21085 CVE-2024-21085 CVE-2024-21085 https://access.redhat.com/security/cve/CVE-2024-21094 CVE-2024-21094 CVE-2024-21094 https://bugzilla.redhat.com/2274977 2274977 https://bugzilla.redhat.com/2275001 2275001 https://bugzilla.redhat.com/2275003 2275003 https://bugzilla.redhat.com/2275005 2275005 https://errata.almalinux.org/9/ALSA-2024-1818.html ALSA-2024:1818 ALSA-2024:1818
�Yjava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm � Yjava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �
Yjava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm
�Yjava-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm � Yjava-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �
Yjava-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9.x86_64.rpm �Yjava-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9.x86_64.rpm ����h�m ��zBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security update
��W�nhttps://access.redhat.com/errata/RHSA-2024:1822 RHSA-2024:1822 RHSA-2024:1822
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21012 CVE-2024-21012 CVE-2024-21012 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://access.redhat.com/security/cve/CVE-2024-21085 CVE-2024-21085 CVE-2024-21085 https://access.redhat.com/security/cve/CVE-2024-21094 CVE-2024-21094 CVE-2024-21094 https://bugzilla.redhat.com/2274975 2274975 https://bugzilla.redhat.com/2274977 2274977 https://bugzilla.redhat.com/2275001 2275001 https://bugzilla.redhat.com/2275003 2275003 https://bugzilla.redhat.com/2275005 2275005 https://errata.almalinux.org/9/ALSA-2024-1822.html ALSA-2024:1822 ALSA-2024:1822 �j)java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �c)java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �d)java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �e)java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �n)java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �a)java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �k)java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �l)java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �f)java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �g)java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �m)java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �i)java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �b)java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �h)java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �j)java-11-openjdk-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �c)java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �d)java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �e)java-11-openjdk-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �n)java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �a)java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �k)java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �l)java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �f)java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �g)java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �m)java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm �i)java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �b)java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9.x86_64.rpm �h)java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9.x86_64.rpm ����Q�n � �VBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update
��E�$
https://access.redhat.com/errata/RHSA-2024:1825 RHSA-2024:1825 RHSA-2024:1825
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21012 CVE-2024-21012 CVE-2024-21012 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://access.redhat.com/security/cve/CVE-2024-21094 CVE-2024-21094 CVE-2024-21094 https://bugzilla.redhat.com/2274975 2274975 https://bugzilla.redhat.com/2274977 2274977 https://bugzilla.redhat.com/2275003 2275003 https://bugzilla.redhat.com/2275005 2275005 https://errata.almalinux.org/9/ALSA-2024-1825.html ALSA-2024:1825 ALSA-2024:1825 q-java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm {-java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm o-java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm t-java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm y-java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm z-java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm w-java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm r-java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm s-java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm v-java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm |-java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm x-java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm u-java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm p-java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm q-java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm {-java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm o-java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm t-java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm y-java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm z-java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm w-java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm r-java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm s-java-17-openjdk-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm v-java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9.x86_64.rpm |-java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm x-java-17-openjdk-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm u-java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm p-java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9.x86_64.rpm ����(�o �
�rBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update
��i�Hhttps://access.redhat.com/errata/RHSA-2024:1828 RHSA-2024:1828 RHSA-2024:1828
https://access.redhat.com/security/cve/CVE-2024-21011 CVE-2024-21011 CVE-2024-21011 https://access.redhat.com/security/cve/CVE-2024-21012 CVE-2024-21012 CVE-2024-21012 https://access.redhat.com/security/cve/CVE-2024-21068 CVE-2024-21068 CVE-2024-21068 https://bugzilla.redhat.com/2274975 2274975 https://bugzilla.redhat.com/2274977 2274977 https://bugzilla.redhat.com/2275003 2275003 https://errata.almalinux.org/9/ALSA-2024-1828.html ALSA-2024:1828 ALSA-2024:1828 �w=java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �t=java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �s=java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �y=java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �q=java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �r=java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �p=java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �|=java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �{=java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �u=java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �z=java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �o=java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �x=java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �v=java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �w=java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �t=java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �s=java-21-openjdk-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �y=java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �q=java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �r=java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �p=java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �|=java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �{=java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �u=java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �z=java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �o=java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �x=java-21-openjdk-slowdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm �v=java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9.alma.1.x86_64.rpm ����V�p ��NBsecurity Low: LibRaw security update �V��1�https://access.redhat.com/errata/RHSA-2024:2137 RHSA-2024:2137 RHSA-2024:2137
https://access.redhat.com/security/cve/CVE-2023-1729 CVE-2023-1729 CVE-2023-1729 https://bugzilla.redhat.com/2188240 2188240 https://errata.almalinux.org/9/ALSA-2024-2137.html ALSA-2024:2137 ALSA-2024:2137 �Z�LibRaw-devel-0.21.1-1.el9.i686.rpm �Z�LibRaw-devel-0.21.1-1.el9.x86_64.rpm �Z�LibRaw-devel-0.21.1-1.el9.i686.rpm �Z�LibRaw-devel-0.21.1-1.el9.x86_64.rpm ���I�q ��security Moderate: ipa security update
��I�uhttps://access.redhat.com/errata/RHSA-2024:2147 RHSA-2024:2147 RHSA-2024:2147
https://access.redhat.com/security/cve/CVE-2024-1481 CVE-2024-1481 CVE-2024-1481 https://bugzilla.redhat.com/2262169 2262169 https://errata.almalinux.org/9/ALSA-2024-2147.html ALSA-2024:2147 ALSA-2024:2147 ��}python3-ipatests-4.11.0-9.el9_4.noarch.rpm ��}python3-ipatests-4.11.0-9.el9_4.noarch.rpm ����r �
�RBBsecurity Moderate: xorg-x11-server security update
��>� https://access.redhat.com/errata/RHSA-2024:2169 RHSA-2024:2169 RHSA-2024:2169
https://access.redhat.com/security/cve/CVE-2023-5367 CVE-2023-5367 CVE-2023-5367 https://access.redhat.com/security/cve/CVE-2023-5380 CVE-2023-5380 CVE-2023-5380 https://access.redhat.com/security/cve/CVE-2023-6377 CVE-2023-6377 CVE-2023-6377 https://access.redhat.com/security/cve/CVE-2023-6478 CVE-2023-6478 CVE-2023-6478 https://access.redhat.com/security/cve/CVE-2023-6816 CVE-2023-6816 CVE-2023-6816 https://access.redhat.com/security/cve/CVE-2024-0229 CVE-2024-0229 CVE-2024-0229 https://access.redhat.com/security/cve/CVE-2024-0408 CVE-2024-0408 CVE-2024-0408 https://access.redhat.com/security/cve/CVE-2024-0409 CVE-2024-0409 CVE-2024-0409 https://access.redhat.com/security/cve/CVE-2024-21885 CVE-2024-21885 CVE-2024-21885 https://access.redhat.com/security/cve/CVE-2024-21886 CVE-2024-21886 CVE-2024-21886 https://bugzilla.redhat.com/2243091 2243091 https://bugzilla.redhat.com/2244736 2244736 https://bugzilla.redhat.com/2253291 2253291 https://bugzilla.redhat.com/2253298 2253298 https://bugzilla.redhat.com/2256540 2256540 https://bugzilla.redhat.com/2256542 2256542 https://bugzilla.redhat.com/2256690 2256690 https://bugzilla.redhat.com/2257689 2257689 https://bugzilla.redhat.com/2257690 2257690 https://bugzilla.redhat.com/2257691 2257691 https://errata.almalinux.org/9/ALSA-2024-2169.html ALSA-2024:2169 ALSA-2024:2169 �_�qxorg-x11-server-source-1.20.11-24.el9.noarch.rpm d�qxorg-x11-server-devel-1.20.11-24.el9.x86_64.rpm d�qxorg-x11-server-devel-1.20.11-24.el9.i686.rpm �_�qxorg-x11-server-source-1.20.11-24.el9.noarch.rpm d�qxorg-x11-server-devel-1.20.11-24.el9.x86_64.rpm d�qxorg-x11-server-devel-1.20.11-24.el9.i686.rpm ���$�s ��VBsecurity Moderate: libsndfile security update
��>�&https://access.redhat.com/errata/RHSA-2024:2184 RHSA-2024:2184 RHSA-2024:2184
https://access.redhat.com/security/cve/CVE-2022-33065 CVE-2022-33065 CVE-2022-33065 https://bugzilla.redhat.com/2238934 2238934 https://errata.almalinux.org/9/ALSA-2024-2184.html ALSA-2024:2184 ALSA-2024:2184 �c�#libsndfile-devel-1.0.31-8.el9.i686.rpm �c�#libsndfile-devel-1.0.31-8.el9.x86_64.rpm �c�#libsndfile-devel-1.0.31-8.el9.i686.rpm �c�#libsndfile-devel-1.0.31-8.el9.x86_64.rpm ���S�t ��YBsecurity Important: pmix security update ��d�:https://access.redhat.com/errata/RHSA-2024:2199 RHSA-2024:2199 RHSA-2024:2199
https://access.redhat.com/security/cve/CVE-2023-41915 CVE-2023-41915 CVE-2023-41915 https://bugzilla.redhat.com/2238898 2238898 https://errata.almalinux.org/9/ALSA-2024-2199.html ALSA-2024:2199 ALSA-2024:2199 ��Ypmix-pmi-devel-3.2.3-5.el9.i686.rpm ��Ypmix-pmi-devel-3.2.3-5.el9.x86_64.rpm ��Ypmix-pmi-devel-3.2.3-5.el9.i686.rpm ��Ypmix-pmi-devel-3.2.3-5.el9.x86_64.rpm ���W�u ��\BBBBBsecurity Moderate: libnbd security update
���<https://access.redhat.com/errata/RHSA-2024:2204 RHSA-2024:2204 RHSA-2024:2204
https://access.redhat.com/security/cve/CVE-2023-5215 CVE-2023-5215 CVE-2023-5215 https://access.redhat.com/security/cve/CVE-2023-5871 CVE-2023-5871 CVE-2023-5871 https://bugzilla.redhat.com/2241041 2241041 https://bugzilla.redhat.com/2247308 2247308 https://errata.almalinux.org/9/ALSA-2024-2204.html ALSA-2024:2204 ALSA-2024:2204 �b�0libnbd-devel-1.18.1-3.el9.x86_64.rpm �,�0ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpm �b�0libnbd-devel-1.18.1-3.el9.i686.rpm �+�0ocaml-libnbd-1.18.1-3.el9.x86_64.rpm �b�0libnbd-devel-1.18.1-3.el9.x86_64.rpm �,�0ocaml-libnbd-devel-1.18.1-3.el9.x86_64.rpm �b�0libnbd-devel-1.18.1-3.el9.i686.rpm �+�0ocaml-libnbd-1.18.1-3.el9.x86_64.rpm ���L�v ��cBBBBsecurity Moderate: freerdp security update
��Z�ihttps://access.redhat.com/errata/RHSA-2024:2208 RHSA-2024:2208 RHSA-2024:2208
https://access.redhat.com/security/cve/CVE-2023-39350 CVE-2023-39350 CVE-2023-39350 https://access.redhat.com/security/cve/CVE-2023-39351 CVE-2023-39351 CVE-2023-39351 https://access.redhat.com/security/cve/CVE-2023-39352 CVE-2023-39352 CVE-2023-39352 https://access.redhat.com/security/cve/CVE-2023-39353 CVE-2023-39353 CVE-2023-39353 https://access.redhat.com/security/cve/CVE-2023-39354 CVE-2023-39354 CVE-2023-39354 https://access.redhat.com/security/cve/CVE-2023-39356 CVE-2023-39356 CVE-2023-39356 https://access.redhat.com/security/cve/CVE-2023-40181 CVE-2023-40181 CVE-2023-40181 https://access.redhat.com/security/cve/CVE-2023-40186 CVE-2023-40186 CVE-2023-40186 https://access.redhat.com/security/cve/CVE-2023-40188 CVE-2023-40188 CVE-2023-40188 https://access.redhat.com/security/cve/CVE-2023-40567 CVE-2023-40567 CVE-2023-40567 https://access.redhat.com/security/cve/CVE-2023-40569 CVE-2023-40569 CVE-2023-40569 https://access.redhat.com/security/cve/CVE-2023-40589 CVE-2023-40589 CVE-2023-40589 https://bugzilla.redhat.com/2236606 2236606 https://bugzilla.redhat.com/2236650 2236650 https://bugzilla.redhat.com/2236656 2236656 https://bugzilla.redhat.com/2236669 2236669 https://bugzilla.redhat.com/2236730 2236730 https://bugzilla.redhat.com/2236750 2236750 https://bugzilla.redhat.com/2236759 2236759 https://bugzilla.redhat.com/2236763 2236763 https://bugzilla.redhat.com/2236766 2236766 https://bugzilla.redhat.com/2236774 2236774 https://bugzilla.redhat.com/2236779 2236779 https://bugzilla.redhat.com/2236784 2236784 https://errata.almalinux.org/9/ALSA-2024-2208.html ALSA-2024:2208 ALSA-2024:2208 � �Hlibwinpr-devel-2.11.2-1.el9.i686.rpm � �Hlibwinpr-devel-2.11.2-1.el9.x86_64.rpm �Hfreerdp-devel-2.11.2-1.el9.x86_64.rpm �Hfreerdp-devel-2.11.2-1.el9.i686.rpm � �Hlibwinpr-devel-2.11.2-1.el9.i686.rpm � �Hlibwinpr-devel-2.11.2-1.el9.x86_64.rpm �Hfreerdp-devel-2.11.2-1.el9.x86_64.rpm �Hfreerdp-devel-2.11.2-1.el9.i686.rpm ����w ��iBBBBsecurity Moderate: libvirt security update
��C�https://access.redhat.com/errata/RHSA-2024:2236 RHSA-2024:2236 RHSA-2024:2236
https://access.redhat.com/security/cve/CVE-2024-2496 CVE-2024-2496 CVE-2024-2496 https://bugzilla.redhat.com/2269672 2269672 https://errata.almalinux.org/9/ALSA-2024-2236.html ALSA-2024:2236 ALSA-2024:2236 �(�mlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm �)�mlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm �B�mlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm �(�mlibvirt-devel-10.0.0-6.el9_4.alma.1.x86_64.rpm �)�mlibvirt-docs-10.0.0-6.el9_4.alma.1.x86_64.rpm �B�mlibvirt-daemon-plugin-sanlock-10.0.0-6.el9_4.alma.1.x86_64.rpm ���i�x ��oBBsecurity Important: edk2 security update ��Y�jhttps://access.redhat.com/errata/RHSA-2024:2264 RHSA-2024:2264 RHSA-2024:2264
https://access.redhat.com/security/cve/CVE-2022-36763 CVE-2022-36763 CVE-2022-36763 https://access.redhat.com/security/cve/CVE-2022-36764 CVE-2022-36764 CVE-2022-36764 https://access.redhat.com/security/cve/CVE-2023-3446 CVE-2023-3446 CVE-2023-3446 https://access.redhat.com/security/cve/CVE-2023-45229 CVE-2023-45229 CVE-2023-45229 https://access.redhat.com/security/cve/CVE-2023-45231 CVE-2023-45231 CVE-2023-45231 https://access.redhat.com/security/cve/CVE-2023-45232 CVE-2023-45232 CVE-2023-45232 https://access.redhat.com/security/cve/CVE-2023-45233 CVE-2023-45233 CVE-2023-45233 https://access.redhat.com/security/cve/CVE-2023-45235 CVE-2023-45235 CVE-2023-45235 https://bugzilla.redhat.com/2224962 2224962 https://bugzilla.redhat.com/2257582 2257582 https://bugzilla.redhat.com/2257583 2257583 https://bugzilla.redhat.com/2258677 2258677 https://bugzilla.redhat.com/2258688 2258688 https://bugzilla.redhat.com/2258691 2258691 https://bugzilla.redhat.com/2258694 2258694 https://bugzilla.redhat.com/2258700 2258700 https://errata.almalinux.org/9/ALSA-2024-2264.html ALSA-2024:2264 ALSA-2024:2264 �K�xedk2-aarch64-20231122-6.el9.noarch.rpm ��xedk2-tools-20231122-6.el9.x86_64.rpm �L�xedk2-tools-doc-20231122-6.el9.noarch.rpm �K�xedk2-aarch64-20231122-6.el9.noarch.rpm ��xedk2-tools-20231122-6.el9.x86_64.rpm �L�xedk2-tools-doc-20231122-6.el9.noarch.rpm ���h�y ��sBsecurity Moderate: qt5-qtbase security update
��C�shttps://access.redhat.com/errata/RHSA-2024:2276 RHSA-2024:2276 RHSA-2024:2276
https://access.redhat.com/security/cve/CVE-2023-51714 CVE-2023-51714 CVE-2023-51714 https://access.redhat.com/security/cve/CVE-2024-25580 CVE-2024-25580 CVE-2024-25580 https://bugzilla.redhat.com/2255856 2255856 https://bugzilla.redhat.com/2264423 2264423 https://errata.almalinux.org/9/ALSA-2024-2276.html ALSA-2024:2276 ALSA-2024:2276 ��aqt5-qtbase-static-5.15.9-9.el9.i686.rpm ��aqt5-qtbase-static-5.15.9-9.el9.x86_64.rpm ��aqt5-qtbase-static-5.15.9-9.el9.i686.rpm ��aqt5-qtbase-static-5.15.9-9.el9.x86_64.rpm ���e�z ��vBsecurity Moderate: gstreamer1-plugins-bad-free security update
��6�P
https://access.redhat.com/errata/RHSA-2024:2287 RHSA-2024:2287 RHSA-2024:2287
https://access.redhat.com/security/cve/CVE-2023-40474 CVE-2023-40474 CVE-2023-40474 https://access.redhat.com/security/cve/CVE-2023-40475 CVE-2023-40475 CVE-2023-40475 https://access.redhat.com/security/cve/CVE-2023-40476 CVE-2023-40476 CVE-2023-40476 https://access.redhat.com/security/cve/CVE-2023-50186 CVE-2023-50186 CVE-2023-50186 https://bugzilla.redhat.com/2254587 2254587 https://bugzilla.redhat.com/2254588 2254588 https://bugzilla.redhat.com/2254589 2254589 https://bugzilla.redhat.com/2255639 2255639 https://errata.almalinux.org/9/ALSA-2024-2287.html ALSA-2024:2287 ALSA-2024:2287 �`�-gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm �`�-gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm �`�-gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.i686.rpm �`�-gstreamer1-plugins-bad-free-devel-1.22.1-4.el9.x86_64.rpm ���k�{ ��ysecurity Moderate: libtiff security update
���:https://access.redhat.com/errata/RHSA-2024:2289 RHSA-2024:2289 RHSA-2024:2289
https://access.redhat.com/security/cve/CVE-2022-40090 CVE-2022-40090 CVE-2022-40090 https://access.redhat.com/security/cve/CVE-2023-3618 CVE-2023-3618 CVE-2023-3618 https://access.redhat.com/security/cve/CVE-2023-40745 CVE-2023-40745 CVE-2023-40745 https://access.redhat.com/security/cve/CVE-2023-41175 CVE-2023-41175 CVE-2023-41175 https://access.redhat.com/security/cve/CVE-2023-6228 CVE-2023-6228 CVE-2023-6228 https://bugzilla.redhat.com/2215865 2215865 https://bugzilla.redhat.com/2234970 2234970 https://bugzilla.redhat.com/2235264 2235264 https://bugzilla.redhat.com/2235265 2235265 https://bugzilla.redhat.com/2240995 2240995 https://errata.almalinux.org/9/ALSA-2024-2289.html ALSA-2024:2289 ALSA-2024:2289 � �Jlibtiff-tools-4.4.0-12.el9.x86_64.rpm � �Jlibtiff-tools-4.4.0-12.el9.x86_64.rpm ����| ��WB�dBBBBBBBBBsecurity Moderate: python3.11 security update
��@�rhttps://access.redhat.com/errata/RHSA-2024:2292 RHSA-2024:2292 RHSA-2024:2292
https://access.redhat.com/security/cve/CVE-2023-27043 CVE-2023-27043 CVE-2023-27043 https://bugzilla.redhat.com/2196183 2196183 https://errata.almalinux.org/9/ALSA-2024-2292.html ALSA-2024:2292 ALSA-2024:2292 �python3.11-test-3.11.7-1.el9.i686.rpm a�python3.11-3.11.7-1.el9.i686.rpm �python3.11-idle-3.11.7-1.el9.i686.rpm �python3.11-test-3.11.7-1.el9.x86_64.rpm �python3.11-debug-3.11.7-1.el9.i686.rpm b�python3.11-tkinter-3.11.7-1.el9.i686.rpm �python3.11-idle-3.11.7-1.el9.x86_64.rpm �python3.11-debug-3.11.7-1.el9.x86_64.rpm �python3.11-test-3.11.7-1.el9.i686.rpm a�python3.11-3.11.7-1.el9.i686.rpm �python3.11-idle-3.11.7-1.el9.i686.rpm �python3.11-test-3.11.7-1.el9.x86_64.rpm �python3.11-debug-3.11.7-1.el9.i686.rpm b�python3.11-tkinter-3.11.7-1.el9.i686.rpm �python3.11-idle-3.11.7-1.el9.x86_64.rpm �python3.11-debug-3.11.7-1.el9.x86_64.rpm ���9�} ��FBBBBsecurity Moderate: libjpeg-turbo security update
��2�Rhttps://access.redhat.com/errata/RHSA-2024:2295 RHSA-2024:2295 RHSA-2024:2295
https://access.redhat.com/security/cve/CVE-2021-29390 CVE-2021-29390 CVE-2021-29390 https://bugzilla.redhat.com/2235521 2235521 https://errata.almalinux.org/9/ALSA-2024-2295.html ALSA-2024:2295 ALSA-2024:2295 �l�Dturbojpeg-devel-2.0.90-7.el9.x86_64.rpm �k�Dturbojpeg-2.0.90-7.el9.i686.rpm �l�Dturbojpeg-devel-2.0.90-7.el9.i686.rpm �k�Dturbojpeg-2.0.90-7.el9.x86_64.rpm �l�Dturbojpeg-devel-2.0.90-7.el9.x86_64.rpm �k�Dturbojpeg-2.0.90-7.el9.i686.rpm �l�Dturbojpeg-devel-2.0.90-7.el9.i686.rpm �k�Dturbojpeg-2.0.90-7.el9.x86_64.rpm ����~ ��LBBsecurity Moderate: mingw components security update
���Bhttps://access.redhat.com/errata/RHSA-2024:2353 RHSA-2024:2353 RHSA-2024:2353
https://access.redhat.com/security/cve/CVE-2023-1579 CVE-2023-1579 CVE-2023-1579 https://bugzilla.redhat.com/2180905 2180905 https://errata.almalinux.org/9/ALSA-2024-2353.html ALSA-2024:2353 ALSA-2024:2353 �`�mingw64-binutils-2.41-3.el9.x86_64.rpm �[�mingw32-binutils-2.41-3.el9.x86_64.rpm �`�mingw64-binutils-2.41-3.el9.x86_64.rpm �[�mingw32-binutils-2.41-3.el9.x86_64.rpm ���/� ��PBsecurity Moderate: zziplib security update
��F�https://access.redhat.com/errata/RHSA-2024:2377 RHSA-2024:2377 RHSA-2024:2377
https://access.redhat.com/security/cve/CVE-2020-18770 CVE-2020-18770 CVE-2020-18770 https://bugzilla.redhat.com/2246907 2246907 https://errata.almalinux.org/9/ALSA-2024-2377.html ALSA-2024:2377 ALSA-2024:2377 �m�zziplib-devel-0.13.71-11.el9_4.x86_64.rpm �m�zziplib-devel-0.13.71-11.el9_4.i686.rpm �m�zziplib-devel-0.13.71-11.el9_4.x86_64.rpm �m�zziplib-devel-0.13.71-11.el9_4.i686.rpm ���/� ��SBBBBsecurity Important: kernel security, bug fix, and enhancement update ��T�%zhttps://access.redhat.com/errata/RHSA-2024:2394 RHSA-2024:2394 RHSA-2024:2394
https://bugzilla.redhat.com/1918601 1918601 https://bugzilla.redhat.com/2049700 2049700 https://bugzilla.redhat.com/2133452 2133452 https://bugzilla.redhat.com/2151959 2151959 https://bugzilla.redhat.com/2177759 2177759 https://bugzilla.redhat.com/2185519 2185519 https://bugzilla.redhat.com/2188102 2188102 https://bugzilla.redhat.com/2210024 2210024 https://bugzilla.redhat.com/2213132 2213132 https://bugzilla.redhat.com/2218332 2218332 https://bugzilla.redhat.com/2219359 2219359 https://bugzilla.redhat.com/2221039 2221039 https://bugzilla.redhat.com/2221463 2221463 https://bugzilla.redhat.com/2221702 2221702 https://bugzilla.redhat.com/2226777 2226777 https://bugzilla.redhat.com/2226787 2226787 https://bugzilla.redhat.com/2226788 2226788 https://bugzilla.redhat.com/2231410 2231410 https://bugzilla.redhat.com/2239845 2239845 https://bugzilla.redhat.com/2239848 2239848 https://bugzilla.redhat.com/2244720 2244720 https://bugzilla.redhat.com/2246980 2246980 https://bugzilla.redhat.com/2250043 2250043 https://bugzilla.redhat.com/2252731 2252731 https://bugzilla.redhat.com/2253034 2253034 https://bugzilla.redhat.com/2253632 2253632 https://bugzilla.redhat.com/2254961 2254961 https://bugzilla.redhat.com/2254982 2254982 https://bugzilla.redhat.com/2255283 2255283 https://bugzilla.redhat.com/2255498 2255498 https://bugzilla.redhat.com/2256490 2256490 https://bugzilla.redhat.com/2256822 2256822 https://bugzilla.redhat.com/2257682 2257682 https://bugzilla.redhat.com/2258013 2258013 https://bugzilla.redhat.com/2258518 2258518 https://bugzilla.redhat.com/2260005 2260005 https://bugzilla.redhat.com/2262126 2262126 https://bugzilla.redhat.com/2262127 2262127 https://bugzilla.redhat.com/2265285 2265285 https://bugzilla.redhat.com/2265517 2265517 https://bugzilla.redhat.com/2265518 2265518 https://bugzilla.redhat.com/2265519 2265519 https://bugzilla.redhat.com/2265520 2265520 https://bugzilla.redhat.com/2265645 2265645 https://bugzilla.redhat.com/2265646 2265646 https://bugzilla.redhat.com/2265653 2265653 https://bugzilla.redhat.com/2267041 2267041 https://bugzilla.redhat.com/2267695 2267695 https://bugzilla.redhat.com/2267750 2267750 https://bugzilla.redhat.com/2267758 2267758 https://bugzilla.redhat.com/2267760 2267760 https://bugzilla.redhat.com/2267761 2267761 https://bugzilla.redhat.com/2267788 2267788 https://bugzilla.redhat.com/2267795 2267795 https://bugzilla.redhat.com/2269189 2269189 https://bugzilla.redhat.com/2269217 2269217 https://bugzilla.redhat.com/2270080 2270080 https://bugzilla.redhat.com/2270118 2270118 https://bugzilla.redhat.com/2270883 2270883 https://errata.almalinux.org/9/ALSA-2024-2394.html ALSA-2024:2394 ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.html CVE-2020-26555 CVE-2020-26555 https://www.redhat.com/security/data/cve/CVE-2022-0480.html CVE-2022-0480 CVE-2022-0480 https://www.redhat.com/security/data/cve/CVE-2022-38096.html CVE-2022-38096 CVE-2022-38096 https://www.redhat.com/security/data/cve/CVE-2022-45934.html CVE-2022-45934 CVE-2022-45934 https://www.redhat.com/security/data/cve/CVE-2023-24023.html CVE-2023-24023 CVE-2023-24023 https://www.redhat.com/security/data/cve/CVE-2023-25775.html CVE-2023-25775 CVE-2023-25775 https://www.redhat.com/security/data/cve/CVE-2023-28464.html CVE-2023-28464 CVE-2023-28464 https://www.redhat.com/security/data/cve/CVE-2023-28866.html CVE-2023-28866 CVE-2023-28866 https://www.redhat.com/security/data/cve/CVE-2023-31083.html CVE-2023-31083 CVE-2023-31083 https://www.redhat.com/security/data/cve/CVE-2023-3567.html CVE-2023-3567 CVE-2023-3567 https://www.redhat.com/security/data/cve/CVE-2023-37453.html CVE-2023-37453 CVE-2023-37453 https://www.redhat.com/security/data/cve/CVE-2023-39189.html CVE-2023-39189 CVE-2023-39189 https://www.redhat.com/security/data/cve/CVE-2023-39193.html CVE-2023-39193 CVE-2023-39193 https://www.redhat.com/security/data/cve/CVE-2023-39194.html CVE-2023-39194 CVE-2023-39194 https://www.redhat.com/security/data/cve/CVE-2023-39198.html CVE-2023-39198 CVE-2023-39198 https://www.redhat.com/security/data/cve/CVE-2023-4133.html CVE-2023-4133 CVE-2023-4133 https://www.redhat.com/security/data/cve/CVE-2023-42754.html CVE-2023-42754 CVE-2023-42754 https://www.redhat.com/security/data/cve/CVE-2023-42756.html CVE-2023-42756 CVE-2023-42756 https://www.redhat.com/security/data/cve/CVE-2023-45863.html CVE-2023-45863 CVE-2023-45863 https://www.redhat.com/security/data/cve/CVE-2023-46862.html CVE-2023-46862 CVE-2023-46862 https://www.redhat.com/security/data/cve/CVE-2023-51043.html CVE-2023-51043 CVE-2023-51043 https://www.redhat.com/security/data/cve/CVE-2023-51779.html CVE-2023-51779 CVE-2023-51779 https://www.redhat.com/security/data/cve/CVE-2023-51780.html CVE-2023-51780 CVE-2023-51780 https://www.redhat.com/security/data/cve/CVE-2023-52434.html CVE-2023-52434 CVE-2023-52434 https://www.redhat.com/security/data/cve/CVE-2023-52448.html CVE-2023-52448 CVE-2023-52448 https://www.redhat.com/security/data/cve/CVE-2023-52450.html CVE-2023-52450 CVE-2023-52450 https://www.redhat.com/security/data/cve/CVE-2023-52476.html CVE-2023-52476 CVE-2023-52476 https://www.redhat.com/security/data/cve/CVE-2023-52489.html CVE-2023-52489 CVE-2023-52489 https://www.redhat.com/security/data/cve/CVE-2023-52522.html CVE-2023-52522 CVE-2023-52522 https://www.redhat.com/security/data/cve/CVE-2023-52529.html CVE-2023-52529 CVE-2023-52529 https://www.redhat.com/security/data/cve/CVE-2023-52574.html CVE-2023-52574 CVE-2023-52574 https://www.redhat.com/security/data/cve/CVE-2023-52578.html CVE-2023-52578 CVE-2023-52578 https://www.redhat.com/security/data/cve/CVE-2023-52580.html CVE-2023-52580 CVE-2023-52580 https://www.redhat.com/security/data/cve/CVE-2023-52581.html CVE-2023-52581 CVE-2023-52581 https://www.redhat.com/security/data/cve/CVE-2023-52597.html CVE-2023-52597 CVE-2023-52597 https://www.redhat.com/security/data/cve/CVE-2023-52610.html CVE-2023-52610 CVE-2023-52610 https://www.redhat.com/security/data/cve/CVE-2023-52620.html CVE-2023-52620 CVE-2023-52620 https://www.redhat.com/security/data/cve/CVE-2023-6040.html CVE-2023-6040 CVE-2023-6040 https://www.redhat.com/security/data/cve/CVE-2023-6121.html CVE-2023-6121 CVE-2023-6121 https://www.redhat.com/security/data/cve/CVE-2023-6176.html CVE-2023-6176 CVE-2023-6176 https://www.redhat.com/security/data/cve/CVE-2023-6531.html CVE-2023-6531 CVE-2023-6531 https://www.redhat.com/security/data/cve/CVE-2023-6546.html CVE-2023-6546 CVE-2023-6546 https://www.redhat.com/security/data/cve/CVE-2023-6622.html CVE-2023-6622 CVE-2023-6622 https://www.redhat.com/security/data/cve/CVE-2023-6915.html CVE-2023-6915 CVE-2023-6915 https://www.redhat.com/security/data/cve/CVE-2023-6931.html CVE-2023-6931 CVE-2023-6931 https://www.redhat.com/security/data/cve/CVE-2023-6932.html CVE-2023-6932 CVE-2023-6932 https://www.redhat.com/security/data/cve/CVE-2024-0565.html CVE-2024-0565 CVE-2024-0565 https://www.redhat.com/security/data/cve/CVE-2024-0841.html CVE-2024-0841 CVE-2024-0841 https://www.redhat.com/security/data/cve/CVE-2024-1085.html CVE-2024-1085 CVE-2024-1085 https://www.redhat.com/security/data/cve/CVE-2024-1086.html CVE-2024-1086 CVE-2024-1086 https://www.redhat.com/security/data/cve/CVE-2024-25744.html CVE-2024-25744 CVE-2024-25744 https://www.redhat.com/security/data/cve/CVE-2024-26582.html CVE-2024-26582 CVE-2024-26582 https://www.redhat.com/security/data/cve/CVE-2024-26583.html CVE-2024-26583 CVE-2024-26583 https://www.redhat.com/security/data/cve/CVE-2024-26584.html CVE-2024-26584 CVE-2024-26584 https://www.redhat.com/security/data/cve/CVE-2024-26585.html CVE-2024-26585 CVE-2024-26585 https://www.redhat.com/security/data/cve/CVE-2024-26586.html CVE-2024-26586 CVE-2024-26586 https://www.redhat.com/security/data/cve/CVE-2024-26593.html CVE-2024-26593 CVE-2024-26593 https://www.redhat.com/security/data/cve/CVE-2024-26602.html CVE-2024-26602 CVE-2024-26602 https://www.redhat.com/security/data/cve/CVE-2024-26609.html CVE-2024-26609 CVE-2024-26609 https://www.redhat.com/security/data/cve/CVE-2024-26633.html CVE-2024-26633 CVE-2024-26633 https://www.redhat.com/security/data/cve/CVE-2024-26671.html CVE-2024-26671 CVE-2024-26671 �ylibperf-5.14.0-427.13.1.el9_4.x86_64.rpm �ykernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpm �ykernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm �ylibperf-5.14.0-427.13.1.el9_4.x86_64.rpm �ykernel-cross-headers-5.14.0-427.13.1.el9_4.x86_64.rpm �ykernel-tools-libs-devel-5.14.0-427.13.1.el9_4.x86_64.rpm ����� ��YBBBBBBBBBBBBBBBBsecurity Moderate: avahi security update
��y�Ohttps://access.redhat.com/errata/RHSA-2024:2433 RHSA-2024:2433 RHSA-2024:2433
https://access.redhat.com/security/cve/CVE-2023-38469 CVE-2023-38469 CVE-2023-38469 https://access.redhat.com/security/cve/CVE-2023-38470 CVE-2023-38470 CVE-2023-38470 https://access.redhat.com/security/cve/CVE-2023-38471 CVE-2023-38471 CVE-2023-38471 https://access.redhat.com/security/cve/CVE-2023-38472 CVE-2023-38472 CVE-2023-38472 https://access.redhat.com/security/cve/CVE-2023-38473 CVE-2023-38473 CVE-2023-38473 https://bugzilla.redhat.com/2191687 2191687 https://bugzilla.redhat.com/2191690 2191690 https://bugzilla.redhat.com/2191691 2191691 https://bugzilla.redhat.com/2191692 2191692 https://bugzilla.redhat.com/2191694 2191694 https://errata.almalinux.org/9/ALSA-2024-2433.html ALSA-2024:2433 ALSA-2024:2433 �8Ravahi-devel-0.8-20.el9.i686.rpm �9Ravahi-glib-devel-0.8-20.el9.x86_64.rpm �6Ravahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm �7Ravahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm �4Ravahi-compat-howl-0.8-20.el9.i686.rpm �8Ravahi-devel-0.8-20.el9.x86_64.rpm �6Ravahi-compat-libdns_sd-0.8-20.el9.i686.rpm �4Ravahi-compat-howl-0.8-20.el9.x86_64.rpm �5Ravahi-compat-howl-devel-0.8-20.el9.i686.rpm �5Ravahi-compat-howl-devel-0.8-20.el9.x86_64.rpm �7Ravahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm �9Ravahi-glib-devel-0.8-20.el9.i686.rpm �8Ravahi-devel-0.8-20.el9.i686.rpm �9Ravahi-glib-devel-0.8-20.el9.x86_64.rpm �6Ravahi-compat-libdns_sd-0.8-20.el9.x86_64.rpm �7Ravahi-compat-libdns_sd-devel-0.8-20.el9.x86_64.rpm �4Ravahi-compat-howl-0.8-20.el9.i686.rpm �8Ravahi-devel-0.8-20.el9.x86_64.rpm �6Ravahi-compat-libdns_sd-0.8-20.el9.i686.rpm �4Ravahi-compat-howl-0.8-20.el9.x86_64.rpm �5Ravahi-compat-howl-devel-0.8-20.el9.i686.rpm �5Ravahi-compat-howl-devel-0.8-20.el9.x86_64.rpm �7Ravahi-compat-libdns_sd-devel-0.8-20.el9.i686.rpm �9Ravahi-glib-devel-0.8-20.el9.i686.rpm ���t� ��ksecurity Moderate: systemd security update
��H�https://access.redhat.com/errata/RHSA-2024:2463 RHSA-2024:2463 RHSA-2024:2463
https://access.redhat.com/security/cve/CVE-2023-7008 CVE-2023-7008 CVE-2023-7008 https://bugzilla.redhat.com/2222672 2222672 https://errata.almalinux.org/9/ALSA-2024-2463.html ALSA-2024:2463 ALSA-2024:2463 �q�Csystemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm �q�Csystemd-boot-unsigned-252-32.el9_4.alma.1.x86_64.rpm ���� � �mBsecurity Low: file security update �V��I�Bhttps://access.redhat.com/errata/RHSA-2024:2512 RHSA-2024:2512 RHSA-2024:2512
https://access.redhat.com/security/cve/CVE-2022-48554 CVE-2022-48554 CVE-2022-48554 https://bugzilla.redhat.com/2235714 2235714 https://errata.almalinux.org/9/ALSA-2024-2512.html ALSA-2024:2512 ALSA-2024:2512 �o�bfile-devel-5.39-16.el9.i686.rpm �o�bfile-devel-5.39-16.el9.x86_64.rpm �o�bfile-devel-5.39-16.el9.i686.rpm �o�bfile-devel-5.39-16.el9.x86_64.rpm ���� �2�psecurity Moderate: mingw-pixman security update
���https://access.redhat.com/errata/RHSA-2024:2525 RHSA-2024:2525 RHSA-2024:2525
https://access.redhat.com/security/cve/CVE-2022-44638 CVE-2022-44638 CVE-2022-44638 https://bugzilla.redhat.com/2139988 2139988 https://errata.almalinux.org/9/ALSA-2024-2525.html ALSA-2024:2525 ALSA-2024:2525 ��mingw32-pixman-0.42.2-3.el9.noarch.rpm ��mingw64-pixman-0.42.2-3.el9.noarch.rpm ��mingw32-pixman-0.42.2-3.el9.noarch.rpm ��mingw64-pixman-0.42.2-3.el9.noarch.rpm ���u� �7�sBBsecurity Low: mingw-glib2 security update �V���%
https://access.redhat.com/errata/RHSA-2024:2528 RHSA-2024:2528 RHSA-2024:2528
https://access.redhat.com/security/cve/CVE-2023-29499 CVE-2023-29499 CVE-2023-29499 https://access.redhat.com/security/cve/CVE-2023-32611 CVE-2023-32611 CVE-2023-32611 https://access.redhat.com/security/cve/CVE-2023-32636 CVE-2023-32636 CVE-2023-32636 https://access.redhat.com/security/cve/CVE-2023-32665 CVE-2023-32665 CVE-2023-32665 https://bugzilla.redhat.com/2211827 2211827 https://bugzilla.redhat.com/2211828 2211828 https://bugzilla.redhat.com/2211829 2211829 https://bugzilla.redhat.com/2211833 2211833 https://errata.almalinux.org/9/ALSA-2024-2528.html ALSA-2024:2528 ALSA-2024:2528 �I�qmingw64-glib2-static-2.78.0-1.el9.noarch.rpm �H�qmingw64-glib2-2.78.0-1.el9.noarch.rpm �F�qmingw32-glib2-2.78.0-1.el9.noarch.rpm �G�qmingw32-glib2-static-2.78.0-1.el9.noarch.rpm �I�qmingw64-glib2-static-2.78.0-1.el9.noarch.rpm �H�qmingw64-glib2-2.78.0-1.el9.noarch.rpm �F�qmingw32-glib2-2.78.0-1.el9.noarch.rpm �G�qmingw32-glib2-static-2.78.0-1.el9.noarch.rpm ���T� �"�a�XBBBsecurity Important: bind security update ��D�https://access.redhat.com/errata/RHSA-2024:2551 RHSA-2024:2551 RHSA-2024:2551
https://access.redhat.com/security/cve/CVE-2023-4408 CVE-2023-4408 CVE-2023-4408 https://access.redhat.com/security/cve/CVE-2023-50387 CVE-2023-50387 CVE-2023-50387 https://access.redhat.com/security/cve/CVE-2023-50868 CVE-2023-50868 CVE-2023-50868 https://access.redhat.com/security/cve/CVE-2023-5517 CVE-2023-5517 CVE-2023-5517 https://access.redhat.com/security/cve/CVE-2023-5679 CVE-2023-5679 CVE-2023-5679 https://access.redhat.com/security/cve/CVE-2023-6516 CVE-2023-6516 CVE-2023-6516 https://bugzilla.redhat.com/2263896 2263896 https://bugzilla.redhat.com/2263897 2263897 https://bugzilla.redhat.com/2263909 2263909 https://bugzilla.redhat.com/2263911 2263911 https://bugzilla.redhat.com/2263914 2263914 https://bugzilla.redhat.com/2263917 2263917 https://errata.almalinux.org/9/ALSA-2024-2551.html ALSA-2024:2551 ALSA-2024:2551 �^�Sbind-libs-9.16.23-18.el9_4.1.i686.rpm O�Sbind-devel-9.16.23-18.el9_4.1.i686.rpm O�Sbind-devel-9.16.23-18.el9_4.1.x86_64.rpm ��Sbind-doc-9.16.23-18.el9_4.1.noarch.rpm �^�Sbind-libs-9.16.23-18.el9_4.1.i686.rpm O�Sbind-devel-9.16.23-18.el9_4.1.i686.rpm O�Sbind-devel-9.16.23-18.el9_4.1.x86_64.rpm ��Sbind-doc-9.16.23-18.el9_4.1.noarch.rpm ���)� �#�}BBBBsecurity Moderate: libvirt security and bug fix update
��R�2https://access.redhat.com/errata/RHSA-2024:2560 RHSA-2024:2560 RHSA-2024:2560
https://access.redhat.com/security/cve/CVE-2024-1441 CVE-2024-1441 CVE-2024-1441 https://access.redhat.com/security/cve/CVE-2024-2494 CVE-2024-2494 CVE-2024-2494 https://bugzilla.redhat.com/2263841 2263841 https://bugzilla.redhat.com/2270115 2270115 https://errata.almalinux.org/9/ALSA-2024-2560.html ALSA-2024:2560 ALSA-2024:2560 �(�klibvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �)�klibvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �B�klibvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �(�klibvirt-devel-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �)�klibvirt-docs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm �B�klibvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm ���!� �$�CBsecurity Moderate: sssd security and bug fix update
���Hhttps://access.redhat.com/errata/RHSA-2024:2571 RHSA-2024:2571 RHSA-2024:2571
https://access.redhat.com/security/cve/CVE-2023-3758 CVE-2023-3758 CVE-2023-3758 https://bugzilla.redhat.com/2223762 2223762 https://errata.almalinux.org/9/ALSA-2024-2571.html ALSA-2024:2571 ALSA-2024:2571 �d�Nlibsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpm �d�Nlibsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpm �d�Nlibsss_nss_idmap-devel-2.9.4-6.el9_4.i686.rpm �d�Nlibsss_nss_idmap-devel-2.9.4-6.el9_4.x86_64.rpm ���C� �%�FBBBBsecurity Moderate: kernel security and bug fix update
��L�&https://access.redhat.com/errata/RHSA-2024:2758 RHSA-2024:2758 RHSA-2024:2758
https://bugzilla.redhat.com/2250843 2250843 https://bugzilla.redhat.com/2270836 2270836 https://errata.almalinux.org/9/ALSA-2024-2758.html ALSA-2024:2758 ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.html CVE-2023-5090 CVE-2023-5090 https://www.redhat.com/security/data/cve/CVE-2023-6240.html CVE-2023-6240 CVE-2023-6240 https://www.redhat.com/security/data/cve/CVE-2024-25742.html CVE-2024-25742 CVE-2024-25742 https://www.redhat.com/security/data/cve/CVE-2024-25743.html CVE-2024-25743 CVE-2024-25743 �zkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpm �zlibperf-5.14.0-427.16.1.el9_4.x86_64.rpm �zkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpm �zkernel-tools-libs-devel-5.14.0-427.16.1.el9_4.x86_64.rpm �zlibperf-5.14.0-427.16.1.el9_4.x86_64.rpm �zkernel-cross-headers-5.14.0-427.16.1.el9_4.x86_64.rpm ����h�
�&�Lsecurity Important: .NET 8.0 security update ��r�"https://access.redhat.com/errata/RHSA-2024:2842 RHSA-2024:2842 RHSA-2024:2842
https://access.redhat.com/security/cve/CVE-2024-30045 CVE-2024-30045 CVE-2024-30045 https://access.redhat.com/security/cve/CVE-2024-30046 CVE-2024-30046 CVE-2024-30046 https://bugzilla.redhat.com/2279695 2279695 https://bugzilla.redhat.com/2279697 2279697 https://errata.almalinux.org/9/ALSA-2024-2842.html ALSA-2024:2842 ALSA-2024:2842 ��sdotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpm ��sdotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4.x86_64.rpm ����C� �'�Nsecurity Important: .NET 7.0 security update ���#https://access.redhat.com/errata/RHSA-2024:2843 RHSA-2024:2843 RHSA-2024:2843
https://access.redhat.com/security/cve/CVE-2024-30045 CVE-2024-30045 CVE-2024-30045 https://access.redhat.com/security/cve/CVE-2024-30046 CVE-2024-30046 CVE-2024-30046 https://bugzilla.redhat.com/2279695 2279695 https://bugzilla.redhat.com/2279697 2279697 https://errata.almalinux.org/9/ALSA-2024-2843.html ALSA-2024:2843 ALSA-2024:2843 �U�ndotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpm �U�ndotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4.x86_64.rpm ����l� �(�PBBBBsecurity Moderate: kernel security and bug fix update
��7�xhttps://access.redhat.com/errata/RHSA-2024:3306 RHSA-2024:3306 RHSA-2024:3306
https://bugzilla.redhat.com/2270879 2270879 https://bugzilla.redhat.com/2270881 2270881 https://bugzilla.redhat.com/2272816 2272816 https://bugzilla.redhat.com/2273423 2273423 https://errata.almalinux.org/9/ALSA-2024-3306.html ALSA-2024:3306 ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.html CVE-2024-26642 CVE-2024-26642 https://www.redhat.com/security/data/cve/CVE-2024-26643.html CVE-2024-26643 CVE-2024-26643 https://www.redhat.com/security/data/cve/CVE-2024-26673.html CVE-2024-26673 CVE-2024-26673 https://www.redhat.com/security/data/cve/CVE-2024-26804.html CVE-2024-26804 CVE-2024-26804 https://www.redhat.com/security/data/cve/CVE-2024-35890.html CVE-2024-35890 CVE-2024-35890 �{libperf-5.14.0-427.18.1.el9_4.x86_64.rpm �{kernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpm �{kernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpm �{libperf-5.14.0-427.18.1.el9_4.x86_64.rpm �{kernel-tools-libs-devel-5.14.0-427.18.1.el9_4.x86_64.rpm �{kernel-cross-headers-5.14.0-427.18.1.el9_4.x86_64.rpm �����
�)�VBBBBBBBBBBBBsecurity Important: glibc security update ��/�https://access.redhat.com/errata/RHSA-2024:3339 RHSA-2024:3339 RHSA-2024:3339
https://access.redhat.com/security/cve/CVE-2024-2961 CVE-2024-2961 CVE-2024-2961 https://access.redhat.com/security/cve/CVE-2024-33599 CVE-2024-33599 CVE-2024-33599 https://access.redhat.com/security/cve/CVE-2024-33600 CVE-2024-33600 CVE-2024-33600 https://access.redhat.com/security/cve/CVE-2024-33601 CVE-2024-33601 CVE-2024-33601 https://access.redhat.com/security/cve/CVE-2024-33602 CVE-2024-33602 CVE-2024-33602 https://bugzilla.redhat.com/2273404 2273404 https://bugzilla.redhat.com/2277202 2277202 https://bugzilla.redhat.com/2277204 2277204 https://bugzilla.redhat.com/2277205 2277205 https://bugzilla.redhat.com/2277206 2277206 https://errata.almalinux.org/9/ALSA-2024-3339.html ALSA-2024:3339 ALSA-2024:3339 �_fglibc-benchtests-2.34-100.el9_4.2.x86_64.rpm �Qfnss_db-2.34-100.el9_4.2.i686.rpm �Nfglibc-static-2.34-100.el9_4.2.x86_64.rpm �Nfglibc-static-2.34-100.el9_4.2.i686.rpm �Mfglibc-nss-devel-2.34-100.el9_4.2.i686.rpm �Rfnss_hesiod-2.34-100.el9_4.2.i686.rpm �Rfnss_hesiod-2.34-100.el9_4.2.x86_64.rpm �Qfnss_db-2.34-100.el9_4.2.x86_64.rpm �Mfglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm �_fglibc-benchtests-2.34-100.el9_4.2.x86_64.rpm �Qfnss_db-2.34-100.el9_4.2.i686.rpm �Nfglibc-static-2.34-100.el9_4.2.x86_64.rpm �Nfglibc-static-2.34-100.el9_4.2.i686.rpm �Mfglibc-nss-devel-2.34-100.el9_4.2.i686.rpm �Rfnss_hesiod-2.34-100.el9_4.2.i686.rpm �Rfnss_hesiod-2.34-100.el9_4.2.x86_64.rpm �Qfnss_db-2.34-100.el9_4.2.x86_64.rpm �Mfglibc-nss-devel-2.34-100.el9_4.2.x86_64.rpm ����t� � �dBBBsecurity Moderate: nghttp2 security update
��?�mhttps://access.redhat.com/errata/RHSA-2024:3501 RHSA-2024:3501 RHSA-2024:3501
https://access.redhat.com/security/cve/CVE-2024-28182 CVE-2024-28182 CVE-2024-28182 https://bugzilla.redhat.com/2268639 2268639 https://errata.almalinux.org/9/ALSA-2024-3501.html ALSA-2024:3501 ALSA-2024:3501 ��Olibnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm �~�Onghttp2-1.43.0-5.el9_4.3.x86_64.rpm ��Olibnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm ��Olibnghttp2-devel-1.43.0-5.el9_4.3.i686.rpm �~�Onghttp2-1.43.0-5.el9_4.3.x86_64.rpm ��Olibnghttp2-devel-1.43.0-5.el9_4.3.x86_64.rpm ���>� �*�iBBBBsecurity Moderate: kernel security and bug fix update
��,�bhttps://access.redhat.com/errata/RHSA-2024:3619 RHSA-2024:3619 RHSA-2024:3619
https://access.redhat.com/security/cve/CVE-2024-26735 CVE-2024-26735 CVE-2024-26735 https://access.redhat.com/security/cve/CVE-2024-26993 CVE-2024-26993 CVE-2024-26993 https://bugzilla.redhat.com/2273278 2273278 https://bugzilla.redhat.com/2278314 2278314 https://errata.almalinux.org/9/ALSA-2024-3619.html ALSA-2024:3619 ALSA-2024:3619 �|libperf-5.14.0-427.20.1.el9_4.x86_64.rpm �|kernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpm �|kernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpm �|libperf-5.14.0-427.20.1.el9_4.x86_64.rpm �|kernel-cross-headers-5.14.0-427.20.1.el9_4.x86_64.rpm �|kernel-tools-libs-devel-5.14.0-427.20.1.el9_4.x86_64.rpm ����F� �+�/security Important: ipa security update ���whttps://access.redhat.com/errata/RHSA-2024:3754 RHSA-2024:3754 RHSA-2024:3754
https://access.redhat.com/security/cve/CVE-2024-2698 CVE-2024-2698 CVE-2024-2698 https://access.redhat.com/security/cve/CVE-2024-3183 CVE-2024-3183 CVE-2024-3183 https://bugzilla.redhat.com/2270353 2270353 https://bugzilla.redhat.com/2270685 2270685 https://errata.almalinux.org/9/ALSA-2024-3754.html ALSA-2024:3754 ALSA-2024:3754 ��|python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm ��|python3-ipatests-4.11.0-15.el9_4.alma.1.noarch.rpm ��ѧm� �,�pBBsecurity Important: libreoffice security update ���Xhttps://access.redhat.com/errata/RHSA-2024:3835 RHSA-2024:3835 RHSA-2024:3835
https://access.redhat.com/security/cve/CVE-2023-6185 CVE-2023-6185 CVE-2023-6185 https://access.redhat.com/security/cve/CVE-2023-6186 CVE-2023-6186 CVE-2023-6186 https://bugzilla.redhat.com/2254003 2254003 https://bugzilla.redhat.com/2254005 2254005 https://errata.almalinux.org/9/ALSA-2024-3835.html ALSA-2024:3835 ALSA-2024:3835 �`�libreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �`�libreoffice-sdk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-12.el9_4.alma.1.x86_64.rpm ����� �-�tsecurity Important: 389-ds-base security update ��]�mhttps://access.redhat.com/errata/RHSA-2024:3837 RHSA-2024:3837 RHSA-2024:3837
https://access.redhat.com/security/cve/CVE-2024-2199 CVE-2024-2199 CVE-2024-2199 https://access.redhat.com/security/cve/CVE-2024-3657 CVE-2024-3657 CVE-2024-3657 https://bugzilla.redhat.com/2267976 2267976 https://bugzilla.redhat.com/2274401 2274401 https://errata.almalinux.org/9/ALSA-2024-3837.html ALSA-2024:3837 ALSA-2024:3837 �t�>389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm �t�>389-ds-base-devel-2.4.5-8.el9_4.x86_64.rpm ����� �.�6security Moderate: ruby security update
��J�Xhttps://access.redhat.com/errata/RHSA-2024:3838 RHSA-2024:3838 RHSA-2024:3838
https://access.redhat.com/security/cve/CVE-2021-33621 CVE-2021-33621 CVE-2021-33621 https://access.redhat.com/security/cve/CVE-2023-28755 CVE-2023-28755 CVE-2023-28755 https://access.redhat.com/security/cve/CVE-2023-28756 CVE-2023-28756 CVE-2023-28756 https://access.redhat.com/security/cve/CVE-2024-27280 CVE-2024-27280 CVE-2024-27280 https://access.redhat.com/security/cve/CVE-2024-27281 CVE-2024-27281 CVE-2024-27281 https://access.redhat.com/security/cve/CVE-2024-27282 CVE-2024-27282 CVE-2024-27282 https://bugzilla.redhat.com/2149706 2149706 https://bugzilla.redhat.com/2184059 2184059 https://bugzilla.redhat.com/2184061 2184061 https://bugzilla.redhat.com/2270749 2270749 https://bugzilla.redhat.com/2270750 2270750 https://bugzilla.redhat.com/2276810 2276810 https://errata.almalinux.org/9/ALSA-2024-3838.html ALSA-2024:3838 ALSA-2024:3838 ��yruby-doc-3.0.7-162.el9_4.noarch.rpm ��yruby-doc-3.0.7-162.el9_4.noarch.rpm ����� �1�oB�HBBBsecurity Important: flatpak security update ��"�|https://access.redhat.com/errata/RHSA-2024:3959 RHSA-2024:3959 RHSA-2024:3959
https://access.redhat.com/security/cve/CVE-2024-32462 CVE-2024-32462 CVE-2024-32462 https://bugzilla.redhat.com/2275981 2275981 https://errata.almalinux.org/9/ALSA-2024-3959.html ALSA-2024:3959 ALSA-2024:3959 �|�-flatpak-1.12.9-1.el9_4.i686.rpm ��-flatpak-devel-1.12.9-1.el9_4.x86_64.rpm �}�-flatpak-session-helper-1.12.9-1.el9_4.i686.rpm ��-flatpak-devel-1.12.9-1.el9_4.i686.rpm �|�-flatpak-1.12.9-1.el9_4.i686.rpm ��-flatpak-devel-1.12.9-1.el9_4.x86_64.rpm �}�-flatpak-session-helper-1.12.9-1.el9_4.i686.rpm ��-flatpak-devel-1.12.9-1.el9_4.i686.rpm ����@� �5�rBB�IBBBBsecurity Important: ghostscript security update ���qhttps://access.redhat.com/errata/RHSA-2024:3999 RHSA-2024:3999 RHSA-2024:3999
https://access.redhat.com/security/cve/CVE-2024-33871 CVE-2024-33871 CVE-2024-33871 https://bugzilla.redhat.com/2283508 2283508 https://errata.almalinux.org/9/ALSA-2024-3999.html ALSA-2024:3999 ALSA-2024:3999 �!�ghostscript-9.54.0-16.el9_4.i686.rpm c�libgs-devel-9.54.0-16.el9_4.i686.rpm �"�ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm c�libgs-devel-9.54.0-16.el9_4.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm �!�ghostscript-9.54.0-16.el9_4.i686.rpm c�libgs-devel-9.54.0-16.el9_4.i686.rpm �"�ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm c�libgs-devel-9.54.0-16.el9_4.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm ��� �8�vB�LBBBBBBBBBsecurity Important: python3.11 security update ���0https://access.redhat.com/errata/RHSA-2024:4077 RHSA-2024:4077 RHSA-2024:4077
https://access.redhat.com/security/cve/CVE-2023-6597 CVE-2023-6597 CVE-2023-6597 https://bugzilla.redhat.com/2276518 2276518 https://errata.almalinux.org/9/ALSA-2024-4077.html ALSA-2024:4077 ALSA-2024:4077 �python3.11-test-3.11.7-1.el9_4.1.i686.rpm �python3.11-test-3.11.7-1.el9_4.1.x86_64.rpm b�python3.11-tkinter-3.11.7-1.el9_4.1.i686.rpm �python3.11-idle-3.11.7-1.el9_4.1.x86_64.rpm a�python3.11-3.11.7-1.el9_4.1.i686.rpm �python3.11-debug-3.11.7-1.el9_4.1.i686.rpm �python3.11-debug-3.11.7-1.el9_4.1.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.1.i686.rpm �python3.11-test-3.11.7-1.el9_4.1.i686.rpm �python3.11-test-3.11.7-1.el9_4.1.x86_64.rpm b�python3.11-tkinter-3.11.7-1.el9_4.1.i686.rpm �python3.11-idle-3.11.7-1.el9_4.1.x86_64.rpm a�python3.11-3.11.7-1.el9_4.1.i686.rpm �python3.11-debug-3.11.7-1.el9_4.1.i686.rpm �python3.11-debug-3.11.7-1.el9_4.1.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.1.i686.rpm ���I� �:�y�I�MBBBBBBBBBsecurity Important: python3.9 security update ��?�https://access.redhat.com/errata/RHSA-2024:4078 RHSA-2024:4078 RHSA-2024:4078
https://access.redhat.com/security/cve/CVE-2023-6597 CVE-2023-6597 CVE-2023-6597 https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://bugzilla.redhat.com/2276518 2276518 https://bugzilla.redhat.com/2276525 2276525 https://errata.almalinux.org/9/ALSA-2024-4078.html ALSA-2024:4078 ALSA-2024:4078 �3python3-idle-3.9.18-3.el9_4.1.i686.rpm �3python3-test-3.9.18-3.el9_4.1.x86_64.rpm N�3python3-tkinter-3.9.18-3.el9_4.1.i686.rpm �3python3-test-3.9.18-3.el9_4.1.i686.rpm �3python3-debug-3.9.18-3.el9_4.1.x86_64.rpm M�3python3-3.9.18-3.el9_4.1.i686.rpm �3python3-idle-3.9.18-3.el9_4.1.x86_64.rpm �3python3-debug-3.9.18-3.el9_4.1.i686.rpm �3python3-idle-3.9.18-3.el9_4.1.i686.rpm �3python3-test-3.9.18-3.el9_4.1.x86_64.rpm N�3python3-tkinter-3.9.18-3.el9_4.1.i686.rpm �3python3-test-3.9.18-3.el9_4.1.i686.rpm �3python3-debug-3.9.18-3.el9_4.1.x86_64.rpm M�3python3-3.9.18-3.el9_4.1.i686.rpm �3python3-idle-3.9.18-3.el9_4.1.x86_64.rpm �3python3-debug-3.9.18-3.el9_4.1.i686.rpm ���#� �;�XBBBBsecurity Moderate: kernel security and bug fix update
��T�https://access.redhat.com/errata/RHSA-2024:4349 RHSA-2024:4349 RHSA-2024:4349
https://access.redhat.com/security/cve/CVE-2021-47400 CVE-2021-47400 CVE-2021-47400 https://access.redhat.com/security/cve/CVE-2023-52626 CVE-2023-52626 CVE-2023-52626 https://access.redhat.com/security/cve/CVE-2023-52667 CVE-2023-52667 CVE-2023-52667 https://access.redhat.com/security/cve/CVE-2024-26801 CVE-2024-26801 CVE-2024-26801 https://access.redhat.com/security/cve/CVE-2024-26974 CVE-2024-26974 CVE-2024-26974 https://access.redhat.com/security/cve/CVE-2024-27393 CVE-2024-27393 CVE-2024-27393 https://access.redhat.com/security/cve/CVE-2024-35870 CVE-2024-35870 CVE-2024-35870 https://access.redhat.com/security/cve/CVE-2024-35960 CVE-2024-35960 CVE-2024-35960 https://bugzilla.redhat.com/2271680 2271680 https://bugzilla.redhat.com/2273429 2273429 https://bugzilla.redhat.com/2278354 2278354 https://bugzilla.redhat.com/2280745 2280745 https://bugzilla.redhat.com/2281350 2281350 https://bugzilla.redhat.com/2281740 2281740 https://bugzilla.redhat.com/2281920 2281920 https://bugzilla.redhat.com/2282336 2282336 https://errata.almalinux.org/9/ALSA-2024-4349.html ALSA-2024:4349 ALSA-2024:4349 �}kernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpm �}libperf-5.14.0-427.24.1.el9_4.x86_64.rpm �}kernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpm �}kernel-cross-headers-5.14.0-427.24.1.el9_4.x86_64.rpm �}libperf-5.14.0-427.24.1.el9_4.x86_64.rpm �}kernel-tools-libs-devel-5.14.0-427.24.1.el9_4.x86_64.rpm ����r� �<�^security Moderate: dotnet6.0 security update
��b�Jhttps://access.redhat.com/errata/RHSA-2024:4439 RHSA-2024:4439 RHSA-2024:4439
https://access.redhat.com/security/cve/CVE-2024-38095 CVE-2024-38095 CVE-2024-38095 https://bugzilla.redhat.com/2295323 2295323 https://errata.almalinux.org/9/ALSA-2024-4439.html ALSA-2024:4439 ALSA-2024:4439 n�adotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm n�adotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4.x86_64.rpm ����I� �=�`security Important: dotnet8.0 security update ��,�&https://access.redhat.com/errata/RHSA-2024:4450 RHSA-2024:4450 RHSA-2024:4450
https://access.redhat.com/security/cve/CVE-2024-30105 CVE-2024-30105 CVE-2024-30105 https://access.redhat.com/security/cve/CVE-2024-35264 CVE-2024-35264 CVE-2024-35264 https://access.redhat.com/security/cve/CVE-2024-38095 CVE-2024-38095 CVE-2024-38095 https://bugzilla.redhat.com/2295320 2295320 https://bugzilla.redhat.com/2295321 2295321 https://bugzilla.redhat.com/2295323 2295323 https://errata.almalinux.org/9/ALSA-2024-4450.html ALSA-2024:4450 ALSA-2024:4450 ��tdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm ��tdotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4.x86_64.rpm ����� �>�bBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security update ��R�Phttps://access.redhat.com/errata/RHSA-2024:4563 RHSA-2024:4563 RHSA-2024:4563
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21144 CVE-2024-21144 CVE-2024-21144 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961 https://bugzilla.redhat.com/2297962 2297962 https://bugzilla.redhat.com/2297963 2297963 https://bugzilla.redhat.com/2297964 2297964 https://bugzilla.redhat.com/2297976 2297976 https://bugzilla.redhat.com/2297977 2297977 https://errata.almalinux.org/9/ALSA-2024-4563.html ALSA-2024:4563 ALSA-2024:4563
�Zjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �
Zjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm � Zjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm
�Zjava-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �
Zjava-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm � Zjava-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm �Zjava-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9.x86_64.rpm ����+� �?�vBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-11-openjdk security update ��"�Ohttps://access.redhat.com/errata/RHSA-2024:4567 RHSA-2024:4567 RHSA-2024:4567
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21144 CVE-2024-21144 CVE-2024-21144 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961 https://bugzilla.redhat.com/2297962 2297962 https://bugzilla.redhat.com/2297963 2297963 https://bugzilla.redhat.com/2297964 2297964 https://bugzilla.redhat.com/2297976 2297976 https://bugzilla.redhat.com/2297977 2297977 https://errata.almalinux.org/9/ALSA-2024-4567.html ALSA-2024:4567 ALSA-2024:4567 �f*java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �h*java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �c*java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �g*java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �e*java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �a*java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �n*java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �k*java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �l*java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �i*java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �j*java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �b*java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �d*java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �m*java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �f*java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �h*java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �c*java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �g*java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �e*java-11-openjdk-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �a*java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �n*java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �k*java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm �l*java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �i*java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �j*java-11-openjdk-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �b*java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �d*java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9.x86_64.rpm �m*java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9.x86_64.rpm ����w� � �RBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security update ��q�ihttps://access.redhat.com/errata/RHSA-2024:4568 RHSA-2024:4568 RHSA-2024:4568
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961 https://bugzilla.redhat.com/2297962 2297962 https://bugzilla.redhat.com/2297963 2297963 https://bugzilla.redhat.com/2297976 2297976 https://bugzilla.redhat.com/2297977 2297977 https://errata.almalinux.org/9/ALSA-2024-4568.html ALSA-2024:4568 ALSA-2024:4568 p.java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm y.java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm r.java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm x.java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm w.java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm v.java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm z.java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm o.java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm s.java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm |.java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm q.java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm {.java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm t.java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm u.java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm p.java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm y.java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm r.java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm x.java-17-openjdk-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm w.java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm v.java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm z.java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm o.java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm s.java-17-openjdk-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm |.java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm q.java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm {.java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm t.java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9.x86_64.rpm u.java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9.x86_64.rpm ����n� ��nBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update ��Z�ihttps://access.redhat.com/errata/RHSA-2024:4573 RHSA-2024:4573 RHSA-2024:4573
https://access.redhat.com/security/cve/CVE-2024-21131 CVE-2024-21131 CVE-2024-21131 https://access.redhat.com/security/cve/CVE-2024-21138 CVE-2024-21138 CVE-2024-21138 https://access.redhat.com/security/cve/CVE-2024-21140 CVE-2024-21140 CVE-2024-21140 https://access.redhat.com/security/cve/CVE-2024-21145 CVE-2024-21145 CVE-2024-21145 https://access.redhat.com/security/cve/CVE-2024-21147 CVE-2024-21147 CVE-2024-21147 https://bugzilla.redhat.com/2297961 2297961 https://bugzilla.redhat.com/2297962 2297962 https://bugzilla.redhat.com/2297963 2297963 https://bugzilla.redhat.com/2297976 2297976 https://bugzilla.redhat.com/2297977 2297977 https://errata.almalinux.org/9/ALSA-2024-4573.html ALSA-2024:4573 ALSA-2024:4573 �s>java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �u>java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �t>java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �|>java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �o>java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �x>java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �w>java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �{>java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �q>java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �z>java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �v>java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �p>java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �y>java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �r>java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �s>java-21-openjdk-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �u>java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �t>java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �|>java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �o>java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �x>java-21-openjdk-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �w>java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �{>java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �q>java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �z>java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �v>java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �p>java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �y>java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm �r>java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9.alma.1.x86_64.rpm ����� ��JBBBBsecurity Important: kernel security update ��C�$https://access.redhat.com/errata/RHSA-2024:4583 RHSA-2024:4583 RHSA-2024:4583
https://access.redhat.com/security/cve/CVE-2021-47548 CVE-2021-47548 CVE-2021-47548 https://access.redhat.com/security/cve/CVE-2021-47596 CVE-2021-47596 CVE-2021-47596 https://access.redhat.com/security/cve/CVE-2022-48627 CVE-2022-48627 CVE-2022-48627 https://access.redhat.com/security/cve/CVE-2023-52638 CVE-2023-52638 CVE-2023-52638 https://access.redhat.com/security/cve/CVE-2024-26783 CVE-2024-26783 CVE-2024-26783 https://access.redhat.com/security/cve/CVE-2024-26858 CVE-2024-26858 CVE-2024-26858 https://access.redhat.com/security/cve/CVE-2024-27397 CVE-2024-27397 CVE-2024-27397 https://access.redhat.com/security/cve/CVE-2024-27435 CVE-2024-27435 CVE-2024-27435 https://access.redhat.com/security/cve/CVE-2024-35958 CVE-2024-35958 CVE-2024-35958 https://access.redhat.com/security/cve/CVE-2024-36270 CVE-2024-36270 CVE-2024-36270 https://access.redhat.com/security/cve/CVE-2024-36886 CVE-2024-36886 CVE-2024-36886 https://access.redhat.com/security/cve/CVE-2024-36904 CVE-2024-36904 CVE-2024-36904 https://access.redhat.com/security/cve/CVE-2024-36957 CVE-2024-36957 CVE-2024-36957 https://access.redhat.com/security/cve/CVE-2024-38543 CVE-2024-38543 CVE-2024-38543 https://access.redhat.com/security/cve/CVE-2024-38586 CVE-2024-38586 CVE-2024-38586 https://access.redhat.com/security/cve/CVE-2024-38593 CVE-2024-38593 CVE-2024-38593 https://access.redhat.com/security/cve/CVE-2024-38663 CVE-2024-38663 CVE-2024-38663 https://bugzilla.redhat.com/2267509 2267509 https://bugzilla.redhat.com/2273082 2273082 https://bugzilla.redhat.com/2273466 2273466 https://bugzilla.redhat.com/2275735 2275735 https://bugzilla.redhat.com/2277238 2277238 https://bugzilla.redhat.com/2280434 2280434 https://bugzilla.redhat.com/2281131 2281131 https://bugzilla.redhat.com/2281925 2281925 https://bugzilla.redhat.com/2283401 2283401 https://bugzilla.redhat.com/2284541 2284541 https://bugzilla.redhat.com/2284581 2284581 https://bugzilla.redhat.com/2293230 2293230 https://bugzilla.redhat.com/2293380 2293380 https://bugzilla.redhat.com/2293402 2293402 https://bugzilla.redhat.com/2293456 2293456 https://bugzilla.redhat.com/2293653 2293653 https://bugzilla.redhat.com/2294225 2294225 https://errata.almalinux.org/9/ALSA-2024-4583.html ALSA-2024:4583 ALSA-2024:4583 �~kernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpm �~kernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpm �~libperf-5.14.0-427.26.1.el9_4.x86_64.rpm �~kernel-tools-libs-devel-5.14.0-427.26.1.el9_4.x86_64.rpm �~kernel-cross-headers-5.14.0-427.26.1.el9_4.x86_64.rpm �~libperf-5.14.0-427.26.1.el9_4.x86_64.rpm ����� ��PBsecurity Important: qt5-qtbase security update ��]�@https://access.redhat.com/errata/RHSA-2024:4623 RHSA-2024:4623 RHSA-2024:4623
https://access.redhat.com/security/cve/CVE-2024-39936 CVE-2024-39936 CVE-2024-39936 https://bugzilla.redhat.com/2295867 2295867 https://errata.almalinux.org/9/ALSA-2024-4623.html ALSA-2024:4623 ALSA-2024:4623 ��^qt5-qtbase-static-5.15.9-10.el9_4.i686.rpm ��^qt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm ��^qt5-qtbase-static-5.15.9-10.el9_4.i686.rpm ��^qt5-qtbase-static-5.15.9-10.el9_4.x86_64.rpm ����! ��DB�OBsecurity Moderate: edk2 security update
���Lhttps://access.redhat.com/errata/RHSA-2024:4749 RHSA-2024:4749 RHSA-2024:4749
https://access.redhat.com/security/cve/CVE-2022-36765 CVE-2022-36765 CVE-2022-36765 https://access.redhat.com/security/cve/CVE-2023-45236 CVE-2023-45236 CVE-2023-45236 https://access.redhat.com/security/cve/CVE-2023-45237 CVE-2023-45237 CVE-2023-45237 https://bugzilla.redhat.com/2257584 2257584 https://bugzilla.redhat.com/2258703 2258703 https://bugzilla.redhat.com/2258706 2258706 https://errata.almalinux.org/9/ALSA-2024-4749.html ALSA-2024:4749 ALSA-2024:4749 � �fedk2-ovmf-20231122-6.el9_4.2.noarch.rpm �K�fedk2-aarch64-20231122-6.el9_4.2.noarch.rpm �L�fedk2-tools-doc-20231122-6.el9_4.2.noarch.rpm ��fedk2-tools-20231122-6.el9_4.2.x86_64.rpm � �fedk2-ovmf-20231122-6.el9_4.2.noarch.rpm �K�fedk2-aarch64-20231122-6.el9_4.2.noarch.rpm �L�fedk2-tools-doc-20231122-6.el9_4.2.noarch.rpm ��fedk2-tools-20231122-6.el9_4.2.x86_64.rpm ����K�" ��VBBsecurity Moderate: libreoffice security update
��i�https://access.redhat.com/errata/RHSA-2024:4755 RHSA-2024:4755 RHSA-2024:4755
https://access.redhat.com/security/cve/CVE-2024-3044 CVE-2024-3044 CVE-2024-3044 https://bugzilla.redhat.com/2280542 2280542 https://errata.almalinux.org/9/ALSA-2024-4755.html ALSA-2024:4755 ALSA-2024:4755 �a�libreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm �`�libreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm �a�libreoffice-sdk-doc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm �`�libreoffice-sdk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm ����%�# ��ZBsecurity Moderate: libuv security update
�� �whttps://access.redhat.com/errata/RHSA-2024:4756 RHSA-2024:4756 RHSA-2024:4756
https://access.redhat.com/security/cve/CVE-2024-24806 CVE-2024-24806 CVE-2024-24806 https://bugzilla.redhat.com/2263292 2263292 https://errata.almalinux.org/9/ALSA-2024-4756.html ALSA-2024:4756 ALSA-2024:4756 �~�=libuv-devel-1.42.0-2.el9_4.x86_64.rpm �~�=libuv-devel-1.42.0-2.el9_4.i686.rpm �~�=libuv-devel-1.42.0-2.el9_4.x86_64.rpm �~�=libuv-devel-1.42.0-2.el9_4.i686.rpm ����5�$ � �]BBBBsecurity Moderate: libvirt security update
��w�\https://access.redhat.com/errata/RHSA-2024:4757 RHSA-2024:4757 RHSA-2024:4757
https://access.redhat.com/security/cve/CVE-2024-4418 CVE-2024-4418 CVE-2024-4418 https://bugzilla.redhat.com/2278616 2278616 https://errata.almalinux.org/9/ALSA-2024-4757.html ALSA-2024:4757 ALSA-2024:4757 �(�llibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �B�llibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �)�llibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �(�llibvirt-devel-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �B�llibvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �)�llibvirt-docs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm �����% ��JB�YBBBBBBBBBsecurity Low: python3 security update �V��S�,https://access.redhat.com/errata/RHSA-2024:4766 RHSA-2024:4766 RHSA-2024:4766
https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://bugzilla.redhat.com/2292921 2292921 https://errata.almalinux.org/9/ALSA-2024-4766.html ALSA-2024:4766 ALSA-2024:4766 �python3.11-debug-3.11.7-1.el9_4.3.i686.rpm �python3.11-test-3.11.7-1.el9_4.3.x86_64.rpm �python3.11-test-3.11.7-1.el9_4.3.i686.rpm �python3.11-idle-3.11.7-1.el9_4.3.i686.rpm �python3.11-debug-3.11.7-1.el9_4.3.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.3.x86_64.rpm b�python3.11-tkinter-3.11.7-1.el9_4.3.i686.rpm a�python3.11-3.11.7-1.el9_4.3.i686.rpm �python3.11-debug-3.11.7-1.el9_4.3.i686.rpm �python3.11-test-3.11.7-1.el9_4.3.x86_64.rpm �python3.11-test-3.11.7-1.el9_4.3.i686.rpm �python3.11-idle-3.11.7-1.el9_4.3.i686.rpm �python3.11-debug-3.11.7-1.el9_4.3.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.3.x86_64.rpm b�python3.11-tkinter-3.11.7-1.el9_4.3.i686.rpm a�python3.11-3.11.7-1.el9_4.3.i686.rpm �����& ��M�v�mBBBBBBBBBsecurity Low: python3 security update �V���,https://access.redhat.com/errata/RHSA-2024:4779 RHSA-2024:4779 RHSA-2024:4779
https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://bugzilla.redhat.com/2292921 2292921 https://errata.almalinux.org/9/ALSA-2024-4779.html ALSA-2024:4779 ALSA-2024:4779 �4python3-debug-3.9.18-3.el9_4.3.i686.rpm �4python3-idle-3.9.18-3.el9_4.3.i686.rpm �4python3-debug-3.9.18-3.el9_4.3.x86_64.rpm �4python3-test-3.9.18-3.el9_4.3.i686.rpm M�4python3-3.9.18-3.el9_4.3.i686.rpm N�4python3-tkinter-3.9.18-3.el9_4.3.i686.rpm �4python3-test-3.9.18-3.el9_4.3.x86_64.rpm �4python3-idle-3.9.18-3.el9_4.3.x86_64.rpm �4python3-debug-3.9.18-3.el9_4.3.i686.rpm �4python3-idle-3.9.18-3.el9_4.3.i686.rpm �4python3-debug-3.9.18-3.el9_4.3.x86_64.rpm �4python3-test-3.9.18-3.el9_4.3.i686.rpm M�4python3-3.9.18-3.el9_4.3.i686.rpm N�4python3-tkinter-3.9.18-3.el9_4.3.i686.rpm �4python3-test-3.9.18-3.el9_4.3.x86_64.rpm �4python3-idle-3.9.18-3.el9_4.3.x86_64.rpm �����' ��yBBBBsecurity Moderate: kernel security update
��+�1$https://access.redhat.com/errata/RHSA-2024:4928 RHSA-2024:4928 RHSA-2024:4928
https://access.redhat.com/security/cve/CVE-2021-47459 CVE-2021-47459 CVE-2021-47459 https://access.redhat.com/security/cve/CVE-2022-48743 CVE-2022-48743 CVE-2022-48743 https://access.redhat.com/security/cve/CVE-2023-52458 CVE-2023-52458 CVE-2023-52458 https://access.redhat.com/security/cve/CVE-2023-52809 CVE-2023-52809 CVE-2023-52809 https://access.redhat.com/security/cve/CVE-2024-26737 CVE-2024-26737 CVE-2024-26737 https://access.redhat.com/security/cve/CVE-2024-26773 CVE-2024-26773 CVE-2024-26773 https://access.redhat.com/security/cve/CVE-2024-26852 CVE-2024-26852 CVE-2024-26852 https://access.redhat.com/security/cve/CVE-2024-26880 CVE-2024-26880 CVE-2024-26880 https://access.redhat.com/security/cve/CVE-2024-26982 CVE-2024-26982 CVE-2024-26982 https://access.redhat.com/security/cve/CVE-2024-27030 CVE-2024-27030 CVE-2024-27030 https://access.redhat.com/security/cve/CVE-2024-27046 CVE-2024-27046 CVE-2024-27046 https://access.redhat.com/security/cve/CVE-2024-35857 CVE-2024-35857 CVE-2024-35857 https://access.redhat.com/security/cve/CVE-2024-35885 CVE-2024-35885 CVE-2024-35885 https://access.redhat.com/security/cve/CVE-2024-35907 CVE-2024-35907 CVE-2024-35907 https://access.redhat.com/security/cve/CVE-2024-36924 CVE-2024-36924 CVE-2024-36924 https://access.redhat.com/security/cve/CVE-2024-36952 CVE-2024-36952 CVE-2024-36952 https://access.redhat.com/security/cve/CVE-2024-38580 CVE-2024-38580 CVE-2024-38580 https://bugzilla.redhat.com/2265794 2265794 https://bugzilla.redhat.com/2273236 2273236 https://bugzilla.redhat.com/2273274 2273274 https://bugzilla.redhat.com/2275690 2275690 https://bugzilla.redhat.com/2275761 2275761 https://bugzilla.redhat.com/2278337 2278337 https://bugzilla.redhat.com/2278435 2278435 https://bugzilla.redhat.com/2278473 2278473 https://bugzilla.redhat.com/2281247 2281247 https://bugzilla.redhat.com/2281647 2281647 https://bugzilla.redhat.com/2281700 2281700 https://bugzilla.redhat.com/2282669 2282669 https://bugzilla.redhat.com/2282898 2282898 https://bugzilla.redhat.com/2284506 2284506 https://bugzilla.redhat.com/2284598 2284598 https://bugzilla.redhat.com/2293316 2293316 https://bugzilla.redhat.com/2293412 2293412 https://errata.almalinux.org/9/ALSA-2024-4928.html ALSA-2024:4928 ALSA-2024:4928 �libperf-5.14.0-427.28.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm �libperf-5.14.0-427.28.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm ����G�( ��BBBBBBBBBBsecurity Important: freeradius security update ��\�Ghttps://access.redhat.com/errata/RHSA-2024:4935 RHSA-2024:4935 RHSA-2024:4935
https://access.redhat.com/security/cve/CVE-2024-3596 CVE-2024-3596 CVE-2024-3596 https://bugzilla.redhat.com/2263240 2263240 https://errata.almalinux.org/9/ALSA-2024-4935.html ALSA-2024:4935 ALSA-2024:4935 ��]freeradius-rest-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-mysql-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-sqlite-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-perl-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-postgresql-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-rest-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-mysql-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-sqlite-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-perl-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-unixODBC-3.0.21-40.el9_4.x86_64.rpm ��]freeradius-postgresql-3.0.21-40.el9_4.x86_64.rpm ��ʚN�) ��Ksecurity Moderate: 389-ds-base security update
��#�jhttps://access.redhat.com/errata/RHSA-2024:5192 RHSA-2024:5192 RHSA-2024:5192
https://access.redhat.com/security/cve/CVE-2024-5953 CVE-2024-5953 CVE-2024-5953 https://access.redhat.com/security/cve/CVE-2024-6237 CVE-2024-6237 CVE-2024-6237 https://bugzilla.redhat.com/2292104 2292104 https://bugzilla.redhat.com/2293579 2293579 https://errata.almalinux.org/9/ALSA-2024-5192.html ALSA-2024:5192 ALSA-2024:5192 �t�?389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm �t�?389-ds-base-devel-2.4.5-9.el9_4.x86_64.rpm ���2�* ��R�|BBBsecurity Important: bind and bind-dyndb-ldap security update ��
�"https://access.redhat.com/errata/RHSA-2024:5231 RHSA-2024:5231 RHSA-2024:5231
https://access.redhat.com/security/cve/CVE-2024-1737 CVE-2024-1737 CVE-2024-1737 https://access.redhat.com/security/cve/CVE-2024-1975 CVE-2024-1975 CVE-2024-1975 https://access.redhat.com/security/cve/CVE-2024-4076 CVE-2024-4076 CVE-2024-4076 https://bugzilla.redhat.com/2298893 2298893 https://bugzilla.redhat.com/2298901 2298901 https://bugzilla.redhat.com/2298904 2298904 https://errata.almalinux.org/9/ALSA-2024-5231.html ALSA-2024:5231 ALSA-2024:5231 O�Tbind-devel-9.16.23-18.el9_4.6.i686.rpm O�Tbind-devel-9.16.23-18.el9_4.6.x86_64.rpm �^�Tbind-libs-9.16.23-18.el9_4.6.i686.rpm ��Tbind-doc-9.16.23-18.el9_4.6.noarch.rpm O�Tbind-devel-9.16.23-18.el9_4.6.i686.rpm O�Tbind-devel-9.16.23-18.el9_4.6.x86_64.rpm �^�Tbind-libs-9.16.23-18.el9_4.6.i686.rpm ��Tbind-doc-9.16.23-18.el9_4.6.noarch.rpm ����n�+ ��Rsecurity Moderate: .NET 8.0 security update
��/�}https://access.redhat.com/errata/RHSA-2024:5334 RHSA-2024:5334 RHSA-2024:5334
https://access.redhat.com/security/cve/CVE-2024-38167 CVE-2024-38167 CVE-2024-38167 https://bugzilla.redhat.com/2302428 2302428 https://errata.almalinux.org/9/ALSA-2024-5334.html ALSA-2024:5334 ALSA-2024:5334 ��udotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpm ��udotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4.x86_64.rpm ����R�, ��TBBBBsecurity Important: kernel security update ��,�4^https://access.redhat.com/errata/RHSA-2024:5363 RHSA-2024:5363 RHSA-2024:5363
https://access.redhat.com/security/cve/CVE-2021-47606 CVE-2021-47606 CVE-2021-47606 https://access.redhat.com/security/cve/CVE-2023-52651 CVE-2023-52651 CVE-2023-52651 https://access.redhat.com/security/cve/CVE-2023-52864 CVE-2023-52864 CVE-2023-52864 https://access.redhat.com/security/cve/CVE-2024-21823 CVE-2024-21823 CVE-2024-21823 https://access.redhat.com/security/cve/CVE-2024-26600 CVE-2024-26600 CVE-2024-26600 https://access.redhat.com/security/cve/CVE-2024-26808 CVE-2024-26808 CVE-2024-26808 https://access.redhat.com/security/cve/CVE-2024-26828 CVE-2024-26828 CVE-2024-26828 https://access.redhat.com/security/cve/CVE-2024-26853 CVE-2024-26853 CVE-2024-26853 https://access.redhat.com/security/cve/CVE-2024-26868 CVE-2024-26868 CVE-2024-26868 https://access.redhat.com/security/cve/CVE-2024-26897 CVE-2024-26897 CVE-2024-26897 https://access.redhat.com/security/cve/CVE-2024-27049 CVE-2024-27049 CVE-2024-27049 https://access.redhat.com/security/cve/CVE-2024-27052 CVE-2024-27052 CVE-2024-27052 https://access.redhat.com/security/cve/CVE-2024-27065 CVE-2024-27065 CVE-2024-27065 https://access.redhat.com/security/cve/CVE-2024-27417 CVE-2024-27417 CVE-2024-27417 https://access.redhat.com/security/cve/CVE-2024-27434 CVE-2024-27434 CVE-2024-27434 https://access.redhat.com/security/cve/CVE-2024-33621 CVE-2024-33621 CVE-2024-33621 https://access.redhat.com/security/cve/CVE-2024-35789 CVE-2024-35789 CVE-2024-35789 https://access.redhat.com/security/cve/CVE-2024-35800 CVE-2024-35800 CVE-2024-35800 https://access.redhat.com/security/cve/CVE-2024-35823 CVE-2024-35823 CVE-2024-35823 https://access.redhat.com/security/cve/CVE-2024-35845 CVE-2024-35845 CVE-2024-35845 https://access.redhat.com/security/cve/CVE-2024-35848 CVE-2024-35848 CVE-2024-35848 https://access.redhat.com/security/cve/CVE-2024-35852 CVE-2024-35852 CVE-2024-35852 https://access.redhat.com/security/cve/CVE-2024-35899 CVE-2024-35899 CVE-2024-35899 https://access.redhat.com/security/cve/CVE-2024-35911 CVE-2024-35911 CVE-2024-35911 https://access.redhat.com/security/cve/CVE-2024-35937 CVE-2024-35937 CVE-2024-35937 https://access.redhat.com/security/cve/CVE-2024-35969 CVE-2024-35969 CVE-2024-35969 https://access.redhat.com/security/cve/CVE-2024-36005 CVE-2024-36005 CVE-2024-36005 https://access.redhat.com/security/cve/CVE-2024-36017 CVE-2024-36017 CVE-2024-36017 https://access.redhat.com/security/cve/CVE-2024-36020 CVE-2024-36020 CVE-2024-36020 https://access.redhat.com/security/cve/CVE-2024-36489 CVE-2024-36489 CVE-2024-36489 https://access.redhat.com/security/cve/CVE-2024-36903 CVE-2024-36903 CVE-2024-36903 https://access.redhat.com/security/cve/CVE-2024-36921 CVE-2024-36921 CVE-2024-36921 https://access.redhat.com/security/cve/CVE-2024-36922 CVE-2024-36922 CVE-2024-36922 https://access.redhat.com/security/cve/CVE-2024-36929 CVE-2024-36929 CVE-2024-36929 https://access.redhat.com/security/cve/CVE-2024-36941 CVE-2024-36941 CVE-2024-36941 https://access.redhat.com/security/cve/CVE-2024-36971 CVE-2024-36971 CVE-2024-36971 https://access.redhat.com/security/cve/CVE-2024-37353 CVE-2024-37353 CVE-2024-37353 https://access.redhat.com/security/cve/CVE-2024-37356 CVE-2024-37356 CVE-2024-37356 https://access.redhat.com/security/cve/CVE-2024-38391 CVE-2024-38391 CVE-2024-38391 https://access.redhat.com/security/cve/CVE-2024-38558 CVE-2024-38558 CVE-2024-38558 https://access.redhat.com/security/cve/CVE-2024-38575 CVE-2024-38575 CVE-2024-38575 https://access.redhat.com/security/cve/CVE-2024-39487 CVE-2024-39487 CVE-2024-39487 https://access.redhat.com/security/cve/CVE-2024-40928 CVE-2024-40928 CVE-2024-40928 https://access.redhat.com/security/cve/CVE-2024-40954 CVE-2024-40954 CVE-2024-40954 https://access.redhat.com/security/cve/CVE-2024-40958 CVE-2024-40958 CVE-2024-40958 https://access.redhat.com/security/cve/CVE-2024-40961 CVE-2024-40961 CVE-2024-40961 https://bugzilla.redhat.com/2265838 2265838 https://bugzilla.redhat.com/2273405 2273405 https://bugzilla.redhat.com/2275600 2275600 https://bugzilla.redhat.com/2275655 2275655 https://bugzilla.redhat.com/2275715 2275715 https://bugzilla.redhat.com/2275748 2275748 https://bugzilla.redhat.com/2278380 2278380 https://bugzilla.redhat.com/2278417 2278417 https://bugzilla.redhat.com/2278429 2278429 https://bugzilla.redhat.com/2278519 2278519 https://bugzilla.redhat.com/2278989 2278989 https://bugzilla.redhat.com/2281057 2281057 https://bugzilla.redhat.com/2281097 2281097 https://bugzilla.redhat.com/2281133 2281133 https://bugzilla.redhat.com/2281190 2281190 https://bugzilla.redhat.com/2281237 2281237 https://bugzilla.redhat.com/2281257 2281257 https://bugzilla.redhat.com/2281265 2281265 https://bugzilla.redhat.com/2281272 2281272 https://bugzilla.redhat.com/2281639 2281639 https://bugzilla.redhat.com/2281667 2281667 https://bugzilla.redhat.com/2281821 2281821 https://bugzilla.redhat.com/2281900 2281900 https://bugzilla.redhat.com/2281949 2281949 https://bugzilla.redhat.com/2282719 2282719 https://bugzilla.redhat.com/2284400 2284400 https://bugzilla.redhat.com/2284417 2284417 https://bugzilla.redhat.com/2284474 2284474 https://bugzilla.redhat.com/2284496 2284496 https://bugzilla.redhat.com/2284511 2284511 https://bugzilla.redhat.com/2284513 2284513 https://bugzilla.redhat.com/2284543 2284543 https://bugzilla.redhat.com/2292331 2292331 https://bugzilla.redhat.com/2293208 2293208 https://bugzilla.redhat.com/2293418 2293418 https://bugzilla.redhat.com/2293441 2293441 https://bugzilla.redhat.com/2293657 2293657 https://bugzilla.redhat.com/2293658 2293658 https://bugzilla.redhat.com/2293686 2293686 https://bugzilla.redhat.com/2293687 2293687 https://bugzilla.redhat.com/2293688 2293688 https://bugzilla.redhat.com/2297056 2297056 https://bugzilla.redhat.com/2297512 2297512 https://bugzilla.redhat.com/2297538 2297538 https://bugzilla.redhat.com/2297542 2297542 https://bugzilla.redhat.com/2297545 2297545 https://errata.almalinux.org/9/ALSA-2024-5363.html ALSA-2024:5363 ALSA-2024:5363 � libperf-5.14.0-427.31.1.el9_4.x86_64.rpm � kernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm � kernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm � libperf-5.14.0-427.31.1.el9_4.x86_64.rpm � kernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm � kernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm ����s�- ��security Important: python3.12-setuptools security update ��`�https://access.redhat.com/errata/RHSA-2024:5533 RHSA-2024:5533 RHSA-2024:5533
https://access.redhat.com/security/cve/CVE-2024-6345 CVE-2024-6345 CVE-2024-6345 https://bugzilla.redhat.com/2297771 2297771 https://errata.almalinux.org/9/ALSA-2024-5533.html ALSA-2024:5533 ALSA-2024:5533 �0�python3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm �0�python3.12-setuptools-wheel-68.2.2-3.el9_4.1.noarch.rpm ����_�. ��[BBsecurity Moderate: libreoffice security update
��w�{https://access.redhat.com/errata/RHSA-2024:5583 RHSA-2024:5583 RHSA-2024:5583
https://access.redhat.com/security/cve/CVE-2024-6472 CVE-2024-6472 CVE-2024-6472 https://bugzilla.redhat.com/2302866 2302866 https://errata.almalinux.org/9/ALSA-2024-5583.html ALSA-2024:5583 ALSA-2024:5583 �a� libreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm �`� libreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm �a� libreoffice-sdk-doc-7.1.8.1-14.el9_4.alma.1.x86_64.rpm �`� libreoffice-sdk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm ����W�/ ��_BBBBsecurity Important: kernel security update ��r�Thttps://access.redhat.com/errata/RHSA-2024:5928 RHSA-2024:5928 RHSA-2024:5928
https://access.redhat.com/security/cve/CVE-2023-52771 CVE-2023-52771 CVE-2023-52771 https://access.redhat.com/security/cve/CVE-2023-52880 CVE-2023-52880 CVE-2023-52880 https://access.redhat.com/security/cve/CVE-2024-26581 CVE-2024-26581 CVE-2024-26581 https://access.redhat.com/security/cve/CVE-2024-26668 CVE-2024-26668 CVE-2024-26668 https://access.redhat.com/security/cve/CVE-2024-26810 CVE-2024-26810 CVE-2024-26810 https://access.redhat.com/security/cve/CVE-2024-26855 CVE-2024-26855 CVE-2024-26855 https://access.redhat.com/security/cve/CVE-2024-26908 CVE-2024-26908 CVE-2024-26908 https://access.redhat.com/security/cve/CVE-2024-26925 CVE-2024-26925 CVE-2024-26925 https://access.redhat.com/security/cve/CVE-2024-27016 CVE-2024-27016 CVE-2024-27016 https://access.redhat.com/security/cve/CVE-2024-27019 CVE-2024-27019 CVE-2024-27019 https://access.redhat.com/security/cve/CVE-2024-27020 CVE-2024-27020 CVE-2024-27020 https://access.redhat.com/security/cve/CVE-2024-27415 CVE-2024-27415 CVE-2024-27415 https://access.redhat.com/security/cve/CVE-2024-35839 CVE-2024-35839 CVE-2024-35839 https://access.redhat.com/security/cve/CVE-2024-35896 CVE-2024-35896 CVE-2024-35896 https://access.redhat.com/security/cve/CVE-2024-35897 CVE-2024-35897 CVE-2024-35897 https://access.redhat.com/security/cve/CVE-2024-35898 CVE-2024-35898 CVE-2024-35898 https://access.redhat.com/security/cve/CVE-2024-35962 CVE-2024-35962 CVE-2024-35962 https://access.redhat.com/security/cve/CVE-2024-36003 CVE-2024-36003 CVE-2024-36003 https://access.redhat.com/security/cve/CVE-2024-36025 CVE-2024-36025 CVE-2024-36025 https://access.redhat.com/security/cve/CVE-2024-38538 CVE-2024-38538 CVE-2024-38538 https://access.redhat.com/security/cve/CVE-2024-38540 CVE-2024-38540 CVE-2024-38540 https://access.redhat.com/security/cve/CVE-2024-38544 CVE-2024-38544 CVE-2024-38544 https://access.redhat.com/security/cve/CVE-2024-38579 CVE-2024-38579 CVE-2024-38579 https://access.redhat.com/security/cve/CVE-2024-38608 CVE-2024-38608 CVE-2024-38608 https://access.redhat.com/security/cve/CVE-2024-39476 CVE-2024-39476 CVE-2024-39476 https://access.redhat.com/security/cve/CVE-2024-40905 CVE-2024-40905 CVE-2024-40905 https://access.redhat.com/security/cve/CVE-2024-40911 CVE-2024-40911 CVE-2024-40911 https://access.redhat.com/security/cve/CVE-2024-40912 CVE-2024-40912 CVE-2024-40912 https://access.redhat.com/security/cve/CVE-2024-40914 CVE-2024-40914 CVE-2024-40914 https://access.redhat.com/security/cve/CVE-2024-40929 CVE-2024-40929 CVE-2024-40929 https://access.redhat.com/security/cve/CVE-2024-40939 CVE-2024-40939 CVE-2024-40939 https://access.redhat.com/security/cve/CVE-2024-40941 CVE-2024-40941 CVE-2024-40941 https://access.redhat.com/security/cve/CVE-2024-40957 CVE-2024-40957 CVE-2024-40957 https://access.redhat.com/security/cve/CVE-2024-40978 CVE-2024-40978 CVE-2024-40978 https://access.redhat.com/security/cve/CVE-2024-40983 CVE-2024-40983 CVE-2024-40983 https://access.redhat.com/security/cve/CVE-2024-41041 CVE-2024-41041 CVE-2024-41041 https://access.redhat.com/security/cve/CVE-2024-41076 CVE-2024-41076 CVE-2024-41076 https://access.redhat.com/security/cve/CVE-2024-41090 CVE-2024-41090 CVE-2024-41090 https://access.redhat.com/security/cve/CVE-2024-41091 CVE-2024-41091 CVE-2024-41091 https://access.redhat.com/security/cve/CVE-2024-42110 CVE-2024-42110 CVE-2024-42110 https://access.redhat.com/security/cve/CVE-2024-42152 CVE-2024-42152 CVE-2024-42152 https://bugzilla.redhat.com/2265185 2265185 https://bugzilla.redhat.com/2272797 2272797 https://bugzilla.redhat.com/2273654 2273654 https://bugzilla.redhat.com/2275742 2275742 https://bugzilla.redhat.com/2275744 2275744 https://bugzilla.redhat.com/2277166 2277166 https://bugzilla.redhat.com/2278256 2278256 https://bugzilla.redhat.com/2278258 2278258 https://bugzilla.redhat.com/2278264 2278264 https://bugzilla.redhat.com/2281101 2281101 https://bugzilla.redhat.com/2281284 2281284 https://bugzilla.redhat.com/2281669 2281669 https://bugzilla.redhat.com/2281672 2281672 https://bugzilla.redhat.com/2281675 2281675 https://bugzilla.redhat.com/2281916 2281916 https://bugzilla.redhat.com/2281958 2281958 https://bugzilla.redhat.com/2282720 2282720 https://bugzilla.redhat.com/2283468 2283468 https://bugzilla.redhat.com/2284421 2284421 https://bugzilla.redhat.com/2293356 2293356 https://bugzilla.redhat.com/2293414 2293414 https://bugzilla.redhat.com/2293455 2293455 https://bugzilla.redhat.com/2293459 2293459 https://bugzilla.redhat.com/2293461 2293461 https://bugzilla.redhat.com/2295914 2295914 https://bugzilla.redhat.com/2297489 2297489 https://bugzilla.redhat.com/2297495 2297495 https://bugzilla.redhat.com/2297496 2297496 https://bugzilla.redhat.com/2297498 2297498 https://bugzilla.redhat.com/2297513 2297513 https://bugzilla.redhat.com/2297523 2297523 https://bugzilla.redhat.com/2297525 2297525 https://bugzilla.redhat.com/2297541 2297541 https://bugzilla.redhat.com/2297562 2297562 https://bugzilla.redhat.com/2297567 2297567 https://bugzilla.redhat.com/2299240 2299240 https://bugzilla.redhat.com/2299336 2299336 https://bugzilla.redhat.com/2300410 2300410 https://bugzilla.redhat.com/2300453 2300453 https://bugzilla.redhat.com/2301473 2301473 https://bugzilla.redhat.com/2301519 2301519 https://errata.almalinux.org/9/ALSA-2024-5928.html ALSA-2024:5928 ALSA-2024:5928 �kernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpm �libperf-5.14.0-427.33.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.33.1.el9_4.x86_64.rpm �libperf-5.14.0-427.33.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.33.1.el9_4.x86_64.rpm ���� �0 ��eBBBBBBBBBBsecurity Important: postgresql security update ��
�https://access.redhat.com/errata/RHSA-2024:5999 RHSA-2024:5999 RHSA-2024:5999
https://access.redhat.com/security/cve/CVE-2024-7348 CVE-2024-7348 CVE-2024-7348 https://bugzilla.redhat.com/2303682 2303682 https://errata.almalinux.org/9/ALSA-2024-5999.html ALSA-2024:5999 ALSA-2024:5999 ��[postgresql-server-devel-13.16-1.el9_4.x86_64.rpm ��[postgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm ��[postgresql-test-13.16-1.el9_4.x86_64.rpm �~�[postgresql-private-devel-13.16-1.el9_4.x86_64.rpm �}�[postgresql-docs-13.16-1.el9_4.x86_64.rpm � �[postgresql-static-13.16-1.el9_4.x86_64.rpm ��[postgresql-server-devel-13.16-1.el9_4.x86_64.rpm ��[postgresql-upgrade-devel-13.16-1.el9_4.x86_64.rpm ��[postgresql-test-13.16-1.el9_4.x86_64.rpm �~�[postgresql-private-devel-13.16-1.el9_4.x86_64.rpm �}�[postgresql-docs-13.16-1.el9_4.x86_64.rpm � �[postgresql-static-13.16-1.el9_4.x86_64.rpm ����y�1 ��ZB�WBBBBBBBBBsecurity Moderate: python3.12 security update
���https://access.redhat.com/errata/RHSA-2024:6146 RHSA-2024:6146 RHSA-2024:6146
https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255 https://errata.almalinux.org/9/ALSA-2024-6146.html ALSA-2024:6146 ALSA-2024:6146 G�python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm E�python3.12-debug-3.12.1-4.el9_4.3.i686.rpm G�python3.12-test-3.12.1-4.el9_4.3.i686.rpm �E�python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm F�python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm F�python3.12-idle-3.12.1-4.el9_4.3.i686.rpm �D�python3.12-3.12.1-4.el9_4.3.i686.rpm E�python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm G�python3.12-test-3.12.1-4.el9_4.3.x86_64.rpm E�python3.12-debug-3.12.1-4.el9_4.3.i686.rpm G�python3.12-test-3.12.1-4.el9_4.3.i686.rpm �E�python3.12-tkinter-3.12.1-4.el9_4.3.i686.rpm F�python3.12-idle-3.12.1-4.el9_4.3.x86_64.rpm F�python3.12-idle-3.12.1-4.el9_4.3.i686.rpm �D�python3.12-3.12.1-4.el9_4.3.i686.rpm E�python3.12-debug-3.12.1-4.el9_4.3.x86_64.rpm ���'�2 ��]�g�zBBBBBBBBBsecurity Moderate: python3.9 security update
��+�hhttps://access.redhat.com/errata/RHSA-2024:6163 RHSA-2024:6163 RHSA-2024:6163
https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255 https://errata.almalinux.org/9/ALSA-2024-6163.html ALSA-2024:6163 ALSA-2024:6163 N�5python3-tkinter-3.9.18-3.el9_4.5.i686.rpm M�5python3-3.9.18-3.el9_4.5.i686.rpm �5python3-idle-3.9.18-3.el9_4.5.x86_64.rpm �5python3-test-3.9.18-3.el9_4.5.i686.rpm �5python3-test-3.9.18-3.el9_4.5.x86_64.rpm �5python3-debug-3.9.18-3.el9_4.5.x86_64.rpm �5python3-idle-3.9.18-3.el9_4.5.i686.rpm �5python3-debug-3.9.18-3.el9_4.5.i686.rpm N�5python3-tkinter-3.9.18-3.el9_4.5.i686.rpm M�5python3-3.9.18-3.el9_4.5.i686.rpm �5python3-idle-3.9.18-3.el9_4.5.x86_64.rpm �5python3-test-3.9.18-3.el9_4.5.i686.rpm �5python3-test-3.9.18-3.el9_4.5.x86_64.rpm �5python3-debug-3.9.18-3.el9_4.5.x86_64.rpm �5python3-idle-3.9.18-3.el9_4.5.i686.rpm �5python3-debug-3.9.18-3.el9_4.5.i686.rpm ����3 �!�_B�hBBBBBBBBBsecurity Moderate: python3.11 security update
���hhttps://access.redhat.com/errata/RHSA-2024:6179 RHSA-2024:6179 RHSA-2024:6179
https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255 https://errata.almalinux.org/9/ALSA-2024-6179.html ALSA-2024:6179 ALSA-2024:6179 �python3.11-debug-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.i686.rpm a�python3.11-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.i686.rpm �python3.11-debug-3.11.7-1.el9_4.5.x86_64.rpm b�python3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm �python3.11-debug-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.5.i686.rpm a�python3.11-3.11.7-1.el9_4.5.i686.rpm �python3.11-test-3.11.7-1.el9_4.5.i686.rpm �python3.11-debug-3.11.7-1.el9_4.5.x86_64.rpm b�python3.11-tkinter-3.11.7-1.el9_4.5.i686.rpm ���8�4 �%�bBB�oBBBBsecurity Moderate: ghostscript security update
��{�Mhttps://access.redhat.com/errata/RHSA-2024:6197 RHSA-2024:6197 RHSA-2024:6197
https://access.redhat.com/security/cve/CVE-2024-29510 CVE-2024-29510 CVE-2024-29510 https://access.redhat.com/security/cve/CVE-2024-33869 CVE-2024-33869 CVE-2024-33869 https://access.redhat.com/security/cve/CVE-2024-33870 CVE-2024-33870 CVE-2024-33870 https://bugzilla.redhat.com/2293950 2293950 https://bugzilla.redhat.com/2293958 2293958 https://bugzilla.redhat.com/2293959 2293959 https://errata.almalinux.org/9/ALSA-2024-6197.html ALSA-2024:6197 ALSA-2024:6197 c�libgs-devel-9.54.0-17.el9_4.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm c�libgs-devel-9.54.0-17.el9_4.i686.rpm �"�ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm �!�ghostscript-9.54.0-17.el9_4.i686.rpm c�libgs-devel-9.54.0-17.el9_4.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-17.el9_4.i686.rpm c�libgs-devel-9.54.0-17.el9_4.i686.rpm �"�ghostscript-tools-fonts-9.54.0-17.el9_4.i686.rpm �!�ghostscript-9.54.0-17.el9_4.i686.rpm ���/�5 �(�fB�rBBBsecurity Important: bubblewrap and flatpak security update ��H�Jhttps://access.redhat.com/errata/RHSA-2024:6356 RHSA-2024:6356 RHSA-2024:6356
https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://bugzilla.redhat.com/2305202 2305202 https://errata.almalinux.org/9/ALSA-2024-6356.html ALSA-2024:6356 ALSA-2024:6356 �}�.flatpak-session-helper-1.12.9-3.el9_4.i686.rpm ��.flatpak-devel-1.12.9-3.el9_4.x86_64.rpm ��.flatpak-devel-1.12.9-3.el9_4.i686.rpm �|�.flatpak-1.12.9-3.el9_4.i686.rpm �}�.flatpak-session-helper-1.12.9-3.el9_4.i686.rpm ��.flatpak-devel-1.12.9-3.el9_4.x86_64.rpm ��.flatpak-devel-1.12.9-3.el9_4.i686.rpm �|�.flatpak-1.12.9-3.el9_4.i686.rpm ���c�6 �)�]Bsecurity Moderate: glib2 security update
���
https://access.redhat.com/errata/RHSA-2024:6464 RHSA-2024:6464 RHSA-2024:6464
https://access.redhat.com/security/cve/CVE-2024-34397 CVE-2024-34397 CVE-2024-34397 https://bugzilla.redhat.com/2279632 2279632 https://errata.almalinux.org/9/ALSA-2024-6464.html ALSA-2024:6464 ALSA-2024:6464 ��Iglib2-static-2.68.4-14.el9_4.1.i686.rpm ��Iglib2-static-2.68.4-14.el9_4.1.x86_64.rpm ��Iglib2-static-2.68.4-14.el9_4.1.i686.rpm ��Iglib2-static-2.68.4-14.el9_4.1.x86_64.rpm ����0�7 �+�j�wBBsecurity Moderate: dovecot security update
���,https://access.redhat.com/errata/RHSA-2024:6529 RHSA-2024:6529 RHSA-2024:6529
https://access.redhat.com/security/cve/CVE-2024-23184 CVE-2024-23184 CVE-2024-23184 https://access.redhat.com/security/cve/CVE-2024-23185 CVE-2024-23185 CVE-2024-23185 https://bugzilla.redhat.com/2305909 2305909 https://bugzilla.redhat.com/2305910 2305910 https://errata.almalinux.org/9/ALSA-2024-6529.html ALSA-2024:6529 ALSA-2024:6529 �^�Qdovecot-devel-2.3.16-11.el9_4.1.i686.rpm ��Qdovecot-2.3.16-11.el9_4.1.i686.rpm �^�Qdovecot-devel-2.3.16-11.el9_4.1.x86_64.rpm �^�Qdovecot-devel-2.3.16-11.el9_4.1.i686.rpm ��Qdovecot-2.3.16-11.el9_4.1.i686.rpm �^�Qdovecot-devel-2.3.16-11.el9_4.1.x86_64.rpm ����Z�8 �,�dBBBBsecurity Moderate: kernel security update
��K�l8https://access.redhat.com/errata/RHSA-2024:6567 RHSA-2024:6567 RHSA-2024:6567
https://access.redhat.com/security/cve/CVE-2023-52463 CVE-2023-52463 CVE-2023-52463 https://access.redhat.com/security/cve/CVE-2023-52801 CVE-2023-52801 CVE-2023-52801 https://access.redhat.com/security/cve/CVE-2024-26629 CVE-2024-26629 CVE-2024-26629 https://access.redhat.com/security/cve/CVE-2024-26630 CVE-2024-26630 CVE-2024-26630 https://access.redhat.com/security/cve/CVE-2024-26720 CVE-2024-26720 CVE-2024-26720 https://access.redhat.com/security/cve/CVE-2024-26886 CVE-2024-26886 CVE-2024-26886 https://access.redhat.com/security/cve/CVE-2024-26946 CVE-2024-26946 CVE-2024-26946 https://access.redhat.com/security/cve/CVE-2024-35791 CVE-2024-35791 CVE-2024-35791 https://access.redhat.com/security/cve/CVE-2024-35797 CVE-2024-35797 CVE-2024-35797 https://access.redhat.com/security/cve/CVE-2024-35875 CVE-2024-35875 CVE-2024-35875 https://access.redhat.com/security/cve/CVE-2024-36000 CVE-2024-36000 CVE-2024-36000 https://access.redhat.com/security/cve/CVE-2024-36019 CVE-2024-36019 CVE-2024-36019 https://access.redhat.com/security/cve/CVE-2024-36883 CVE-2024-36883 CVE-2024-36883 https://access.redhat.com/security/cve/CVE-2024-36979 CVE-2024-36979 CVE-2024-36979 https://access.redhat.com/security/cve/CVE-2024-38559 CVE-2024-38559 CVE-2024-38559 https://access.redhat.com/security/cve/CVE-2024-38619 CVE-2024-38619 CVE-2024-38619 https://access.redhat.com/security/cve/CVE-2024-40927 CVE-2024-40927 CVE-2024-40927 https://access.redhat.com/security/cve/CVE-2024-40936 CVE-2024-40936 CVE-2024-40936 https://access.redhat.com/security/cve/CVE-2024-41040 CVE-2024-41040 CVE-2024-41040 https://access.redhat.com/security/cve/CVE-2024-41044 CVE-2024-41044 CVE-2024-41044 https://access.redhat.com/security/cve/CVE-2024-41055 CVE-2024-41055 CVE-2024-41055 https://access.redhat.com/security/cve/CVE-2024-41073 CVE-2024-41073 CVE-2024-41073 https://access.redhat.com/security/cve/CVE-2024-41096 CVE-2024-41096 CVE-2024-41096 https://access.redhat.com/security/cve/CVE-2024-42082 CVE-2024-42082 CVE-2024-42082 https://access.redhat.com/security/cve/CVE-2024-42096 CVE-2024-42096 CVE-2024-42096 https://access.redhat.com/security/cve/CVE-2024-42102 CVE-2024-42102 CVE-2024-42102 https://access.redhat.com/security/cve/CVE-2024-42131 CVE-2024-42131 CVE-2024-42131 https://bugzilla.redhat.com/2265797 2265797 https://bugzilla.redhat.com/2269434 2269434 https://bugzilla.redhat.com/2269436 2269436 https://bugzilla.redhat.com/2273141 2273141 https://bugzilla.redhat.com/2275678 2275678 https://bugzilla.redhat.com/2278206 2278206 https://bugzilla.redhat.com/2281052 2281052 https://bugzilla.redhat.com/2281151 2281151 https://bugzilla.redhat.com/2281727 2281727 https://bugzilla.redhat.com/2281968 2281968 https://bugzilla.redhat.com/2282709 2282709 https://bugzilla.redhat.com/2284271 2284271 https://bugzilla.redhat.com/2284402 2284402 https://bugzilla.redhat.com/2293273 2293273 https://bugzilla.redhat.com/2293276 2293276 https://bugzilla.redhat.com/2293440 2293440 https://bugzilla.redhat.com/2297511 2297511 https://bugzilla.redhat.com/2297520 2297520 https://bugzilla.redhat.com/2300409 2300409 https://bugzilla.redhat.com/2300414 2300414 https://bugzilla.redhat.com/2300429 2300429 https://bugzilla.redhat.com/2300491 2300491 https://bugzilla.redhat.com/2300520 2300520 https://bugzilla.redhat.com/2300713 2300713 https://bugzilla.redhat.com/2301465 2301465 https://bugzilla.redhat.com/2301496 2301496 https://bugzilla.redhat.com/2301637 2301637 https://errata.almalinux.org/9/ALSA-2024-6567.html ALSA-2024:6567 ALSA-2024:6567 �libperf-5.14.0-427.35.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpm �libperf-5.14.0-427.35.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.35.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.35.1.el9_4.x86_64.rpm ����O�9 �-�jBBBBBsecurity Moderate: libnbd security update
��7�Qhttps://access.redhat.com/errata/RHSA-2024:6757 RHSA-2024:6757 RHSA-2024:6757
https://access.redhat.com/security/cve/CVE-2024-7383 CVE-2024-7383 CVE-2024-7383 https://bugzilla.redhat.com/2302865 2302865 https://errata.almalinux.org/9/ALSA-2024-6757.html ALSA-2024:6757 ALSA-2024:6757 �b�1libnbd-devel-1.18.1-4.el9_4.i686.rpm �,�1ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm �+�1ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpm �b�1libnbd-devel-1.18.1-4.el9_4.x86_64.rpm �b�1libnbd-devel-1.18.1-4.el9_4.i686.rpm �,�1ocaml-libnbd-devel-1.18.1-4.el9_4.x86_64.rpm �+�1ocaml-libnbd-1.18.1-4.el9_4.x86_64.rpm �b�1libnbd-devel-1.18.1-4.el9_4.x86_64.rpm ����|�: �.�qBBBBsecurity Important: kernel security update ���+https://access.redhat.com/errata/RHSA-2024:6997 RHSA-2024:6997 RHSA-2024:6997
https://access.redhat.com/security/cve/CVE-2023-52439 CVE-2023-52439 CVE-2023-52439 https://access.redhat.com/security/cve/CVE-2023-52884 CVE-2023-52884 CVE-2023-52884 https://access.redhat.com/security/cve/CVE-2024-26739 CVE-2024-26739 CVE-2024-26739 https://access.redhat.com/security/cve/CVE-2024-26929 CVE-2024-26929 CVE-2024-26929 https://access.redhat.com/security/cve/CVE-2024-26930 CVE-2024-26930 CVE-2024-26930 https://access.redhat.com/security/cve/CVE-2024-26931 CVE-2024-26931 CVE-2024-26931 https://access.redhat.com/security/cve/CVE-2024-26947 CVE-2024-26947 CVE-2024-26947 https://access.redhat.com/security/cve/CVE-2024-26991 CVE-2024-26991 CVE-2024-26991 https://access.redhat.com/security/cve/CVE-2024-27022 CVE-2024-27022 CVE-2024-27022 https://access.redhat.com/security/cve/CVE-2024-35895 CVE-2024-35895 CVE-2024-35895 https://access.redhat.com/security/cve/CVE-2024-36016 CVE-2024-36016 CVE-2024-36016 https://access.redhat.com/security/cve/CVE-2024-36899 CVE-2024-36899 CVE-2024-36899 https://access.redhat.com/security/cve/CVE-2024-38562 CVE-2024-38562 CVE-2024-38562 https://access.redhat.com/security/cve/CVE-2024-38570 CVE-2024-38570 CVE-2024-38570 https://access.redhat.com/security/cve/CVE-2024-38573 CVE-2024-38573 CVE-2024-38573 https://access.redhat.com/security/cve/CVE-2024-38601 CVE-2024-38601 CVE-2024-38601 https://access.redhat.com/security/cve/CVE-2024-38615 CVE-2024-38615 CVE-2024-38615 https://access.redhat.com/security/cve/CVE-2024-40984 CVE-2024-40984 CVE-2024-40984 https://access.redhat.com/security/cve/CVE-2024-41071 CVE-2024-41071 CVE-2024-41071 https://access.redhat.com/security/cve/CVE-2024-42225 CVE-2024-42225 CVE-2024-42225 https://access.redhat.com/security/cve/CVE-2024-42246 CVE-2024-42246 CVE-2024-42246 https://bugzilla.redhat.com/2265271 2265271 https://bugzilla.redhat.com/2273270 2273270 https://bugzilla.redhat.com/2278167 2278167 https://bugzilla.redhat.com/2278245 2278245 https://bugzilla.redhat.com/2278248 2278248 https://bugzilla.redhat.com/2278250 2278250 https://bugzilla.redhat.com/2278252 2278252 https://bugzilla.redhat.com/2278318 2278318 https://bugzilla.redhat.com/2281677 2281677 https://bugzilla.redhat.com/2283894 2283894 https://bugzilla.redhat.com/2284549 2284549 https://bugzilla.redhat.com/2293348 2293348 https://bugzilla.redhat.com/2293364 2293364 https://bugzilla.redhat.com/2293420 2293420 https://bugzilla.redhat.com/2293423 2293423 https://bugzilla.redhat.com/2293431 2293431 https://bugzilla.redhat.com/2293685 2293685 https://bugzilla.redhat.com/2297568 2297568 https://bugzilla.redhat.com/2300448 2300448 https://bugzilla.redhat.com/2301543 2301543 https://errata.almalinux.org/9/ALSA-2024-6997.html ALSA-2024:6997 ALSA-2024:6997 �kernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpm �libperf-5.14.0-427.37.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.37.1.el9_4.x86_64.rpm �libperf-5.14.0-427.37.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.37.1.el9_4.x86_64.rpm ����}�; �/�wBsecurity Important: cups-filters security update ���Lhttps://access.redhat.com/errata/RHSA-2024:7346 RHSA-2024:7346 RHSA-2024:7346
https://access.redhat.com/security/cve/CVE-2024-47076 CVE-2024-47076 CVE-2024-47076 https://access.redhat.com/security/cve/CVE-2024-47175 CVE-2024-47175 CVE-2024-47175 https://access.redhat.com/security/cve/CVE-2024-47176 CVE-2024-47176 CVE-2024-47176 https://bugzilla.redhat.com/2314252 2314252 https://bugzilla.redhat.com/2314253 2314253 https://bugzilla.redhat.com/2314256 2314256 https://errata.almalinux.org/9/ALSA-2024-7346.html ALSA-2024:7346 ALSA-2024:7346 �\�2cups-filters-devel-1.28.7-17.el9_4.x86_64.rpm �\�2cups-filters-devel-1.28.7-17.el9_4.i686.rpm �\�2cups-filters-devel-1.28.7-17.el9_4.x86_64.rpm �\�2cups-filters-devel-1.28.7-17.el9_4.i686.rpm ��߷*�< �0�zsecurity Important: .NET 6.0 security update ��i�"https://access.redhat.com/errata/RHSA-2024:7867 RHSA-2024:7867 RHSA-2024:7867
https://access.redhat.com/security/cve/CVE-2024-43483 CVE-2024-43483 CVE-2024-43483 https://access.redhat.com/security/cve/CVE-2024-43484 CVE-2024-43484 CVE-2024-43484 https://access.redhat.com/security/cve/CVE-2024-43485 CVE-2024-43485 CVE-2024-43485 https://bugzilla.redhat.com/2315729 2315729 https://bugzilla.redhat.com/2315730 2315730 https://bugzilla.redhat.com/2315731 2315731 https://errata.almalinux.org/9/ALSA-2024-7867.html ALSA-2024:7867 ALSA-2024:7867 n�bdotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm n�bdotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4.x86_64.rpm ����2�= �1�|security Important: .NET 8.0 security update ���
https://access.redhat.com/errata/RHSA-2024:7869 RHSA-2024:7869 RHSA-2024:7869
https://access.redhat.com/security/cve/CVE-2024-38229 CVE-2024-38229 CVE-2024-38229 https://access.redhat.com/security/cve/CVE-2024-43483 CVE-2024-43483 CVE-2024-43483 https://access.redhat.com/security/cve/CVE-2024-43484 CVE-2024-43484 CVE-2024-43484 https://access.redhat.com/security/cve/CVE-2024-43485 CVE-2024-43485 CVE-2024-43485 https://bugzilla.redhat.com/2315729 2315729 https://bugzilla.redhat.com/2315730 2315730 https://bugzilla.redhat.com/2315731 2315731 https://bugzilla.redhat.com/2316161 2316161 https://errata.almalinux.org/9/ALSA-2024-7869.html ALSA-2024:7869 ALSA-2024:7869 ��vdotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpm ��vdotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4.x86_64.rpm ����M�> �2�~Bsecurity Moderate: OpenIPMI security update
��!�:https://access.redhat.com/errata/RHSA-2024:8037 RHSA-2024:8037 RHSA-2024:8037
https://access.redhat.com/security/cve/CVE-2024-42934 CVE-2024-42934 CVE-2024-42934 https://bugzilla.redhat.com/2308375 2308375 https://errata.almalinux.org/9/ALSA-2024-8037.html ALSA-2024:8037 ALSA-2024:8037 �i�EOpenIPMI-devel-2.0.32-5.el9_4.i686.rpm �i�EOpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm �i�EOpenIPMI-devel-2.0.32-5.el9_4.i686.rpm �i�EOpenIPMI-devel-2.0.32-5.el9_4.x86_64.rpm ����]�? �3�ABBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update
��[�rhttps://access.redhat.com/errata/RHSA-2024:8117 RHSA-2024:8117 RHSA-2024:8117
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025 https://bugzilla.redhat.com/2318524 2318524 https://bugzilla.redhat.com/2318526 2318526 https://bugzilla.redhat.com/2318530 2318530 https://bugzilla.redhat.com/2318534 2318534 https://errata.almalinux.org/9/ALSA-2024-8117.html ALSA-2024:8117 ALSA-2024:8117
�[java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �
[java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm � [java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm
�[java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �
[java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm � [java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9.x86_64.rpm �[java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9.x86_64.rpm ����k�@ �4�UBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-11-openjdk security update
��M�qhttps://access.redhat.com/errata/RHSA-2024:8121 RHSA-2024:8121 RHSA-2024:8121
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025 https://bugzilla.redhat.com/2318524 2318524 https://bugzilla.redhat.com/2318526 2318526 https://bugzilla.redhat.com/2318530 2318530 https://bugzilla.redhat.com/2318534 2318534 https://errata.almalinux.org/9/ALSA-2024-8121.html ALSA-2024:8121 ALSA-2024:8121 �j+java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �l+java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �d+java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �a+java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �f+java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �i+java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �g+java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �k+java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �h+java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �m+java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �e+java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �c+java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �n+java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �b+java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �j+java-11-openjdk-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �l+java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �d+java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �a+java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �f+java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �i+java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �g+java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �k+java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �h+java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �m+java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �e+java-11-openjdk-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �c+java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9.x86_64.rpm �n+java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm �b+java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9.x86_64.rpm ����h�A �5�qBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update
��>�qhttps://access.redhat.com/errata/RHSA-2024:8124 RHSA-2024:8124 RHSA-2024:8124
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025 https://bugzilla.redhat.com/2318524 2318524 https://bugzilla.redhat.com/2318526 2318526 https://bugzilla.redhat.com/2318530 2318530 https://bugzilla.redhat.com/2318534 2318534 https://errata.almalinux.org/9/ALSA-2024-8124.html ALSA-2024:8124 ALSA-2024:8124 q/java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm u/java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm x/java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm y/java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm o/java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm z/java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm w/java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm v/java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm t/java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm s/java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm p/java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm |/java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm r/java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm {/java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm q/java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm u/java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm x/java-17-openjdk-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm y/java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm o/java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm z/java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm w/java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm v/java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm t/java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm s/java-17-openjdk-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm p/java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm |/java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm r/java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm {/java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9.alma.1.x86_64.rpm ����n�B �6�MBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update
��/�https://access.redhat.com/errata/RHSA-2024:8127 RHSA-2024:8127 RHSA-2024:8127
https://access.redhat.com/security/cve/CVE-2023-48161 CVE-2023-48161 CVE-2023-48161 https://access.redhat.com/security/cve/CVE-2024-21208 CVE-2024-21208 CVE-2024-21208 https://access.redhat.com/security/cve/CVE-2024-21210 CVE-2024-21210 CVE-2024-21210 https://access.redhat.com/security/cve/CVE-2024-21217 CVE-2024-21217 CVE-2024-21217 https://access.redhat.com/security/cve/CVE-2024-21235 CVE-2024-21235 CVE-2024-21235 https://bugzilla.redhat.com/2251025 2251025 https://bugzilla.redhat.com/2318524 2318524 https://bugzilla.redhat.com/2318526 2318526 https://bugzilla.redhat.com/2318530 2318530 https://bugzilla.redhat.com/2318534 2318534 https://errata.almalinux.org/9/ALSA-2024-8127.html ALSA-2024:8127 ALSA-2024:8127 �u?java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �q?java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �v?java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �x?java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �|?java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �r?java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �w?java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �y?java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �o?java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �{?java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �t?java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �s?java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �p?java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �z?java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �u?java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �q?java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �v?java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �x?java-21-openjdk-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �|?java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �r?java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �w?java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �y?java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �o?java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �{?java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �t?java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �s?java-21-openjdk-fastdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �p?java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm �z?java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9.alma.1.x86_64.rpm ����_�C �7�iBBBBsecurity Moderate: kernel security update
��E�<https://access.redhat.com/errata/RHSA-2024:8162 RHSA-2024:8162 RHSA-2024:8162
https://access.redhat.com/security/cve/CVE-2021-47385 CVE-2021-47385 CVE-2021-47385 https://access.redhat.com/security/cve/CVE-2023-28746 CVE-2023-28746 CVE-2023-28746 https://access.redhat.com/security/cve/CVE-2023-52658 CVE-2023-52658 CVE-2023-52658 https://access.redhat.com/security/cve/CVE-2024-27403 CVE-2024-27403 CVE-2024-27403 https://access.redhat.com/security/cve/CVE-2024-35989 CVE-2024-35989 CVE-2024-35989 https://access.redhat.com/security/cve/CVE-2024-36889 CVE-2024-36889 CVE-2024-36889 https://access.redhat.com/security/cve/CVE-2024-36978 CVE-2024-36978 CVE-2024-36978 https://access.redhat.com/security/cve/CVE-2024-38556 CVE-2024-38556 CVE-2024-38556 https://access.redhat.com/security/cve/CVE-2024-39483 CVE-2024-39483 CVE-2024-39483 https://access.redhat.com/security/cve/CVE-2024-39502 CVE-2024-39502 CVE-2024-39502 https://access.redhat.com/security/cve/CVE-2024-40959 CVE-2024-40959 CVE-2024-40959 https://access.redhat.com/security/cve/CVE-2024-42079 CVE-2024-42079 CVE-2024-42079 https://access.redhat.com/security/cve/CVE-2024-42272 CVE-2024-42272 CVE-2024-42272 https://access.redhat.com/security/cve/CVE-2024-42284 CVE-2024-42284 CVE-2024-42284 https://bugzilla.redhat.com/2270700 2270700 https://bugzilla.redhat.com/2281127 2281127 https://bugzilla.redhat.com/2281149 2281149 https://bugzilla.redhat.com/2281847 2281847 https://bugzilla.redhat.com/2282355 2282355 https://bugzilla.redhat.com/2284571 2284571 https://bugzilla.redhat.com/2293078 2293078 https://bugzilla.redhat.com/2293443 2293443 https://bugzilla.redhat.com/2295921 2295921 https://bugzilla.redhat.com/2297474 2297474 https://bugzilla.redhat.com/2297543 2297543 https://bugzilla.redhat.com/2300517 2300517 https://errata.almalinux.org/9/ALSA-2024-8162.html ALSA-2024:8162 ALSA-2024:8162 �kernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm �libperf-5.14.0-427.40.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.40.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.40.1.el9_4.x86_64.rpm �libperf-5.14.0-427.40.1.el9_4.x86_64.rpm ���{�D �:�xB�wBBBBBBBBBsecurity Moderate: python3.11 security update
���Thttps://access.redhat.com/errata/RHSA-2024:8374 RHSA-2024:8374 RHSA-2024:8374
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-8374.html ALSA-2024:8374 ALSA-2024:8374 b�python3.11-tkinter-3.11.7-1.el9_4.6.i686.rpm a�python3.11-3.11.7-1.el9_4.6.i686.rpm �python3.11-debug-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-debug-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.i686.rpm b�python3.11-tkinter-3.11.7-1.el9_4.6.i686.rpm a�python3.11-3.11.7-1.el9_4.6.i686.rpm �python3.11-debug-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-debug-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.x86_64.rpm �python3.11-idle-3.11.7-1.el9_4.6.i686.rpm �python3.11-test-3.11.7-1.el9_4.6.i686.rpm ����w�E �<�{�J�wBBBBBBBBBsecurity Moderate: python3.9 security update
��U�\https://access.redhat.com/errata/RHSA-2024:8446 RHSA-2024:8446 RHSA-2024:8446
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-8446.html ALSA-2024:8446 ALSA-2024:8446 �6python3-test-3.9.18-3.el9_4.6.x86_64.rpm �6python3-idle-3.9.18-3.el9_4.6.x86_64.rpm �6python3-idle-3.9.18-3.el9_4.6.i686.rpm �6python3-test-3.9.18-3.el9_4.6.i686.rpm �6python3-debug-3.9.18-3.el9_4.6.x86_64.rpm N�6python3-tkinter-3.9.18-3.el9_4.6.i686.rpm M�6python3-3.9.18-3.el9_4.6.i686.rpm �6python3-debug-3.9.18-3.el9_4.6.i686.rpm �6python3-test-3.9.18-3.el9_4.6.x86_64.rpm �6python3-idle-3.9.18-3.el9_4.6.x86_64.rpm �6python3-idle-3.9.18-3.el9_4.6.i686.rpm �6python3-test-3.9.18-3.el9_4.6.i686.rpm �6python3-debug-3.9.18-3.el9_4.6.x86_64.rpm N�6python3-tkinter-3.9.18-3.el9_4.6.i686.rpm M�6python3-3.9.18-3.el9_4.6.i686.rpm �6python3-debug-3.9.18-3.el9_4.6.i686.rpm ����F �?�}B�HBBBBBBBBBsecurity Moderate: python3.12 security update
��1�
https://access.redhat.com/errata/RHSA-2024:8447 RHSA-2024:8447 RHSA-2024:8447
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-8447.html ALSA-2024:8447 ALSA-2024:8447 G� python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm G� python3.12-test-3.12.1-4.el9_4.4.i686.rpm F� python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm E� python3.12-debug-3.12.1-4.el9_4.4.i686.rpm �E� python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm F� python3.12-idle-3.12.1-4.el9_4.4.i686.rpm �D� python3.12-3.12.1-4.el9_4.4.i686.rpm E� python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm G� python3.12-test-3.12.1-4.el9_4.4.x86_64.rpm G� python3.12-test-3.12.1-4.el9_4.4.i686.rpm F� python3.12-idle-3.12.1-4.el9_4.4.x86_64.rpm E� python3.12-debug-3.12.1-4.el9_4.4.i686.rpm �E� python3.12-tkinter-3.12.1-4.el9_4.4.i686.rpm F� python3.12-idle-3.12.1-4.el9_4.4.i686.rpm �D� python3.12-3.12.1-4.el9_4.4.i686.rpm E� python3.12-debug-3.12.1-4.el9_4.4.x86_64.rpm ��� �G � �PBBBBsecurity Moderate: kernel security update
��>�>-https://access.redhat.com/errata/RHSA-2024:8617 RHSA-2024:8617 RHSA-2024:8617
https://access.redhat.com/security/cve/CVE-2021-47383 CVE-2021-47383 CVE-2021-47383 https://access.redhat.com/security/cve/CVE-2024-2201 CVE-2024-2201 CVE-2024-2201 https://access.redhat.com/security/cve/CVE-2024-26640 CVE-2024-26640 CVE-2024-26640 https://access.redhat.com/security/cve/CVE-2024-26826 CVE-2024-26826 CVE-2024-26826 https://access.redhat.com/security/cve/CVE-2024-26923 CVE-2024-26923 CVE-2024-26923 https://access.redhat.com/security/cve/CVE-2024-26935 CVE-2024-26935 CVE-2024-26935 https://access.redhat.com/security/cve/CVE-2024-26961 CVE-2024-26961 CVE-2024-26961 https://access.redhat.com/security/cve/CVE-2024-36244 CVE-2024-36244 CVE-2024-36244 https://access.redhat.com/security/cve/CVE-2024-39472 CVE-2024-39472 CVE-2024-39472 https://access.redhat.com/security/cve/CVE-2024-39504 CVE-2024-39504 CVE-2024-39504 https://access.redhat.com/security/cve/CVE-2024-40904 CVE-2024-40904 CVE-2024-40904 https://access.redhat.com/security/cve/CVE-2024-40931 CVE-2024-40931 CVE-2024-40931 https://access.redhat.com/security/cve/CVE-2024-40960 CVE-2024-40960 CVE-2024-40960 https://access.redhat.com/security/cve/CVE-2024-40972 CVE-2024-40972 CVE-2024-40972 https://access.redhat.com/security/cve/CVE-2024-40977 CVE-2024-40977 CVE-2024-40977 https://access.redhat.com/security/cve/CVE-2024-40995 CVE-2024-40995 CVE-2024-40995 https://access.redhat.com/security/cve/CVE-2024-40998 CVE-2024-40998 CVE-2024-40998 https://access.redhat.com/security/cve/CVE-2024-41005 CVE-2024-41005 CVE-2024-41005 https://access.redhat.com/security/cve/CVE-2024-41013 CVE-2024-41013 CVE-2024-41013 https://access.redhat.com/security/cve/CVE-2024-41014 CVE-2024-41014 CVE-2024-41014 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://bugzilla.redhat.com/2268118 2268118 https://bugzilla.redhat.com/2270100 2270100 https://bugzilla.redhat.com/2275604 2275604 https://bugzilla.redhat.com/2277171 2277171 https://bugzilla.redhat.com/2278176 2278176 https://bugzilla.redhat.com/2278235 2278235 https://bugzilla.redhat.com/2282357 2282357 https://bugzilla.redhat.com/2293654 2293654 https://bugzilla.redhat.com/2296067 2296067 https://bugzilla.redhat.com/2297476 2297476 https://bugzilla.redhat.com/2297488 2297488 https://bugzilla.redhat.com/2297515 2297515 https://bugzilla.redhat.com/2297544 2297544 https://bugzilla.redhat.com/2297556 2297556 https://bugzilla.redhat.com/2297561 2297561 https://bugzilla.redhat.com/2297579 2297579 https://bugzilla.redhat.com/2297582 2297582 https://bugzilla.redhat.com/2297589 2297589 https://bugzilla.redhat.com/2300296 2300296 https://bugzilla.redhat.com/2300297 2300297 https://bugzilla.redhat.com/2311715 2311715 https://errata.almalinux.org/9/ALSA-2024-8617.html ALSA-2024:8617 ALSA-2024:8617 �libperf-5.14.0-427.42.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm �libperf-5.14.0-427.42.1.el9_4.x86_64.rpm �kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpm �kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpm ����<�H ��VBsecurity Important: openexr security update ��|�:https://access.redhat.com/errata/RHSA-2024:8800 RHSA-2024:8800 RHSA-2024:8800
https://access.redhat.com/security/cve/CVE-2023-5841 CVE-2023-5841 CVE-2023-5841 https://bugzilla.redhat.com/2262397 2262397 https://errata.almalinux.org/9/ALSA-2024-8800.html ALSA-2024:8800 ALSA-2024:8800 �f�Vopenexr-devel-3.1.1-2.el9_4.1.x86_64.rpm �f�Vopenexr-devel-3.1.1-2.el9_4.1.i686.rpm �f�Vopenexr-devel-3.1.1-2.el9_4.1.x86_64.rpm �f�Vopenexr-devel-3.1.1-2.el9_4.1.i686.rpm �����I ��Ysecurity Moderate: libtiff security update
��6�https://access.redhat.com/errata/RHSA-2024:8914 RHSA-2024:8914 RHSA-2024:8914
https://access.redhat.com/security/cve/CVE-2024-7006 CVE-2024-7006 CVE-2024-7006 https://bugzilla.redhat.com/2302996 2302996 https://errata.almalinux.org/9/ALSA-2024-8914.html ALSA-2024:8914 ALSA-2024:8914 � �Klibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm � �Klibtiff-tools-4.4.0-12.el9_4.1.x86_64.rpm �����J ��CB�XBsecurity Moderate: edk2 security update
��A�Ehttps://access.redhat.com/errata/RHSA-2024:8935 RHSA-2024:8935 RHSA-2024:8935
https://access.redhat.com/security/cve/CVE-2024-6119 CVE-2024-6119 CVE-2024-6119 https://bugzilla.redhat.com/2306158 2306158 https://errata.almalinux.org/9/ALSA-2024-8935.html ALSA-2024:8935 ALSA-2024:8935 �K�gedk2-aarch64-20231122-6.el9_4.4.noarch.rpm ��gedk2-tools-20231122-6.el9_4.4.x86_64.rpm �L�gedk2-tools-doc-20231122-6.el9_4.4.noarch.rpm � �gedk2-ovmf-20231122-6.el9_4.4.noarch.rpm �K�gedk2-aarch64-20231122-6.el9_4.4.noarch.rpm ��gedk2-tools-20231122-6.el9_4.4.x86_64.rpm �L�gedk2-tools-doc-20231122-6.el9_4.4.noarch.rpm � �gedk2-ovmf-20231122-6.el9_4.4.noarch.rpm ����w�K ��^BBsecurity Moderate: edk2 security update
���=
https://access.redhat.com/errata/RHSA-2024:9088 RHSA-2024:9088 RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2023-6129 CVE-2023-6129 CVE-2023-6129 https://access.redhat.com/security/cve/CVE-2023-6237 CVE-2023-6237 CVE-2023-6237 https://access.redhat.com/security/cve/CVE-2024-0727 CVE-2024-0727 CVE-2024-0727 https://access.redhat.com/security/cve/CVE-2024-1298 CVE-2024-1298 CVE-2024-1298 https://bugzilla.redhat.com/2257571 2257571 https://bugzilla.redhat.com/2258502 2258502 https://bugzilla.redhat.com/2259944 2259944 https://bugzilla.redhat.com/2284243 2284243 https://errata.almalinux.org/9/ALSA-2024-9088.html ALSA-2024:9088 ALSA-2024:9088 �K�yedk2-aarch64-20240524-6.el9_5.noarch.rpm ��yedk2-tools-20240524-6.el9_5.x86_64.rpm �L�yedk2-tools-doc-20240524-6.el9_5.noarch.rpm �K�yedk2-aarch64-20240524-6.el9_5.noarch.rpm ��yedk2-tools-20240524-6.el9_5.x86_64.rpm �L�yedk2-tools-doc-20240524-6.el9_5.noarch.rpm ����6�L ��G�\BBsecurity Moderate: xorg-x11-server-Xwayland security update
��C�:https://access.redhat.com/errata/RHSA-2024:9093 RHSA-2024:9093 RHSA-2024:9093
https://access.redhat.com/security/cve/CVE-2024-31080 CVE-2024-31080 CVE-2024-31080 https://access.redhat.com/security/cve/CVE-2024-31081 CVE-2024-31081 CVE-2024-31081 https://access.redhat.com/security/cve/CVE-2024-31083 CVE-2024-31083 CVE-2024-31083 https://bugzilla.redhat.com/2271997 2271997 https://bugzilla.redhat.com/2271998 2271998 https://bugzilla.redhat.com/2272000 2272000 https://errata.almalinux.org/9/ALSA-2024-9093.html ALSA-2024:9093 ALSA-2024:9093 ��Sxorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm ��Sxorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm ��Sxorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm ��Sxorg-x11-server-Xwayland-23.2.7-1.el9.i686.rpm ��Sxorg-x11-server-Xwayland-devel-23.2.7-1.el9.x86_64.rpm ��Sxorg-x11-server-Xwayland-devel-23.2.7-1.el9.i686.rpm ����]�M � �fBBsecurity Moderate: xorg-x11-server security update
��}�)https://access.redhat.com/errata/RHSA-2024:9122 RHSA-2024:9122 RHSA-2024:9122
https://access.redhat.com/security/cve/CVE-2024-31080 CVE-2024-31080 CVE-2024-31080 https://access.redhat.com/security/cve/CVE-2024-31081 CVE-2024-31081 CVE-2024-31081 https://access.redhat.com/security/cve/CVE-2024-31083 CVE-2024-31083 CVE-2024-31083 https://bugzilla.redhat.com/2271997 2271997 https://bugzilla.redhat.com/2271998 2271998 https://bugzilla.redhat.com/2272000 2272000 https://errata.almalinux.org/9/ALSA-2024-9122.html ALSA-2024:9122 ALSA-2024:9122 �_�rxorg-x11-server-source-1.20.11-26.el9.noarch.rpm d�rxorg-x11-server-devel-1.20.11-26.el9.x86_64.rpm d�rxorg-x11-server-devel-1.20.11-26.el9.i686.rpm �_�rxorg-x11-server-source-1.20.11-26.el9.noarch.rpm d�rxorg-x11-server-devel-1.20.11-26.el9.x86_64.rpm d�rxorg-x11-server-devel-1.20.11-26.el9.i686.rpm ����
�N �
�jBBBBsecurity Moderate: libvirt security update
��&�|https://access.redhat.com/errata/RHSA-2024:9128 RHSA-2024:9128 RHSA-2024:9128
https://access.redhat.com/security/cve/CVE-2024-8235 CVE-2024-8235 CVE-2024-8235 https://bugzilla.redhat.com/2308680 2308680 https://errata.almalinux.org/9/ALSA-2024-9128.html ALSA-2024:9128 ALSA-2024:9128 �)�nlibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm �B�nlibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm �(�nlibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm �)�nlibvirt-docs-10.5.0-7.el9_5.alma.1.x86_64.rpm �B�nlibvirt-daemon-plugin-sanlock-10.5.0-7.el9_5.alma.1.x86_64.rpm �(�nlibvirt-devel-10.5.0-7.el9_5.alma.1.x86_64.rpm ����`�O ��pBBBBBBBBBBBsecurity Moderate: poppler security update
��"�+https://access.redhat.com/errata/RHSA-2024:9167 RHSA-2024:9167 RHSA-2024:9167
https://access.redhat.com/security/cve/CVE-2024-6239 CVE-2024-6239 CVE-2024-6239 https://bugzilla.redhat.com/2293594 2293594 https://errata.almalinux.org/9/ALSA-2024-9167.html ALSA-2024:9167 ALSA-2024:9167 �}poppler-glib-devel-21.01.0-21.el9.i686.rpm �}poppler-glib-devel-21.01.0-21.el9.x86_64.rpm �}poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm �}poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm �}poppler-devel-21.01.0-21.el9.x86_64.rpm �.}poppler-glib-doc-21.01.0-21.el9.noarch.rpm �}poppler-qt5-devel-21.01.0-21.el9.i686.rpm �}poppler-cpp-devel-21.01.0-21.el9.i686.rpm �}poppler-devel-21.01.0-21.el9.i686.rpm �}poppler-glib-devel-21.01.0-21.el9.i686.rpm �}poppler-glib-devel-21.01.0-21.el9.x86_64.rpm �}poppler-cpp-devel-21.01.0-21.el9.x86_64.rpm �}poppler-qt5-devel-21.01.0-21.el9.x86_64.rpm �}poppler-devel-21.01.0-21.el9.x86_64.rpm �.}poppler-glib-doc-21.01.0-21.el9.noarch.rpm �}poppler-qt5-devel-21.01.0-21.el9.i686.rpm �}poppler-cpp-devel-21.01.0-21.el9.i686.rpm �}poppler-devel-21.01.0-21.el9.i686.rpm ����V�P ��}Bsecurity Moderate: jose security update
��M�Rhttps://access.redhat.com/errata/RHSA-2024:9181 RHSA-2024:9181 RHSA-2024:9181
https://access.redhat.com/security/cve/CVE-2023-50967 CVE-2023-50967 CVE-2023-50967 https://access.redhat.com/security/cve/CVE-2024-28176 CVE-2024-28176 CVE-2024-28176 https://bugzilla.redhat.com/2268820 2268820 https://bugzilla.redhat.com/2270538 2270538 https://errata.almalinux.org/9/ALSA-2024-9181.html ALSA-2024:9181 ALSA-2024:9181 �u�<libjose-devel-14-1.el9.x86_64.rpm �u�<libjose-devel-14-1.el9.i686.rpm �u�<libjose-devel-14-1.el9.x86_64.rpm �u�<libjose-devel-14-1.el9.i686.rpm ����@�Q �
�@security Moderate: gtk3 security update
���+https://access.redhat.com/errata/RHSA-2024:9184 RHSA-2024:9184 RHSA-2024:9184
https://access.redhat.com/security/cve/CVE-2024-6655 CVE-2024-6655 CVE-2024-6655 https://bugzilla.redhat.com/2297098 2297098 https://errata.almalinux.org/9/ALSA-2024-9184.html ALSA-2024:9184 ALSA-2024:9184 ��Hgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm ��Hgtk3-devel-docs-3.24.31-5.el9.x86_64.rpm ����0�R ��BBsecurity Low: bcc security update �V��J�vhttps://access.redhat.com/errata/RHSA-2024:9187 RHSA-2024:9187 RHSA-2024:9187
https://access.redhat.com/security/cve/CVE-2024-2314 CVE-2024-2314 CVE-2024-2314 https://bugzilla.redhat.com/2269019 2269019 https://errata.almalinux.org/9/ALSA-2024-9187.html ALSA-2024:9187 ALSA-2024:9187 ��bcc-devel-0.30.0-6.el9.x86_64.rpm ��bcc-doc-0.30.0-6.el9.noarch.rpm ��bcc-devel-0.30.0-6.el9.x86_64.rpm ��bcc-doc-0.30.0-6.el9.noarch.rpm ����T�S ��OB�vBBBBBBBBBsecurity Moderate: python3.12 security update
��@�Fhttps://access.redhat.com/errata/RHSA-2024:9190 RHSA-2024:9190 RHSA-2024:9190
https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2276525 2276525 https://bugzilla.redhat.com/2292921 2292921 https://bugzilla.redhat.com/2307370 2307370 https://errata.almalinux.org/9/ALSA-2024-9190.html ALSA-2024:9190 ALSA-2024:9190 G�%python3.12-test-3.12.5-2.el9.i686.rpm E�%python3.12-debug-3.12.5-2.el9.i686.rpm F�%python3.12-idle-3.12.5-2.el9.x86_64.rpm �E�%python3.12-tkinter-3.12.5-2.el9.i686.rpm �D�%python3.12-3.12.5-2.el9.i686.rpm G�%python3.12-test-3.12.5-2.el9.x86_64.rpm E�%python3.12-debug-3.12.5-2.el9.x86_64.rpm F�%python3.12-idle-3.12.5-2.el9.i686.rpm G�%python3.12-test-3.12.5-2.el9.i686.rpm E�%python3.12-debug-3.12.5-2.el9.i686.rpm F�%python3.12-idle-3.12.5-2.el9.x86_64.rpm �E�%python3.12-tkinter-3.12.5-2.el9.i686.rpm �D�%python3.12-3.12.5-2.el9.i686.rpm G�%python3.12-test-3.12.5-2.el9.x86_64.rpm E�%python3.12-debug-3.12.5-2.el9.x86_64.rpm F�%python3.12-idle-3.12.5-2.el9.i686.rpm ���>�T ��RB�~BBBBBBBBBsecurity Moderate: python3.11 security update
���Rhttps://access.redhat.com/errata/RHSA-2024:9192 RHSA-2024:9192 RHSA-2024:9192
https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2276525 2276525 https://bugzilla.redhat.com/2307370 2307370 https://errata.almalinux.org/9/ALSA-2024-9192.html ALSA-2024:9192 ALSA-2024:9192 �python3.11-test-3.11.9-7.el9.i686.rpm a�python3.11-3.11.9-7.el9.i686.rpm �python3.11-idle-3.11.9-7.el9.x86_64.rpm �python3.11-debug-3.11.9-7.el9.i686.rpm b�python3.11-tkinter-3.11.9-7.el9.i686.rpm �python3.11-debug-3.11.9-7.el9.x86_64.rpm �python3.11-test-3.11.9-7.el9.x86_64.rpm �python3.11-idle-3.11.9-7.el9.i686.rpm �python3.11-test-3.11.9-7.el9.i686.rpm a�python3.11-3.11.9-7.el9.i686.rpm �python3.11-idle-3.11.9-7.el9.x86_64.rpm �python3.11-debug-3.11.9-7.el9.i686.rpm b�python3.11-tkinter-3.11.9-7.el9.i686.rpm �python3.11-debug-3.11.9-7.el9.x86_64.rpm �python3.11-test-3.11.9-7.el9.x86_64.rpm �python3.11-idle-3.11.9-7.el9.i686.rpm ���f�U ��[Bsecurity Low: NetworkManager security update �V��X�jhttps://access.redhat.com/errata/RHSA-2024:9317 RHSA-2024:9317 RHSA-2024:9317
https://access.redhat.com/security/cve/CVE-2024-6501 CVE-2024-6501 CVE-2024-6501 https://bugzilla.redhat.com/2295734 2295734 https://errata.almalinux.org/9/ALSA-2024-9317.html ALSA-2024:9317 ALSA-2024:9317 �[�>NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm �[�>NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm �[�>NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.x86_64.rpm �[�>NetworkManager-libnm-devel-1.48.10-2.el9_5.alma.1.i686.rpm ����F�V ��V�p�ZBBBBBBBBBsecurity Moderate: python3.9 security update
��B�khttps://access.redhat.com/errata/RHSA-2024:9371 RHSA-2024:9371 RHSA-2024:9371
https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2307370 2307370 https://errata.almalinux.org/9/ALSA-2024-9371.html ALSA-2024:9371 ALSA-2024:9371 N�7python3-tkinter-3.9.19-8.el9.i686.rpm �7python3-idle-3.9.19-8.el9.x86_64.rpm �7python3-idle-3.9.19-8.el9.i686.rpm �7python3-debug-3.9.19-8.el9.x86_64.rpm �7python3-debug-3.9.19-8.el9.i686.rpm �7python3-test-3.9.19-8.el9.x86_64.rpm M�7python3-3.9.19-8.el9.i686.rpm �7python3-test-3.9.19-8.el9.i686.rpm N�7python3-tkinter-3.9.19-8.el9.i686.rpm �7python3-idle-3.9.19-8.el9.x86_64.rpm �7python3-idle-3.9.19-8.el9.i686.rpm �7python3-debug-3.9.19-8.el9.x86_64.rpm �7python3-debug-3.9.19-8.el9.i686.rpm �7python3-test-3.9.19-8.el9.x86_64.rpm M�7python3-3.9.19-8.el9.i686.rpm �7python3-test-3.9.19-8.el9.i686.rpm ���7�W ��iBsecurity Moderate: bluez security update
��-�+https://access.redhat.com/errata/RHSA-2024:9413 RHSA-2024:9413 RHSA-2024:9413
https://access.redhat.com/security/cve/CVE-2023-27349 CVE-2023-27349 CVE-2023-27349 https://access.redhat.com/security/cve/CVE-2023-44431 CVE-2023-44431 CVE-2023-44431 https://access.redhat.com/security/cve/CVE-2023-45866 CVE-2023-45866 CVE-2023-45866 https://access.redhat.com/security/cve/CVE-2023-50229 CVE-2023-50229 CVE-2023-50229 https://access.redhat.com/security/cve/CVE-2023-50230 CVE-2023-50230 CVE-2023-50230 https://access.redhat.com/security/cve/CVE-2023-51580 CVE-2023-51580 CVE-2023-51580 https://access.redhat.com/security/cve/CVE-2023-51589 CVE-2023-51589 CVE-2023-51589 https://access.redhat.com/security/cve/CVE-2023-51592 CVE-2023-51592 CVE-2023-51592 https://access.redhat.com/security/cve/CVE-2023-51594 CVE-2023-51594 CVE-2023-51594 https://access.redhat.com/security/cve/CVE-2023-51596 CVE-2023-51596 CVE-2023-51596 https://bugzilla.redhat.com/2253391 2253391 https://bugzilla.redhat.com/2278787 2278787 https://bugzilla.redhat.com/2278945 2278945 https://bugzilla.redhat.com/2278955 2278955 https://bugzilla.redhat.com/2278962 2278962 https://bugzilla.redhat.com/2278965 2278965 https://bugzilla.redhat.com/2278967 2278967 https://bugzilla.redhat.com/2278969 2278969 https://bugzilla.redhat.com/2278972 2278972 https://bugzilla.redhat.com/2278974 2278974 https://errata.almalinux.org/9/ALSA-2024-9413.html ALSA-2024:9413 ALSA-2024:9413 �m�dbluez-libs-devel-5.72-2.el9.i686.rpm �m�dbluez-libs-devel-5.72-2.el9.x86_64.rpm �m�dbluez-libs-devel-5.72-2.el9.i686.rpm �m�dbluez-libs-devel-5.72-2.el9.x86_64.rpm ����J�X �/�lBsecurity Moderate: fontforge security update
��X�ehttps://access.redhat.com/errata/RHSA-2024:9439 RHSA-2024:9439 RHSA-2024:9439
https://access.redhat.com/security/cve/CVE-2024-25081 CVE-2024-25081 CVE-2024-25081 https://access.redhat.com/security/cve/CVE-2024-25082 CVE-2024-25082 CVE-2024-25082 https://bugzilla.redhat.com/2266180 2266180 https://bugzilla.redhat.com/2266181 2266181 https://errata.almalinux.org/9/ALSA-2024-9439.html ALSA-2024:9439 ALSA-2024:9439 �:�Pfontforge-20201107-6.el9.i686.rpm �:�Pfontforge-20201107-6.el9.x86_64.rpm �:�Pfontforge-20201107-6.el9.i686.rpm �:�Pfontforge-20201107-6.el9.x86_64.rpm ����L�Y �4�pBBsecurity Moderate: mingw-glib2 security update
��=�(https://access.redhat.com/errata/RHSA-2024:9442 RHSA-2024:9442 RHSA-2024:9442
https://access.redhat.com/security/cve/CVE-2024-34397 CVE-2024-34397 CVE-2024-34397 https://bugzilla.redhat.com/2279632 2279632 https://errata.almalinux.org/9/ALSA-2024-9442.html ALSA-2024:9442 ALSA-2024:9442 �I�rmingw64-glib2-static-2.78.6-1.el9.noarch.rpm �F�rmingw32-glib2-2.78.6-1.el9.noarch.rpm �G�rmingw32-glib2-static-2.78.6-1.el9.noarch.rpm �H�rmingw64-glib2-2.78.6-1.el9.noarch.rpm �I�rmingw64-glib2-static-2.78.6-1.el9.noarch.rpm �F�rmingw32-glib2-2.78.6-1.el9.noarch.rpm �G�rmingw32-glib2-static-2.78.6-1.el9.noarch.rpm �H�rmingw64-glib2-2.78.6-1.el9.noarch.rpm ����3�Z ��YB�\BBBsecurity Important: bubblewrap and flatpak security update ��e�Rhttps://access.redhat.com/errata/RHSA-2024:9449 RHSA-2024:9449 RHSA-2024:9449
https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://errata.almalinux.org/9/ALSA-2024-9449.html ALSA-2024:9449 ALSA-2024:9449 �|�/flatpak-1.12.9-3.el9_5.i686.rpm ��/flatpak-devel-1.12.9-3.el9_5.x86_64.rpm ��/flatpak-devel-1.12.9-3.el9_5.i686.rpm �}�/flatpak-session-helper-1.12.9-3.el9_5.i686.rpm �|�/flatpak-1.12.9-3.el9_5.i686.rpm ��/flatpak-devel-1.12.9-3.el9_5.x86_64.rpm ��/flatpak-devel-1.12.9-3.el9_5.i686.rpm �}�/flatpak-session-helper-1.12.9-3.el9_5.i686.rpm ����4�[ ��\B�^BBBBBBBBBsecurity Moderate: python3.11 security update
��7�\https://access.redhat.com/errata/RHSA-2024:9450 RHSA-2024:9450 RHSA-2024:9450
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-9450.html ALSA-2024:9450 ALSA-2024:9450 �python3.11-test-3.11.9-7.el9_5.1.i686.rpm �python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.1.x86_64.rpm b�python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.i686.rpm a�python3.11-3.11.9-7.el9_5.1.i686.rpm �python3.11-test-3.11.9-7.el9_5.1.i686.rpm �python3.11-idle-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.x86_64.rpm �python3.11-test-3.11.9-7.el9_5.1.x86_64.rpm b�python3.11-tkinter-3.11.9-7.el9_5.1.i686.rpm �python3.11-debug-3.11.9-7.el9_5.1.i686.rpm a�python3.11-3.11.9-7.el9_5.1.i686.rpm ����y�\ �!�_B�fBBBBBBBBBsecurity Moderate: python3.12 security update
���
https://access.redhat.com/errata/RHSA-2024:9451 RHSA-2024:9451 RHSA-2024:9451
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-9451.html ALSA-2024:9451 ALSA-2024:9451 G�&python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm �E�&python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm E�&python3.12-debug-3.12.5-2.el9_5.1.i686.rpm F�&python3.12-idle-3.12.5-2.el9_5.1.i686.rpm E�&python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm G�&python3.12-test-3.12.5-2.el9_5.1.i686.rpm F�&python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm �D�&python3.12-3.12.5-2.el9_5.1.i686.rpm G�&python3.12-test-3.12.5-2.el9_5.1.x86_64.rpm �E�&python3.12-tkinter-3.12.5-2.el9_5.1.i686.rpm E�&python3.12-debug-3.12.5-2.el9_5.1.i686.rpm F�&python3.12-idle-3.12.5-2.el9_5.1.i686.rpm E�&python3.12-debug-3.12.5-2.el9_5.1.x86_64.rpm G�&python3.12-test-3.12.5-2.el9_5.1.i686.rpm F�&python3.12-idle-3.12.5-2.el9_5.1.x86_64.rpm �D�&python3.12-3.12.5-2.el9_5.1.i686.rpm ����|�] �#�b�e�KBBBBBBBBBsecurity Moderate: python3.9 security update
�� �\https://access.redhat.com/errata/RHSA-2024:9468 RHSA-2024:9468 RHSA-2024:9468
https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-9468.html ALSA-2024:9468 ALSA-2024:9468 �8python3-test-3.9.19-8.el9_5.1.x86_64.rpm �8python3-idle-3.9.19-8.el9_5.1.x86_64.rpm �8python3-debug-3.9.19-8.el9_5.1.x86_64.rpm �8python3-test-3.9.19-8.el9_5.1.i686.rpm N�8python3-tkinter-3.9.19-8.el9_5.1.i686.rpm M�8python3-3.9.19-8.el9_5.1.i686.rpm �8python3-debug-3.9.19-8.el9_5.1.i686.rpm �8python3-idle-3.9.19-8.el9_5.1.i686.rpm �8python3-test-3.9.19-8.el9_5.1.x86_64.rpm �8python3-idle-3.9.19-8.el9_5.1.x86_64.rpm �8python3-debug-3.9.19-8.el9_5.1.x86_64.rpm �8python3-test-3.9.19-8.el9_5.1.i686.rpm N�8python3-tkinter-3.9.19-8.el9_5.1.i686.rpm M�8python3-3.9.19-8.el9_5.1.i686.rpm �8python3-debug-3.9.19-8.el9_5.1.i686.rpm �8python3-idle-3.9.19-8.el9_5.1.i686.rpm ���� �^ �$�[security Important: .NET 9.0 security update ��|�fhttps://access.redhat.com/errata/RHSA-2024:9543 RHSA-2024:9543 RHSA-2024:9543
https://access.redhat.com/security/cve/CVE-2024-43498 CVE-2024-43498 CVE-2024-43498 https://access.redhat.com/security/cve/CVE-2024-43499 CVE-2024-43499 CVE-2024-43499 https://bugzilla.redhat.com/2323239 2323239 https://bugzilla.redhat.com/2323240 2323240 https://errata.almalinux.org/9/ALSA-2024-9543.html ALSA-2024:9543 ALSA-2024:9543 �^�~dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm �^�~dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5.x86_64.rpm ����O�_ �%�]Bsecurity Important: openexr security update ��b�:https://access.redhat.com/errata/RHSA-2024:9548 RHSA-2024:9548 RHSA-2024:9548
https://access.redhat.com/security/cve/CVE-2023-5841 CVE-2023-5841 CVE-2023-5841 https://bugzilla.redhat.com/2262397 2262397 https://errata.almalinux.org/9/ALSA-2024-9548.html ALSA-2024:9548 ALSA-2024:9548 �f�Wopenexr-devel-3.1.1-2.el9_5.1.x86_64.rpm �f�Wopenexr-devel-3.1.1-2.el9_5.1.i686.rpm �f�Wopenexr-devel-3.1.1-2.el9_5.1.x86_64.rpm �f�Wopenexr-devel-3.1.1-2.el9_5.1.i686.rpm ����X�` �&�`BBBBsecurity Moderate: kernel security update
���'https://access.redhat.com/errata/RHSA-2024:9605 RHSA-2024:9605 RHSA-2024:9605
https://access.redhat.com/security/cve/CVE-2024-42283 CVE-2024-42283 CVE-2024-42283 https://access.redhat.com/security/cve/CVE-2024-46824 CVE-2024-46824 CVE-2024-46824 https://access.redhat.com/security/cve/CVE-2024-46858 CVE-2024-46858 CVE-2024-46858 https://bugzilla.redhat.com/2315176 2315176 https://bugzilla.redhat.com/2315210 2315210 https://errata.almalinux.org/9/ALSA-2024-9605.html ALSA-2024:9605 ALSA-2024:9605 �kernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm �libperf-5.14.0-503.14.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.14.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.14.1.el9_5.x86_64.rpm �libperf-5.14.0-503.14.1.el9_5.x86_64.rpm ����:�a �'�fBsecurity Moderate: libvpx security update
��C�>https://access.redhat.com/errata/RHSA-2024:9827 RHSA-2024:9827 RHSA-2024:9827
https://access.redhat.com/security/cve/CVE-2024-5197 CVE-2024-5197 CVE-2024-5197 https://bugzilla.redhat.com/2291198 2291198 https://errata.almalinux.org/9/ALSA-2024-9827.html ALSA-2024:9827 ALSA-2024:9827 ��:libvpx-devel-1.9.0-8.el9_5.i686.rpm ��:libvpx-devel-1.9.0-8.el9_5.x86_64.rpm ��:libvpx-devel-1.9.0-8.el9_5.i686.rpm ��:libvpx-devel-1.9.0-8.el9_5.x86_64.rpm ����Z�b �(�iBBBBsecurity Important: kernel security update ���
https://access.redhat.com/errata/RHSA-2025:0059 RHSA-2025:0059 RHSA-2025:0059
https://access.redhat.com/security/cve/CVE-2024-46713 CVE-2024-46713 CVE-2024-46713 https://access.redhat.com/security/cve/CVE-2024-50208 CVE-2024-50208 CVE-2024-50208 https://access.redhat.com/security/cve/CVE-2024-50252 CVE-2024-50252 CVE-2024-50252 https://access.redhat.com/security/cve/CVE-2024-53122 CVE-2024-53122 CVE-2024-53122 https://bugzilla.redhat.com/2312221 2312221 https://bugzilla.redhat.com/2324611 2324611 https://bugzilla.redhat.com/2324898 2324898 https://bugzilla.redhat.com/2329932 2329932 https://errata.almalinux.org/9/ALSA-2025-0059.html ALSA-2025:0059 ALSA-2025:0059 �
kernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpm �
kernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpm �
libperf-5.14.0-503.21.1.el9_5.x86_64.rpm �
kernel-tools-libs-devel-5.14.0-503.21.1.el9_5.x86_64.rpm �
kernel-cross-headers-5.14.0-503.21.1.el9_5.x86_64.rpm �
libperf-5.14.0-503.21.1.el9_5.x86_64.rpm ����4�c �)�oBsecurity Important: raptor2 security update ���@https://access.redhat.com/errata/RHSA-2025:0312 RHSA-2025:0312 RHSA-2025:0312
https://access.redhat.com/security/cve/CVE-2024-57823 CVE-2024-57823 CVE-2024-57823 https://bugzilla.redhat.com/2336921 2336921 https://errata.almalinux.org/9/ALSA-2025-0312.html ALSA-2025:0312 ALSA-2025:0312 ��Draptor2-devel-2.0.15-32.el9_5.i686.rpm ��Draptor2-devel-2.0.15-32.el9_5.x86_64.rpm ��Draptor2-devel-2.0.15-32.el9_5.i686.rpm ��Draptor2-devel-2.0.15-32.el9_5.x86_64.rpm ����@�d �*�2security Moderate: ipa security update
��K�ahttps://access.redhat.com/errata/RHSA-2025:0334 RHSA-2025:0334 RHSA-2025:0334
https://access.redhat.com/security/cve/CVE-2024-11029 CVE-2024-11029 CVE-2024-11029 https://bugzilla.redhat.com/2325557 2325557 https://errata.almalinux.org/9/ALSA-2025-0334.html ALSA-2025:0334 ALSA-2025:0334 ��~python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm ��~python3-ipatests-4.12.2-1.el9_5.3.noarch.rpm ����v�e �+�sBsecurity Moderate: Security and bug fixes for NetworkManager
��,�Lhttps://access.redhat.com/errata/RHSA-2025:0377 RHSA-2025:0377 RHSA-2025:0377
https://access.redhat.com/security/cve/CVE-2024-3661 CVE-2024-3661 CVE-2024-3661 https://errata.almalinux.org/9/ALSA-2025-0377.html ALSA-2025:0377 ALSA-2025:0377 �[�?NetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm �[�?NetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm �[�?NetworkManager-libnm-devel-1.48.10-5.el9_5.i686.rpm �[�?NetworkManager-libnm-devel-1.48.10-5.el9_5.x86_64.rpm ���� �f �,�vBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5
��x�fhttps://access.redhat.com/errata/RHSA-2025:0422 RHSA-2025:0422 RHSA-2025:0422
https://access.redhat.com/security/cve/CVE-2025-21502 CVE-2025-21502 CVE-2025-21502 https://errata.almalinux.org/9/ALSA-2025-0422.html ALSA-2025:0422 ALSA-2025:0422 z0java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm q0java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm x0java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm p0java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm w0java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm v0java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm s0java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm r0java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm u0java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm o0java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm |0java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm {0java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm y0java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm t0java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm z0java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm q0java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm x0java-17-openjdk-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm p0java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm w0java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm v0java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm s0java-17-openjdk-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm r0java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm u0java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm o0java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm |0java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm {0java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm y0java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm t0java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9.alma.1.x86_64.rpm ����Q�g �-�RBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5
��^�https://access.redhat.com/errata/RHSA-2025:0426 RHSA-2025:0426 RHSA-2025:0426
https://access.redhat.com/security/cve/CVE-2025-21502 CVE-2025-21502 CVE-2025-21502 https://errata.almalinux.org/9/ALSA-2025-0426.html ALSA-2025:0426 ALSA-2025:0426 �z@java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �u@java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �t@java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �|@java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �v@java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �{@java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �o@java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �q@java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �p@java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �r@java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �y@java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �s@java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �x@java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �w@java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �z@java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �u@java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �t@java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �|@java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �v@java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �{@java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �o@java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �q@java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �p@java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �r@java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �y@java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �s@java-21-openjdk-fastdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �x@java-21-openjdk-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm �w@java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9.alma.1.x86_64.rpm ��ɲ%�h �.�nBBBBsecurity Moderate: kernel security update
��a�Ehttps://access.redhat.com/errata/RHSA-2025:0578 RHSA-2025:0578 RHSA-2025:0578
https://access.redhat.com/security/cve/CVE-2024-50154 CVE-2024-50154 CVE-2024-50154 https://access.redhat.com/security/cve/CVE-2024-50275 CVE-2024-50275 CVE-2024-50275 https://access.redhat.com/security/cve/CVE-2024-53088 CVE-2024-53088 CVE-2024-53088 https://bugzilla.redhat.com/2324313 2324313 https://bugzilla.redhat.com/2327198 2327198 https://bugzilla.redhat.com/2327328 2327328 https://errata.almalinux.org/9/ALSA-2025-0578.html ALSA-2025:0578 ALSA-2025:0578 �kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm �libperf-5.14.0-503.22.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.22.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.22.1.el9_5.x86_64.rpm �libperf-5.14.0-503.22.1.el9_5.x86_64.rpm ��Օ�i �/�tBBBBsecurity Moderate: galera and mariadb security update
��&�4https://access.redhat.com/errata/RHSA-2025:0914 RHSA-2025:0914 RHSA-2025:0914
https://access.redhat.com/security/cve/CVE-2023-22084 CVE-2023-22084 CVE-2023-22084 https://access.redhat.com/security/cve/CVE-2024-21096 CVE-2024-21096 CVE-2024-21096 https://bugzilla.redhat.com/2245023 2245023 https://bugzilla.redhat.com/2275452 2275452 https://errata.almalinux.org/9/ALSA-2025-0914.html ALSA-2025:0914 ALSA-2025:0914 �E�vmariadb-test-10.5.27-1.el9_5.x86_64.rpm �D�vmariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm �C�vmariadb-devel-10.5.27-1.el9_5.x86_64.rpm �E�vmariadb-test-10.5.27-1.el9_5.x86_64.rpm �D�vmariadb-embedded-devel-10.5.27-1.el9_5.x86_64.rpm �C�vmariadb-devel-10.5.27-1.el9_5.x86_64.rpm ����6�j �>�zBBsecurity Moderate: mingw-glib2 security update
��Z�https://access.redhat.com/errata/RHSA-2025:0936 RHSA-2025:0936 RHSA-2025:0936
https://access.redhat.com/security/cve/CVE-2024-52533 CVE-2024-52533 CVE-2024-52533 https://bugzilla.redhat.com/2325340 2325340 https://errata.almalinux.org/9/ALSA-2025-0936.html ALSA-2025:0936 ALSA-2025:0936 �F�smingw32-glib2-2.78.6-2.el9.noarch.rpm �G�smingw32-glib2-static-2.78.6-2.el9.noarch.rpm �I�smingw64-glib2-static-2.78.6-2.el9.noarch.rpm �H�smingw64-glib2-2.78.6-2.el9.noarch.rpm �F�smingw32-glib2-2.78.6-2.el9.noarch.rpm �G�smingw32-glib2-static-2.78.6-2.el9.noarch.rpm �I�smingw64-glib2-static-2.78.6-2.el9.noarch.rpm �H�smingw64-glib2-2.78.6-2.el9.noarch.rpm �����k �1�p�X�yBBBBBBBBBsecurity Important: python3.9 security update ��o�ghttps://access.redhat.com/errata/RHSA-2025:10136 RHSA-2025:10136 RHSA-2025:10136
https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010 https://bugzilla.redhat.com/2370013 2370013 https://bugzilla.redhat.com/2370014 2370014 https://bugzilla.redhat.com/2370016 2370016 https://bugzilla.redhat.com/2372426 2372426 https://errata.almalinux.org/9/ALSA-2025-10136.html ALSA-2025:10136 ALSA-2025:10136 �;python3-test-3.9.21-2.el9_6.1.i686.rpm �;python3-test-3.9.21-2.el9_6.1.x86_64.rpm �;python3-idle-3.9.21-2.el9_6.1.i686.rpm M�;python3-3.9.21-2.el9_6.1.i686.rpm �;python3-debug-3.9.21-2.el9_6.1.x86_64.rpm �;python3-debug-3.9.21-2.el9_6.1.i686.rpm N�;python3-tkinter-3.9.21-2.el9_6.1.i686.rpm �;python3-idle-3.9.21-2.el9_6.1.x86_64.rpm �;python3-test-3.9.21-2.el9_6.1.i686.rpm �;python3-test-3.9.21-2.el9_6.1.x86_64.rpm �;python3-idle-3.9.21-2.el9_6.1.i686.rpm M�;python3-3.9.21-2.el9_6.1.i686.rpm �;python3-debug-3.9.21-2.el9_6.1.x86_64.rpm �;python3-debug-3.9.21-2.el9_6.1.i686.rpm N�;python3-tkinter-3.9.21-2.el9_6.1.i686.rpm �;python3-idle-3.9.21-2.el9_6.1.x86_64.rpm ��D�l �4�rB�XBBBBBBBBBsecurity Important: python3.11 security update ��V�ghttps://access.redhat.com/errata/RHSA-2025:10148 RHSA-2025:10148 RHSA-2025:10148
https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010 https://bugzilla.redhat.com/2370013 2370013 https://bugzilla.redhat.com/2370014 2370014 https://bugzilla.redhat.com/2370016 2370016 https://bugzilla.redhat.com/2372426 2372426 https://errata.almalinux.org/9/ALSA-2025-10148.html ALSA-2025:10148 ALSA-2025:10148 �python3.11-debug-3.11.11-2.el9_6.1.i686.rpm b�python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm �python3.11-test-3.11.11-2.el9_6.1.i686.rpm �python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm �python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm �python3.11-idle-3.11.11-2.el9_6.1.i686.rpm a�python3.11-3.11.11-2.el9_6.1.i686.rpm �python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm �python3.11-debug-3.11.11-2.el9_6.1.i686.rpm b�python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm �python3.11-test-3.11.11-2.el9_6.1.i686.rpm �python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm �python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm �python3.11-idle-3.11.11-2.el9_6.1.i686.rpm a�python3.11-3.11.11-2.el9_6.1.i686.rpm �python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm ��o�m �7�uB�`BBBBBBBBBsecurity Important: python3.12 security update ��=�ghttps://access.redhat.com/errata/RHSA-2025:10189 RHSA-2025:10189 RHSA-2025:10189
https://access.redhat.com/security/cve/CVE-2024-12718 CVE-2024-12718 CVE-2024-12718 https://access.redhat.com/security/cve/CVE-2025-4138 CVE-2025-4138 CVE-2025-4138 https://access.redhat.com/security/cve/CVE-2025-4330 CVE-2025-4330 CVE-2025-4330 https://access.redhat.com/security/cve/CVE-2025-4435 CVE-2025-4435 CVE-2025-4435 https://access.redhat.com/security/cve/CVE-2025-4517 CVE-2025-4517 CVE-2025-4517 https://bugzilla.redhat.com/2370010 2370010 https://bugzilla.redhat.com/2370013 2370013 https://bugzilla.redhat.com/2370014 2370014 https://bugzilla.redhat.com/2370016 2370016 https://bugzilla.redhat.com/2372426 2372426 https://errata.almalinux.org/9/ALSA-2025-10189.html ALSA-2025:10189 ALSA-2025:10189 G�*python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm E�*python3.12-debug-3.12.9-1.el9_6.1.i686.rpm �E�*python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm G�*python3.12-test-3.12.9-1.el9_6.1.i686.rpm F�*python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm �D�*python3.12-3.12.9-1.el9_6.1.i686.rpm F�*python3.12-idle-3.12.9-1.el9_6.1.i686.rpm E�*python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm G�*python3.12-test-3.12.9-1.el9_6.1.x86_64.rpm E�*python3.12-debug-3.12.9-1.el9_6.1.i686.rpm �E�*python3.12-tkinter-3.12.9-1.el9_6.1.i686.rpm G�*python3.12-test-3.12.9-1.el9_6.1.i686.rpm F�*python3.12-idle-3.12.9-1.el9_6.1.x86_64.rpm �D�*python3.12-3.12.9-1.el9_6.1.i686.rpm F�*python3.12-idle-3.12.9-1.el9_6.1.i686.rpm E�*python3.12-debug-3.12.9-1.el9_6.1.x86_64.rpm ��d�n �8�`BBBBsecurity Important: kernel security update ��$�]https://access.redhat.com/errata/RHSA-2025:10379 RHSA-2025:10379 RHSA-2025:10379
https://access.redhat.com/security/cve/CVE-2022-49846 CVE-2022-49846 CVE-2022-49846 https://access.redhat.com/security/cve/CVE-2025-21759 CVE-2025-21759 CVE-2025-21759 https://access.redhat.com/security/cve/CVE-2025-21887 CVE-2025-21887 CVE-2025-21887 https://access.redhat.com/security/cve/CVE-2025-22004 CVE-2025-22004 CVE-2025-22004 https://access.redhat.com/security/cve/CVE-2025-37799 CVE-2025-37799 CVE-2025-37799 https://bugzilla.redhat.com/2348596 2348596 https://bugzilla.redhat.com/2355405 2355405 https://bugzilla.redhat.com/2357142 2357142 https://bugzilla.redhat.com/2363432 2363432 https://bugzilla.redhat.com/2363876 2363876 https://errata.almalinux.org/9/ALSA-2025-10379.html ALSA-2025:10379 ALSA-2025:10379 �kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpm �libperf-5.14.0-570.25.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.25.1.el9_6.x86_64.rpm �libperf-5.14.0-570.25.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.25.1.el9_6.x86_64.rpm �ÿ�}�o ��fBsecurity Moderate: jq security update
���
https://access.redhat.com/errata/RHSA-2025:10585 RHSA-2025:10585 RHSA-2025:10585
https://access.redhat.com/security/cve/CVE-2024-23337 CVE-2024-23337 CVE-2024-23337 https://access.redhat.com/security/cve/CVE-2025-48060 CVE-2025-48060 CVE-2025-48060 https://bugzilla.redhat.com/2367807 2367807 https://bugzilla.redhat.com/2367842 2367842 https://errata.almalinux.org/9/ALSA-2025-10585.html ALSA-2025:10585 ALSA-2025:10585 �q�7jq-devel-1.6-17.el9_6.2.i686.rpm �q�7jq-devel-1.6-17.el9_6.2.x86_64.rpm �q�7jq-devel-1.6-17.el9_6.2.i686.rpm �q�7jq-devel-1.6-17.el9_6.2.x86_64.rpm �þ�D�p �9�iBBBBsecurity Moderate: kernel security update
���https://access.redhat.com/errata/RHSA-2025:10837 RHSA-2025:10837 RHSA-2025:10837
https://access.redhat.com/security/cve/CVE-2025-21991 CVE-2025-21991 CVE-2025-21991 https://bugzilla.redhat.com/2356917 2356917 https://errata.almalinux.org/9/ALSA-2025-10837.html ALSA-2025:10837 ALSA-2025:10837 �kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm �libperf-5.14.0-570.26.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.26.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.26.1.el9_6.x86_64.rpm �libperf-5.14.0-570.26.1.el9_6.x86_64.rpm ����Q�q �:�oBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security update ���ahttps://access.redhat.com/errata/RHSA-2025:10862 RHSA-2025:10862 RHSA-2025:10862
https://access.redhat.com/security/cve/CVE-2025-30749 CVE-2025-30749 CVE-2025-30749 https://access.redhat.com/security/cve/CVE-2025-30754 CVE-2025-30754 CVE-2025-30754 https://access.redhat.com/security/cve/CVE-2025-30761 CVE-2025-30761 CVE-2025-30761 https://access.redhat.com/security/cve/CVE-2025-50106 CVE-2025-50106 CVE-2025-50106 https://errata.almalinux.org/9/ALSA-2025-10862.html ALSA-2025:10862 ALSA-2025:10862
�]java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm � ]java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �
]java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm
�]java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm � ]java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �
]java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9.x86_64.rpm �]java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9.x86_64.rpm ���+�r �;�CBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security update �� �
https://access.redhat.com/errata/RHSA-2025:10867 RHSA-2025:10867 RHSA-2025:10867
https://access.redhat.com/security/cve/CVE-2025-30749 CVE-2025-30749 CVE-2025-30749 https://access.redhat.com/security/cve/CVE-2025-30754 CVE-2025-30754 CVE-2025-30754 https://access.redhat.com/security/cve/CVE-2025-50059 CVE-2025-50059 CVE-2025-50059 https://access.redhat.com/security/cve/CVE-2025-50106 CVE-2025-50106 CVE-2025-50106 https://errata.almalinux.org/9/ALSA-2025-10867.html ALSA-2025:10867 ALSA-2025:10867 p2java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm w2java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm t2java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm {2java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm o2java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm v2java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm z2java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm u2java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm s2java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm y2java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm q2java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm r2java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm x2java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm |2java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm p2java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm w2java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm t2java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm {2java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm o2java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm v2java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm z2java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm u2java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm s2java-17-openjdk-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm y2java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm q2java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm r2java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm x2java-17-openjdk-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm |2java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9.alma.1.x86_64.rpm ��k�s �<�_BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update ��
�qhttps://access.redhat.com/errata/RHSA-2025:10873 RHSA-2025:10873 RHSA-2025:10873
https://access.redhat.com/security/cve/CVE-2025-30749 CVE-2025-30749 CVE-2025-30749 https://access.redhat.com/security/cve/CVE-2025-30754 CVE-2025-30754 CVE-2025-30754 https://access.redhat.com/security/cve/CVE-2025-50059 CVE-2025-50059 CVE-2025-50059 https://access.redhat.com/security/cve/CVE-2025-50106 CVE-2025-50106 CVE-2025-50106 https://errata.almalinux.org/9/ALSA-2025-10873.html ALSA-2025:10873 ALSA-2025:10873 �tBjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �uBjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �rBjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �sBjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �zBjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �{Bjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �vBjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �oBjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �yBjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �wBjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �qBjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �pBjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �|Bjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �xBjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �tBjava-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �uBjava-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �rBjava-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �sBjava-21-openjdk-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �zBjava-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �{Bjava-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �vBjava-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �oBjava-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �yBjava-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �wBjava-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �qBjava-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �pBjava-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �|Bjava-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �xBjava-21-openjdk-slowdebug-21.0.8.0.9-1.el9.alma.1.x86_64.rpm �Ĩ�p�t �=�{Bsecurity Moderate: glib2 security update
��~�https://access.redhat.com/errata/RHSA-2025:11140 RHSA-2025:11140 RHSA-2025:11140
https://access.redhat.com/security/cve/CVE-2024-52533 CVE-2024-52533 CVE-2024-52533 https://access.redhat.com/security/cve/CVE-2025-4373 CVE-2025-4373 CVE-2025-4373 https://bugzilla.redhat.com/2325340 2325340 https://bugzilla.redhat.com/2364265 2364265 https://errata.almalinux.org/9/ALSA-2025-11140.html ALSA-2025:11140 ALSA-2025:11140 ��Jglib2-static-2.68.4-16.el9_6.2.x86_64.rpm ��Jglib2-static-2.68.4-16.el9_6.2.i686.rpm ��Jglib2-static-2.68.4-16.el9_6.2.x86_64.rpm ��Jglib2-static-2.68.4-16.el9_6.2.i686.rpm ��/�u �>�~BBBBsecurity Important: kernel security update ���Vhttps://access.redhat.com/errata/RHSA-2025:11411 RHSA-2025:11411 RHSA-2025:11411
https://access.redhat.com/security/cve/CVE-2024-58002 CVE-2024-58002 CVE-2024-58002 https://access.redhat.com/security/cve/CVE-2025-38089 CVE-2025-38089 CVE-2025-38089 https://bugzilla.redhat.com/2348513 2348513 https://bugzilla.redhat.com/2375529 2375529 https://errata.almalinux.org/9/ALSA-2025-11411.html ALSA-2025:11411 ALSA-2025:11411 �kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm �libperf-5.14.0-570.28.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.28.1.el9_6.x86_64.rpm �libperf-5.14.0-570.28.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.28.1.el9_6.x86_64.rpm ��*�v �?�DBsecurity Important: unbound security update ��X�hhttps://access.redhat.com/errata/RHSA-2025:11849 RHSA-2025:11849 RHSA-2025:11849
https://access.redhat.com/security/cve/CVE-2025-5994 CVE-2025-5994 CVE-2025-5994 https://bugzilla.redhat.com/2380949 2380949 https://errata.almalinux.org/9/ALSA-2025-11849.html ALSA-2025:11849 ALSA-2025:11849 �T�%unbound-devel-1.16.2-19.el9_6.1.x86_64.rpm �T�%unbound-devel-1.16.2-19.el9_6.1.i686.rpm �T�%unbound-devel-1.16.2-19.el9_6.1.x86_64.rpm �T�%unbound-devel-1.16.2-19.el9_6.1.i686.rpm ��]�w � �GBBBBsecurity Moderate: kernel security update
��@�https://access.redhat.com/errata/RHSA-2025:11861 RHSA-2025:11861 RHSA-2025:11861
https://access.redhat.com/security/cve/CVE-2024-57980 CVE-2024-57980 CVE-2024-57980 https://access.redhat.com/security/cve/CVE-2025-21905 CVE-2025-21905 CVE-2025-21905 https://access.redhat.com/security/cve/CVE-2025-22085 CVE-2025-22085 CVE-2025-22085 https://access.redhat.com/security/cve/CVE-2025-22091 CVE-2025-22091 CVE-2025-22091 https://access.redhat.com/security/cve/CVE-2025-22113 CVE-2025-22113 CVE-2025-22113 https://access.redhat.com/security/cve/CVE-2025-22121 CVE-2025-22121 CVE-2025-22121 https://access.redhat.com/security/cve/CVE-2025-37797 CVE-2025-37797 CVE-2025-37797 https://access.redhat.com/security/cve/CVE-2025-37958 CVE-2025-37958 CVE-2025-37958 https://access.redhat.com/security/cve/CVE-2025-38086 CVE-2025-38086 CVE-2025-38086 https://access.redhat.com/security/cve/CVE-2025-38110 CVE-2025-38110 CVE-2025-38110 https://bugzilla.redhat.com/2348599 2348599 https://bugzilla.redhat.com/2356613 2356613 https://bugzilla.redhat.com/2360186 2360186 https://bugzilla.redhat.com/2360199 2360199 https://bugzilla.redhat.com/2360212 2360212 https://bugzilla.redhat.com/2360219 2360219 https://bugzilla.redhat.com/2363672 2363672 https://bugzilla.redhat.com/2367572 2367572 https://bugzilla.redhat.com/2375305 2375305 https://bugzilla.redhat.com/2376035 2376035 https://errata.almalinux.org/9/ALSA-2025-11861.html ALSA-2025:11861 ALSA-2025:11861 �libperf-5.14.0-570.30.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm �libperf-5.14.0-570.30.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.30.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.30.1.el9_6.x86_64.rpm ��x ��MBBBBsecurity Important: kernel security update ��N�https://access.redhat.com/errata/RHSA-2025:1262 RHSA-2025:1262 RHSA-2025:1262
https://access.redhat.com/security/cve/CVE-2024-53104 CVE-2024-53104 CVE-2024-53104 https://bugzilla.redhat.com/2329817 2329817 https://errata.almalinux.org/9/ALSA-2025-1262.html ALSA-2025:1262 ALSA-2025:1262 �kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm �libperf-5.14.0-503.23.2.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.23.2.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.23.2.el9_5.x86_64.rpm �libperf-5.14.0-503.23.2.el9_5.x86_64.rpm ����u�y ��SBBBBsecurity Important: kernel security update ��k�ohttps://access.redhat.com/errata/RHSA-2025:12746 RHSA-2025:12746 RHSA-2025:12746
https://access.redhat.com/security/cve/CVE-2022-49788 CVE-2022-49788 CVE-2022-49788 https://access.redhat.com/security/cve/CVE-2025-21727 CVE-2025-21727 CVE-2025-21727 https://access.redhat.com/security/cve/CVE-2025-21928 CVE-2025-21928 CVE-2025-21928 https://access.redhat.com/security/cve/CVE-2025-21929 CVE-2025-21929 CVE-2025-21929 https://access.redhat.com/security/cve/CVE-2025-21962 CVE-2025-21962 CVE-2025-21962 https://access.redhat.com/security/cve/CVE-2025-22020 CVE-2025-22020 CVE-2025-22020 https://access.redhat.com/security/cve/CVE-2025-37890 CVE-2025-37890 CVE-2025-37890 https://access.redhat.com/security/cve/CVE-2025-38052 CVE-2025-38052 CVE-2025-38052 https://access.redhat.com/security/cve/CVE-2025-38087 CVE-2025-38087 CVE-2025-38087 https://bugzilla.redhat.com/2348516 2348516 https://bugzilla.redhat.com/2356592 2356592 https://bugzilla.redhat.com/2356594 2356594 https://bugzilla.redhat.com/2356624 2356624 https://bugzilla.redhat.com/2360099 2360099 https://bugzilla.redhat.com/2363378 2363378 https://bugzilla.redhat.com/2366848 2366848 https://bugzilla.redhat.com/2373380 2373380 https://bugzilla.redhat.com/2375531 2375531 https://errata.almalinux.org/9/ALSA-2025-12746.html ALSA-2025:12746 ALSA-2025:12746 �libperf-5.14.0-570.32.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm �libperf-5.14.0-570.32.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.32.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.32.1.el9_6.x86_64.rpm ��ҙi�z ��security Moderate: python3.12-setuptools security update
��Z�Jhttps://access.redhat.com/errata/RHSA-2025:12834 RHSA-2025:12834 RHSA-2025:12834
https://access.redhat.com/security/cve/CVE-2025-47273 CVE-2025-47273 CVE-2025-47273 https://bugzilla.redhat.com/2366982 2366982 https://errata.almalinux.org/9/ALSA-2025-12834.html ALSA-2025:12834 ALSA-2025:12834 �0�python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm �0�python3.12-setuptools-wheel-68.2.2-5.el9_6.noarch.rpm ����s�{ � �ZBBBBsecurity Moderate: doxygen security update
��$�ehttps://access.redhat.com/errata/RHSA-2025:1329 RHSA-2025:1329 RHSA-2025:1329
https://access.redhat.com/security/cve/CVE-2020-11023 CVE-2020-11023 CVE-2020-11023 https://bugzilla.redhat.com/1850004 1850004 https://errata.almalinux.org/9/ALSA-2025-1329.html ALSA-2025:1329 ALSA-2025:1329 ��odoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm ��odoxygen-1.9.1-12.el9_5.x86_64.rpm ��odoxygen-latex-1.9.1-12.el9_5.x86_64.rpm ��odoxygen-doxywizard-1.9.1-12.el9_5.x86_64.rpm ��odoxygen-1.9.1-12.el9_5.x86_64.rpm ��odoxygen-latex-1.9.1-12.el9_5.x86_64.rpm ����f�| ��aBBBBsecurity Moderate: gcc security update
�� �Khttps://access.redhat.com/errata/RHSA-2025:1346 RHSA-2025:1346 RHSA-2025:1346
https://access.redhat.com/security/cve/CVE-2020-11023 CVE-2020-11023 CVE-2020-11023 https://bugzilla.redhat.com/1850004 1850004 https://errata.almalinux.org/9/ALSA-2025-1346.html ALSA-2025:1346 ALSA-2025:1346 �p�Bgcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm �p�Bgcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm �{�Blibstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm �{�Blibstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm �p�Bgcc-plugin-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm �p�Bgcc-plugin-devel-11.5.0-5.el9_5.alma.1.i686.rpm �{�Blibstdc++-static-11.5.0-5.el9_5.alma.1.x86_64.rpm �{�Blibstdc++-static-11.5.0-5.el9_5.alma.1.i686.rpm �����} ��gBBBBsecurity Moderate: kernel security update
��T�Hhttps://access.redhat.com/errata/RHSA-2025:13602 RHSA-2025:13602 RHSA-2025:13602
https://access.redhat.com/security/cve/CVE-2025-38079 CVE-2025-38079 CVE-2025-38079 https://access.redhat.com/security/cve/CVE-2025-38292 CVE-2025-38292 CVE-2025-38292 https://bugzilla.redhat.com/2373383 2373383 https://bugzilla.redhat.com/2379219 2379219 https://errata.almalinux.org/9/ALSA-2025-13602.html ALSA-2025:13602 ALSA-2025:13602 �libperf-5.14.0-570.33.2.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm �libperf-5.14.0-570.33.2.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.33.2.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.33.2.el9_6.x86_64.rpm ����~ ��mBBBBsecurity Important: kernel security update ���https://access.redhat.com/errata/RHSA-2025:13962 RHSA-2025:13962 RHSA-2025:13962
https://access.redhat.com/security/cve/CVE-2024-28956 CVE-2024-28956 CVE-2024-28956 https://access.redhat.com/security/cve/CVE-2025-21867 CVE-2025-21867 CVE-2025-21867 https://access.redhat.com/security/cve/CVE-2025-38084 CVE-2025-38084 CVE-2025-38084 https://access.redhat.com/security/cve/CVE-2025-38085 CVE-2025-38085 CVE-2025-38085 https://access.redhat.com/security/cve/CVE-2025-38124 CVE-2025-38124 CVE-2025-38124 https://access.redhat.com/security/cve/CVE-2025-38159 CVE-2025-38159 CVE-2025-38159 https://access.redhat.com/security/cve/CVE-2025-38250 CVE-2025-38250 CVE-2025-38250 https://access.redhat.com/security/cve/CVE-2025-38380 CVE-2025-38380 CVE-2025-38380 https://access.redhat.com/security/cve/CVE-2025-38471 CVE-2025-38471 CVE-2025-38471 https://bugzilla.redhat.com/2355334 2355334 https://bugzilla.redhat.com/2366125 2366125 https://bugzilla.redhat.com/2375303 2375303 https://bugzilla.redhat.com/2375304 2375304 https://bugzilla.redhat.com/2376041 2376041 https://bugzilla.redhat.com/2376064 2376064 https://bugzilla.redhat.com/2378982 2378982 https://bugzilla.redhat.com/2383381 2383381 https://bugzilla.redhat.com/2383893 2383893 https://errata.almalinux.org/9/ALSA-2025-13962.html ALSA-2025:13962 ALSA-2025:13962 �kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm �libperf-5.14.0-570.35.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.35.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.35.1.el9_6.x86_64.rpm �libperf-5.14.0-570.35.1.el9_6.x86_64.rpm ��Z� ��sBBBBsecurity Important: kernel security update ��-�!https://access.redhat.com/errata/RHSA-2025:14420 RHSA-2025:14420 RHSA-2025:14420
https://access.redhat.com/security/cve/CVE-2025-22058 CVE-2025-22058 CVE-2025-22058 https://access.redhat.com/security/cve/CVE-2025-37914 CVE-2025-37914 CVE-2025-37914 https://access.redhat.com/security/cve/CVE-2025-38417 CVE-2025-38417 CVE-2025-38417 https://bugzilla.redhat.com/2360276 2360276 https://bugzilla.redhat.com/2367500 2367500 https://bugzilla.redhat.com/2383463 2383463 https://errata.almalinux.org/9/ALSA-2025-14420.html ALSA-2025:14420 ALSA-2025:14420 �kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm �libperf-5.14.0-570.37.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.37.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.37.1.el9_6.x86_64.rpm �libperf-5.14.0-570.37.1.el9_6.x86_64.rpm ��j� ��yBBBBBBBBBBBsecurity Important: postgresql security update ��N�Nhttps://access.redhat.com/errata/RHSA-2025:14878 RHSA-2025:14878 RHSA-2025:14878
https://access.redhat.com/security/cve/CVE-2025-8714 CVE-2025-8714 CVE-2025-8714 https://access.redhat.com/security/cve/CVE-2025-8715 CVE-2025-8715 CVE-2025-8715 https://bugzilla.redhat.com/2388551 2388551 https://bugzilla.redhat.com/2388553 2388553 https://errata.almalinux.org/9/ALSA-2025-14878.html ALSA-2025:14878 ALSA-2025:14878 � �Hpostgresql-static-13.22-1.el9_6.x86_64.rpm ��Hpostgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm �~�Hpostgresql-private-devel-13.22-1.el9_6.x86_64.rpm �<�Hpostgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpm �}�Hpostgresql-docs-13.22-1.el9_6.x86_64.rpm ��Hpostgresql-server-devel-13.22-1.el9_6.x86_64.rpm ��Hpostgresql-test-13.22-1.el9_6.x86_64.rpm � �Hpostgresql-static-13.22-1.el9_6.x86_64.rpm ��Hpostgresql-upgrade-devel-13.22-1.el9_6.x86_64.rpm �~�Hpostgresql-private-devel-13.22-1.el9_6.x86_64.rpm �<�Hpostgresql-test-rpm-macros-13.22-1.el9_6.noarch.rpm �}�Hpostgresql-docs-13.22-1.el9_6.x86_64.rpm ��Hpostgresql-server-devel-13.22-1.el9_6.x86_64.rpm ��Hpostgresql-test-13.22-1.el9_6.x86_64.rpm ��Śg� ��IB�}BBBBBBBBBsecurity Moderate: python3.12 security update
���;https://access.redhat.com/errata/RHSA-2025:15007 RHSA-2025:15007 RHSA-2025:15007
https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043 https://errata.almalinux.org/9/ALSA-2025-15007.html ALSA-2025:15007 ALSA-2025:15007 G�+python3.12-test-3.12.9-1.el9_6.2.i686.rpm E�+python3.12-debug-3.12.9-1.el9_6.2.i686.rpm �E�+python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm G�+python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm E�+python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm F�+python3.12-idle-3.12.9-1.el9_6.2.i686.rpm F�+python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm �D�+python3.12-3.12.9-1.el9_6.2.i686.rpm G�+python3.12-test-3.12.9-1.el9_6.2.i686.rpm E�+python3.12-debug-3.12.9-1.el9_6.2.i686.rpm �E�+python3.12-tkinter-3.12.9-1.el9_6.2.i686.rpm G�+python3.12-test-3.12.9-1.el9_6.2.x86_64.rpm E�+python3.12-debug-3.12.9-1.el9_6.2.x86_64.rpm F�+python3.12-idle-3.12.9-1.el9_6.2.i686.rpm F�+python3.12-idle-3.12.9-1.el9_6.2.x86_64.rpm �D�+python3.12-3.12.9-1.el9_6.2.i686.rpm ���%� ��LB�EBBBBBBBBBsecurity Moderate: python3.11 security update
��W�;https://access.redhat.com/errata/RHSA-2025:15010 RHSA-2025:15010 RHSA-2025:15010
https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043 https://errata.almalinux.org/9/ALSA-2025-15010.html ALSA-2025:15010 ALSA-2025:15010 �python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpm a�python3.11-3.11.11-2.el9_6.2.i686.rpm �python3.11-test-3.11.11-2.el9_6.2.i686.rpm �python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm �python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm �python3.11-debug-3.11.11-2.el9_6.2.i686.rpm �python3.11-idle-3.11.11-2.el9_6.2.i686.rpm b�python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm �python3.11-debug-3.11.11-2.el9_6.2.x86_64.rpm a�python3.11-3.11.11-2.el9_6.2.i686.rpm �python3.11-test-3.11.11-2.el9_6.2.i686.rpm �python3.11-idle-3.11.11-2.el9_6.2.x86_64.rpm �python3.11-test-3.11.11-2.el9_6.2.x86_64.rpm �python3.11-debug-3.11.11-2.el9_6.2.i686.rpm �python3.11-idle-3.11.11-2.el9_6.2.i686.rpm b�python3.11-tkinter-3.11.11-2.el9_6.2.i686.rpm ���!� ��\BBBBsecurity Important: kernel security update ���https://access.redhat.com/errata/RHSA-2025:15011 RHSA-2025:15011 RHSA-2025:15011
https://bugzilla.redhat.com/2365024 2365024 https://bugzilla.redhat.com/2376392 2376392 https://bugzilla.redhat.com/2376406 2376406 https://bugzilla.redhat.com/2382054 2382054 https://bugzilla.redhat.com/2383509 2383509 https://bugzilla.redhat.com/2383513 2383513 https://bugzilla.redhat.com/2387866 2387866 https://errata.almalinux.org/9/ALSA-2025-15011.html ALSA-2025:15011 ALSA-2025:15011 https://www.redhat.com/security/data/cve/CVE-2025-37823.html CVE-2025-37823 CVE-2025-37823 https://www.redhat.com/security/data/cve/CVE-2025-38200.html CVE-2025-38200 CVE-2025-38200 https://www.redhat.com/security/data/cve/CVE-2025-38211.html CVE-2025-38211 CVE-2025-38211 https://www.redhat.com/security/data/cve/CVE-2025-38350.html CVE-2025-38350 CVE-2025-38350 https://www.redhat.com/security/data/cve/CVE-2025-38461.html CVE-2025-38461 CVE-2025-38461 https://www.redhat.com/security/data/cve/CVE-2025-38464.html CVE-2025-38464 CVE-2025-38464 https://www.redhat.com/security/data/cve/CVE-2025-38500.html CVE-2025-38500 CVE-2025-38500 https://www.redhat.com/security/data/cve/CVE-2025-38684.html CVE-2025-38684 CVE-2025-38684 � kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm � kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm � libperf-5.14.0-570.39.1.el9_6.x86_64.rpm � kernel-cross-headers-5.14.0-570.39.1.el9_6.x86_64.rpm � kernel-tools-libs-devel-5.14.0-570.39.1.el9_6.x86_64.rpm � libperf-5.14.0-570.39.1.el9_6.x86_64.rpm ���� ��bBsecurity Important: udisks2 security update ��)�https://access.redhat.com/errata/RHSA-2025:15018 RHSA-2025:15018 RHSA-2025:15018
https://access.redhat.com/security/cve/CVE-2025-8067 CVE-2025-8067 CVE-2025-8067 https://bugzilla.redhat.com/2388623 2388623 https://errata.almalinux.org/9/ALSA-2025-15018.html ALSA-2025:15018 ALSA-2025:15018 �}�Mlibudisks2-devel-2.9.4-11.el9_6.1.i686.rpm �}�Mlibudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm �}�Mlibudisks2-devel-2.9.4-11.el9_6.1.i686.rpm �}�Mlibudisks2-devel-2.9.4-11.el9_6.1.x86_64.rpm ���W� ��Q�y�]BBBBBBBBBsecurity Moderate: python3.9 security update
��?�;https://access.redhat.com/errata/RHSA-2025:15019 RHSA-2025:15019 RHSA-2025:15019
https://access.redhat.com/security/cve/CVE-2025-8194 CVE-2025-8194 CVE-2025-8194 https://bugzilla.redhat.com/2384043 2384043 https://errata.almalinux.org/9/ALSA-2025-15019.html ALSA-2025:15019 ALSA-2025:15019 �<python3-debug-3.9.21-2.el9_6.2.i686.rpm �<python3-idle-3.9.21-2.el9_6.2.x86_64.rpm N�<python3-tkinter-3.9.21-2.el9_6.2.i686.rpm �<python3-debug-3.9.21-2.el9_6.2.x86_64.rpm �<python3-idle-3.9.21-2.el9_6.2.i686.rpm M�<python3-3.9.21-2.el9_6.2.i686.rpm �<python3-test-3.9.21-2.el9_6.2.x86_64.rpm �<python3-test-3.9.21-2.el9_6.2.i686.rpm �<python3-debug-3.9.21-2.el9_6.2.i686.rpm �<python3-idle-3.9.21-2.el9_6.2.x86_64.rpm N�<python3-tkinter-3.9.21-2.el9_6.2.i686.rpm �<python3-debug-3.9.21-2.el9_6.2.x86_64.rpm �<python3-idle-3.9.21-2.el9_6.2.i686.rpm M�<python3-3.9.21-2.el9_6.2.i686.rpm �<python3-test-3.9.21-2.el9_6.2.x86_64.rpm �<python3-test-3.9.21-2.el9_6.2.i686.rpm ���� ��pBBBBsecurity Important: kernel security update ��z�Whttps://access.redhat.com/errata/RHSA-2025:15429 RHSA-2025:15429 RHSA-2025:15429
https://access.redhat.com/security/cve/CVE-2025-37803 CVE-2025-37803 CVE-2025-37803 https://access.redhat.com/security/cve/CVE-2025-38392 CVE-2025-38392 CVE-2025-38392 https://bugzilla.redhat.com/2365013 2365013 https://bugzilla.redhat.com/2383407 2383407 https://errata.almalinux.org/9/ALSA-2025-15429.html ALSA-2025:15429 ALSA-2025:15429 �!kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm �!kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm �!libperf-5.14.0-570.41.1.el9_6.x86_64.rpm �!kernel-tools-libs-devel-5.14.0-570.41.1.el9_6.x86_64.rpm �!kernel-cross-headers-5.14.0-570.41.1.el9_6.x86_64.rpm �!libperf-5.14.0-570.41.1.el9_6.x86_64.rpm �Ɵ�� ��vBBBBsecurity Important: kernel security update ��Q�
https://access.redhat.com/errata/RHSA-2025:15661 RHSA-2025:15661 RHSA-2025:15661
https://access.redhat.com/security/cve/CVE-2025-22097 CVE-2025-22097 CVE-2025-22097 https://access.redhat.com/security/cve/CVE-2025-38332 CVE-2025-38332 CVE-2025-38332 https://access.redhat.com/security/cve/CVE-2025-38352 CVE-2025-38352 CVE-2025-38352 https://access.redhat.com/security/cve/CVE-2025-38449 CVE-2025-38449 CVE-2025-38449 https://bugzilla.redhat.com/2360223 2360223 https://bugzilla.redhat.com/2379246 2379246 https://bugzilla.redhat.com/2382581 2382581 https://bugzilla.redhat.com/2383519 2383519 https://errata.almalinux.org/9/ALSA-2025-15661.html ALSA-2025:15661 ALSA-2025:15661 �"kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm �"kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm �"libperf-5.14.0-570.42.2.el9_6.x86_64.rpm �"kernel-tools-libs-devel-5.14.0-570.42.2.el9_6.x86_64.rpm �"kernel-cross-headers-5.14.0-570.42.2.el9_6.x86_64.rpm �"libperf-5.14.0-570.42.2.el9_6.x86_64.rpm �Ƥ�G� ��|BBBBsecurity Moderate: kernel security update
��k� https://access.redhat.com/errata/RHSA-2025:15740 RHSA-2025:15740 RHSA-2025:15740
https://access.redhat.com/security/cve/CVE-2025-38550 CVE-2025-38550 CVE-2025-38550 https://bugzilla.redhat.com/2388941 2388941 https://errata.almalinux.org/9/ALSA-2025-15740.html ALSA-2025:15740 ALSA-2025:15740 �#libperf-5.14.0-570.44.1.el9_6.x86_64.rpm �#kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm �#kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm �#libperf-5.14.0-570.44.1.el9_6.x86_64.rpm �#kernel-tools-libs-devel-5.14.0-570.44.1.el9_6.x86_64.rpm �#kernel-cross-headers-5.14.0-570.44.1.el9_6.x86_64.rpm ��ԃ� ��VB�lBBsecurity Moderate: mysql security update
��k�hhttps://access.redhat.com/errata/RHSA-2025:16086 RHSA-2025:16086 RHSA-2025:16086
https://access.redhat.com/security/cve/CVE-2025-21574 CVE-2025-21574 CVE-2025-21574 https://access.redhat.com/security/cve/CVE-2025-21575 CVE-2025-21575 CVE-2025-21575 https://access.redhat.com/security/cve/CVE-2025-21577 CVE-2025-21577 CVE-2025-21577 https://access.redhat.com/security/cve/CVE-2025-21579 CVE-2025-21579 CVE-2025-21579 https://access.redhat.com/security/cve/CVE-2025-21580 CVE-2025-21580 CVE-2025-21580 https://access.redhat.com/security/cve/CVE-2025-21581 CVE-2025-21581 CVE-2025-21581 https://access.redhat.com/security/cve/CVE-2025-21584 CVE-2025-21584 CVE-2025-21584 https://access.redhat.com/security/cve/CVE-2025-21585 CVE-2025-21585 CVE-2025-21585 https://access.redhat.com/security/cve/CVE-2025-30681 CVE-2025-30681 CVE-2025-30681 https://access.redhat.com/security/cve/CVE-2025-30682 CVE-2025-30682 CVE-2025-30682 https://access.redhat.com/security/cve/CVE-2025-30683 CVE-2025-30683 CVE-2025-30683 https://access.redhat.com/security/cve/CVE-2025-30684 CVE-2025-30684 CVE-2025-30684 https://access.redhat.com/security/cve/CVE-2025-30685 CVE-2025-30685 CVE-2025-30685 https://access.redhat.com/security/cve/CVE-2025-30687 CVE-2025-30687 CVE-2025-30687 https://access.redhat.com/security/cve/CVE-2025-30688 CVE-2025-30688 CVE-2025-30688 https://access.redhat.com/security/cve/CVE-2025-30689 CVE-2025-30689 CVE-2025-30689 https://access.redhat.com/security/cve/CVE-2025-30693 CVE-2025-30693 CVE-2025-30693 https://access.redhat.com/security/cve/CVE-2025-30695 CVE-2025-30695 CVE-2025-30695 https://access.redhat.com/security/cve/CVE-2025-30696 CVE-2025-30696 CVE-2025-30696 https://access.redhat.com/security/cve/CVE-2025-30699 CVE-2025-30699 CVE-2025-30699 https://access.redhat.com/security/cve/CVE-2025-30703 CVE-2025-30703 CVE-2025-30703 https://access.redhat.com/security/cve/CVE-2025-30704 CVE-2025-30704 CVE-2025-30704 https://access.redhat.com/security/cve/CVE-2025-30705 CVE-2025-30705 CVE-2025-30705 https://access.redhat.com/security/cve/CVE-2025-30715 CVE-2025-30715 CVE-2025-30715 https://access.redhat.com/security/cve/CVE-2025-30721 CVE-2025-30721 CVE-2025-30721 https://access.redhat.com/security/cve/CVE-2025-30722 CVE-2025-30722 CVE-2025-30722 https://access.redhat.com/security/cve/CVE-2025-50077 CVE-2025-50077 CVE-2025-50077 https://access.redhat.com/security/cve/CVE-2025-50078 CVE-2025-50078 CVE-2025-50078 https://access.redhat.com/security/cve/CVE-2025-50079 CVE-2025-50079 CVE-2025-50079 https://access.redhat.com/security/cve/CVE-2025-50080 CVE-2025-50080 CVE-2025-50080 https://access.redhat.com/security/cve/CVE-2025-50081 CVE-2025-50081 CVE-2025-50081 https://access.redhat.com/security/cve/CVE-2025-50082 CVE-2025-50082 CVE-2025-50082 https://access.redhat.com/security/cve/CVE-2025-50083 CVE-2025-50083 CVE-2025-50083 https://access.redhat.com/security/cve/CVE-2025-50084 CVE-2025-50084 CVE-2025-50084 https://access.redhat.com/security/cve/CVE-2025-50085 CVE-2025-50085 CVE-2025-50085 https://access.redhat.com/security/cve/CVE-2025-50086 CVE-2025-50086 CVE-2025-50086 https://access.redhat.com/security/cve/CVE-2025-50087 CVE-2025-50087 CVE-2025-50087 https://access.redhat.com/security/cve/CVE-2025-50088 CVE-2025-50088 CVE-2025-50088 https://access.redhat.com/security/cve/CVE-2025-50091 CVE-2025-50091 CVE-2025-50091 https://access.redhat.com/security/cve/CVE-2025-50092 CVE-2025-50092 CVE-2025-50092 https://access.redhat.com/security/cve/CVE-2025-50093 CVE-2025-50093 CVE-2025-50093 https://access.redhat.com/security/cve/CVE-2025-50094 CVE-2025-50094 CVE-2025-50094 https://access.redhat.com/security/cve/CVE-2025-50096 CVE-2025-50096 CVE-2025-50096 https://access.redhat.com/security/cve/CVE-2025-50097 CVE-2025-50097 CVE-2025-50097 https://access.redhat.com/security/cve/CVE-2025-50098 CVE-2025-50098 CVE-2025-50098 https://access.redhat.com/security/cve/CVE-2025-50099 CVE-2025-50099 CVE-2025-50099 https://access.redhat.com/security/cve/CVE-2025-50100 CVE-2025-50100 CVE-2025-50100 https://access.redhat.com/security/cve/CVE-2025-50101 CVE-2025-50101 CVE-2025-50101 https://access.redhat.com/security/cve/CVE-2025-50102 CVE-2025-50102 CVE-2025-50102 https://access.redhat.com/security/cve/CVE-2025-50104 CVE-2025-50104 CVE-2025-50104 https://access.redhat.com/security/cve/CVE-2025-53023 CVE-2025-53023 CVE-2025-53023 https://bugzilla.redhat.com/2359885 2359885 https://bugzilla.redhat.com/2359888 2359888 https://bugzilla.redhat.com/2359892 2359892 https://bugzilla.redhat.com/2359894 2359894 https://bugzilla.redhat.com/2359895 2359895 https://bugzilla.redhat.com/2359899 2359899 https://bugzilla.redhat.com/2359900 2359900 https://bugzilla.redhat.com/2359902 2359902 https://bugzilla.redhat.com/2359903 2359903 https://bugzilla.redhat.com/2359918 2359918 https://bugzilla.redhat.com/2359920 2359920 https://bugzilla.redhat.com/2359924 2359924 https://bugzilla.redhat.com/2359928 2359928 https://bugzilla.redhat.com/2359930 2359930 https://bugzilla.redhat.com/2359932 2359932 https://bugzilla.redhat.com/2359934 2359934 https://bugzilla.redhat.com/2359938 2359938 https://bugzilla.redhat.com/2359940 2359940 https://bugzilla.redhat.com/2359943 2359943 https://bugzilla.redhat.com/2359944 2359944 https://bugzilla.redhat.com/2359945 2359945 https://bugzilla.redhat.com/2359947 2359947 https://bugzilla.redhat.com/2359950 2359950 https://bugzilla.redhat.com/2359963 2359963 https://bugzilla.redhat.com/2359964 2359964 https://bugzilla.redhat.com/2359972 2359972 https://bugzilla.redhat.com/2380264 2380264 https://bugzilla.redhat.com/2380273 2380273 https://bugzilla.redhat.com/2380274 2380274 https://bugzilla.redhat.com/2380278 2380278 https://bugzilla.redhat.com/2380280 2380280 https://bugzilla.redhat.com/2380283 2380283 https://bugzilla.redhat.com/2380284 2380284 https://bugzilla.redhat.com/2380290 2380290 https://bugzilla.redhat.com/2380291 2380291 https://bugzilla.redhat.com/2380295 2380295 https://bugzilla.redhat.com/2380298 2380298 https://bugzilla.redhat.com/2380306 2380306 https://bugzilla.redhat.com/2380308 2380308 https://bugzilla.redhat.com/2380309 2380309 https://bugzilla.redhat.com/2380310 2380310 https://bugzilla.redhat.com/2380311 2380311 https://bugzilla.redhat.com/2380312 2380312 https://bugzilla.redhat.com/2380313 2380313 https://bugzilla.redhat.com/2380320 2380320 https://bugzilla.redhat.com/2380321 2380321 https://bugzilla.redhat.com/2380322 2380322 https://bugzilla.redhat.com/2380326 2380326 https://bugzilla.redhat.com/2380327 2380327 https://bugzilla.redhat.com/2380334 2380334 https://bugzilla.redhat.com/2380335 2380335 https://errata.almalinux.org/9/ALSA-2025-16086.html ALSA-2025:16086 ALSA-2025:16086 �*�?mysql-devel-8.0.43-1.el9_6.x86_64.rpm �J�?mysql-libs-8.0.43-1.el9_6.x86_64.rpm �+�?mysql-test-8.0.43-1.el9_6.x86_64.rpm �*�?mysql-devel-8.0.43-1.el9_6.x86_64.rpm �J�?mysql-libs-8.0.43-1.el9_6.x86_64.rpm �+�?mysql-test-8.0.43-1.el9_6.x86_64.rpm ���o�
��FBBBBsecurity Moderate: kernel security update
��q�
https://access.redhat.com/errata/RHSA-2025:16398 RHSA-2025:16398 RHSA-2025:16398
https://access.redhat.com/security/cve/CVE-2023-53125 CVE-2023-53125 CVE-2023-53125 https://access.redhat.com/security/cve/CVE-2025-37810 CVE-2025-37810 CVE-2025-37810 https://access.redhat.com/security/cve/CVE-2025-38498 CVE-2025-38498 CVE-2025-38498 https://access.redhat.com/security/cve/CVE-2025-39694 CVE-2025-39694 CVE-2025-39694 https://bugzilla.redhat.com/2363686 2363686 https://bugzilla.redhat.com/2365028 2365028 https://bugzilla.redhat.com/2384422 2384422 https://bugzilla.redhat.com/2393534 2393534 https://errata.almalinux.org/9/ALSA-2025-16398.html ALSA-2025:16398 ALSA-2025:16398 �$libperf-5.14.0-570.46.1.el9_6.x86_64.rpm �$kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm �$kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm �$libperf-5.14.0-570.46.1.el9_6.x86_64.rpm �$kernel-tools-libs-devel-5.14.0-570.46.1.el9_6.x86_64.rpm �$kernel-cross-headers-5.14.0-570.46.1.el9_6.x86_64.rpm ���^� ��LBBBBsecurity Moderate: kernel security update
��x�https://access.redhat.com/errata/RHSA-2025:1659 RHSA-2025:1659 RHSA-2025:1659
https://access.redhat.com/security/cve/CVE-2023-52490 CVE-2023-52490 CVE-2023-52490 https://bugzilla.redhat.com/2269187 2269187 https://errata.almalinux.org/9/ALSA-2025-1659.html ALSA-2025:1659 ALSA-2025:1659 �
kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm �
libperf-5.14.0-503.26.1.el9_5.x86_64.rpm �
kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm �
kernel-cross-headers-5.14.0-503.26.1.el9_5.x86_64.rpm �
libperf-5.14.0-503.26.1.el9_5.x86_64.rpm �
kernel-tools-libs-devel-5.14.0-503.26.1.el9_5.x86_64.rpm ����5� ��[�xBBBsecurity Important: bind9.18 security update �� �rhttps://access.redhat.com/errata/RHSA-2025:1670 RHSA-2025:1670 RHSA-2025:1670
https://access.redhat.com/security/cve/CVE-2024-11187 CVE-2024-11187 CVE-2024-11187 https://access.redhat.com/security/cve/CVE-2024-12705 CVE-2024-12705 CVE-2024-12705 https://bugzilla.redhat.com/2342879 2342879 https://bugzilla.redhat.com/2342880 2342880 https://errata.almalinux.org/9/ALSA-2025-1670.html ALSA-2025:1670 ALSA-2025:1670 ��Ybind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpm �A�Ybind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm ��Ybind9.18-devel-9.18.29-1.el9_5.1.i686.rpm �{�Ybind9.18-libs-9.18.29-1.el9_5.1.i686.rpm ��Ybind9.18-devel-9.18.29-1.el9_5.1.x86_64.rpm �A�Ybind9.18-doc-9.18.29-1.el9_5.1.noarch.rpm ��Ybind9.18-devel-9.18.29-1.el9_5.1.i686.rpm �{�Ybind9.18-libs-9.18.29-1.el9_5.1.i686.rpm ���3�
��WBBBBsecurity Important: mysql security update ��{�*dhttps://access.redhat.com/errata/RHSA-2025:1671 RHSA-2025:1671 RHSA-2025:1671
https://access.redhat.com/security/cve/CVE-2024-11053 CVE-2024-11053 CVE-2024-11053 https://access.redhat.com/security/cve/CVE-2024-21193 CVE-2024-21193 CVE-2024-21193 https://access.redhat.com/security/cve/CVE-2024-21194 CVE-2024-21194 CVE-2024-21194 https://access.redhat.com/security/cve/CVE-2024-21196 CVE-2024-21196 CVE-2024-21196 https://access.redhat.com/security/cve/CVE-2024-21197 CVE-2024-21197 CVE-2024-21197 https://access.redhat.com/security/cve/CVE-2024-21198 CVE-2024-21198 CVE-2024-21198 https://access.redhat.com/security/cve/CVE-2024-21199 CVE-2024-21199 CVE-2024-21199 https://access.redhat.com/security/cve/CVE-2024-21201 CVE-2024-21201 CVE-2024-21201 https://access.redhat.com/security/cve/CVE-2024-21203 CVE-2024-21203 CVE-2024-21203 https://access.redhat.com/security/cve/CVE-2024-21212 CVE-2024-21212 CVE-2024-21212 https://access.redhat.com/security/cve/CVE-2024-21213 CVE-2024-21213 CVE-2024-21213 https://access.redhat.com/security/cve/CVE-2024-21218 CVE-2024-21218 CVE-2024-21218 https://access.redhat.com/security/cve/CVE-2024-21219 CVE-2024-21219 CVE-2024-21219 https://access.redhat.com/security/cve/CVE-2024-21230 CVE-2024-21230 CVE-2024-21230 https://access.redhat.com/security/cve/CVE-2024-21231 CVE-2024-21231 CVE-2024-21231 https://access.redhat.com/security/cve/CVE-2024-21236 CVE-2024-21236 CVE-2024-21236 https://access.redhat.com/security/cve/CVE-2024-21237 CVE-2024-21237 CVE-2024-21237 https://access.redhat.com/security/cve/CVE-2024-21238 CVE-2024-21238 CVE-2024-21238 https://access.redhat.com/security/cve/CVE-2024-21239 CVE-2024-21239 CVE-2024-21239 https://access.redhat.com/security/cve/CVE-2024-21241 CVE-2024-21241 CVE-2024-21241 https://access.redhat.com/security/cve/CVE-2024-21247 CVE-2024-21247 CVE-2024-21247 https://access.redhat.com/security/cve/CVE-2024-37371 CVE-2024-37371 CVE-2024-37371 https://access.redhat.com/security/cve/CVE-2024-5535 CVE-2024-5535 CVE-2024-5535 https://access.redhat.com/security/cve/CVE-2024-7264 CVE-2024-7264 CVE-2024-7264 https://access.redhat.com/security/cve/CVE-2025-21490 CVE-2025-21490 CVE-2025-21490 https://access.redhat.com/security/cve/CVE-2025-21491 CVE-2025-21491 CVE-2025-21491 https://access.redhat.com/security/cve/CVE-2025-21494 CVE-2025-21494 CVE-2025-21494 https://access.redhat.com/security/cve/CVE-2025-21497 CVE-2025-21497 CVE-2025-21497 https://access.redhat.com/security/cve/CVE-2025-21500 CVE-2025-21500 CVE-2025-21500 https://access.redhat.com/security/cve/CVE-2025-21501 CVE-2025-21501 CVE-2025-21501 https://access.redhat.com/security/cve/CVE-2025-21503 CVE-2025-21503 CVE-2025-21503 https://access.redhat.com/security/cve/CVE-2025-21504 CVE-2025-21504 CVE-2025-21504 https://access.redhat.com/security/cve/CVE-2025-21505 CVE-2025-21505 CVE-2025-21505 https://access.redhat.com/security/cve/CVE-2025-21518 CVE-2025-21518 CVE-2025-21518 https://access.redhat.com/security/cve/CVE-2025-21519 CVE-2025-21519 CVE-2025-21519 https://access.redhat.com/security/cve/CVE-2025-21520 CVE-2025-21520 CVE-2025-21520 https://access.redhat.com/security/cve/CVE-2025-21521 CVE-2025-21521 CVE-2025-21521 https://access.redhat.com/security/cve/CVE-2025-21522 CVE-2025-21522 CVE-2025-21522 https://access.redhat.com/security/cve/CVE-2025-21523 CVE-2025-21523 CVE-2025-21523 https://access.redhat.com/security/cve/CVE-2025-21525 CVE-2025-21525 CVE-2025-21525 https://access.redhat.com/security/cve/CVE-2025-21529 CVE-2025-21529 CVE-2025-21529 https://access.redhat.com/security/cve/CVE-2025-21531 CVE-2025-21531 CVE-2025-21531 https://access.redhat.com/security/cve/CVE-2025-21534 CVE-2025-21534 CVE-2025-21534 https://access.redhat.com/security/cve/CVE-2025-21536 CVE-2025-21536 CVE-2025-21536 https://access.redhat.com/security/cve/CVE-2025-21540 CVE-2025-21540 CVE-2025-21540 https://access.redhat.com/security/cve/CVE-2025-21543 CVE-2025-21543 CVE-2025-21543 https://access.redhat.com/security/cve/CVE-2025-21546 CVE-2025-21546 CVE-2025-21546 https://access.redhat.com/security/cve/CVE-2025-21555 CVE-2025-21555 CVE-2025-21555 https://access.redhat.com/security/cve/CVE-2025-21559 CVE-2025-21559 CVE-2025-21559 https://bugzilla.redhat.com/2294581 2294581 https://bugzilla.redhat.com/2294676 2294676 https://bugzilla.redhat.com/2301888 2301888 https://bugzilla.redhat.com/2318857 2318857 https://bugzilla.redhat.com/2318858 2318858 https://bugzilla.redhat.com/2318870 2318870 https://bugzilla.redhat.com/2318873 2318873 https://bugzilla.redhat.com/2318874 2318874 https://bugzilla.redhat.com/2318876 2318876 https://bugzilla.redhat.com/2318882 2318882 https://bugzilla.redhat.com/2318883 2318883 https://bugzilla.redhat.com/2318884 2318884 https://bugzilla.redhat.com/2318885 2318885 https://bugzilla.redhat.com/2318886 2318886 https://bugzilla.redhat.com/2318897 2318897 https://bugzilla.redhat.com/2318900 2318900 https://bugzilla.redhat.com/2318905 2318905 https://bugzilla.redhat.com/2318914 2318914 https://bugzilla.redhat.com/2318922 2318922 https://bugzilla.redhat.com/2318923 2318923 https://bugzilla.redhat.com/2318925 2318925 https://bugzilla.redhat.com/2318926 2318926 https://bugzilla.redhat.com/2318927 2318927 https://bugzilla.redhat.com/2331191 2331191 https://bugzilla.redhat.com/2339218 2339218 https://bugzilla.redhat.com/2339220 2339220 https://bugzilla.redhat.com/2339221 2339221 https://bugzilla.redhat.com/2339226 2339226 https://bugzilla.redhat.com/2339231 2339231 https://bugzilla.redhat.com/2339236 2339236 https://bugzilla.redhat.com/2339238 2339238 https://bugzilla.redhat.com/2339243 2339243 https://bugzilla.redhat.com/2339247 2339247 https://bugzilla.redhat.com/2339252 2339252 https://bugzilla.redhat.com/2339259 2339259 https://bugzilla.redhat.com/2339266 2339266 https://bugzilla.redhat.com/2339270 2339270 https://bugzilla.redhat.com/2339271 2339271 https://bugzilla.redhat.com/2339275 2339275 https://bugzilla.redhat.com/2339277 2339277 https://bugzilla.redhat.com/2339281 2339281 https://bugzilla.redhat.com/2339284 2339284 https://bugzilla.redhat.com/2339291 2339291 https://bugzilla.redhat.com/2339293 2339293 https://bugzilla.redhat.com/2339295 2339295 https://bugzilla.redhat.com/2339299 2339299 https://bugzilla.redhat.com/2339300 2339300 https://bugzilla.redhat.com/2339304 2339304 https://bugzilla.redhat.com/2339305 2339305 https://errata.almalinux.org/9/ALSA-2025-1671.html ALSA-2025:1671 ALSA-2025:1671 �*�>mysql-devel-8.0.41-2.el9_5.x86_64.rpm �J�>mysql-libs-8.0.41-2.el9_5.x86_64.rpm �+�>mysql-test-8.0.41-2.el9_5.x86_64.rpm �*�>mysql-devel-8.0.41-2.el9_5.x86_64.rpm �J�>mysql-libs-8.0.41-2.el9_5.x86_64.rpm �+�>mysql-test-8.0.41-2.el9_5.x86_64.rpm ��݄c� ��^�@BBBsecurity Important: bind security update ��%�Xhttps://access.redhat.com/errata/RHSA-2025:1681 RHSA-2025:1681 RHSA-2025:1681
https://access.redhat.com/security/cve/CVE-2024-11187 CVE-2024-11187 CVE-2024-11187 https://bugzilla.redhat.com/2342879 2342879 https://errata.almalinux.org/9/ALSA-2025-1681.html ALSA-2025:1681 ALSA-2025:1681 ��Ubind-doc-9.16.23-24.el9_5.3.noarch.rpm O�Ubind-devel-9.16.23-24.el9_5.3.i686.rpm O�Ubind-devel-9.16.23-24.el9_5.3.x86_64.rpm �^�Ubind-libs-9.16.23-24.el9_5.3.i686.rpm ��Ubind-doc-9.16.23-24.el9_5.3.noarch.rpm O�Ubind-devel-9.16.23-24.el9_5.3.i686.rpm O�Ubind-devel-9.16.23-24.el9_5.3.x86_64.rpm �^�Ubind-libs-9.16.23-24.el9_5.3.i686.rpm ��ܴ� � �bBBBBsecurity Moderate: kernel security update
��}�ihttps://access.redhat.com/errata/RHSA-2025:16880 RHSA-2025:16880 RHSA-2025:16880
https://access.redhat.com/security/cve/CVE-2025-38472 CVE-2025-38472 CVE-2025-38472 https://access.redhat.com/security/cve/CVE-2025-38527 CVE-2025-38527 CVE-2025-38527 https://access.redhat.com/security/cve/CVE-2025-38718 CVE-2025-38718 CVE-2025-38718 https://access.redhat.com/security/cve/CVE-2025-39682 CVE-2025-39682 CVE-2025-39682 https://access.redhat.com/security/cve/CVE-2025-39698 CVE-2025-39698 CVE-2025-39698 https://bugzilla.redhat.com/2383916 2383916 https://bugzilla.redhat.com/2388928 2388928 https://bugzilla.redhat.com/2393166 2393166 https://bugzilla.redhat.com/2393511 2393511 https://bugzilla.redhat.com/2393519 2393519 https://errata.almalinux.org/9/ALSA-2025-16880.html ALSA-2025:16880 ALSA-2025:16880 �%kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm �%libperf-5.14.0-570.49.1.el9_6.x86_64.rpm �%kernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm �%kernel-cross-headers-5.14.0-570.49.1.el9_6.x86_64.rpm �%libperf-5.14.0-570.49.1.el9_6.x86_64.rpm �%kernel-tools-libs-devel-5.14.0-570.49.1.el9_6.x86_64.rpm ����h� �!�(security Important: ipa security update ��f�ghttps://access.redhat.com/errata/RHSA-2025:17084 RHSA-2025:17084 RHSA-2025:17084
https://access.redhat.com/security/cve/CVE-2025-7493 CVE-2025-7493 CVE-2025-7493 https://bugzilla.redhat.com/2389448 2389448 https://errata.almalinux.org/9/ALSA-2025-17084.html ALSA-2025:17084 ALSA-2025:17084 �� python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm �� python3-ipatests-4.12.2-14.el9_6.5.noarch.rpm ���8� �+�isecurity Moderate: perl-JSON-XS security update
��M�shttps://access.redhat.com/errata/RHSA-2025:17162 RHSA-2025:17162 RHSA-2025:17162
https://access.redhat.com/security/cve/CVE-2025-40928 CVE-2025-40928 CVE-2025-40928 https://bugzilla.redhat.com/2393878 2393878 https://errata.almalinux.org/9/ALSA-2025-17162.html ALSA-2025:17162 ALSA-2025:17162 �h�;perl-JSON-XS-4.04-1.el9_6.x86_64.rpm �h�;perl-JSON-XS-4.04-1.el9_6.x86_64.rpm ����� �"�lBBBBsecurity Moderate: kernel security update
��@�Fhttps://access.redhat.com/errata/RHSA-2025:17377 RHSA-2025:17377 RHSA-2025:17377
https://access.redhat.com/security/cve/CVE-2024-50301 CVE-2024-50301 CVE-2024-50301 https://access.redhat.com/security/cve/CVE-2025-38351 CVE-2025-38351 CVE-2025-38351 https://access.redhat.com/security/cve/CVE-2025-39761 CVE-2025-39761 CVE-2025-39761 https://bugzilla.redhat.com/2327188 2327188 https://bugzilla.redhat.com/2382059 2382059 https://bugzilla.redhat.com/2394606 2394606 https://errata.almalinux.org/9/ALSA-2025-17377.html ALSA-2025:17377 ALSA-2025:17377 �&kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm �&kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm �&libperf-5.14.0-570.51.1.el9_6.x86_64.rpm �&kernel-tools-libs-devel-5.14.0-570.51.1.el9_6.x86_64.rpm �&kernel-cross-headers-5.14.0-570.51.1.el9_6.x86_64.rpm �&libperf-5.14.0-570.51.1.el9_6.x86_64.rpm �ǝ�=� �#�rBBBBBBBBBBBsecurity Important: postgresql security update ���'https://access.redhat.com/errata/RHSA-2025:1742 RHSA-2025:1742 RHSA-2025:1742
https://access.redhat.com/security/cve/CVE-2025-1094 CVE-2025-1094 CVE-2025-1094 https://bugzilla.redhat.com/2345548 2345548 https://errata.almalinux.org/9/ALSA-2025-1742.html ALSA-2025:1742 ALSA-2025:1742 ��Gpostgresql-server-devel-13.20-1.el9_5.x86_64.rpm �<�Gpostgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm �~�Gpostgresql-private-devel-13.20-1.el9_5.x86_64.rpm ��Gpostgresql-test-13.20-1.el9_5.x86_64.rpm � �Gpostgresql-static-13.20-1.el9_5.x86_64.rpm �}�Gpostgresql-docs-13.20-1.el9_5.x86_64.rpm ��Gpostgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm ��Gpostgresql-server-devel-13.20-1.el9_5.x86_64.rpm �<�Gpostgresql-test-rpm-macros-13.20-1.el9_5.noarch.rpm �~�Gpostgresql-private-devel-13.20-1.el9_5.x86_64.rpm ��Gpostgresql-test-13.20-1.el9_5.x86_64.rpm � �Gpostgresql-static-13.20-1.el9_5.x86_64.rpm �}�Gpostgresql-docs-13.20-1.el9_5.x86_64.rpm ��Gpostgresql-upgrade-devel-13.20-1.el9_5.x86_64.rpm ���s� �$�BBBBsecurity Moderate: kernel security update
��-�d
https://access.redhat.com/errata/RHSA-2025:17760 RHSA-2025:17760 RHSA-2025:17760
https://access.redhat.com/security/cve/CVE-2023-53373 CVE-2023-53373 CVE-2023-53373 https://access.redhat.com/security/cve/CVE-2025-38556 CVE-2025-38556 CVE-2025-38556 https://access.redhat.com/security/cve/CVE-2025-38614 CVE-2025-38614 CVE-2025-38614 https://access.redhat.com/security/cve/CVE-2025-39757 CVE-2025-39757 CVE-2025-39757 https://bugzilla.redhat.com/2389456 2389456 https://bugzilla.redhat.com/2389491 2389491 https://bugzilla.redhat.com/2394615 2394615 https://bugzilla.redhat.com/2396379 2396379 https://errata.almalinux.org/9/ALSA-2025-17760.html ALSA-2025:17760 ALSA-2025:17760 �'kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm �'libperf-5.14.0-570.52.1.el9_6.x86_64.rpm �'kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm �'kernel-cross-headers-5.14.0-570.52.1.el9_6.x86_64.rpm �'libperf-5.14.0-570.52.1.el9_6.x86_64.rpm �'kernel-tools-libs-devel-5.14.0-570.52.1.el9_6.x86_64.rpm ��¿� �%�Esecurity Important: .NET 8.0 security update ���Mhttps://access.redhat.com/errata/RHSA-2025:18149 RHSA-2025:18149 RHSA-2025:18149
https://access.redhat.com/security/cve/CVE-2025-55247 CVE-2025-55247 CVE-2025-55247 https://access.redhat.com/security/cve/CVE-2025-55248 CVE-2025-55248 CVE-2025-55248 https://access.redhat.com/security/cve/CVE-2025-55315 CVE-2025-55315 CVE-2025-55315 https://bugzilla.redhat.com/2403083 2403083 https://bugzilla.redhat.com/2403085 2403085 https://bugzilla.redhat.com/2403086 2403086 https://errata.almalinux.org/9/ALSA-2025-18149.html ALSA-2025:18149 ALSA-2025:18149 ��zdotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm ��zdotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6.x86_64.rpm ����\� �&�Gsecurity Important: .NET 9.0 security update ��^�Mhttps://access.redhat.com/errata/RHSA-2025:18151 RHSA-2025:18151 RHSA-2025:18151
https://access.redhat.com/security/cve/CVE-2025-55247 CVE-2025-55247 CVE-2025-55247 https://access.redhat.com/security/cve/CVE-2025-55248 CVE-2025-55248 CVE-2025-55248 https://access.redhat.com/security/cve/CVE-2025-55315 CVE-2025-55315 CVE-2025-55315 https://bugzilla.redhat.com/2403083 2403083 https://bugzilla.redhat.com/2403085 2403085 https://bugzilla.redhat.com/2403086 2403086 https://errata.almalinux.org/9/ALSA-2025-18151.html ALSA-2025:18151 ALSA-2025:18151 �^�dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpm �^�dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6.x86_64.rpm �ȡ�h� �'�IBBBBsecurity Moderate: kernel security update
��+�https://access.redhat.com/errata/RHSA-2025:18281 RHSA-2025:18281 RHSA-2025:18281
https://access.redhat.com/security/cve/CVE-2022-50087 CVE-2022-50087 CVE-2022-50087 https://access.redhat.com/security/cve/CVE-2025-22026 CVE-2025-22026 CVE-2025-22026 https://access.redhat.com/security/cve/CVE-2025-38566 CVE-2025-38566 CVE-2025-38566 https://access.redhat.com/security/cve/CVE-2025-38571 CVE-2025-38571 CVE-2025-38571 https://access.redhat.com/security/cve/CVE-2025-39817 CVE-2025-39817 CVE-2025-39817 https://access.redhat.com/security/cve/CVE-2025-39841 CVE-2025-39841 CVE-2025-39841 https://access.redhat.com/security/cve/CVE-2025-39849 CVE-2025-39849 CVE-2025-39849 https://bugzilla.redhat.com/2360224 2360224 https://bugzilla.redhat.com/2373539 2373539 https://bugzilla.redhat.com/2389480 2389480 https://bugzilla.redhat.com/2389487 2389487 https://bugzilla.redhat.com/2395805 2395805 https://bugzilla.redhat.com/2396928 2396928 https://bugzilla.redhat.com/2396944 2396944 https://errata.almalinux.org/9/ALSA-2025-18281.html ALSA-2025:18281 ALSA-2025:18281 �(kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm �(kernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm �(libperf-5.14.0-570.55.1.el9_6.x86_64.rpm �(kernel-tools-libs-devel-5.14.0-570.55.1.el9_6.x86_64.rpm �(kernel-cross-headers-5.14.0-570.55.1.el9_6.x86_64.rpm �(libperf-5.14.0-570.55.1.el9_6.x86_64.rpm ����c� �(�OBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update
��@�\https://access.redhat.com/errata/RHSA-2025:18815 RHSA-2025:18815 RHSA-2025:18815
https://access.redhat.com/security/cve/CVE-2025-53057 CVE-2025-53057 CVE-2025-53057 https://access.redhat.com/security/cve/CVE-2025-53066 CVE-2025-53066 CVE-2025-53066 https://errata.almalinux.org/9/ALSA-2025-18815.html ALSA-2025:18815 ALSA-2025:18815
�^java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �
^java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm � ^java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm
�^java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �
^java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm � ^java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �^java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm �ȍ�I� �)�cBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:18821 RHSA-2025:18821 RHSA-2025:18821
https://access.redhat.com/security/cve/CVE-2025-53057 CVE-2025-53057 CVE-2025-53057 https://access.redhat.com/security/cve/CVE-2025-53066 CVE-2025-53066 CVE-2025-53066 https://errata.almalinux.org/9/ALSA-2025-18821.html ALSA-2025:18821 ALSA-2025:18821 s3java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm {3java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm x3java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm o3java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm r3java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm v3java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm t3java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm |3java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm z3java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm y3java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm w3java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm q3java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm u3java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm p3java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm s3java-17-openjdk-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm {3java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm x3java-17-openjdk-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm o3java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm r3java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm v3java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm t3java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm |3java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm z3java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm y3java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm w3java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm q3java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm u3java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm p3java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9.alma.1.x86_64.rpm �Ȍ�l� �*�BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update
��!�lhttps://access.redhat.com/errata/RHSA-2025:18824 RHSA-2025:18824 RHSA-2025:18824
https://access.redhat.com/security/cve/CVE-2025-53057 CVE-2025-53057 CVE-2025-53057 https://access.redhat.com/security/cve/CVE-2025-53066 CVE-2025-53066 CVE-2025-53066 https://access.redhat.com/security/cve/CVE-2025-61748 CVE-2025-61748 CVE-2025-61748 https://errata.almalinux.org/9/ALSA-2025-18824.html ALSA-2025:18824 ALSA-2025:18824 �vCjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �oCjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �uCjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �zCjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �yCjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �|Cjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �pCjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �qCjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �tCjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �rCjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �{Cjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �sCjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �wCjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �xCjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �vCjava-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �oCjava-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �uCjava-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �zCjava-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �yCjava-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �|Cjava-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �pCjava-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �qCjava-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �tCjava-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �rCjava-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �{Cjava-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �sCjava-21-openjdk-fastdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �wCjava-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �xCjava-21-openjdk-slowdebug-21.0.9.0.10-1.el9.alma.1.x86_64.rpm �Ȍ�W� �+�[security Important: libtiff security update ��
�<https://access.redhat.com/errata/RHSA-2025:19113 RHSA-2025:19113 RHSA-2025:19113
https://access.redhat.com/security/cve/CVE-2025-8176 CVE-2025-8176 CVE-2025-8176 https://access.redhat.com/security/cve/CVE-2025-9900 CVE-2025-9900 CVE-2025-9900 https://bugzilla.redhat.com/2383598 2383598 https://bugzilla.redhat.com/2392784 2392784 https://errata.almalinux.org/9/ALSA-2025-19113.html ALSA-2025:19113 ALSA-2025:19113 � �Llibtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm � �Llibtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm �ȁ�1� �,�]BBBBsecurity Moderate: kernel security update
��I�https://access.redhat.com/errata/RHSA-2025:19409 RHSA-2025:19409 RHSA-2025:19409
https://access.redhat.com/security/cve/CVE-2022-50367 CVE-2022-50367 CVE-2022-50367 https://access.redhat.com/security/cve/CVE-2023-53494 CVE-2023-53494 CVE-2023-53494 https://access.redhat.com/security/cve/CVE-2025-39702 CVE-2025-39702 CVE-2025-39702 https://bugzilla.redhat.com/2393533 2393533 https://bugzilla.redhat.com/2396114 2396114 https://bugzilla.redhat.com/2400777 2400777 https://errata.almalinux.org/9/ALSA-2025-19409.html ALSA-2025:19409 ALSA-2025:19409 �)kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpm �)kernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpm �)libperf-5.14.0-570.60.1.el9_6.x86_64.rpm �)kernel-tools-libs-devel-5.14.0-570.60.1.el9_6.x86_64.rpm �)kernel-cross-headers-5.14.0-570.60.1.el9_6.x86_64.rpm �)libperf-5.14.0-570.60.1.el9_6.x86_64.rpm �ȷ�H� �-�cBBBBsecurity Moderate: galera and mariadb security update
��M�!https://access.redhat.com/errata/RHSA-2025:19584 RHSA-2025:19584 RHSA-2025:19584
https://access.redhat.com/security/cve/CVE-2023-52969 CVE-2023-52969 CVE-2023-52969 https://access.redhat.com/security/cve/CVE-2023-52970 CVE-2023-52970 CVE-2023-52970 https://access.redhat.com/security/cve/CVE-2025-21490 CVE-2025-21490 CVE-2025-21490 https://access.redhat.com/security/cve/CVE-2025-30693 CVE-2025-30693 CVE-2025-30693 https://access.redhat.com/security/cve/CVE-2025-30722 CVE-2025-30722 CVE-2025-30722 https://bugzilla.redhat.com/2339221 2339221 https://bugzilla.redhat.com/2350916 2350916 https://bugzilla.redhat.com/2350918 2350918 https://bugzilla.redhat.com/2359885 2359885 https://bugzilla.redhat.com/2359963 2359963 https://errata.almalinux.org/9/ALSA-2025-19584.html ALSA-2025:19584 ALSA-2025:19584 �D�wmariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpm �E�wmariadb-test-10.5.29-2.el9_6.x86_64.rpm �C�wmariadb-devel-10.5.29-2.el9_6.x86_64.rpm �D�wmariadb-embedded-devel-10.5.29-2.el9_6.x86_64.rpm �E�wmariadb-test-10.5.29-2.el9_6.x86_64.rpm �C�wmariadb-devel-10.5.29-2.el9_6.x86_64.rpm �ȶ�9� �.�iBBBBsecurity Moderate: kernel security update
��n�9https://access.redhat.com/errata/RHSA-2025:19930 RHSA-2025:19930 RHSA-2025:19930
https://access.redhat.com/security/cve/CVE-2024-36350 CVE-2024-36350 CVE-2024-36350 https://access.redhat.com/security/cve/CVE-2024-36357 CVE-2024-36357 CVE-2024-36357 https://access.redhat.com/security/cve/CVE-2025-40300 CVE-2025-40300 CVE-2025-40300 https://bugzilla.redhat.com/2350725 2350725 https://bugzilla.redhat.com/2350726 2350726 https://bugzilla.redhat.com/2394627 2394627 https://errata.almalinux.org/9/ALSA-2025-19930.html ALSA-2025:19930 ALSA-2025:19930 �*kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpm �*kernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpm �*libperf-5.14.0-570.62.1.el9_6.x86_64.rpm �*kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.x86_64.rpm �*kernel-cross-headers-5.14.0-570.62.1.el9_6.x86_64.rpm �*libperf-5.14.0-570.62.1.el9_6.x86_64.rpm ��ѲA� �0�o�ABBBsecurity Important: bind9.18 security update ��'�phttps://access.redhat.com/errata/RHSA-2025:19950 RHSA-2025:19950 RHSA-2025:19950
https://access.redhat.com/security/cve/CVE-2025-40778 CVE-2025-40778 CVE-2025-40778 https://access.redhat.com/security/cve/CVE-2025-40780 CVE-2025-40780 CVE-2025-40780 https://access.redhat.com/security/cve/CVE-2025-8677 CVE-2025-8677 CVE-2025-8677 https://bugzilla.redhat.com/2405827 2405827 https://bugzilla.redhat.com/2405829 2405829 https://bugzilla.redhat.com/2405830 2405830 https://errata.almalinux.org/9/ALSA-2025-19950.html ALSA-2025:19950 ALSA-2025:19950 ��Zbind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpm �A�Zbind9.18-doc-9.18.29-4.el9_6.2.noarch.rpm �{�Zbind9.18-libs-9.18.29-4.el9_6.2.i686.rpm ��Zbind9.18-devel-9.18.29-4.el9_6.2.i686.rpm ��Zbind9.18-devel-9.18.29-4.el9_6.2.x86_64.rpm �A�Zbind9.18-doc-9.18.29-4.el9_6.2.noarch.rpm �{�Zbind9.18-libs-9.18.29-4.el9_6.2.i686.rpm ��Zbind9.18-devel-9.18.29-4.el9_6.2.i686.rpm ���1� �1�tBBBBsecurity Moderate: kernel security update
���X�ahttps://access.redhat.com/errata/RHSA-2025:20518 RHSA-2025:20518 RHSA-2025:20518
https://bugzilla.redhat.com/2298169 2298169 https://bugzilla.redhat.com/2312077 2312077 https://bugzilla.redhat.com/2313092 2313092 https://bugzilla.redhat.com/2320172 2320172 https://bugzilla.redhat.com/2320259 2320259 https://bugzilla.redhat.com/2320455 2320455 https://bugzilla.redhat.com/2320616 2320616 https://bugzilla.redhat.com/2320722 2320722 https://bugzilla.redhat.com/2324549 2324549 https://bugzilla.redhat.com/2327203 2327203 https://bugzilla.redhat.com/2327374 2327374 https://bugzilla.redhat.com/2327887 2327887 https://bugzilla.redhat.com/2329918 2329918 https://bugzilla.redhat.com/2330341 2330341 https://bugzilla.redhat.com/2331326 2331326 https://bugzilla.redhat.com/2334357 2334357 https://bugzilla.redhat.com/2334396 2334396 https://bugzilla.redhat.com/2334415 2334415 https://bugzilla.redhat.com/2334439 2334439 https://bugzilla.redhat.com/2334537 2334537 https://bugzilla.redhat.com/2334547 2334547 https://bugzilla.redhat.com/2334548 2334548 https://bugzilla.redhat.com/2334560 2334560 https://bugzilla.redhat.com/2334676 2334676 https://bugzilla.redhat.com/2334795 2334795 https://bugzilla.redhat.com/2334829 2334829 https://bugzilla.redhat.com/2336541 2336541 https://bugzilla.redhat.com/2337121 2337121 https://bugzilla.redhat.com/2337124 2337124 https://bugzilla.redhat.com/2338814 2338814 https://bugzilla.redhat.com/2338828 2338828 https://bugzilla.redhat.com/2338832 2338832 https://bugzilla.redhat.com/2343172 2343172 https://bugzilla.redhat.com/2343175 2343175 https://bugzilla.redhat.com/2344684 2344684 https://bugzilla.redhat.com/2344687 2344687 https://bugzilla.redhat.com/2345240 2345240 https://bugzilla.redhat.com/2346272 2346272 https://bugzilla.redhat.com/2347707 2347707 https://bugzilla.redhat.com/2347753 2347753 https://bugzilla.redhat.com/2347759 2347759 https://bugzilla.redhat.com/2347781 2347781 https://bugzilla.redhat.com/2347807 2347807 https://bugzilla.redhat.com/2347859 2347859 https://bugzilla.redhat.com/2347919 2347919 https://bugzilla.redhat.com/2347968 2347968 https://bugzilla.redhat.com/2348022 2348022 https://bugzilla.redhat.com/2348071 2348071 https://bugzilla.redhat.com/2348238 2348238 https://bugzilla.redhat.com/2348240 2348240 https://bugzilla.redhat.com/2348279 2348279 https://bugzilla.redhat.com/2348515 2348515 https://bugzilla.redhat.com/2348523 2348523 https://bugzilla.redhat.com/2348528 2348528 https://bugzilla.redhat.com/2348541 2348541 https://bugzilla.redhat.com/2348543 2348543 https://bugzilla.redhat.com/2348547 2348547 https://bugzilla.redhat.com/2348550 2348550 https://bugzilla.redhat.com/2348554 2348554 https://bugzilla.redhat.com/2348556 2348556 https://bugzilla.redhat.com/2348566 2348566 https://bugzilla.redhat.com/2348573 2348573 https://bugzilla.redhat.com/2348574 2348574 https://bugzilla.redhat.com/2348577 2348577 https://bugzilla.redhat.com/2348578 2348578 https://bugzilla.redhat.com/2348581 2348581 https://bugzilla.redhat.com/2348584 2348584 https://bugzilla.redhat.com/2348585 2348585 https://bugzilla.redhat.com/2348587 2348587 https://bugzilla.redhat.com/2348595 2348595 https://bugzilla.redhat.com/2348597 2348597 https://bugzilla.redhat.com/2348600 2348600 https://bugzilla.redhat.com/2348601 2348601 https://bugzilla.redhat.com/2348615 2348615 https://bugzilla.redhat.com/2348620 2348620 https://bugzilla.redhat.com/2348625 2348625 https://bugzilla.redhat.com/2348634 2348634 https://bugzilla.redhat.com/2348645 2348645 https://bugzilla.redhat.com/2348650 2348650 https://bugzilla.redhat.com/2348654 2348654 https://bugzilla.redhat.com/2348901 2348901 https://bugzilla.redhat.com/2350363 2350363 https://bugzilla.redhat.com/2350367 2350367 https://bugzilla.redhat.com/2350374 2350374 https://bugzilla.redhat.com/2350375 2350375 https://bugzilla.redhat.com/2350386 2350386 https://bugzilla.redhat.com/2350388 2350388 https://bugzilla.redhat.com/2350392 2350392 https://bugzilla.redhat.com/2350396 2350396 https://bugzilla.redhat.com/2350397 2350397 https://bugzilla.redhat.com/2350400 2350400 https://bugzilla.redhat.com/2350585 2350585 https://bugzilla.redhat.com/2350589 2350589 https://bugzilla.redhat.com/2350725 2350725 https://bugzilla.redhat.com/2350726 2350726 https://bugzilla.redhat.com/2351606 2351606 https://bugzilla.redhat.com/2351608 2351608 https://bugzilla.redhat.com/2351612 2351612 https://bugzilla.redhat.com/2351613 2351613 https://bugzilla.redhat.com/2351616 2351616 https://bugzilla.redhat.com/2351618 2351618 https://bugzilla.redhat.com/2351620 2351620 https://bugzilla.redhat.com/2351624 2351624 https://bugzilla.redhat.com/2351625 2351625 https://bugzilla.redhat.com/2351629 2351629 https://bugzilla.redhat.com/2351633 2351633 https://bugzilla.redhat.com/2360215 2360215 https://bugzilla.redhat.com/2363380 2363380 https://bugzilla.redhat.com/2369184 2369184 https://bugzilla.redhat.com/2376076 2376076 https://bugzilla.redhat.com/2383441 2383441 https://errata.almalinux.org/9/ALSA-2025-20518.html ALSA-2025:20518 ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.html CVE-2022-48830 CVE-2022-48830 https://www.redhat.com/security/data/cve/CVE-2022-49024.html CVE-2022-49024 CVE-2022-49024 https://www.redhat.com/security/data/cve/CVE-2022-49269.html CVE-2022-49269 CVE-2022-49269 https://www.redhat.com/security/data/cve/CVE-2022-49353.html CVE-2022-49353 CVE-2022-49353 https://www.redhat.com/security/data/cve/CVE-2022-49357.html CVE-2022-49357 CVE-2022-49357 https://www.redhat.com/security/data/cve/CVE-2022-49432.html CVE-2022-49432 CVE-2022-49432 https://www.redhat.com/security/data/cve/CVE-2022-49437.html CVE-2022-49437 CVE-2022-49437 https://www.redhat.com/security/data/cve/CVE-2022-49443.html CVE-2022-49443 CVE-2022-49443 https://www.redhat.com/security/data/cve/CVE-2022-49623.html CVE-2022-49623 CVE-2022-49623 https://www.redhat.com/security/data/cve/CVE-2022-49627.html CVE-2022-49627 CVE-2022-49627 https://www.redhat.com/security/data/cve/CVE-2022-49643.html CVE-2022-49643 CVE-2022-49643 https://www.redhat.com/security/data/cve/CVE-2022-49648.html CVE-2022-49648 CVE-2022-49648 https://www.redhat.com/security/data/cve/CVE-2022-49657.html CVE-2022-49657 CVE-2022-49657 https://www.redhat.com/security/data/cve/CVE-2022-49670.html CVE-2022-49670 CVE-2022-49670 https://www.redhat.com/security/data/cve/CVE-2022-49672.html CVE-2022-49672 CVE-2022-49672 https://www.redhat.com/security/data/cve/CVE-2022-49845.html CVE-2022-49845 CVE-2022-49845 https://www.redhat.com/security/data/cve/CVE-2024-36350.html CVE-2024-36350 CVE-2024-36350 https://www.redhat.com/security/data/cve/CVE-2024-36357.html CVE-2024-36357 CVE-2024-36357 https://www.redhat.com/security/data/cve/CVE-2024-46689.html CVE-2024-46689 CVE-2024-46689 https://www.redhat.com/security/data/cve/CVE-2024-46744.html CVE-2024-46744 CVE-2024-46744 https://www.redhat.com/security/data/cve/CVE-2024-47679.html CVE-2024-47679 CVE-2024-47679 https://www.redhat.com/security/data/cve/CVE-2024-47727.html CVE-2024-47727 CVE-2024-47727 https://www.redhat.com/security/data/cve/CVE-2024-49570.html CVE-2024-49570 CVE-2024-49570 https://www.redhat.com/security/data/cve/CVE-2024-49864.html CVE-2024-49864 CVE-2024-49864 https://www.redhat.com/security/data/cve/CVE-2024-50060.html CVE-2024-50060 CVE-2024-50060 https://www.redhat.com/security/data/cve/CVE-2024-50195.html CVE-2024-50195 CVE-2024-50195 https://www.redhat.com/security/data/cve/CVE-2024-50294.html CVE-2024-50294 CVE-2024-50294 https://www.redhat.com/security/data/cve/CVE-2024-52332.html CVE-2024-52332 CVE-2024-52332 https://www.redhat.com/security/data/cve/CVE-2024-53052.html CVE-2024-53052 CVE-2024-53052 https://www.redhat.com/security/data/cve/CVE-2024-53090.html CVE-2024-53090 CVE-2024-53090 https://www.redhat.com/security/data/cve/CVE-2024-53119.html CVE-2024-53119 CVE-2024-53119 https://www.redhat.com/security/data/cve/CVE-2024-53135.html CVE-2024-53135 CVE-2024-53135 https://www.redhat.com/security/data/cve/CVE-2024-53170.html CVE-2024-53170 CVE-2024-53170 https://www.redhat.com/security/data/cve/CVE-2024-53216.html CVE-2024-53216 CVE-2024-53216 https://www.redhat.com/security/data/cve/CVE-2024-53229.html CVE-2024-53229 CVE-2024-53229 https://www.redhat.com/security/data/cve/CVE-2024-53241.html CVE-2024-53241 CVE-2024-53241 https://www.redhat.com/security/data/cve/CVE-2024-53680.html CVE-2024-53680 CVE-2024-53680 https://www.redhat.com/security/data/cve/CVE-2024-54456.html CVE-2024-54456 CVE-2024-54456 https://www.redhat.com/security/data/cve/CVE-2024-56603.html CVE-2024-56603 CVE-2024-56603 https://www.redhat.com/security/data/cve/CVE-2024-56645.html CVE-2024-56645 CVE-2024-56645 https://www.redhat.com/security/data/cve/CVE-2024-56662.html CVE-2024-56662 CVE-2024-56662 https://www.redhat.com/security/data/cve/CVE-2024-56672.html CVE-2024-56672 CVE-2024-56672 https://www.redhat.com/security/data/cve/CVE-2024-56675.html CVE-2024-56675 CVE-2024-56675 https://www.redhat.com/security/data/cve/CVE-2024-56690.html CVE-2024-56690 CVE-2024-56690 https://www.redhat.com/security/data/cve/CVE-2024-56709.html CVE-2024-56709 CVE-2024-56709 https://www.redhat.com/security/data/cve/CVE-2024-56739.html CVE-2024-56739 CVE-2024-56739 https://www.redhat.com/security/data/cve/CVE-2024-56786.html CVE-2024-56786 CVE-2024-56786 https://www.redhat.com/security/data/cve/CVE-2024-57981.html CVE-2024-57981 CVE-2024-57981 https://www.redhat.com/security/data/cve/CVE-2024-57986.html CVE-2024-57986 CVE-2024-57986 https://www.redhat.com/security/data/cve/CVE-2024-57987.html CVE-2024-57987 CVE-2024-57987 https://www.redhat.com/security/data/cve/CVE-2024-57988.html CVE-2024-57988 CVE-2024-57988 https://www.redhat.com/security/data/cve/CVE-2024-57989.html CVE-2024-57989 CVE-2024-57989 https://www.redhat.com/security/data/cve/CVE-2024-57990.html CVE-2024-57990 CVE-2024-57990 https://www.redhat.com/security/data/cve/CVE-2024-57993.html CVE-2024-57993 CVE-2024-57993 https://www.redhat.com/security/data/cve/CVE-2024-57995.html CVE-2024-57995 CVE-2024-57995 https://www.redhat.com/security/data/cve/CVE-2024-57998.html CVE-2024-57998 CVE-2024-57998 https://www.redhat.com/security/data/cve/CVE-2024-58012.html CVE-2024-58012 CVE-2024-58012 https://www.redhat.com/security/data/cve/CVE-2024-58014.html CVE-2024-58014 CVE-2024-58014 https://www.redhat.com/security/data/cve/CVE-2024-58015.html CVE-2024-58015 CVE-2024-58015 https://www.redhat.com/security/data/cve/CVE-2024-58057.html CVE-2024-58057 CVE-2024-58057 https://www.redhat.com/security/data/cve/CVE-2024-58062.html CVE-2024-58062 CVE-2024-58062 https://www.redhat.com/security/data/cve/CVE-2024-58068.html CVE-2024-58068 CVE-2024-58068 https://www.redhat.com/security/data/cve/CVE-2024-58072.html CVE-2024-58072 CVE-2024-58072 https://www.redhat.com/security/data/cve/CVE-2024-58075.html CVE-2024-58075 CVE-2024-58075 https://www.redhat.com/security/data/cve/CVE-2024-58077.html CVE-2024-58077 CVE-2024-58077 https://www.redhat.com/security/data/cve/CVE-2024-58083.html CVE-2024-58083 CVE-2024-58083 https://www.redhat.com/security/data/cve/CVE-2024-58088.html CVE-2024-58088 CVE-2024-58088 https://www.redhat.com/security/data/cve/CVE-2025-21631.html CVE-2025-21631 CVE-2025-21631 https://www.redhat.com/security/data/cve/CVE-2025-21647.html CVE-2025-21647 CVE-2025-21647 https://www.redhat.com/security/data/cve/CVE-2025-21648.html CVE-2025-21648 CVE-2025-21648 https://www.redhat.com/security/data/cve/CVE-2025-21671.html CVE-2025-21671 CVE-2025-21671 https://www.redhat.com/security/data/cve/CVE-2025-21672.html CVE-2025-21672 CVE-2025-21672 https://www.redhat.com/security/data/cve/CVE-2025-21691.html CVE-2025-21691 CVE-2025-21691 https://www.redhat.com/security/data/cve/CVE-2025-21693.html CVE-2025-21693 CVE-2025-21693 https://www.redhat.com/security/data/cve/CVE-2025-21696.html CVE-2025-21696 CVE-2025-21696 https://www.redhat.com/security/data/cve/CVE-2025-21702.html CVE-2025-21702 CVE-2025-21702 https://www.redhat.com/security/data/cve/CVE-2025-21714.html CVE-2025-21714 CVE-2025-21714 https://www.redhat.com/security/data/cve/CVE-2025-21726.html CVE-2025-21726 CVE-2025-21726 https://www.redhat.com/security/data/cve/CVE-2025-21728.html CVE-2025-21728 CVE-2025-21728 https://www.redhat.com/security/data/cve/CVE-2025-21729.html CVE-2025-21729 CVE-2025-21729 https://www.redhat.com/security/data/cve/CVE-2025-21738.html CVE-2025-21738 CVE-2025-21738 https://www.redhat.com/security/data/cve/CVE-2025-21739.html CVE-2025-21739 CVE-2025-21739 https://www.redhat.com/security/data/cve/CVE-2025-21745.html CVE-2025-21745 CVE-2025-21745 https://www.redhat.com/security/data/cve/CVE-2025-21746.html CVE-2025-21746 CVE-2025-21746 https://www.redhat.com/security/data/cve/CVE-2025-21765.html CVE-2025-21765 CVE-2025-21765 https://www.redhat.com/security/data/cve/CVE-2025-21786.html CVE-2025-21786 CVE-2025-21786 https://www.redhat.com/security/data/cve/CVE-2025-21787.html CVE-2025-21787 CVE-2025-21787 https://www.redhat.com/security/data/cve/CVE-2025-21790.html CVE-2025-21790 CVE-2025-21790 https://www.redhat.com/security/data/cve/CVE-2025-21791.html CVE-2025-21791 CVE-2025-21791 https://www.redhat.com/security/data/cve/CVE-2025-21795.html CVE-2025-21795 CVE-2025-21795 https://www.redhat.com/security/data/cve/CVE-2025-21796.html CVE-2025-21796 CVE-2025-21796 https://www.redhat.com/security/data/cve/CVE-2025-21806.html CVE-2025-21806 CVE-2025-21806 https://www.redhat.com/security/data/cve/CVE-2025-21826.html CVE-2025-21826 CVE-2025-21826 https://www.redhat.com/security/data/cve/CVE-2025-21828.html CVE-2025-21828 CVE-2025-21828 https://www.redhat.com/security/data/cve/CVE-2025-21829.html CVE-2025-21829 CVE-2025-21829 https://www.redhat.com/security/data/cve/CVE-2025-21837.html CVE-2025-21837 CVE-2025-21837 https://www.redhat.com/security/data/cve/CVE-2025-21839.html CVE-2025-21839 CVE-2025-21839 https://www.redhat.com/security/data/cve/CVE-2025-21844.html CVE-2025-21844 CVE-2025-21844 https://www.redhat.com/security/data/cve/CVE-2025-21846.html CVE-2025-21846 CVE-2025-21846 https://www.redhat.com/security/data/cve/CVE-2025-21847.html CVE-2025-21847 CVE-2025-21847 https://www.redhat.com/security/data/cve/CVE-2025-21848.html CVE-2025-21848 CVE-2025-21848 https://www.redhat.com/security/data/cve/CVE-2025-21851.html CVE-2025-21851 CVE-2025-21851 https://www.redhat.com/security/data/cve/CVE-2025-21853.html CVE-2025-21853 CVE-2025-21853 https://www.redhat.com/security/data/cve/CVE-2025-21855.html CVE-2025-21855 CVE-2025-21855 https://www.redhat.com/security/data/cve/CVE-2025-21861.html CVE-2025-21861 CVE-2025-21861 https://www.redhat.com/security/data/cve/CVE-2025-21863.html CVE-2025-21863 CVE-2025-21863 https://www.redhat.com/security/data/cve/CVE-2025-21864.html CVE-2025-21864 CVE-2025-21864 https://www.redhat.com/security/data/cve/CVE-2025-22056.html CVE-2025-22056 CVE-2025-22056 https://www.redhat.com/security/data/cve/CVE-2025-22097.html CVE-2025-22097 CVE-2025-22097 https://www.redhat.com/security/data/cve/CVE-2025-37994.html CVE-2025-37994 CVE-2025-37994 https://www.redhat.com/security/data/cve/CVE-2025-38116.html CVE-2025-38116 CVE-2025-38116 https://www.redhat.com/security/data/cve/CVE-2025-38396.html CVE-2025-38396 CVE-2025-38396 �:libperf-5.14.0-611.5.1.el9_7.x86_64.rpm �:kernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm �:kernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm �:libperf-5.14.0-611.5.1.el9_7.x86_64.rpm �:kernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm �:kernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm ���7�! �
�zBsecurity Low: shadow-utils security update �V��o�https://access.redhat.com/errata/RHSA-2025:20559 RHSA-2025:20559 RHSA-2025:20559
https://access.redhat.com/security/cve/CVE-2024-56433 CVE-2024-56433 CVE-2024-56433 https://bugzilla.redhat.com/2334165 2334165 https://errata.almalinux.org/9/ALSA-2025-20559.html ALSA-2025:20559 ALSA-2025:20559 �j�Sshadow-utils-subid-devel-4.9-15.el9.i686.rpm �j�Sshadow-utils-subid-devel-4.9-15.el9.x86_64.rpm �j�Sshadow-utils-subid-devel-4.9-15.el9.i686.rpm �j�Sshadow-utils-subid-devel-4.9-15.el9.x86_64.rpm ����" �2�}Bsecurity Moderate: zziplib security update
��v�https://access.redhat.com/errata/RHSA-2025:20838 RHSA-2025:20838 RHSA-2025:20838
https://access.redhat.com/security/cve/CVE-2018-17828 CVE-2018-17828 CVE-2018-17828 https://bugzilla.redhat.com/1635888 1635888 https://errata.almalinux.org/9/ALSA-2025-20838.html ALSA-2025:20838 ALSA-2025:20838 �m�zziplib-devel-0.13.71-12.el9.i686.rpm �m�zziplib-devel-0.13.71-12.el9.x86_64.rpm �m�zziplib-devel-0.13.71-12.el9.i686.rpm �m�zziplib-devel-0.13.71-12.el9.x86_64.rpm ���t�# �3� security Important: ipa security update ���ghttps://access.redhat.com/errata/RHSA-2025:20928 RHSA-2025:20928 RHSA-2025:20928
https://access.redhat.com/security/cve/CVE-2025-7493 CVE-2025-7493 CVE-2025-7493 https://bugzilla.redhat.com/2389448 2389448 https://errata.almalinux.org/9/ALSA-2025-20928.html ALSA-2025:20928 ALSA-2025:20928 ��python3-ipatests-4.12.2-22.el9_7.1.noarch.rpm ��python3-ipatests-4.12.2-22.el9_7.1.noarch.rpm �ɵ�V�$ �4�ABsecurity Important: sssd security update ��o�/https://access.redhat.com/errata/RHSA-2025:20954 RHSA-2025:20954 RHSA-2025:20954
https://access.redhat.com/security/cve/CVE-2025-11561 CVE-2025-11561 CVE-2025-11561 https://bugzilla.redhat.com/2402727 2402727 https://errata.almalinux.org/9/ALSA-2025-20954.html ALSA-2025:20954 ALSA-2025:20954 �d�Olibsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpm �d�Olibsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpm �d�Olibsss_nss_idmap-devel-2.9.7-4.el9_7.1.x86_64.rpm �d�Olibsss_nss_idmap-devel-2.9.7-4.el9_7.1.i686.rpm �ɵ��% �5�Dsecurity Important: libtiff security update ���<https://access.redhat.com/errata/RHSA-2025:20956 RHSA-2025:20956 RHSA-2025:20956
https://access.redhat.com/security/cve/CVE-2025-8176 CVE-2025-8176 CVE-2025-8176 https://access.redhat.com/security/cve/CVE-2025-9900 CVE-2025-9900 CVE-2025-9900 https://bugzilla.redhat.com/2383598 2383598 https://bugzilla.redhat.com/2392784 2392784 https://errata.almalinux.org/9/ALSA-2025-20956.html ALSA-2025:20956 ALSA-2025:20956 � �Mlibtiff-tools-4.4.0-15.el9_7.2.x86_64.rpm � �Mlibtiff-tools-4.4.0-15.el9_7.2.x86_64.rpm ���/�& �7�v�QBBsecurity Moderate: xorg-x11-server-Xwayland security update
��Z�
https://access.redhat.com/errata/RHSA-2025:20960 RHSA-2025:20960 RHSA-2025:20960
https://access.redhat.com/security/cve/CVE-2025-62229 CVE-2025-62229 CVE-2025-62229 https://access.redhat.com/security/cve/CVE-2025-62230 CVE-2025-62230 CVE-2025-62230 https://access.redhat.com/security/cve/CVE-2025-62231 CVE-2025-62231 CVE-2025-62231 https://bugzilla.redhat.com/2402649 2402649 https://bugzilla.redhat.com/2402653 2402653 https://bugzilla.redhat.com/2402660 2402660 https://errata.almalinux.org/9/ALSA-2025-20960.html ALSA-2025:20960 ALSA-2025:20960 ��Vxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpm ��Vxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpm ��Vxorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpm ��Vxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.i686.rpm ��Vxorg-x11-server-Xwayland-devel-23.2.7-5.el9_7.x86_64.rpm ��Vxorg-x11-server-Xwayland-23.2.7-5.el9_7.i686.rpm ���7�' �8�JBBsecurity Moderate: xorg-x11-server security update
��d�yhttps://access.redhat.com/errata/RHSA-2025:20961 RHSA-2025:20961 RHSA-2025:20961
https://access.redhat.com/security/cve/CVE-2025-62229 CVE-2025-62229 CVE-2025-62229 https://access.redhat.com/security/cve/CVE-2025-62230 CVE-2025-62230 CVE-2025-62230 https://access.redhat.com/security/cve/CVE-2025-62231 CVE-2025-62231 CVE-2025-62231 https://bugzilla.redhat.com/2402649 2402649 https://bugzilla.redhat.com/2402653 2402653 https://bugzilla.redhat.com/2402660 2402660 https://errata.almalinux.org/9/ALSA-2025-20961.html ALSA-2025:20961 ALSA-2025:20961 d�uxorg-x11-server-devel-1.20.11-32.el9_7.i686.rpm �_�uxorg-x11-server-source-1.20.11-32.el9_7.noarch.rpm d�uxorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpm d�uxorg-x11-server-devel-1.20.11-32.el9_7.i686.rpm �_�uxorg-x11-server-source-1.20.11-32.el9_7.noarch.rpm d�uxorg-x11-server-devel-1.20.11-32.el9_7.x86_64.rpm ����( �:�y�VBBBsecurity Important: bind security update ��]�~https://access.redhat.com/errata/RHSA-2025:21110 RHSA-2025:21110 RHSA-2025:21110
https://access.redhat.com/security/cve/CVE-2025-40778 CVE-2025-40778 CVE-2025-40778 https://access.redhat.com/security/cve/CVE-2025-40780 CVE-2025-40780 CVE-2025-40780 https://bugzilla.redhat.com/2405827 2405827 https://bugzilla.redhat.com/2405829 2405829 https://errata.almalinux.org/9/ALSA-2025-21110.html ALSA-2025:21110 ALSA-2025:21110 O�Vbind-devel-9.16.23-34.el9_7.1.x86_64.rpm O�Vbind-devel-9.16.23-34.el9_7.1.i686.rpm ��Vbind-doc-9.16.23-34.el9_7.1.noarch.rpm �^�Vbind-libs-9.16.23-34.el9_7.1.i686.rpm O�Vbind-devel-9.16.23-34.el9_7.1.x86_64.rpm O�Vbind-devel-9.16.23-34.el9_7.1.i686.rpm ��Vbind-doc-9.16.23-34.el9_7.1.noarch.rpm �^�Vbind-libs-9.16.23-34.el9_7.1.i686.rpm ���<�) �<�{�YBBBsecurity Important: bind9.18 security update ��[�phttps://access.redhat.com/errata/RHSA-2025:21111 RHSA-2025:21111 RHSA-2025:21111
https://access.redhat.com/security/cve/CVE-2025-40778 CVE-2025-40778 CVE-2025-40778 https://access.redhat.com/security/cve/CVE-2025-40780 CVE-2025-40780 CVE-2025-40780 https://access.redhat.com/security/cve/CVE-2025-8677 CVE-2025-8677 CVE-2025-8677 https://bugzilla.redhat.com/2405827 2405827 https://bugzilla.redhat.com/2405829 2405829 https://bugzilla.redhat.com/2405830 2405830 https://errata.almalinux.org/9/ALSA-2025-21111.html ALSA-2025:21111 ALSA-2025:21111 ��[bind9.18-devel-9.18.29-5.el9_7.2.i686.rpm �{�[bind9.18-libs-9.18.29-5.el9_7.2.i686.rpm �A�[bind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm ��[bind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpm ��[bind9.18-devel-9.18.29-5.el9_7.2.i686.rpm �{�[bind9.18-libs-9.18.29-5.el9_7.2.i686.rpm �A�[bind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm ��[bind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpm �ɵ��* �=�XBsecurity Critical: lasso security update �"��K�$https://access.redhat.com/errata/RHSA-2025:21462 RHSA-2025:21462 RHSA-2025:21462
https://access.redhat.com/security/cve/CVE-2025-47151 CVE-2025-47151 CVE-2025-47151 https://bugzilla.redhat.com/2412739 2412739 https://errata.almalinux.org/9/ALSA-2025-21462.html ALSA-2025:21462 ALSA-2025:21462 �r�Llasso-devel-2.7.0-11.el9_7.3.i686.rpm �r�Llasso-devel-2.7.0-11.el9_7.3.x86_64.rpm �r�Llasso-devel-2.7.0-11.el9_7.3.i686.rpm �r�Llasso-devel-2.7.0-11.el9_7.3.x86_64.rpm ��� �+ �>�[BBBBsecurity Moderate: kernel security update
��o�;https://access.redhat.com/errata/RHSA-2025:22405 RHSA-2025:22405 RHSA-2025:22405
https://access.redhat.com/security/cve/CVE-2025-38724 CVE-2025-38724 CVE-2025-38724 https://access.redhat.com/security/cve/CVE-2025-39864 CVE-2025-39864 CVE-2025-39864 https://access.redhat.com/security/cve/CVE-2025-39898 CVE-2025-39898 CVE-2025-39898 https://access.redhat.com/security/cve/CVE-2025-39918 CVE-2025-39918 CVE-2025-39918 https://access.redhat.com/security/cve/CVE-2025-39955 CVE-2025-39955 CVE-2025-39955 https://access.redhat.com/security/cve/CVE-2025-39981 CVE-2025-39981 CVE-2025-39981 https://access.redhat.com/security/cve/CVE-2025-40058 CVE-2025-40058 CVE-2025-40058 https://access.redhat.com/security/cve/CVE-2025-40185 CVE-2025-40185 CVE-2025-40185 https://bugzilla.redhat.com/2393172 2393172 https://bugzilla.redhat.com/2396934 2396934 https://bugzilla.redhat.com/2400598 2400598 https://bugzilla.redhat.com/2400628 2400628 https://bugzilla.redhat.com/2402699 2402699 https://bugzilla.redhat.com/2404105 2404105 https://bugzilla.redhat.com/2406776 2406776 https://bugzilla.redhat.com/2414741 2414741 https://errata.almalinux.org/9/ALSA-2025-22405.html ALSA-2025:22405 ALSA-2025:22405 �+kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpm �+kernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpm �+libperf-5.14.0-611.11.1.el9_7.x86_64.rpm �+kernel-tools-libs-devel-5.14.0-611.11.1.el9_7.x86_64.rpm �+kernel-cross-headers-5.14.0-611.11.1.el9_7.x86_64.rpm �+libperf-5.14.0-611.11.1.el9_7.x86_64.rpm ��ۅ]�, �?�aBBBBsecurity Moderate: kernel security update
��*�Shttps://access.redhat.com/errata/RHSA-2025:22865 RHSA-2025:22865 RHSA-2025:22865
https://access.redhat.com/security/cve/CVE-2025-39925 CVE-2025-39925 CVE-2025-39925 https://access.redhat.com/security/cve/CVE-2025-39979 CVE-2025-39979 CVE-2025-39979 https://bugzilla.redhat.com/2400629 2400629 https://bugzilla.redhat.com/2404109 2404109 https://errata.almalinux.org/9/ALSA-2025-22865.html ALSA-2025:22865 ALSA-2025:22865 �,kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpm �,kernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpm �,libperf-5.14.0-611.13.1.el9_7.x86_64.rpm �,kernel-cross-headers-5.14.0-611.13.1.el9_7.x86_64.rpm �,kernel-tools-libs-devel-5.14.0-611.13.1.el9_7.x86_64.rpm �,libperf-5.14.0-611.13.1.el9_7.x86_64.rpm �ʊ�z�- � �gBBsecurity Moderate: mysql security update
��}�[https://access.redhat.com/errata/RHSA-2025:23109 RHSA-2025:23109 RHSA-2025:23109
https://access.redhat.com/security/cve/CVE-2025-53040 CVE-2025-53040 CVE-2025-53040 https://access.redhat.com/security/cve/CVE-2025-53042 CVE-2025-53042 CVE-2025-53042 https://access.redhat.com/security/cve/CVE-2025-53044 CVE-2025-53044 CVE-2025-53044 https://access.redhat.com/security/cve/CVE-2025-53045 CVE-2025-53045 CVE-2025-53045 https://access.redhat.com/security/cve/CVE-2025-53053 CVE-2025-53053 CVE-2025-53053 https://access.redhat.com/security/cve/CVE-2025-53054 CVE-2025-53054 CVE-2025-53054 https://access.redhat.com/security/cve/CVE-2025-53062 CVE-2025-53062 CVE-2025-53062 https://access.redhat.com/security/cve/CVE-2025-53069 CVE-2025-53069 CVE-2025-53069 https://bugzilla.redhat.com/2405486 2405486 https://bugzilla.redhat.com/2405491 2405491 https://bugzilla.redhat.com/2405511 2405511 https://bugzilla.redhat.com/2405514 2405514 https://bugzilla.redhat.com/2405523 2405523 https://bugzilla.redhat.com/2405534 2405534 https://bugzilla.redhat.com/2405541 2405541 https://bugzilla.redhat.com/2405544 2405544 https://errata.almalinux.org/9/ALSA-2025-23109.html ALSA-2025:23109 ALSA-2025:23109 �+�mysql-test-8.0.44-1.el9_7.x86_64.rpm �*�mysql-devel-8.0.44-1.el9_7.x86_64.rpm �+�mysql-test-8.0.44-1.el9_7.x86_64.rpm �*�mysql-devel-8.0.44-1.el9_7.x86_64.rpm ����D�. ��kBsecurity Important: wireshark security update ��X�&https://access.redhat.com/errata/RHSA-2025:23142 RHSA-2025:23142 RHSA-2025:23142
https://access.redhat.com/security/cve/CVE-2025-13499 CVE-2025-13499 CVE-2025-13499 https://bugzilla.redhat.com/2416293 2416293 https://errata.almalinux.org/9/ALSA-2025-23142.html ALSA-2025:23142 ALSA-2025:23142 �@�Cwireshark-devel-3.4.10-8.el9_7.1.i686.rpm �@�Cwireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm �@�Cwireshark-devel-3.4.10-8.el9_7.1.i686.rpm �@�Cwireshark-devel-3.4.10-8.el9_7.1.x86_64.rpm ����#�/ ��nBBBBsecurity Important: kernel security update ��~�Mhttps://access.redhat.com/errata/RHSA-2025:23241 RHSA-2025:23241 RHSA-2025:23241
https://access.redhat.com/security/cve/CVE-2025-38499 CVE-2025-38499 CVE-2025-38499 https://access.redhat.com/security/cve/CVE-2025-39966 CVE-2025-39966 CVE-2025-39966 https://access.redhat.com/security/cve/CVE-2025-40176 CVE-2025-40176 CVE-2025-40176 https://bugzilla.redhat.com/2387670 2387670 https://bugzilla.redhat.com/2404107 2404107 https://bugzilla.redhat.com/2414524 2414524 https://errata.almalinux.org/9/ALSA-2025-23241.html ALSA-2025:23241 ALSA-2025:23241 �-kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpm �-kernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpm �-libperf-5.14.0-611.16.1.el9_7.x86_64.rpm �-kernel-tools-libs-devel-5.14.0-611.16.1.el9_7.x86_64.rpm �-kernel-cross-headers-5.14.0-611.16.1.el9_7.x86_64.rpm �-libperf-5.14.0-611.16.1.el9_7.x86_64.rpm ����0 ��CB�qBBBBBBBBBsecurity Moderate: python3.12 security update
��K�ghttps://access.redhat.com/errata/RHSA-2025:23323 RHSA-2025:23323 RHSA-2025:23323
https://access.redhat.com/security/cve/CVE-2025-8291 CVE-2025-8291 CVE-2025-8291 https://bugzilla.redhat.com/2402342 2402342 https://errata.almalinux.org/9/ALSA-2025-23323.html ALSA-2025:23323 ALSA-2025:23323 F�!python3.12-idle-3.12.12-1.el9_7.x86_64.rpm �D�!python3.12-3.12.12-1.el9_7.i686.rpm �E�!python3.12-tkinter-3.12.12-1.el9_7.i686.rpm G�!python3.12-test-3.12.12-1.el9_7.i686.rpm F�!python3.12-idle-3.12.12-1.el9_7.i686.rpm G�!python3.12-test-3.12.12-1.el9_7.x86_64.rpm E�!python3.12-debug-3.12.12-1.el9_7.x86_64.rpm E�!python3.12-debug-3.12.12-1.el9_7.i686.rpm F�!python3.12-idle-3.12.12-1.el9_7.x86_64.rpm �D�!python3.12-3.12.12-1.el9_7.i686.rpm �E�!python3.12-tkinter-3.12.12-1.el9_7.i686.rpm G�!python3.12-test-3.12.12-1.el9_7.i686.rpm F�!python3.12-idle-3.12.12-1.el9_7.i686.rpm G�!python3.12-test-3.12.12-1.el9_7.x86_64.rpm E�!python3.12-debug-3.12.12-1.el9_7.x86_64.rpm E�!python3.12-debug-3.12.12-1.el9_7.i686.rpm �ʥ��1 ��F�F�uBBBBBBBBBsecurity Moderate: python3.9 security update
��2�x
https://access.redhat.com/errata/RHSA-2025:23342 RHSA-2025:23342 RHSA-2025:23342
https://access.redhat.com/security/cve/CVE-2024-5642 CVE-2024-5642 CVE-2024-5642 https://access.redhat.com/security/cve/CVE-2025-6069 CVE-2025-6069 CVE-2025-6069 https://access.redhat.com/security/cve/CVE-2025-6075 CVE-2025-6075 CVE-2025-6075 https://access.redhat.com/security/cve/CVE-2025-8291 CVE-2025-8291 CVE-2025-8291 https://bugzilla.redhat.com/2294682 2294682 https://bugzilla.redhat.com/2373234 2373234 https://bugzilla.redhat.com/2402342 2402342 https://bugzilla.redhat.com/2408891 2408891 https://errata.almalinux.org/9/ALSA-2025-23342.html ALSA-2025:23342 ALSA-2025:23342 �=python3-test-3.9.25-2.el9_7.x86_64.rpm �=python3-idle-3.9.25-2.el9_7.x86_64.rpm N�=python3-tkinter-3.9.25-2.el9_7.i686.rpm �=python3-debug-3.9.25-2.el9_7.x86_64.rpm �=python3-test-3.9.25-2.el9_7.i686.rpm �=python3-idle-3.9.25-2.el9_7.i686.rpm �=python3-debug-3.9.25-2.el9_7.i686.rpm M�=python3-3.9.25-2.el9_7.i686.rpm �=python3-test-3.9.25-2.el9_7.x86_64.rpm �=python3-idle-3.9.25-2.el9_7.x86_64.rpm N�=python3-tkinter-3.9.25-2.el9_7.i686.rpm �=python3-debug-3.9.25-2.el9_7.x86_64.rpm �=python3-test-3.9.25-2.el9_7.i686.rpm �=python3-idle-3.9.25-2.el9_7.i686.rpm �=python3-debug-3.9.25-2.el9_7.i686.rpm M�=python3-3.9.25-2.el9_7.i686.rpm �ʥ�u�2 ��JBBBBsecurity Important: kernel security update ��*�9https://access.redhat.com/errata/RHSA-2025:2627 RHSA-2025:2627 RHSA-2025:2627
https://access.redhat.com/security/cve/CVE-2023-52605 CVE-2023-52605 CVE-2023-52605 https://access.redhat.com/security/cve/CVE-2023-52922 CVE-2023-52922 CVE-2023-52922 https://access.redhat.com/security/cve/CVE-2024-50264 CVE-2024-50264 CVE-2024-50264 https://access.redhat.com/security/cve/CVE-2024-50302 CVE-2024-50302 CVE-2024-50302 https://access.redhat.com/security/cve/CVE-2024-53113 CVE-2024-53113 CVE-2024-53113 https://access.redhat.com/security/cve/CVE-2024-53197 CVE-2024-53197 CVE-2024-53197 https://bugzilla.redhat.com/2268295 2268295 https://bugzilla.redhat.com/2327168 2327168 https://bugzilla.redhat.com/2327169 2327169 https://bugzilla.redhat.com/2329370 2329370 https://bugzilla.redhat.com/2329924 2329924 https://bugzilla.redhat.com/2334412 2334412 https://errata.almalinux.org/9/ALSA-2025-2627.html ALSA-2025:2627 ALSA-2025:2627 �libperf-5.14.0-503.31.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm �libperf-5.14.0-503.31.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.31.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.31.1.el9_5.x86_64.rpm �����3 � �Psecurity Important: .NET 9.0 security, bug fix, and enhancement update ��c�|https://access.redhat.com/errata/RHSA-2025:2668 RHSA-2025:2668 RHSA-2025:2668
https://access.redhat.com/security/cve/CVE-2025-24070 CVE-2025-24070 CVE-2025-24070 https://bugzilla.redhat.com/2349733 2349733 https://errata.almalinux.org/9/ALSA-2025-2668.html ALSA-2025:2668 ALSA-2025:2668 �^�dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpm �^�dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5.x86_64.rpm ����Y�4 �
�Rsecurity Important: .NET 8.0 security, bug fix, and enhancement update ��_�}https://access.redhat.com/errata/RHSA-2025:2669 RHSA-2025:2669 RHSA-2025:2669
https://access.redhat.com/security/cve/CVE-2025-24070 CVE-2025-24070 CVE-2025-24070 https://bugzilla.redhat.com/2349733 2349733 https://errata.almalinux.org/9/ALSA-2025-2669.html ALSA-2025:2669 ALSA-2025:2669 ��wdotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpm ��wdotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5.x86_64.rpm ����P�5 �
�KB�IBBBBBBBBBsecurity Low: python3.12 security update �V��\�Xhttps://access.redhat.com/errata/RHSA-2025:3631 RHSA-2025:3631 RHSA-2025:3631
https://access.redhat.com/security/cve/CVE-2024-7592 CVE-2024-7592 CVE-2024-7592 https://errata.almalinux.org/9/ALSA-2025-3631.html ALSA-2025:3631 ALSA-2025:3631 �D�(python3.12-3.12.5-2.el9_5.3.i686.rpm F�(python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm E�(python3.12-debug-3.12.5-2.el9_5.3.i686.rpm �E�(python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm G�(python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm F�(python3.12-idle-3.12.5-2.el9_5.3.i686.rpm E�(python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm G�(python3.12-test-3.12.5-2.el9_5.3.i686.rpm �D�(python3.12-3.12.5-2.el9_5.3.i686.rpm F�(python3.12-idle-3.12.5-2.el9_5.3.x86_64.rpm E�(python3.12-debug-3.12.5-2.el9_5.3.i686.rpm �E�(python3.12-tkinter-3.12.5-2.el9_5.3.i686.rpm G�(python3.12-test-3.12.5-2.el9_5.3.x86_64.rpm F�(python3.12-idle-3.12.5-2.el9_5.3.i686.rpm E�(python3.12-debug-3.12.5-2.el9_5.3.x86_64.rpm G�(python3.12-test-3.12.5-2.el9_5.3.i686.rpm ����;�6 ��NB�QBBBBBBBBBsecurity Low: python3.11 security update �V��4�Xhttps://access.redhat.com/errata/RHSA-2025:3634 RHSA-2025:3634 RHSA-2025:3634
https://access.redhat.com/security/cve/CVE-2024-7592 CVE-2024-7592 CVE-2024-7592 https://errata.almalinux.org/9/ALSA-2025-3634.html ALSA-2025:3634 ALSA-2025:3634 �python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.i686.rpm �python3.11-idle-3.11.9-7.el9_5.3.i686.rpm a�python3.11-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpm b�python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm �python3.11-debug-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-debug-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.i686.rpm �python3.11-idle-3.11.9-7.el9_5.3.i686.rpm a�python3.11-3.11.9-7.el9_5.3.i686.rpm �python3.11-test-3.11.9-7.el9_5.3.x86_64.rpm �python3.11-idle-3.11.9-7.el9_5.3.x86_64.rpm b�python3.11-tkinter-3.11.9-7.el9_5.3.i686.rpm ����C�7 ��jBBBBBBBBBBBBBBBBBBsecurity Moderate: java-1.8.0-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:3845 RHSA-2025:3845 RHSA-2025:3845
https://access.redhat.com/security/cve/CVE-2025-21587 CVE-2025-21587 CVE-2025-21587 https://access.redhat.com/security/cve/CVE-2025-30691 CVE-2025-30691 CVE-2025-30691 https://access.redhat.com/security/cve/CVE-2025-30698 CVE-2025-30698 CVE-2025-30698 https://errata.almalinux.org/9/ALSA-2025-3845.html ALSA-2025:3845 ALSA-2025:3845
�\java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm � \java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �
\java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm
�\java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm � \java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm �\java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9.x86_64.rpm �
\java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9.x86_64.rpm ����T�8 ��~BBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-17-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:3852 RHSA-2025:3852 RHSA-2025:3852
https://access.redhat.com/security/cve/CVE-2025-21587 CVE-2025-21587 CVE-2025-21587 https://access.redhat.com/security/cve/CVE-2025-30691 CVE-2025-30691 CVE-2025-30691 https://access.redhat.com/security/cve/CVE-2025-30698 CVE-2025-30698 CVE-2025-30698 https://errata.almalinux.org/9/ALSA-2025-3852.html ALSA-2025:3852 ALSA-2025:3852 r1java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm o1java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm w1java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm z1java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm {1java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm t1java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm |1java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm s1java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm u1java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm v1java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm p1java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm y1java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm q1java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm x1java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm r1java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm o1java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm w1java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm z1java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm {1java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm t1java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm |1java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm s1java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm u1java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm v1java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm p1java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm y1java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm q1java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm x1java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.alma.1.x86_64.rpm ���"�9 ��ZBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: java-21-openjdk security update
���https://access.redhat.com/errata/RHSA-2025:3855 RHSA-2025:3855 RHSA-2025:3855
https://access.redhat.com/security/cve/CVE-2025-21587 CVE-2025-21587 CVE-2025-21587 https://access.redhat.com/security/cve/CVE-2025-30691 CVE-2025-30691 CVE-2025-30691 https://access.redhat.com/security/cve/CVE-2025-30698 CVE-2025-30698 CVE-2025-30698 https://errata.almalinux.org/9/ALSA-2025-3855.html ALSA-2025:3855 ALSA-2025:3855 �yAjava-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �zAjava-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �qAjava-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �tAjava-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �wAjava-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �vAjava-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �oAjava-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �{Ajava-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �rAjava-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �sAjava-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �xAjava-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �uAjava-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �|Ajava-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �pAjava-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �yAjava-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �zAjava-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �qAjava-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �tAjava-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �wAjava-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �vAjava-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �oAjava-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �{Ajava-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �rAjava-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �sAjava-21-openjdk-fastdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �xAjava-21-openjdk-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �uAjava-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �|Ajava-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm �pAjava-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9.alma.1.x86_64.rpm ����: ��vBBBBsecurity Moderate: kernel security update
���https://access.redhat.com/errata/RHSA-2025:3937 RHSA-2025:3937 RHSA-2025:3937
https://access.redhat.com/security/cve/CVE-2024-53150 CVE-2024-53150 CVE-2024-53150 https://bugzilla.redhat.com/2333971 2333971 https://errata.almalinux.org/9/ALSA-2025-3937.html ALSA-2025:3937 ALSA-2025:3937 �kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpm �libperf-5.14.0-503.38.1.el9_5.x86_64.rpm �kernel-cross-headers-5.14.0-503.38.1.el9_5.x86_64.rpm �kernel-tools-libs-devel-5.14.0-503.38.1.el9_5.x86_64.rpm �libperf-5.14.0-503.38.1.el9_5.x86_64.rpm ����X�; ��|BBBBBBBBBBBBsecurity Moderate: glibc security update
��#�;https://access.redhat.com/errata/RHSA-2025:4244 RHSA-2025:4244 RHSA-2025:4244
https://access.redhat.com/security/cve/CVE-2025-0395 CVE-2025-0395 CVE-2025-0395 https://bugzilla.redhat.com/2339460 2339460 https://errata.almalinux.org/9/ALSA-2025-4244.html ALSA-2025:4244 ALSA-2025:4244 �Mgglibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpm �_gglibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qgnss_db-2.34-125.el9_5.8.alma.1.i686.rpm �Ngglibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpm �Ngglibc-static-2.34-125.el9_5.8.alma.1.i686.rpm �Rgnss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpm �Mgglibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qgnss_db-2.34-125.el9_5.8.alma.1.x86_64.rpm �Rgnss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm �Mgglibc-nss-devel-2.34-125.el9_5.8.alma.1.i686.rpm �_gglibc-benchtests-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qgnss_db-2.34-125.el9_5.8.alma.1.i686.rpm �Ngglibc-static-2.34-125.el9_5.8.alma.1.x86_64.rpm �Ngglibc-static-2.34-125.el9_5.8.alma.1.i686.rpm �Rgnss_hesiod-2.34-125.el9_5.8.alma.1.x86_64.rpm �Mgglibc-nss-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm �Qgnss_db-2.34-125.el9_5.8.alma.1.x86_64.rpm �Rgnss_hesiod-2.34-125.el9_5.8.alma.1.i686.rpm ����?�< ��Jsecurity Moderate: 389-ds-base security update
��^�zhttps://access.redhat.com/errata/RHSA-2025:4491 RHSA-2025:4491 RHSA-2025:4491
https://access.redhat.com/security/cve/CVE-2025-2487 CVE-2025-2487 CVE-2025-2487 https://bugzilla.redhat.com/2353071 2353071 https://errata.almalinux.org/9/ALSA-2025-4491.html ALSA-2025:4491 ALSA-2025:4491 �t�@389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm �t�@389-ds-base-devel-2.5.2-9.el9_5.x86_64.rpm ���i�= ��W�v�ABBBBBBBBBsecurity Moderate: python3.9 security update
��X�[https://access.redhat.com/errata/RHSA-2025:6977 RHSA-2025:6977 RHSA-2025:6977
https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237 https://errata.almalinux.org/9/ALSA-2025-6977.html ALSA-2025:6977 ALSA-2025:6977 �:python3-idle-3.9.21-2.el9.i686.rpm �:python3-debug-3.9.21-2.el9.x86_64.rpm �:python3-idle-3.9.21-2.el9.x86_64.rpm �:python3-test-3.9.21-2.el9.x86_64.rpm N�:python3-tkinter-3.9.21-2.el9.i686.rpm �:python3-test-3.9.21-2.el9.i686.rpm M�:python3-3.9.21-2.el9.i686.rpm �:python3-debug-3.9.21-2.el9.i686.rpm �:python3-idle-3.9.21-2.el9.i686.rpm �:python3-debug-3.9.21-2.el9.x86_64.rpm �:python3-idle-3.9.21-2.el9.x86_64.rpm �:python3-test-3.9.21-2.el9.x86_64.rpm N�:python3-tkinter-3.9.21-2.el9.i686.rpm �:python3-test-3.9.21-2.el9.i686.rpm M�:python3-3.9.21-2.el9.i686.rpm �:python3-debug-3.9.21-2.el9.i686.rpm ��t�> ��YB�~BBBBBBBBBsecurity Moderate: python3.12 security update
��3�[https://access.redhat.com/errata/RHSA-2025:7107 RHSA-2025:7107 RHSA-2025:7107
https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237 https://errata.almalinux.org/9/ALSA-2025-7107.html ALSA-2025:7107 ALSA-2025:7107 E�)python3.12-debug-3.12.9-1.el9.i686.rpm �E�)python3.12-tkinter-3.12.9-1.el9.i686.rpm F�)python3.12-idle-3.12.9-1.el9.i686.rpm G�)python3.12-test-3.12.9-1.el9.x86_64.rpm �D�)python3.12-3.12.9-1.el9.i686.rpm E�)python3.12-debug-3.12.9-1.el9.x86_64.rpm F�)python3.12-idle-3.12.9-1.el9.x86_64.rpm G�)python3.12-test-3.12.9-1.el9.i686.rpm E�)python3.12-debug-3.12.9-1.el9.i686.rpm �E�)python3.12-tkinter-3.12.9-1.el9.i686.rpm F�)python3.12-idle-3.12.9-1.el9.i686.rpm G�)python3.12-test-3.12.9-1.el9.x86_64.rpm �D�)python3.12-3.12.9-1.el9.i686.rpm E�)python3.12-debug-3.12.9-1.el9.x86_64.rpm F�)python3.12-idle-3.12.9-1.el9.x86_64.rpm G�)python3.12-test-3.12.9-1.el9.i686.rpm ��!�? ��\B�FBBBBBBBBBsecurity Moderate: python3.11 security update
���[https://access.redhat.com/errata/RHSA-2025:7109 RHSA-2025:7109 RHSA-2025:7109
https://access.redhat.com/security/cve/CVE-2025-0938 CVE-2025-0938 CVE-2025-0938 https://bugzilla.redhat.com/2343237 2343237 https://errata.almalinux.org/9/ALSA-2025-7109.html ALSA-2025:7109 ALSA-2025:7109 �
python3.11-idle-3.11.11-2.el9.i686.rpm �
python3.11-test-3.11.11-2.el9.i686.rpm b�
python3.11-tkinter-3.11.11-2.el9.i686.rpm �
python3.11-idle-3.11.11-2.el9.x86_64.rpm �
python3.11-debug-3.11.11-2.el9.i686.rpm �
python3.11-test-3.11.11-2.el9.x86_64.rpm a�
python3.11-3.11.11-2.el9.i686.rpm �
python3.11-debug-3.11.11-2.el9.x86_64.rpm �
python3.11-idle-3.11.11-2.el9.i686.rpm �
python3.11-test-3.11.11-2.el9.i686.rpm b�
python3.11-tkinter-3.11.11-2.el9.i686.rpm �
python3.11-idle-3.11.11-2.el9.x86_64.rpm �
python3.11-debug-3.11.11-2.el9.i686.rpm �
python3.11-test-3.11.11-2.el9.x86_64.rpm a�
python3.11-3.11.11-2.el9.i686.rpm �
python3.11-debug-3.11.11-2.el9.x86_64.rpm ��P�@ ��mBBBBBBBsecurity Moderate: protobuf security update
��i�:https://access.redhat.com/errata/RHSA-2025:7138 RHSA-2025:7138 RHSA-2025:7138
https://access.redhat.com/security/cve/CVE-2022-1941 CVE-2022-1941 CVE-2022-1941 https://bugzilla.redhat.com/2291470 2291470 https://errata.almalinux.org/9/ALSA-2025-7138.html ALSA-2025:7138 ALSA-2025:7138 �?�protobuf-lite-devel-3.14.0-16.el9.x86_64.rpm �=�protobuf-compiler-3.14.0-16.el9.i686.rpm �>�protobuf-devel-3.14.0-16.el9.i686.rpm �>�protobuf-devel-3.14.0-16.el9.x86_64.rpm �=�protobuf-compiler-3.14.0-16.el9.x86_64.rpm �?�protobuf-lite-devel-3.14.0-16.el9.i686.rpm �?�protobuf-lite-devel-3.14.0-16.el9.x86_64.rpm �=�protobuf-compiler-3.14.0-16.el9.i686.rpm �>�protobuf-devel-3.14.0-16.el9.i686.rpm �>�protobuf-devel-3.14.0-16.el9.x86_64.rpm �=�protobuf-compiler-3.14.0-16.el9.x86_64.rpm �?�protobuf-lite-devel-3.14.0-16.el9.i686.rpm �Ô�C�A � �vBBsecurity Moderate: xorg-x11-server security update
��#�shttps://access.redhat.com/errata/RHSA-2025:7163 RHSA-2025:7163 RHSA-2025:7163
https://access.redhat.com/security/cve/CVE-2024-9632 CVE-2024-9632 CVE-2024-9632 https://access.redhat.com/security/cve/CVE-2025-26594 CVE-2025-26594 CVE-2025-26594 https://access.redhat.com/security/cve/CVE-2025-26595 CVE-2025-26595 CVE-2025-26595 https://access.redhat.com/security/cve/CVE-2025-26596 CVE-2025-26596 CVE-2025-26596 https://access.redhat.com/security/cve/CVE-2025-26597 CVE-2025-26597 CVE-2025-26597 https://access.redhat.com/security/cve/CVE-2025-26598 CVE-2025-26598 CVE-2025-26598 https://access.redhat.com/security/cve/CVE-2025-26599 CVE-2025-26599 CVE-2025-26599 https://access.redhat.com/security/cve/CVE-2025-26600 CVE-2025-26600 CVE-2025-26600 https://access.redhat.com/security/cve/CVE-2025-26601 CVE-2025-26601 CVE-2025-26601 https://bugzilla.redhat.com/2317233 2317233 https://bugzilla.redhat.com/2345248 2345248 https://bugzilla.redhat.com/2345251 2345251 https://bugzilla.redhat.com/2345252 2345252 https://bugzilla.redhat.com/2345253 2345253 https://bugzilla.redhat.com/2345254 2345254 https://bugzilla.redhat.com/2345255 2345255 https://bugzilla.redhat.com/2345256 2345256 https://bugzilla.redhat.com/2345257 2345257 https://errata.almalinux.org/9/ALSA-2025-7163.html ALSA-2025:7163 ALSA-2025:7163 �_�sxorg-x11-server-source-1.20.11-28.el9_6.noarch.rpm d�sxorg-x11-server-devel-1.20.11-28.el9_6.i686.rpm d�sxorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpm �_�sxorg-x11-server-source-1.20.11-28.el9_6.noarch.rpm d�sxorg-x11-server-devel-1.20.11-28.el9_6.i686.rpm d�sxorg-x11-server-devel-1.20.11-28.el9_6.x86_64.rpm �Ô�-�B �"�a�ZBBsecurity Moderate: xorg-x11-server-Xwayland security update
���https://access.redhat.com/errata/RHSA-2025:7165 RHSA-2025:7165 RHSA-2025:7165
https://access.redhat.com/security/cve/CVE-2024-9632 CVE-2024-9632 CVE-2024-9632 https://access.redhat.com/security/cve/CVE-2025-26594 CVE-2025-26594 CVE-2025-26594 https://access.redhat.com/security/cve/CVE-2025-26595 CVE-2025-26595 CVE-2025-26595 https://access.redhat.com/security/cve/CVE-2025-26596 CVE-2025-26596 CVE-2025-26596 https://access.redhat.com/security/cve/CVE-2025-26597 CVE-2025-26597 CVE-2025-26597 https://access.redhat.com/security/cve/CVE-2025-26598 CVE-2025-26598 CVE-2025-26598 https://access.redhat.com/security/cve/CVE-2025-26599 CVE-2025-26599 CVE-2025-26599 https://access.redhat.com/security/cve/CVE-2025-26600 CVE-2025-26600 CVE-2025-26600 https://access.redhat.com/security/cve/CVE-2025-26601 CVE-2025-26601 CVE-2025-26601 https://bugzilla.redhat.com/2317233 2317233 https://bugzilla.redhat.com/2345248 2345248 https://bugzilla.redhat.com/2345251 2345251 https://bugzilla.redhat.com/2345252 2345252 https://bugzilla.redhat.com/2345253 2345253 https://bugzilla.redhat.com/2345254 2345254 https://bugzilla.redhat.com/2345255 2345255 https://bugzilla.redhat.com/2345256 2345256 https://bugzilla.redhat.com/2345257 2345257 https://errata.almalinux.org/9/ALSA-2025-7165.html ALSA-2025:7165 ALSA-2025:7165 ��Txorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm ��Txorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm ��Txorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm ��Txorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.i686.rpm ��Txorg-x11-server-Xwayland-23.2.7-3.el9_6.i686.rpm ��Txorg-x11-server-Xwayland-devel-23.2.7-3.el9_6.x86_64.rpm ���C �#�~Bsecurity Moderate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update
���shttps://access.redhat.com/errata/RHSA-2025:7178 RHSA-2025:7178 RHSA-2025:7178
https://access.redhat.com/security/cve/CVE-2024-0444 CVE-2024-0444 CVE-2024-0444 https://access.redhat.com/security/cve/CVE-2024-4453 CVE-2024-4453 CVE-2024-4453 https://bugzilla.redhat.com/2282999 2282999 https://bugzilla.redhat.com/2292335 2292335 https://errata.almalinux.org/9/ALSA-2025-7178.html ALSA-2025:7178 ALSA-2025:7178 �`�.gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm �`�.gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm �`�.gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.i686.rpm �`�.gstreamer1-plugins-bad-free-devel-1.22.12-3.el9.x86_64.rpm �Ô�/�D �$�Asecurity Moderate: corosync security update
��
�$https://access.redhat.com/errata/RHSA-2025:7201 RHSA-2025:7201 RHSA-2025:7201
https://access.redhat.com/security/cve/CVE-2025-30472 CVE-2025-30472 CVE-2025-30472 https://bugzilla.redhat.com/2354229 2354229 https://errata.almalinux.org/9/ALSA-2025-7201.html ALSA-2025:7201 ALSA-2025:7201 � �Gcorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm � �Gcorosync-vqsim-3.1.9-2.el9_6.x86_64.rpm �Ô�:�E �%�CBBBBsecurity Moderate: openjpeg2 security update
��1�Xhttps://access.redhat.com/errata/RHSA-2025:7309 RHSA-2025:7309 RHSA-2025:7309
https://access.redhat.com/security/cve/CVE-2024-56826 CVE-2024-56826 CVE-2024-56826 https://access.redhat.com/security/cve/CVE-2024-56827 CVE-2024-56827 CVE-2024-56827 https://bugzilla.redhat.com/2335172 2335172 https://bugzilla.redhat.com/2335174 2335174 https://errata.almalinux.org/9/ALSA-2025-7309.html ALSA-2025:7309 ALSA-2025:7309 �h�Gopenjpeg2-tools-2.4.0-8.el9.i686.rpm �g�Gopenjpeg2-devel-2.4.0-8.el9.x86_64.rpm �g�Gopenjpeg2-devel-2.4.0-8.el9.i686.rpm �h�Gopenjpeg2-tools-2.4.0-8.el9.x86_64.rpm �h�Gopenjpeg2-tools-2.4.0-8.el9.i686.rpm �g�Gopenjpeg2-devel-2.4.0-8.el9.x86_64.rpm �g�Gopenjpeg2-devel-2.4.0-8.el9.i686.rpm �h�Gopenjpeg2-tools-2.4.0-8.el9.x86_64.rpm �Ô�<�F �
� security Moderate: perl-Module-ScanDeps security update
�� �https://access.redhat.com/errata/RHSA-2025:7350 RHSA-2025:7350 RHSA-2025:7350
https://access.redhat.com/security/cve/CVE-2024-10224 CVE-2024-10224 CVE-2024-10224 https://bugzilla.redhat.com/2327329 2327329 https://errata.almalinux.org/9/ALSA-2025-7350.html ALSA-2025:7350 ALSA-2025:7350 ��vperl-Module-ScanDeps-1.30-6.el9.noarch.rpm ��vperl-Module-ScanDeps-1.30-6.el9.noarch.rpm ��K�G �&�Ksecurity Moderate: 389-ds-base security update
��
�zhttps://access.redhat.com/errata/RHSA-2025:7395 RHSA-2025:7395 RHSA-2025:7395
https://access.redhat.com/security/cve/CVE-2025-2487 CVE-2025-2487 CVE-2025-2487 https://bugzilla.redhat.com/2353071 2353071 https://errata.almalinux.org/9/ALSA-2025-7395.html ALSA-2025:7395 ALSA-2025:7395 �t�A389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm �t�A389-ds-base-devel-2.6.1-8.el9_6.x86_64.rpm �����H �'�Msecurity Moderate: nginx security update
���Ghttps://access.redhat.com/errata/RHSA-2025:7402 RHSA-2025:7402 RHSA-2025:7402
https://access.redhat.com/security/cve/CVE-2022-41741 CVE-2022-41741 CVE-2022-41741 https://access.redhat.com/security/cve/CVE-2022-41742 CVE-2022-41742 CVE-2022-41742 https://access.redhat.com/security/cve/CVE-2024-7347 CVE-2024-7347 CVE-2024-7347 https://bugzilla.redhat.com/2141495 2141495 https://bugzilla.redhat.com/2141496 2141496 https://errata.almalinux.org/9/ALSA-2025-7402.html ALSA-2025:7402 ALSA-2025:7402 ��Dnginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm ��Dnginx-mod-devel-1.20.1-22.el9_6.2.alma.1.x86_64.rpm ����^�I �+�hBB�fBBBBsecurity Moderate: ghostscript security update
��N�hhttps://access.redhat.com/errata/RHSA-2025:7422 RHSA-2025:7422 RHSA-2025:7422
https://access.redhat.com/security/cve/CVE-2023-46751 CVE-2023-46751 CVE-2023-46751 https://access.redhat.com/security/cve/CVE-2024-46951 CVE-2024-46951 CVE-2024-46951 https://access.redhat.com/security/cve/CVE-2024-46952 CVE-2024-46952 CVE-2024-46952 https://access.redhat.com/security/cve/CVE-2024-46953 CVE-2024-46953 CVE-2024-46953 https://access.redhat.com/security/cve/CVE-2024-46954 CVE-2024-46954 CVE-2024-46954 https://access.redhat.com/security/cve/CVE-2024-46956 CVE-2024-46956 CVE-2024-46956 https://bugzilla.redhat.com/2253365 2253365 https://bugzilla.redhat.com/2325041 2325041 https://bugzilla.redhat.com/2325043 2325043 https://bugzilla.redhat.com/2325044 2325044 https://bugzilla.redhat.com/2325045 2325045 https://bugzilla.redhat.com/2325047 2325047 https://errata.almalinux.org/9/ALSA-2025-7422.html ALSA-2025:7422 ALSA-2025:7422 �"�ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpm c�libgs-devel-9.54.0-18.el9_6.i686.rpm c�libgs-devel-9.54.0-18.el9_6.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm �!�ghostscript-9.54.0-18.el9_6.i686.rpm �"�ghostscript-tools-fonts-9.54.0-18.el9_6.i686.rpm c�libgs-devel-9.54.0-18.el9_6.i686.rpm c�libgs-devel-9.54.0-18.el9_6.x86_64.rpm �#�ghostscript-tools-printing-9.54.0-18.el9_6.i686.rpm �!�ghostscript-9.54.0-18.el9_6.i686.rpm ����^�J �,�UBBBBsecurity Important: kernel security update ��6�@https://access.redhat.com/errata/RHSA-2025:7423 RHSA-2025:7423 RHSA-2025:7423
https://access.redhat.com/security/cve/CVE-2024-58005 CVE-2024-58005 CVE-2024-58005 https://access.redhat.com/security/cve/CVE-2024-58007 CVE-2024-58007 CVE-2024-58007 https://access.redhat.com/security/cve/CVE-2024-58069 CVE-2024-58069 CVE-2024-58069 https://access.redhat.com/security/cve/CVE-2025-21633 CVE-2025-21633 CVE-2025-21633 https://access.redhat.com/security/cve/CVE-2025-21927 CVE-2025-21927 CVE-2025-21927 https://access.redhat.com/security/cve/CVE-2025-21993 CVE-2025-21993 CVE-2025-21993 https://bugzilla.redhat.com/2338813 2338813 https://bugzilla.redhat.com/2348565 2348565 https://bugzilla.redhat.com/2348590 2348590 https://bugzilla.redhat.com/2350364 2350364 https://bugzilla.redhat.com/2356593 2356593 https://bugzilla.redhat.com/2356908 2356908 https://errata.almalinux.org/9/ALSA-2025-7423.html ALSA-2025:7423 ALSA-2025:7423 �libperf-5.14.0-570.16.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm �libperf-5.14.0-570.16.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.16.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.16.1.el9_6.x86_64.rpm ��ɐ#�K �-�[Bsecurity Important: yelp security update ��v�dhttps://access.redhat.com/errata/RHSA-2025:7430 RHSA-2025:7430 RHSA-2025:7430
https://access.redhat.com/security/cve/CVE-2025-3155 CVE-2025-3155 CVE-2025-3155 https://bugzilla.redhat.com/2357091 2357091 https://errata.almalinux.org/9/ALSA-2025-7430.html ALSA-2025:7430 ALSA-2025:7430 ��Uyelp-devel-40.3-2.el9_6.1.x86_64.rpm ��Uyelp-devel-40.3-2.el9_6.1.i686.rpm ��Uyelp-devel-40.3-2.el9_6.1.x86_64.rpm ��Uyelp-devel-40.3-2.el9_6.1.i686.rpm ����5�L �.�^BBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: avahi security update
��Z�*https://access.redhat.com/errata/RHSA-2025:7437 RHSA-2025:7437 RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616 CVE-2024-52616 CVE-2024-52616 https://bugzilla.redhat.com/2326429 2326429 https://errata.almalinux.org/9/ALSA-2025-7437.html ALSA-2025:7437 ALSA-2025:7437 �8"avahi-devel-0.8-22.el9_6.x86_64.rpm �4"avahi-compat-howl-0.8-22.el9_6.i686.rpm �9"avahi-glib-devel-0.8-22.el9_6.i686.rpm �6"avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm �7"avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpm �l"avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm �6"avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpm �l"avahi-gobject-devel-0.8-22.el9_6.i686.rpm �4"avahi-compat-howl-0.8-22.el9_6.x86_64.rpm �k"avahi-gobject-0.8-22.el9_6.i686.rpm �7"avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm �9"avahi-glib-devel-0.8-22.el9_6.x86_64.rpm �5"avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpm �k"avahi-gobject-0.8-22.el9_6.x86_64.rpm �8"avahi-devel-0.8-22.el9_6.i686.rpm �5"avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm �8"avahi-devel-0.8-22.el9_6.x86_64.rpm �4"avahi-compat-howl-0.8-22.el9_6.i686.rpm �9"avahi-glib-devel-0.8-22.el9_6.i686.rpm �6"avahi-compat-libdns_sd-0.8-22.el9_6.x86_64.rpm �7"avahi-compat-libdns_sd-devel-0.8-22.el9_6.x86_64.rpm �l"avahi-gobject-devel-0.8-22.el9_6.x86_64.rpm �6"avahi-compat-libdns_sd-0.8-22.el9_6.i686.rpm �l"avahi-gobject-devel-0.8-22.el9_6.i686.rpm �4"avahi-compat-howl-0.8-22.el9_6.x86_64.rpm �k"avahi-gobject-0.8-22.el9_6.i686.rpm �7"avahi-compat-libdns_sd-devel-0.8-22.el9_6.i686.rpm �9"avahi-glib-devel-0.8-22.el9_6.x86_64.rpm �5"avahi-compat-howl-devel-0.8-22.el9_6.x86_64.rpm �k"avahi-gobject-0.8-22.el9_6.x86_64.rpm �8"avahi-devel-0.8-22.el9_6.i686.rpm �5"avahi-compat-howl-devel-0.8-22.el9_6.i686.rpm ����~�M �2�oBB�FBBBBsecurity Moderate: ghostscript security update
���fhttps://access.redhat.com/errata/RHSA-2025:7586 RHSA-2025:7586 RHSA-2025:7586
https://access.redhat.com/security/cve/CVE-2025-27832 CVE-2025-27832 CVE-2025-27832 https://bugzilla.redhat.com/2354949 2354949 https://errata.almalinux.org/9/ALSA-2025-7586.html ALSA-2025:7586 ALSA-2025:7586 �#�ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpm c�libgs-devel-9.54.0-19.el9_6.x86_64.rpm �"�ghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm �!�ghostscript-9.54.0-19.el9_6.i686.rpm c�libgs-devel-9.54.0-19.el9_6.i686.rpm �#�ghostscript-tools-printing-9.54.0-19.el9_6.i686.rpm c�libgs-devel-9.54.0-19.el9_6.x86_64.rpm �"�ghostscript-tools-fonts-9.54.0-19.el9_6.i686.rpm �!�ghostscript-9.54.0-19.el9_6.i686.rpm c�libgs-devel-9.54.0-19.el9_6.i686.rpm ��v�N �3�|security Important: .NET 8.0 security update ��j�Ghttps://access.redhat.com/errata/RHSA-2025:7598 RHSA-2025:7598 RHSA-2025:7598
https://access.redhat.com/security/cve/CVE-2025-26646 CVE-2025-26646 CVE-2025-26646 https://bugzilla.redhat.com/2365317 2365317 https://errata.almalinux.org/9/ALSA-2025-7598.html ALSA-2025:7598 ALSA-2025:7598 ��xdotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpm ��xdotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6.x86_64.rpm ����H�O �4�~security Important: .NET 9.0 security update ��1�Fhttps://access.redhat.com/errata/RHSA-2025:7600 RHSA-2025:7600 RHSA-2025:7600
https://access.redhat.com/security/cve/CVE-2025-26646 CVE-2025-26646 CVE-2025-26646 https://bugzilla.redhat.com/2365317 2365317 https://errata.almalinux.org/9/ALSA-2025-7600.html ALSA-2025:7600 ALSA-2025:7600 �^� dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm �^� dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6.x86_64.rpm ��;�P �5�@BBBBsecurity Important: kernel security update ��w�9https://access.redhat.com/errata/RHSA-2025:7903 RHSA-2025:7903 RHSA-2025:7903
https://access.redhat.com/security/cve/CVE-2025-21756 CVE-2025-21756 CVE-2025-21756 https://access.redhat.com/security/cve/CVE-2025-21966 CVE-2025-21966 CVE-2025-21966 https://access.redhat.com/security/cve/CVE-2025-37749 CVE-2025-37749 CVE-2025-37749 https://bugzilla.redhat.com/2348609 2348609 https://bugzilla.redhat.com/2356605 2356605 https://bugzilla.redhat.com/2363332 2363332 https://errata.almalinux.org/9/ALSA-2025-7903.html ALSA-2025:7903 ALSA-2025:7903 �kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm �libperf-5.14.0-570.17.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.17.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.17.1.el9_6.x86_64.rpm �libperf-5.14.0-570.17.1.el9_6.x86_64.rpm ����V�Q �6�FBBBBsecurity Moderate: kernel security update
��0�
https://access.redhat.com/errata/RHSA-2025:8142 RHSA-2025:8142 RHSA-2025:8142
https://access.redhat.com/security/cve/CVE-2025-21964 CVE-2025-21964 CVE-2025-21964 https://bugzilla.redhat.com/2356665 2356665 https://errata.almalinux.org/9/ALSA-2025-8142.html ALSA-2025:8142 ALSA-2025:8142 �libperf-5.14.0-570.18.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm �libperf-5.14.0-570.18.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.18.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.18.1.el9_6.x86_64.rpm ��ܣf�R �7�LBsecurity Important: gstreamer1-plugins-bad-free security update ��=�https://access.redhat.com/errata/RHSA-2025:8183 RHSA-2025:8183 RHSA-2025:8183
https://access.redhat.com/security/cve/CVE-2025-3887 CVE-2025-3887 CVE-2025-3887 https://bugzilla.redhat.com/2367919 2367919 https://errata.almalinux.org/9/ALSA-2025-8183.html ALSA-2025:8183 ALSA-2025:8183 �`�/gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm �`�/gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm �`�/gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.i686.rpm �`�/gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6.x86_64.rpm �����S �8�OBBBBsecurity Moderate: kernel security update
��K�Whttps://access.redhat.com/errata/RHSA-2025:8333 RHSA-2025:8333 RHSA-2025:8333
https://access.redhat.com/security/cve/CVE-2022-3424 CVE-2022-3424 CVE-2022-3424 https://access.redhat.com/security/cve/CVE-2025-21764 CVE-2025-21764 CVE-2025-21764 https://bugzilla.redhat.com/2132640 2132640 https://bugzilla.redhat.com/2348575 2348575 https://errata.almalinux.org/9/ALSA-2025-8333.html ALSA-2025:8333 ALSA-2025:8333 �kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm �libperf-5.14.0-570.19.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.19.1.el9_6.x86_64.rpm �libperf-5.14.0-570.19.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.19.1.el9_6.x86_64.rpm ��H�T �9�UBsecurity Important: varnish security update ��"�Zhttps://access.redhat.com/errata/RHSA-2025:8337 RHSA-2025:8337 RHSA-2025:8337
https://access.redhat.com/security/cve/CVE-2025-47905 CVE-2025-47905 CVE-2025-47905 https://bugzilla.redhat.com/2364235 2364235 https://errata.almalinux.org/9/ALSA-2025-8337.html ALSA-2025:8337 ALSA-2025:8337 ��hvarnish-devel-6.6.2-6.el9_6.1.i686.rpm ��hvarnish-devel-6.6.2-6.el9_6.1.x86_64.rpm ��hvarnish-devel-6.6.2-6.el9_6.1.i686.rpm ��hvarnish-devel-6.6.2-6.el9_6.1.x86_64.rpm ����[�U �:�XBBBBsecurity Important: kernel security update ��|�https://access.redhat.com/errata/RHSA-2025:8643 RHSA-2025:8643 RHSA-2025:8643
https://access.redhat.com/security/cve/CVE-2025-21920 CVE-2025-21920 CVE-2025-21920 https://access.redhat.com/security/cve/CVE-2025-21926 CVE-2025-21926 CVE-2025-21926 https://access.redhat.com/security/cve/CVE-2025-21997 CVE-2025-21997 CVE-2025-21997 https://access.redhat.com/security/cve/CVE-2025-22055 CVE-2025-22055 CVE-2025-22055 https://access.redhat.com/security/cve/CVE-2025-37785 CVE-2025-37785 CVE-2025-37785 https://access.redhat.com/security/cve/CVE-2025-37943 CVE-2025-37943 CVE-2025-37943 https://bugzilla.redhat.com/2356587 2356587 https://bugzilla.redhat.com/2356639 2356639 https://bugzilla.redhat.com/2357143 2357143 https://bugzilla.redhat.com/2360300 2360300 https://bugzilla.redhat.com/2360921 2360921 https://bugzilla.redhat.com/2367748 2367748 https://errata.almalinux.org/9/ALSA-2025-8643.html ALSA-2025:8643 ALSA-2025:8643 �kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm �libperf-5.14.0-570.21.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm �libperf-5.14.0-570.21.1.el9_6.x86_64.rpm �«�]�V �;�^BBBBBBBBBBBBsecurity Moderate: glibc security update
���Nhttps://access.redhat.com/errata/RHSA-2025:8655 RHSA-2025:8655 RHSA-2025:8655
https://access.redhat.com/security/cve/CVE-2025-4802 CVE-2025-4802 CVE-2025-4802 https://bugzilla.redhat.com/2367468 2367468 https://errata.almalinux.org/9/ALSA-2025-8655.html ALSA-2025:8655 ALSA-2025:8655 �Qhnss_db-2.34-168.el9_6.19.i686.rpm �Rhnss_hesiod-2.34-168.el9_6.19.i686.rpm �_hglibc-benchtests-2.34-168.el9_6.19.x86_64.rpm �Nhglibc-static-2.34-168.el9_6.19.x86_64.rpm �Mhglibc-nss-devel-2.34-168.el9_6.19.i686.rpm �Nhglibc-static-2.34-168.el9_6.19.i686.rpm �Rhnss_hesiod-2.34-168.el9_6.19.x86_64.rpm �Qhnss_db-2.34-168.el9_6.19.x86_64.rpm �Mhglibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm �Qhnss_db-2.34-168.el9_6.19.i686.rpm �Rhnss_hesiod-2.34-168.el9_6.19.i686.rpm �_hglibc-benchtests-2.34-168.el9_6.19.x86_64.rpm �Nhglibc-static-2.34-168.el9_6.19.x86_64.rpm �Mhglibc-nss-devel-2.34-168.el9_6.19.i686.rpm �Nhglibc-static-2.34-168.el9_6.19.i686.rpm �Rhnss_hesiod-2.34-168.el9_6.19.x86_64.rpm �Qhnss_db-2.34-168.el9_6.19.x86_64.rpm �Mhglibc-nss-devel-2.34-168.el9_6.19.x86_64.rpm �� �W �<�lsecurity Important: .NET 8.0 security update ��R�8https://access.redhat.com/errata/RHSA-2025:8813 RHSA-2025:8813 RHSA-2025:8813
https://access.redhat.com/security/cve/CVE-2025-30399 CVE-2025-30399 CVE-2025-30399 https://bugzilla.redhat.com/2369701 2369701 https://errata.almalinux.org/9/ALSA-2025-8813.html ALSA-2025:8813 ALSA-2025:8813 ��ydotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm ��ydotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6.x86_64.rpm �°�q�X �=�nsecurity Important: .NET 9.0 security update ��
�7https://access.redhat.com/errata/RHSA-2025:8817 RHSA-2025:8817 RHSA-2025:8817
https://access.redhat.com/security/cve/CVE-2025-30399 CVE-2025-30399 CVE-2025-30399 https://bugzilla.redhat.com/2369701 2369701 https://errata.almalinux.org/9/ALSA-2025-8817.html ALSA-2025:8817 ALSA-2025:8817 �^�dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm �^�dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6.x86_64.rpm �ª�B�Y �>�pBBBBsecurity Important: kernel security update ��A�ihttps://access.redhat.com/errata/RHSA-2025:9080 RHSA-2025:9080 RHSA-2025:9080
https://access.redhat.com/security/cve/CVE-2025-21961 CVE-2025-21961 CVE-2025-21961 https://access.redhat.com/security/cve/CVE-2025-21963 CVE-2025-21963 CVE-2025-21963 https://access.redhat.com/security/cve/CVE-2025-21969 CVE-2025-21969 CVE-2025-21969 https://access.redhat.com/security/cve/CVE-2025-21979 CVE-2025-21979 CVE-2025-21979 https://access.redhat.com/security/cve/CVE-2025-21999 CVE-2025-21999 CVE-2025-21999 https://access.redhat.com/security/cve/CVE-2025-22126 CVE-2025-22126 CVE-2025-22126 https://access.redhat.com/security/cve/CVE-2025-37750 CVE-2025-37750 CVE-2025-37750 https://bugzilla.redhat.com/2356584 2356584 https://bugzilla.redhat.com/2356633 2356633 https://bugzilla.redhat.com/2356642 2356642 https://bugzilla.redhat.com/2356652 2356652 https://bugzilla.redhat.com/2357134 2357134 https://bugzilla.redhat.com/2360236 2360236 https://bugzilla.redhat.com/2363341 2363341 https://errata.almalinux.org/9/ALSA-2025-9080.html ALSA-2025:9080 ALSA-2025:9080 �kernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpm �libperf-5.14.0-570.22.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.22.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.22.1.el9_6.x86_64.rpm �libperf-5.14.0-570.22.1.el9_6.x86_64.rpm ���Z �7�6security Important: apache-commons-beanutils security update ��*�ihttps://access.redhat.com/errata/RHSA-2025:9114 RHSA-2025:9114 RHSA-2025:9114
https://access.redhat.com/security/cve/CVE-2025-48734 CVE-2025-48734 CVE-2025-48734 https://bugzilla.redhat.com/2368956 2368956 https://errata.almalinux.org/9/ALSA-2025-9114.html ALSA-2025:9114 ALSA-2025:9114 ��wapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm ��wapache-commons-beanutils-1.9.4-10.el9_6.noarch.rpm ��3�[ �?�xBsecurity Important: libvpx security update ���8https://access.redhat.com/errata/RHSA-2025:9118 RHSA-2025:9118 RHSA-2025:9118
https://access.redhat.com/security/cve/CVE-2025-5283 CVE-2025-5283 CVE-2025-5283 https://bugzilla.redhat.com/2368749 2368749 https://errata.almalinux.org/9/ALSA-2025-9118.html ALSA-2025:9118 ALSA-2025:9118 ��;libvpx-devel-1.9.0-9.el9_6.x86_64.rpm ��;libvpx-devel-1.9.0-9.el9_6.i686.rpm ��;libvpx-devel-1.9.0-9.el9_6.x86_64.rpm ��;libvpx-devel-1.9.0-9.el9_6.i686.rpm ��@�\ � �;security Important: ipa security update ��K�ghttps://access.redhat.com/errata/RHSA-2025:9184 RHSA-2025:9184 RHSA-2025:9184
https://access.redhat.com/security/cve/CVE-2025-4404 CVE-2025-4404 CVE-2025-4404 https://bugzilla.redhat.com/2364606 2364606 https://errata.almalinux.org/9/ALSA-2025-9184.html ALSA-2025:9184 ALSA-2025:9184 ��python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm ��python3-ipatests-4.12.2-14.el9_6.1.noarch.rpm ��E�] ��|BBBBsecurity Moderate: kernel security update
��2�https://access.redhat.com/errata/RHSA-2025:9302 RHSA-2025:9302 RHSA-2025:9302
https://access.redhat.com/security/cve/CVE-2025-21883 CVE-2025-21883 CVE-2025-21883 https://access.redhat.com/security/cve/CVE-2025-21919 CVE-2025-21919 CVE-2025-21919 https://access.redhat.com/security/cve/CVE-2025-22104 CVE-2025-22104 CVE-2025-22104 https://access.redhat.com/security/cve/CVE-2025-23150 CVE-2025-23150 CVE-2025-23150 https://access.redhat.com/security/cve/CVE-2025-37738 CVE-2025-37738 CVE-2025-37738 https://bugzilla.redhat.com/2355415 2355415 https://bugzilla.redhat.com/2356618 2356618 https://bugzilla.redhat.com/2360265 2360265 https://bugzilla.redhat.com/2363268 2363268 https://bugzilla.redhat.com/2363305 2363305 https://errata.almalinux.org/9/ALSA-2025-9302.html ALSA-2025:9302 ALSA-2025:9302 �libperf-5.14.0-570.23.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpm �libperf-5.14.0-570.23.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.23.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.23.1.el9_6.x86_64.rpm ��;�^ ��B�ABBBBBBsecurity Important: xorg-x11-server and xorg-x11-server-Xwayland security update ��L�zhttps://access.redhat.com/errata/RHSA-2025:9303 RHSA-2025:9303 RHSA-2025:9303
https://access.redhat.com/security/cve/CVE-2025-49175 CVE-2025-49175 CVE-2025-49175 https://access.redhat.com/security/cve/CVE-2025-49176 CVE-2025-49176 CVE-2025-49176 https://access.redhat.com/security/cve/CVE-2025-49178 CVE-2025-49178 CVE-2025-49178 https://access.redhat.com/security/cve/CVE-2025-49179 CVE-2025-49179 CVE-2025-49179 https://access.redhat.com/security/cve/CVE-2025-49180 CVE-2025-49180 CVE-2025-49180 https://bugzilla.redhat.com/2369947 2369947 https://bugzilla.redhat.com/2369954 2369954 https://bugzilla.redhat.com/2369977 2369977 https://bugzilla.redhat.com/2369978 2369978 https://bugzilla.redhat.com/2369981 2369981 https://errata.almalinux.org/9/ALSA-2025-9303.html ALSA-2025:9303 ALSA-2025:9303 ��Uxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm ��Uxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpm d�txorg-x11-server-devel-1.20.11-31.el9_6.i686.rpm �_�txorg-x11-server-source-1.20.11-31.el9_6.noarch.rpm ��Uxorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpm d�txorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm ��Uxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.x86_64.rpm ��Uxorg-x11-server-Xwayland-devel-23.2.7-4.el9_6.i686.rpm d�txorg-x11-server-devel-1.20.11-31.el9_6.i686.rpm �_�txorg-x11-server-source-1.20.11-31.el9_6.noarch.rpm ��Uxorg-x11-server-Xwayland-23.2.7-4.el9_6.i686.rpm d�txorg-x11-server-devel-1.20.11-31.el9_6.x86_64.rpm ���_ ��Jsecurity Important: perl-YAML-LibYAML security update ��F�nhttps://access.redhat.com/errata/RHSA-2025:9330 RHSA-2025:9330 RHSA-2025:9330
https://access.redhat.com/security/cve/CVE-2025-40908 CVE-2025-40908 CVE-2025-40908 https://bugzilla.redhat.com/2369630 2369630 https://errata.almalinux.org/9/ALSA-2025-9330.html ALSA-2025:9330 ALSA-2025:9330 �i�8perl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm �i�8perl-YAML-LibYAML-0.82-6.1.el9_6.x86_64.rpm ��y�` ��MBsecurity Moderate: qt5-qtbase security update
��4�.https://access.redhat.com/errata/RHSA-2025:9462 RHSA-2025:9462 RHSA-2025:9462
https://access.redhat.com/security/cve/CVE-2025-5455 CVE-2025-5455 CVE-2025-5455 https://bugzilla.redhat.com/2369722 2369722 https://errata.almalinux.org/9/ALSA-2025-9462.html ALSA-2025:9462 ALSA-2025:9462 ��_qt5-qtbase-static-5.15.9-11.el9_6.i686.rpm ��_qt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm ��_qt5-qtbase-static-5.15.9-11.el9_6.i686.rpm ��_qt5-qtbase-static-5.15.9-11.el9_6.x86_64.rpm ���a ��security Important: perl-File-Find-Rule security update ��b�4https://access.redhat.com/errata/RHSA-2025:9517 RHSA-2025:9517 RHSA-2025:9517
https://access.redhat.com/security/cve/CVE-2011-10007 CVE-2011-10007 CVE-2011-10007 https://bugzilla.redhat.com/2370424 2370424 https://errata.almalinux.org/9/ALSA-2025-9517.html ALSA-2025:9517 ALSA-2025:9517 ��tperl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm ��tperl-File-Find-Rule-0.34-19.1.el9_6.noarch.rpm ���b ��RBBBBBBBBBBBBsecurity Moderate: glibc security update
���2https://access.redhat.com/errata/RHSA-2025:9877 RHSA-2025:9877 RHSA-2025:9877
https://access.redhat.com/security/cve/CVE-2025-5702 CVE-2025-5702 CVE-2025-5702 https://bugzilla.redhat.com/2370472 2370472 https://errata.almalinux.org/9/ALSA-2025-9877.html ALSA-2025:9877 ALSA-2025:9877 �_iglibc-benchtests-2.34-168.el9_6.20.x86_64.rpm �Niglibc-static-2.34-168.el9_6.20.x86_64.rpm �Qinss_db-2.34-168.el9_6.20.x86_64.rpm �Niglibc-static-2.34-168.el9_6.20.i686.rpm �Qinss_db-2.34-168.el9_6.20.i686.rpm �Rinss_hesiod-2.34-168.el9_6.20.i686.rpm �Miglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm �Miglibc-nss-devel-2.34-168.el9_6.20.i686.rpm �Rinss_hesiod-2.34-168.el9_6.20.x86_64.rpm �_iglibc-benchtests-2.34-168.el9_6.20.x86_64.rpm �Niglibc-static-2.34-168.el9_6.20.x86_64.rpm �Qinss_db-2.34-168.el9_6.20.x86_64.rpm �Niglibc-static-2.34-168.el9_6.20.i686.rpm �Qinss_db-2.34-168.el9_6.20.i686.rpm �Rinss_hesiod-2.34-168.el9_6.20.i686.rpm �Miglibc-nss-devel-2.34-168.el9_6.20.x86_64.rpm �Miglibc-nss-devel-2.34-168.el9_6.20.i686.rpm �Rinss_hesiod-2.34-168.el9_6.20.x86_64.rpm ��t�c ��`BBBBsecurity Moderate: kernel security update
��H� https://access.redhat.com/errata/RHSA-2025:9880 RHSA-2025:9880 RHSA-2025:9880
https://access.redhat.com/security/cve/CVE-2023-52933 CVE-2023-52933 CVE-2023-52933 https://bugzilla.redhat.com/2355476 2355476 https://errata.almalinux.org/9/ALSA-2025-9880.html ALSA-2025:9880 ALSA-2025:9880 �libperf-5.14.0-570.24.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpm �libperf-5.14.0-570.24.1.el9_6.x86_64.rpm �kernel-cross-headers-5.14.0-570.24.1.el9_6.x86_64.rpm �kernel-tools-libs-devel-5.14.0-570.24.1.el9_6.x86_64.rpm ��b�d ��fBBBBBBBBBBBsecurity Moderate: poppler security update !
��Q�xhttps://access.redhat.com/errata/RHSA-2026:0126 RHSA-2026:0126 RHSA-2026:0126
https://access.redhat.com/security/cve/CVE-2025-32365 CVE-2025-32365 CVE-2025-32365 https://bugzilla.redhat.com/2357656 2357656 https://errata.almalinux.org/9/ALSA-2026-0126.html ALSA-2026:0126 ALSA-2026:0126 �~poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm �~poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm �.~poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm �~poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm �~poppler-devel-21.01.0-23.el9_7.x86_64.rpm �~poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm �~poppler-devel-21.01.0-23.el9_7.i686.rpm �~poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm �~poppler-glib-devel-21.01.0-23.el9_7.i686.rpm �~poppler-cpp-devel-21.01.0-23.el9_7.i686.rpm �~poppler-cpp-devel-21.01.0-23.el9_7.x86_64.rpm �.~poppler-glib-doc-21.01.0-23.el9_7.noarch.rpm �~poppler-qt5-devel-21.01.0-23.el9_7.i686.rpm �~poppler-devel-21.01.0-23.el9_7.x86_64.rpm �~poppler-qt5-devel-21.01.0-23.el9_7.x86_64.rpm �~poppler-devel-21.01.0-23.el9_7.i686.rpm �~poppler-glib-devel-21.01.0-23.el9_7.x86_64.rpm �~poppler-glib-devel-21.01.0-23.el9_7.i686.rpm ���q�e ��sBBBBsecurity Important: mariadb security update !��I�8https://access.redhat.com/errata/RHSA-2026:0137 RHSA-2026:0137 RHSA-2026:0137
https://access.redhat.com/security/cve/CVE-2025-13699 CVE-2025-13699 CVE-2025-13699 https://bugzilla.redhat.com/2417693 2417693 https://errata.almalinux.org/9/ALSA-2026-0137.html ALSA-2026:0137 ALSA-2026:0137 �C�xmariadb-devel-10.5.29-3.el9_7.x86_64.rpm �D�xmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm �E�xmariadb-test-10.5.29-3.el9_7.x86_64.rpm �C�xmariadb-devel-10.5.29-3.el9_7.x86_64.rpm �D�xmariadb-embedded-devel-10.5.29-3.el9_7.x86_64.rpm �E�xmariadb-test-10.5.29-3.el9_7.x86_64.rpm ����f � �yBBBBsecurity Moderate: kernel security update !
���0
https://access.redhat.com/errata/RHSA-2026:0445 RHSA-2026:0445 RHSA-2026:0445
https://access.redhat.com/security/cve/CVE-2025-39806 CVE-2025-39806 CVE-2025-39806 https://access.redhat.com/security/cve/CVE-2025-39840 CVE-2025-39840 CVE-2025-39840 https://access.redhat.com/security/cve/CVE-2025-39883 CVE-2025-39883 CVE-2025-39883 https://access.redhat.com/security/cve/CVE-2025-40240 CVE-2025-40240 CVE-2025-40240 https://bugzilla.redhat.com/2395807 2395807 https://bugzilla.redhat.com/2396936 2396936 https://bugzilla.redhat.com/2397553 2397553 https://bugzilla.redhat.com/2418832 2418832 https://errata.almalinux.org/9/ALSA-2026-0445.html ALSA-2026:0445 ALSA-2026:0445 �.libperf-5.14.0-611.20.1.el9_7.x86_64.rpm �.kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm �.kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm �.libperf-5.14.0-611.20.1.el9_7.x86_64.rpm �.kernel-tools-libs-devel-5.14.0-611.20.1.el9_7.x86_64.rpm �.kernel-cross-headers-5.14.0-611.20.1.el9_7.x86_64.rpm �˩�F�g �
�BBBBBBBBBBBsecurity Moderate: postgresql security update !
��1�[https://access.redhat.com/errata/RHSA-2026:0491 RHSA-2026:0491 RHSA-2026:0491
https://access.redhat.com/security/cve/CVE-2025-12817 CVE-2025-12817 CVE-2025-12817 https://access.redhat.com/security/cve/CVE-2025-12818 CVE-2025-12818 CVE-2025-12818 https://bugzilla.redhat.com/2414825 2414825 https://bugzilla.redhat.com/2414826 2414826 https://errata.almalinux.org/9/ALSA-2026-0491.html ALSA-2026:0491 ALSA-2026:0491 �}�Ipostgresql-docs-13.23-1.el9_7.x86_64.rpm ��Ipostgresql-test-13.23-1.el9_7.x86_64.rpm � �Ipostgresql-static-13.23-1.el9_7.x86_64.rpm ��Ipostgresql-server-devel-13.23-1.el9_7.x86_64.rpm �<�Ipostgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpm �~�Ipostgresql-private-devel-13.23-1.el9_7.x86_64.rpm ��Ipostgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm �}�Ipostgresql-docs-13.23-1.el9_7.x86_64.rpm ��Ipostgresql-test-13.23-1.el9_7.x86_64.rpm � �Ipostgresql-static-13.23-1.el9_7.x86_64.rpm ��Ipostgresql-server-devel-13.23-1.el9_7.x86_64.rpm �<�Ipostgresql-test-rpm-macros-13.23-1.el9_7.noarch.rpm �~�Ipostgresql-private-devel-13.23-1.el9_7.x86_64.rpm ��Ipostgresql-upgrade-devel-13.23-1.el9_7.x86_64.rpm �˩�W�h ��Lsecurity Moderate: transfig security update !
���Phttps://access.redhat.com/errata/RHSA-2026:0700 RHSA-2026:0700 RHSA-2026:0700
https://access.redhat.com/security/cve/CVE-2025-46397 CVE-2025-46397 CVE-2025-46397 https://bugzilla.redhat.com/2362058 2362058 https://errata.almalinux.org/9/ALSA-2026-0700.html ALSA-2026:0700 ALSA-2026:0700 �r�:transfig-3.2.7b-11.el9_7.x86_64.rpm �r�:transfig-3.2.7b-11.el9_7.x86_64.rpm �˩�Q�i ��Osecurity Important: jmc security update !��\�"https://access.redhat.com/errata/RHSA-2026:0752 RHSA-2026:0752 RHSA-2026:0752
https://access.redhat.com/security/cve/CVE-2025-66566 CVE-2025-66566 CVE-2025-66566 https://bugzilla.redhat.com/2419500 2419500 https://errata.almalinux.org/9/ALSA-2026-0752.html ALSA-2026:0752 ALSA-2026:0752 �F�}jmc-8.2.0-18.el9_7.2.x86_64.rpm �F�}jmc-8.2.0-18.el9_7.2.x86_64.rpm �˽��j ��RBBBBsecurity Important: kernel security update !��~�+https://access.redhat.com/errata/RHSA-2026:0793 RHSA-2026:0793 RHSA-2026:0793
https://access.redhat.com/security/cve/CVE-2025-38703 CVE-2025-38703 CVE-2025-38703 https://access.redhat.com/security/cve/CVE-2025-39933 CVE-2025-39933 CVE-2025-39933 https://access.redhat.com/security/cve/CVE-2025-40277 CVE-2025-40277 CVE-2025-40277 https://access.redhat.com/security/cve/CVE-2025-68285 CVE-2025-68285 CVE-2025-68285 https://access.redhat.com/security/cve/CVE-2025-68287 CVE-2025-68287 CVE-2025-68287 https://bugzilla.redhat.com/2393157 2393157 https://bugzilla.redhat.com/2401432 2401432 https://bugzilla.redhat.com/2419954 2419954 https://bugzilla.redhat.com/2422788 2422788 https://bugzilla.redhat.com/2422801 2422801 https://errata.almalinux.org/9/ALSA-2026-0793.html ALSA-2026:0793 ALSA-2026:0793 �/libperf-5.14.0-611.24.1.el9_7.x86_64.rpm �/kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm �/kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm �/libperf-5.14.0-611.24.1.el9_7.x86_64.rpm �/kernel-tools-libs-devel-5.14.0-611.24.1.el9_7.x86_64.rpm �/kernel-cross-headers-5.14.0-611.24.1.el9_7.x86_64.rpm ����t�k ��XBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-17-openjdk security update !��)�dhttps://access.redhat.com/errata/RHSA-2026:0927 RHSA-2026:0927 RHSA-2026:0927
https://access.redhat.com/security/cve/CVE-2025-64720 CVE-2025-64720 CVE-2025-64720 https://access.redhat.com/security/cve/CVE-2025-65018 CVE-2025-65018 CVE-2025-65018 https://access.redhat.com/security/cve/CVE-2026-21925 CVE-2026-21925 CVE-2026-21925 https://access.redhat.com/security/cve/CVE-2026-21933 CVE-2026-21933 CVE-2026-21933 https://access.redhat.com/security/cve/CVE-2026-21945 CVE-2026-21945 CVE-2026-21945 https://errata.almalinux.org/9/ALSA-2026-0927.html ALSA-2026:0927 ALSA-2026:0927 s4java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm w4java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm r4java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm o4java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm y4java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm z4java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm q4java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm u4java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm x4java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm p4java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm {4java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm v4java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm |4java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm t4java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm s4java-17-openjdk-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm w4java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm r4java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm o4java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm y4java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm z4java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm q4java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm u4java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm x4java-17-openjdk-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm p4java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm {4java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm v4java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm |4java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm t4java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9.alma.1.x86_64.rpm ����2�l �
�tBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-21-openjdk security update !��
�)https://access.redhat.com/errata/RHSA-2026:0928 RHSA-2026:0928 RHSA-2026:0928
https://access.redhat.com/security/cve/CVE-2025-64720 CVE-2025-64720 CVE-2025-64720 https://access.redhat.com/security/cve/CVE-2025-65018 CVE-2025-65018 CVE-2025-65018 https://access.redhat.com/security/cve/CVE-2026-21925 CVE-2026-21925 CVE-2026-21925 https://access.redhat.com/security/cve/CVE-2026-21933 CVE-2026-21933 CVE-2026-21933 https://access.redhat.com/security/cve/CVE-2026-21945 CVE-2026-21945 CVE-2026-21945 https://errata.almalinux.org/9/ALSA-2026-0928.html ALSA-2026:0928 ALSA-2026:0928 �u;java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �v;java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �|;java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �w;java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �x;java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �p;java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �o;java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �{;java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �t;java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �r;java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �z;java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �y;java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �q;java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �s;java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �u;java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �v;java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �|;java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �w;java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �x;java-21-openjdk-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �p;java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �o;java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �{;java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �t;java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �r;java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �z;java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �y;java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �q;java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm �s;java-21-openjdk-fastdebug-21.0.10.0.7-1.el9.alma.1.x86_64.rpm ����&�m ��PBBBBBBBBBBBBBBBBBBsecurity Important: java-1.8.0-openjdk security update !��6�whttps://access.redhat.com/errata/RHSA-2026:0932 RHSA-2026:0932 RHSA-2026:0932
https://access.redhat.com/security/cve/CVE-2025-64720 CVE-2025-64720 CVE-2025-64720 https://access.redhat.com/security/cve/CVE-2025-65018 CVE-2025-65018 CVE-2025-65018 https://access.redhat.com/security/cve/CVE-2026-21925 CVE-2026-21925 CVE-2026-21925 https://access.redhat.com/security/cve/CVE-2026-21933 CVE-2026-21933 CVE-2026-21933 https://access.redhat.com/security/cve/CVE-2026-21945 CVE-2026-21945 CVE-2026-21945 https://errata.almalinux.org/9/ALSA-2026-0932.html ALSA-2026:0932 ALSA-2026:0932
�_java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �
_java-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm � _java-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm
�_java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �
_java-1.8.0-openjdk-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm � _java-1.8.0-openjdk-headless-slowdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-headless-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm �_java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm ����n ��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: java-25-openjdk security update !��-�fhttps://access.redhat.com/errata/RHSA-2026:0933 RHSA-2026:0933 RHSA-2026:0933
https://access.redhat.com/security/cve/CVE-2025-64720 CVE-2025-64720 CVE-2025-64720 https://access.redhat.com/security/cve/CVE-2025-65018 CVE-2025-65018 CVE-2025-65018 https://access.redhat.com/security/cve/CVE-2026-21925 CVE-2026-21925 CVE-2026-21925 https://access.redhat.com/security/cve/CVE-2026-21933 CVE-2026-21933 CVE-2026-21933 https://access.redhat.com/security/cve/CVE-2026-21945 CVE-2026-21945 CVE-2026-21945 https://errata.almalinux.org/9/ALSA-2026-0933.html ALSA-2026:0933 ALSA-2026:0933 �; java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �< java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �7 java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �> java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �: java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �B java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �C java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �A java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �9 java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �6 java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �E java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �? java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �D java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �8 java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �@ java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �= java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �; java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �< java-25-openjdk-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �7 java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �> java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �: java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �B java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �C java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �A java-25-openjdk-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �9 java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �6 java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �E java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �? java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �D java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �8 java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �@ java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm �= java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9.alma.1.x86_64.rpm ����o ��DBsecurity Moderate: glib2 security update !
���https://access.redhat.com/errata/RHSA-2026:0936 RHSA-2026:0936 RHSA-2026:0936
https://access.redhat.com/security/cve/CVE-2025-13601 CVE-2025-13601 CVE-2025-13601 https://bugzilla.redhat.com/2416741 2416741 https://errata.almalinux.org/9/ALSA-2026-0936.html ALSA-2026:0936 ALSA-2026:0936 ��Kglib2-static-2.68.4-18.el9_7.1.i686.rpm ��Kglib2-static-2.68.4-18.el9_7.1.x86_64.rpm ��Kglib2-static-2.68.4-18.el9_7.1.i686.rpm ��Kglib2-static-2.68.4-18.el9_7.1.x86_64.rpm ����e�p ��GBBBBsecurity Important: kernel security update !��0�https://access.redhat.com/errata/RHSA-2026:1143 RHSA-2026:1143 RHSA-2026:1143
https://access.redhat.com/security/cve/CVE-2025-38141 CVE-2025-38141 CVE-2025-38141 https://access.redhat.com/security/cve/CVE-2025-38349 CVE-2025-38349 CVE-2025-38349 https://access.redhat.com/security/cve/CVE-2025-38731 CVE-2025-38731 CVE-2025-38731 https://access.redhat.com/security/cve/CVE-2025-40248 CVE-2025-40248 CVE-2025-40248 https://access.redhat.com/security/cve/CVE-2025-40258 CVE-2025-40258 CVE-2025-40258 https://access.redhat.com/security/cve/CVE-2025-40294 CVE-2025-40294 CVE-2025-40294 https://access.redhat.com/security/cve/CVE-2025-68301 CVE-2025-68301 CVE-2025-68301 https://access.redhat.com/security/cve/CVE-2025-68305 CVE-2025-68305 CVE-2025-68305 https://bugzilla.redhat.com/2376052 2376052 https://bugzilla.redhat.com/2381870 2381870 https://bugzilla.redhat.com/2393488 2393488 https://bugzilla.redhat.com/2418872 2418872 https://bugzilla.redhat.com/2418876 2418876 https://bugzilla.redhat.com/2419891 2419891 https://bugzilla.redhat.com/2422836 2422836 https://bugzilla.redhat.com/2422840 2422840 https://errata.almalinux.org/9/ALSA-2026-1143.html ALSA-2026:1143 ALSA-2026:1143 �0kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm �0kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm �0libperf-5.14.0-611.26.1.el9_7.x86_64.rpm �0kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm �0kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm �0libperf-5.14.0-611.26.1.el9_7.x86_64.rpm ���/�q ��RB�{BBBBBBBBBsecurity Moderate: python3.12 security update !
��M�,https://access.redhat.com/errata/RHSA-2026:1408 RHSA-2026:1408 RHSA-2026:1408
https://access.redhat.com/security/cve/CVE-2025-12084 CVE-2025-12084 CVE-2025-12084 https://access.redhat.com/security/cve/CVE-2025-13836 CVE-2025-13836 CVE-2025-13836 https://bugzilla.redhat.com/2418078 2418078 https://bugzilla.redhat.com/2418655 2418655 https://errata.almalinux.org/9/ALSA-2026-1408.html ALSA-2026:1408 ALSA-2026:1408 E�"python3.12-debug-3.12.12-4.el9_7.x86_64.rpm �E�"python3.12-tkinter-3.12.12-4.el9_7.i686.rpm G�"python3.12-test-3.12.12-4.el9_7.x86_64.rpm �D�"python3.12-3.12.12-4.el9_7.i686.rpm F�"python3.12-idle-3.12.12-4.el9_7.x86_64.rpm G�"python3.12-test-3.12.12-4.el9_7.i686.rpm F�"python3.12-idle-3.12.12-4.el9_7.i686.rpm E�"python3.12-debug-3.12.12-4.el9_7.i686.rpm E�"python3.12-debug-3.12.12-4.el9_7.x86_64.rpm �E�"python3.12-tkinter-3.12.12-4.el9_7.i686.rpm G�"python3.12-test-3.12.12-4.el9_7.x86_64.rpm �D�"python3.12-3.12.12-4.el9_7.i686.rpm F�"python3.12-idle-3.12.12-4.el9_7.x86_64.rpm G�"python3.12-test-3.12.12-4.el9_7.i686.rpm F�"python3.12-idle-3.12.12-4.el9_7.i686.rpm E�"python3.12-debug-3.12.12-4.el9_7.i686.rpm ����r ��UB�CBBBBBBBBBsecurity Moderate: python3.11 security update !
��y�,https://access.redhat.com/errata/RHSA-2026:1410 RHSA-2026:1410 RHSA-2026:1410
https://access.redhat.com/security/cve/CVE-2025-12084 CVE-2025-12084 CVE-2025-12084 https://access.redhat.com/security/cve/CVE-2025-13836 CVE-2025-13836 CVE-2025-13836 https://bugzilla.redhat.com/2418078 2418078 https://bugzilla.redhat.com/2418655 2418655 https://errata.almalinux.org/9/ALSA-2026-1410.html ALSA-2026:1410 ALSA-2026:1410 �python3.11-idle-3.11.13-5.el9_7.x86_64.rpm �python3.11-test-3.11.13-5.el9_7.x86_64.rpm a�python3.11-3.11.13-5.el9_7.i686.rpm �python3.11-test-3.11.13-5.el9_7.i686.rpm �python3.11-debug-3.11.13-5.el9_7.i686.rpm b�python3.11-tkinter-3.11.13-5.el9_7.i686.rpm �python3.11-idle-3.11.13-5.el9_7.i686.rpm �python3.11-debug-3.11.13-5.el9_7.x86_64.rpm �python3.11-idle-3.11.13-5.el9_7.x86_64.rpm �python3.11-test-3.11.13-5.el9_7.x86_64.rpm a�python3.11-3.11.13-5.el9_7.i686.rpm �python3.11-test-3.11.13-5.el9_7.i686.rpm �python3.11-debug-3.11.13-5.el9_7.i686.rpm b�python3.11-tkinter-3.11.13-5.el9_7.i686.rpm �python3.11-idle-3.11.13-5.el9_7.i686.rpm �python3.11-debug-3.11.13-5.el9_7.x86_64.rpm ���J�s ��X�v�WBBBBBBBBBsecurity Moderate: python3.9 security update !
��%�bhttps://access.redhat.com/errata/RHSA-2026:1478 RHSA-2026:1478 RHSA-2026:1478
https://access.redhat.com/security/cve/CVE-2025-12084 CVE-2025-12084 CVE-2025-12084 https://bugzilla.redhat.com/2418655 2418655 https://errata.almalinux.org/9/ALSA-2026-1478.html ALSA-2026:1478 ALSA-2026:1478 �>python3-debug-3.9.25-3.el9_7.i686.rpm M�>python3-3.9.25-3.el9_7.i686.rpm �>python3-test-3.9.25-3.el9_7.x86_64.rpm �>python3-idle-3.9.25-3.el9_7.i686.rpm �>python3-debug-3.9.25-3.el9_7.x86_64.rpm N�>python3-tkinter-3.9.25-3.el9_7.i686.rpm �>python3-test-3.9.25-3.el9_7.i686.rpm �>python3-idle-3.9.25-3.el9_7.x86_64.rpm �>python3-debug-3.9.25-3.el9_7.i686.rpm M�>python3-3.9.25-3.el9_7.i686.rpm �>python3-test-3.9.25-3.el9_7.x86_64.rpm �>python3-idle-3.9.25-3.el9_7.i686.rpm �>python3-debug-3.9.25-3.el9_7.x86_64.rpm N�>python3-tkinter-3.9.25-3.el9_7.i686.rpm �>python3-test-3.9.25-3.el9_7.i686.rpm �>python3-idle-3.9.25-3.el9_7.x86_64.rpm ����u�t ��nBBBBsecurity Moderate: kernel security update !
���Dhttps://access.redhat.com/errata/RHSA-2026:1617 RHSA-2026:1617 RHSA-2026:1617
https://access.redhat.com/security/cve/CVE-2025-38568 CVE-2025-38568 CVE-2025-38568 https://access.redhat.com/security/cve/CVE-2025-40154 CVE-2025-40154 CVE-2025-40154 https://access.redhat.com/security/cve/CVE-2025-40251 CVE-2025-40251 CVE-2025-40251 https://bugzilla.redhat.com/2389507 2389507 https://bugzilla.redhat.com/2414494 2414494 https://bugzilla.redhat.com/2418892 2418892 https://errata.almalinux.org/9/ALSA-2026-1617.html ALSA-2026:1617 ALSA-2026:1617 �1libperf-5.14.0-611.27.1.el9_7.x86_64.rpm �1kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm �1kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm �1libperf-5.14.0-611.27.1.el9_7.x86_64.rpm �1kernel-cross-headers-5.14.0-611.27.1.el9_7.x86_64.rpm �1kernel-tools-libs-devel-5.14.0-611.27.1.el9_7.x86_64.rpm �̖�4�u ��tBBBBsecurity Moderate: util-linux security update !
��K�https://access.redhat.com/errata/RHSA-2026:1913 RHSA-2026:1913 RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104 CVE-2025-14104 CVE-2025-14104 https://bugzilla.redhat.com/2419369 2419369 https://errata.almalinux.org/9/ALSA-2026-1913.html ALSA-2026:1913 ALSA-2026:1913 �z�Elibsmartcols-devel-2.37.4-21.el9_7.i686.rpm �s�Elibfdisk-devel-2.37.4-21.el9_7.x86_64.rpm �z�Elibsmartcols-devel-2.37.4-21.el9_7.x86_64.rpm �s�Elibfdisk-devel-2.37.4-21.el9_7.i686.rpm �z�Elibsmartcols-devel-2.37.4-21.el9_7.i686.rpm �s�Elibfdisk-devel-2.37.4-21.el9_7.x86_64.rpm �z�Elibsmartcols-devel-2.37.4-21.el9_7.x86_64.rpm �s�Elibfdisk-devel-2.37.4-21.el9_7.i686.rpm �̫�E�v ��:security Important: python3.12-wheel security update !��g�hhttps://access.redhat.com/errata/RHSA-2026:1939 RHSA-2026:1939 RHSA-2026:1939
https://access.redhat.com/security/cve/CVE-2026-24049 CVE-2026-24049 CVE-2026-24049 https://bugzilla.redhat.com/2431959 2431959 https://errata.almalinux.org/9/ALSA-2026-1939.html ALSA-2026:1939 ALSA-2026:1939 ��upython3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm ��upython3.12-wheel-wheel-0.41.2-3.el9_7.1.noarch.rpm �̫�!�w �>�{Bsecurity Important: fontforge security update !��O�thttps://access.redhat.com/errata/RHSA-2026:2039 RHSA-2026:2039 RHSA-2026:2039
https://access.redhat.com/security/cve/CVE-2025-15269 CVE-2025-15269 CVE-2025-15269 https://access.redhat.com/security/cve/CVE-2025-15275 CVE-2025-15275 CVE-2025-15275 https://access.redhat.com/security/cve/CVE-2025-15279 CVE-2025-15279 CVE-2025-15279 https://bugzilla.redhat.com/2426421 2426421 https://bugzilla.redhat.com/2426423 2426423 https://bugzilla.redhat.com/2426429 2426429 https://errata.almalinux.org/9/ALSA-2026-2039.html ALSA-2026:2039 ALSA-2026:2039 �:�Qfontforge-20201107-7.el9_7.x86_64.rpm �:�Qfontforge-20201107-7.el9_7.i686.rpm �:�Qfontforge-20201107-7.el9_7.x86_64.rpm �:�Qfontforge-20201107-7.el9_7.i686.rpm �̙�J�x ��BBBBsecurity Important: freerdp security update !��C�https://access.redhat.com/errata/RHSA-2026:2048 RHSA-2026:2048 RHSA-2026:2048
https://access.redhat.com/security/cve/CVE-2026-23530 CVE-2026-23530 CVE-2026-23530 https://access.redhat.com/security/cve/CVE-2026-23531 CVE-2026-23531 CVE-2026-23531 https://access.redhat.com/security/cve/CVE-2026-23532 CVE-2026-23532 CVE-2026-23532 https://access.redhat.com/security/cve/CVE-2026-23533 CVE-2026-23533 CVE-2026-23533 https://access.redhat.com/security/cve/CVE-2026-23534 CVE-2026-23534 CVE-2026-23534 https://access.redhat.com/security/cve/CVE-2026-23883 CVE-2026-23883 CVE-2026-23883 https://access.redhat.com/security/cve/CVE-2026-23884 CVE-2026-23884 CVE-2026-23884 https://bugzilla.redhat.com/2430877 2430877 https://bugzilla.redhat.com/2430880 2430880 https://bugzilla.redhat.com/2430885 2430885 https://bugzilla.redhat.com/2430886 2430886 https://bugzilla.redhat.com/2430887 2430887 https://bugzilla.redhat.com/2430888 2430888 https://bugzilla.redhat.com/2430891 2430891 https://errata.almalinux.org/9/ALSA-2026-2048.html ALSA-2026:2048 ALSA-2026:2048 �Ifreerdp-devel-2.11.7-1.el9_7.1.i686.rpm � �Ilibwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpm � �Ilibwinpr-devel-2.11.7-1.el9_7.1.i686.rpm �Ifreerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm �Ifreerdp-devel-2.11.7-1.el9_7.1.i686.rpm � �Ilibwinpr-devel-2.11.7-1.el9_7.1.x86_64.rpm � �Ilibwinpr-devel-2.11.7-1.el9_7.1.i686.rpm �Ifreerdp-devel-2.11.7-1.el9_7.1.x86_64.rpm �̫�u�y ��EBBBBsecurity Moderate: kernel security update !
��a�u"https://access.redhat.com/errata/RHSA-2026:2212 RHSA-2026:2212 RHSA-2026:2212
https://access.redhat.com/security/cve/CVE-2025-37789 CVE-2025-37789 CVE-2025-37789 https://access.redhat.com/security/cve/CVE-2025-37819 CVE-2025-37819 CVE-2025-37819 https://access.redhat.com/security/cve/CVE-2025-38022 CVE-2025-38022 CVE-2025-38022 https://access.redhat.com/security/cve/CVE-2025-38024 CVE-2025-38024 CVE-2025-38024 https://access.redhat.com/security/cve/CVE-2025-38403 CVE-2025-38403 CVE-2025-38403 https://access.redhat.com/security/cve/CVE-2025-38415 CVE-2025-38415 CVE-2025-38415 https://access.redhat.com/security/cve/CVE-2025-38459 CVE-2025-38459 CVE-2025-38459 https://access.redhat.com/security/cve/CVE-2025-38730 CVE-2025-38730 CVE-2025-38730 https://access.redhat.com/security/cve/CVE-2025-39760 CVE-2025-39760 CVE-2025-39760 https://access.redhat.com/security/cve/CVE-2025-40135 CVE-2025-40135 CVE-2025-40135 https://access.redhat.com/security/cve/CVE-2025-40141 CVE-2025-40141 CVE-2025-40141 https://access.redhat.com/security/cve/CVE-2025-40158 CVE-2025-40158 CVE-2025-40158 https://access.redhat.com/security/cve/CVE-2025-40170 CVE-2025-40170 CVE-2025-40170 https://access.redhat.com/security/cve/CVE-2025-40269 CVE-2025-40269 CVE-2025-40269 https://access.redhat.com/security/cve/CVE-2025-40271 CVE-2025-40271 CVE-2025-40271 https://access.redhat.com/security/cve/CVE-2025-40318 CVE-2025-40318 CVE-2025-40318 https://bugzilla.redhat.com/2363315 2363315 https://bugzilla.redhat.com/2365032 2365032 https://bugzilla.redhat.com/2373326 2373326 https://bugzilla.redhat.com/2373354 2373354 https://bugzilla.redhat.com/2383404 2383404 https://bugzilla.redhat.com/2383421 2383421 https://bugzilla.redhat.com/2383487 2383487 https://bugzilla.redhat.com/2393191 2393191 https://bugzilla.redhat.com/2394601 2394601 https://bugzilla.redhat.com/2414506 2414506 https://bugzilla.redhat.com/2414521 2414521 https://bugzilla.redhat.com/2414522 2414522 https://bugzilla.redhat.com/2414523 2414523 https://bugzilla.redhat.com/2419837 2419837 https://bugzilla.redhat.com/2419919 2419919 https://bugzilla.redhat.com/2419920 2419920 https://errata.almalinux.org/9/ALSA-2026-2212.html ALSA-2026:2212 ALSA-2026:2212 �2libperf-5.14.0-611.30.1.el9_7.x86_64.rpm �2kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm �2kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm �2libperf-5.14.0-611.30.1.el9_7.x86_64.rpm �2kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm �2kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm �̶�#�z ��KBBBBsecurity Moderate: kernel security update !
��V�https://access.redhat.com/errata/RHSA-2026:2722 RHSA-2026:2722 RHSA-2026:2722
https://access.redhat.com/security/cve/CVE-2023-53034 CVE-2023-53034 CVE-2023-53034 https://access.redhat.com/security/cve/CVE-2025-40064 CVE-2025-40064 CVE-2025-40064 https://access.redhat.com/security/cve/CVE-2025-40304 CVE-2025-40304 CVE-2025-40304 https://access.redhat.com/security/cve/CVE-2025-40322 CVE-2025-40322 CVE-2025-40322 https://access.redhat.com/security/cve/CVE-2025-68349 CVE-2025-68349 CVE-2025-68349 https://access.redhat.com/security/cve/CVE-2025-68811 CVE-2025-68811 CVE-2025-68811 https://access.redhat.com/security/cve/CVE-2026-22998 CVE-2026-22998 CVE-2026-22998 https://bugzilla.redhat.com/2360239 2360239 https://bugzilla.redhat.com/2406747 2406747 https://bugzilla.redhat.com/2419870 2419870 https://bugzilla.redhat.com/2419902 2419902 https://bugzilla.redhat.com/2424880 2424880 https://bugzilla.redhat.com/2429116 2429116 https://bugzilla.redhat.com/2432671 2432671 https://errata.almalinux.org/9/ALSA-2026-2722.html ALSA-2026:2722 ALSA-2026:2722 �3kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm �3kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm �3libperf-5.14.0-611.34.1.el9_7.x86_64.rpm �3kernel-cross-headers-5.14.0-611.34.1.el9_7.x86_64.rpm �3kernel-tools-libs-devel-5.14.0-611.34.1.el9_7.x86_64.rpm �3libperf-5.14.0-611.34.1.el9_7.x86_64.rpm ���,�{ �"�`B�qBsecurity Moderate: edk2 security update !
��m�Ghttps://access.redhat.com/errata/RHSA-2026:2776 RHSA-2026:2776 RHSA-2026:2776
https://access.redhat.com/security/cve/CVE-2025-9230 CVE-2025-9230 CVE-2025-9230 https://bugzilla.redhat.com/2396054 2396054 https://errata.almalinux.org/9/ALSA-2026-2776.html ALSA-2026:2776 ALSA-2026:2776 �L�iedk2-tools-doc-20241117-4.el9_7.3.noarch.rpm ��iedk2-tools-20241117-4.el9_7.3.x86_64.rpm � �iedk2-ovmf-20241117-4.el9_7.3.noarch.rpm �K�iedk2-aarch64-20241117-4.el9_7.3.noarch.rpm �L�iedk2-tools-doc-20241117-4.el9_7.3.noarch.rpm ��iedk2-tools-20241117-4.el9_7.3.x86_64.rpm � �iedk2-ovmf-20241117-4.el9_7.3.noarch.rpm �K�iedk2-aarch64-20241117-4.el9_7.3.noarch.rpm ��׆=�| �#�TBBBBBBBBBBBBsecurity Moderate: glibc security update !
��4�|https://access.redhat.com/errata/RHSA-2026:2786 RHSA-2026:2786 RHSA-2026:2786
https://access.redhat.com/security/cve/CVE-2025-15281 CVE-2025-15281 CVE-2025-15281 https://access.redhat.com/security/cve/CVE-2026-0861 CVE-2026-0861 CVE-2026-0861 https://access.redhat.com/security/cve/CVE-2026-0915 CVE-2026-0915 CVE-2026-0915 https://bugzilla.redhat.com/2429771 2429771 https://bugzilla.redhat.com/2430201 2430201 https://bugzilla.redhat.com/2431196 2431196 https://errata.almalinux.org/9/ALSA-2026-2786.html ALSA-2026:2786 ALSA-2026:2786 �Njglibc-static-2.34-231.el9_7.10.x86_64.rpm �_jglibc-benchtests-2.34-231.el9_7.10.x86_64.rpm �Mjglibc-nss-devel-2.34-231.el9_7.10.i686.rpm �Qjnss_db-2.34-231.el9_7.10.x86_64.rpm �Rjnss_hesiod-2.34-231.el9_7.10.i686.rpm �Mjglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpm �Qjnss_db-2.34-231.el9_7.10.i686.rpm �Njglibc-static-2.34-231.el9_7.10.i686.rpm �Rjnss_hesiod-2.34-231.el9_7.10.x86_64.rpm �Njglibc-static-2.34-231.el9_7.10.x86_64.rpm �_jglibc-benchtests-2.34-231.el9_7.10.x86_64.rpm �Mjglibc-nss-devel-2.34-231.el9_7.10.i686.rpm �Qjnss_db-2.34-231.el9_7.10.x86_64.rpm �Rjnss_hesiod-2.34-231.el9_7.10.i686.rpm �Mjglibc-nss-devel-2.34-231.el9_7.10.x86_64.rpm �Qjnss_db-2.34-231.el9_7.10.i686.rpm �Njglibc-static-2.34-231.el9_7.10.i686.rpm �Rjnss_hesiod-2.34-231.el9_7.10.x86_64.rpm ��ׄ �} �$�bBsecurity Important: munge security update !��0�}https://access.redhat.com/errata/RHSA-2026:3034 RHSA-2026:3034 RHSA-2026:3034
https://access.redhat.com/security/cve/CVE-2026-25506 CVE-2026-25506 CVE-2026-25506 https://bugzilla.redhat.com/2438715 2438715 https://errata.almalinux.org/9/ALSA-2026-3034.html ALSA-2026:3034 ALSA-2026:3034 � � munge-devel-0.5.13-14.el9_7.x86_64.rpm � � munge-devel-0.5.13-14.el9_7.i686.rpm � � munge-devel-0.5.13-14.el9_7.x86_64.rpm � � munge-devel-0.5.13-14.el9_7.i686.rpm �̀�;�~ �%�eBBBBsecurity Moderate: kernel security update !
��-�whttps://access.redhat.com/errata/RHSA-2026:3066 RHSA-2026:3066 RHSA-2026:3066
https://access.redhat.com/security/cve/CVE-2025-38129 CVE-2025-38129 CVE-2025-38129 https://access.redhat.com/security/cve/CVE-2025-38206 CVE-2025-38206 CVE-2025-38206 https://bugzilla.redhat.com/2376034 2376034 https://bugzilla.redhat.com/2376377 2376377 https://errata.almalinux.org/9/ALSA-2026-3066.html ALSA-2026:3066 ALSA-2026:3066 �4kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm �4libperf-5.14.0-611.35.1.el9_7.x86_64.rpm �4kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm �4kernel-tools-libs-devel-5.14.0-611.35.1.el9_7.x86_64.rpm �4libperf-5.14.0-611.35.1.el9_7.x86_64.rpm �4kernel-cross-headers-5.14.0-611.35.1.el9_7.x86_64.rpm �̀�� �&�kBBBBsecurity Important: freerdp security update !��$�^https://access.redhat.com/errata/RHSA-2026:3067 RHSA-2026:3067 RHSA-2026:3067
https://access.redhat.com/security/cve/CVE-2026-22855 CVE-2026-22855 CVE-2026-22855 https://access.redhat.com/security/cve/CVE-2026-22858 CVE-2026-22858 CVE-2026-22858 https://access.redhat.com/security/cve/CVE-2026-22859 CVE-2026-22859 CVE-2026-22859 https://bugzilla.redhat.com/2429645 2429645 https://bugzilla.redhat.com/2429649 2429649 https://bugzilla.redhat.com/2429653 2429653 https://errata.almalinux.org/9/ALSA-2026-3067.html ALSA-2026:3067 ALSA-2026:3067 �Jfreerdp-devel-2.11.7-1.el9_7.2.i686.rpm � �Jlibwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpm �Jfreerdp-devel-2.11.7-1.el9_7.2.x86_64.rpm � �Jlibwinpr-devel-2.11.7-1.el9_7.2.i686.rpm �Jfreerdp-devel-2.11.7-1.el9_7.2.i686.rpm � �Jlibwinpr-devel-2.11.7-1.el9_7.2.x86_64.rpm �Jfreerdp-devel-2.11.7-1.el9_7.2.x86_64.rpm � �Jlibwinpr-devel-2.11.7-1.el9_7.2.i686.rpm �̀�� �'�qBBBBBBBsecurity Important: protobuf security update !���9https://access.redhat.com/errata/RHSA-2026:3095 RHSA-2026:3095 RHSA-2026:3095
https://access.redhat.com/security/cve/CVE-2026-0994 CVE-2026-0994 CVE-2026-0994 https://bugzilla.redhat.com/2432398 2432398 https://errata.almalinux.org/9/ALSA-2026-3095.html ALSA-2026:3095 ALSA-2026:3095 �>�protobuf-devel-3.14.0-17.el9_7.i686.rpm �?�protobuf-lite-devel-3.14.0-17.el9_7.i686.rpm �=�protobuf-compiler-3.14.0-17.el9_7.x86_64.rpm �?�protobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpm �>�protobuf-devel-3.14.0-17.el9_7.x86_64.rpm �=�protobuf-compiler-3.14.0-17.el9_7.i686.rpm �>�protobuf-devel-3.14.0-17.el9_7.i686.rpm �?�protobuf-lite-devel-3.14.0-17.el9_7.i686.rpm �=�protobuf-compiler-3.14.0-17.el9_7.x86_64.rpm �?�protobuf-lite-devel-3.14.0-17.el9_7.x86_64.rpm �>�protobuf-devel-3.14.0-17.el9_7.x86_64.rpm �=�protobuf-compiler-3.14.0-17.el9_7.i686.rpm ����-� �(�zsecurity Moderate: 389-ds-base security update !
��;�https://access.redhat.com/errata/RHSA-2026:3189 RHSA-2026:3189 RHSA-2026:3189
https://access.redhat.com/security/cve/CVE-2025-14905 CVE-2025-14905 CVE-2025-14905 https://bugzilla.redhat.com/2423624 2423624 https://errata.almalinux.org/9/ALSA-2026-3189.html ALSA-2026:3189 ALSA-2026:3189 �t�B389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm �t�B389-ds-base-devel-2.7.0-10.el9_7.x86_64.rpm �̀�� �)�|BBBBsecurity Moderate: kernel security update !
��T�Zhttps://access.redhat.com/errata/RHSA-2026:3488 RHSA-2026:3488 RHSA-2026:3488
https://access.redhat.com/security/cve/CVE-2025-40168 CVE-2025-40168 CVE-2025-40168 https://access.redhat.com/security/cve/CVE-2025-71085 CVE-2025-71085 CVE-2025-71085 https://access.redhat.com/security/cve/CVE-2026-23097 CVE-2026-23097 CVE-2026-23097 https://bugzilla.redhat.com/2414482 2414482 https://bugzilla.redhat.com/2429026 2429026 https://bugzilla.redhat.com/2436802 2436802 https://errata.almalinux.org/9/ALSA-2026-3488.html ALSA-2026:3488 ALSA-2026:3488 �5libperf-5.14.0-611.36.1.el9_7.x86_64.rpm �5kernel-cross-headers-5.14.0-611.36.1.el9_7.x86_64.rpm �5kernel-tools-libs-devel-5.14.0-611.36.1.el9_7.x86_64.rpm �5libperf-5.14.0-611.36.1.el9_7.x86_64.rpm �5kernel-cross-headers-5.14.0-611.36.1.el9_7.x86_64.rpm �5kernel-tools-libs-devel-5.14.0-611.36.1.el9_7.x86_64.rpm �͠�F� �*�BBBBBBBBBBBBsecurity Important: postgresql security update !��.�https://access.redhat.com/errata/RHSA-2026:3730 RHSA-2026:3730 RHSA-2026:3730
https://access.redhat.com/security/cve/CVE-2026-2004 CVE-2026-2004 CVE-2026-2004 https://access.redhat.com/security/cve/CVE-2026-2005 CVE-2026-2005 CVE-2026-2005 https://access.redhat.com/security/cve/CVE-2026-2006 CVE-2026-2006 CVE-2026-2006 https://bugzilla.redhat.com/2439324 2439324 https://bugzilla.redhat.com/2439325 2439325 https://bugzilla.redhat.com/2439326 2439326 https://errata.almalinux.org/9/ALSA-2026-3730.html ALSA-2026:3730 ALSA-2026:3730 ��Jpostgresql-upgrade-devel-13.23-2.el9_7.x86_64.rpm ��Jpostgresql-server-devel-13.23-2.el9_7.x86_64.rpm �<�Jpostgresql-test-rpm-macros-13.23-2.el9_7.noarch.rpm ��Jpostgresql-test-13.23-2.el9_7.x86_64.rpm � �Jpostgresql-static-13.23-2.el9_7.x86_64.rpm �}�Jpostgresql-docs-13.23-2.el9_7.x86_64.rpm �~�Jpostgresql-private-devel-13.23-2.el9_7.x86_64.rpm ��Jpostgresql-upgrade-devel-13.23-2.el9_7.x86_64.rpm ��Jpostgresql-server-devel-13.23-2.el9_7.x86_64.rpm �<�Jpostgresql-test-rpm-macros-13.23-2.el9_7.noarch.rpm ��Jpostgresql-test-13.23-2.el9_7.x86_64.rpm � �Jpostgresql-static-13.23-2.el9_7.x86_64.rpm �}�Jpostgresql-docs-13.23-2.el9_7.x86_64.rpm �~�Jpostgresql-private-devel-13.23-2.el9_7.x86_64.rpm ���d� �+�OBsecurity Moderate: nfs-utils security update !
��3�@https://access.redhat.com/errata/RHSA-2026:3940 RHSA-2026:3940 RHSA-2026:3940
https://access.redhat.com/security/cve/CVE-2025-12801 CVE-2025-12801 CVE-2025-12801 https://bugzilla.redhat.com/2413081 2413081 https://errata.almalinux.org/9/ALSA-2026-3940.html ALSA-2026:3940 ALSA-2026:3940 �x�@libnfsidmap-devel-2.5.4-38.el9_7.3.x86_64.rpm �x�@libnfsidmap-devel-2.5.4-38.el9_7.3.i686.rpm �x�@libnfsidmap-devel-2.5.4-38.el9_7.3.x86_64.rpm �x�@libnfsidmap-devel-2.5.4-38.el9_7.3.i686.rpm ��ϲ!� �,�RBBBBsecurity Moderate: kernel security update !
��s�https://access.redhat.com/errata/RHSA-2026:3966 RHSA-2026:3966 RHSA-2026:3966
https://access.redhat.com/security/cve/CVE-2025-38106 CVE-2025-38106 CVE-2025-38106 https://access.redhat.com/security/cve/CVE-2026-23001 CVE-2026-23001 CVE-2026-23001 https://bugzilla.redhat.com/2376077 2376077 https://bugzilla.redhat.com/2432664 2432664 https://errata.almalinux.org/9/ALSA-2026-3966.html ALSA-2026:3966 ALSA-2026:3966 �6kernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm �6libperf-5.14.0-611.38.1.el9_7.x86_64.rpm �6kernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpm �6kernel-cross-headers-5.14.0-611.38.1.el9_7.x86_64.rpm �6libperf-5.14.0-611.38.1.el9_7.x86_64.rpm �6kernel-tools-libs-devel-5.14.0-611.38.1.el9_7.x86_64.rpm ���m� �/�mB�kBBBBBBBBBsecurity Moderate: python3.12 security update !
���`https://access.redhat.com/errata/RHSA-2026:4165 RHSA-2026:4165 RHSA-2026:4165
https://access.redhat.com/security/cve/CVE-2025-15366 CVE-2025-15366 CVE-2025-15366 https://access.redhat.com/security/cve/CVE-2025-15367 CVE-2025-15367 CVE-2025-15367 https://access.redhat.com/security/cve/CVE-2026-1299 CVE-2026-1299 CVE-2026-1299 https://bugzilla.redhat.com/2431368 2431368 https://bugzilla.redhat.com/2431373 2431373 https://bugzilla.redhat.com/2432437 2432437 https://errata.almalinux.org/9/ALSA-2026-4165.html ALSA-2026:4165 ALSA-2026:4165 �E�#python3.12-tkinter-3.12.12-4.el9_7.1.i686.rpm G�#python3.12-test-3.12.12-4.el9_7.1.i686.rpm F�#python3.12-idle-3.12.12-4.el9_7.1.i686.rpm E�#python3.12-debug-3.12.12-4.el9_7.1.x86_64.rpm �D�#python3.12-3.12.12-4.el9_7.1.i686.rpm F�#python3.12-idle-3.12.12-4.el9_7.1.x86_64.rpm G�#python3.12-test-3.12.12-4.el9_7.1.x86_64.rpm E�#python3.12-debug-3.12.12-4.el9_7.1.i686.rpm �E�#python3.12-tkinter-3.12.12-4.el9_7.1.i686.rpm G�#python3.12-test-3.12.12-4.el9_7.1.i686.rpm F�#python3.12-idle-3.12.12-4.el9_7.1.i686.rpm E�#python3.12-debug-3.12.12-4.el9_7.1.x86_64.rpm �D�#python3.12-3.12.12-4.el9_7.1.i686.rpm F�#python3.12-idle-3.12.12-4.el9_7.1.x86_64.rpm G�#python3.12-test-3.12.12-4.el9_7.1.x86_64.rpm E�#python3.12-debug-3.12.12-4.el9_7.1.i686.rpm ���\� �1�p�_�VBBBBBBBBBsecurity Moderate: python3.9 security update !
��d�` https://access.redhat.com/errata/RHSA-2026:4168 RHSA-2026:4168 RHSA-2026:4168
https://bugzilla.redhat.com/2431368 2431368 https://bugzilla.redhat.com/2431373 2431373 https://bugzilla.redhat.com/2432437 2432437 https://errata.almalinux.org/9/ALSA-2026-4168.html ALSA-2026:4168 ALSA-2026:4168 https://www.redhat.com/security/data/cve/CVE-2025-15366.html CVE-2025-15366 CVE-2025-15366 https://www.redhat.com/security/data/cve/CVE-2025-15367.html CVE-2025-15367 CVE-2025-15367 https://www.redhat.com/security/data/cve/CVE-2026-0865.html CVE-2026-0865 CVE-2026-0865 https://www.redhat.com/security/data/cve/CVE-2026-1299.html CVE-2026-1299 CVE-2026-1299 �?python3-debug-3.9.25-3.el9_7.1.i686.rpm �?python3-idle-3.9.25-3.el9_7.1.i686.rpm �?python3-test-3.9.25-3.el9_7.1.i686.rpm �?python3-test-3.9.25-3.el9_7.1.x86_64.rpm M�?python3-3.9.25-3.el9_7.1.i686.rpm �?python3-debug-3.9.25-3.el9_7.1.x86_64.rpm N�?python3-tkinter-3.9.25-3.el9_7.1.i686.rpm �?python3-idle-3.9.25-3.el9_7.1.x86_64.rpm �?python3-debug-3.9.25-3.el9_7.1.i686.rpm �?python3-idle-3.9.25-3.el9_7.1.i686.rpm �?python3-test-3.9.25-3.el9_7.1.i686.rpm �?python3-test-3.9.25-3.el9_7.1.x86_64.rpm M�?python3-3.9.25-3.el9_7.1.i686.rpm �?python3-debug-3.9.25-3.el9_7.1.x86_64.rpm N�?python3-tkinter-3.9.25-3.el9_7.1.i686.rpm �?python3-idle-3.9.25-3.el9_7.1.x86_64.rpm ��ϰ*� �4�rB�|BBBBBBBBBsecurity Moderate: python3.11 security update !
��D�`https://access.redhat.com/errata/RHSA-2026:4216 RHSA-2026:4216 RHSA-2026:4216
https://access.redhat.com/security/cve/CVE-2025-15366 CVE-2025-15366 CVE-2025-15366 https://access.redhat.com/security/cve/CVE-2025-15367 CVE-2025-15367 CVE-2025-15367 https://access.redhat.com/security/cve/CVE-2026-1299 CVE-2026-1299 CVE-2026-1299 https://bugzilla.redhat.com/2431368 2431368 https://bugzilla.redhat.com/2431373 2431373 https://bugzilla.redhat.com/2432437 2432437 https://errata.almalinux.org/9/ALSA-2026-4216.html ALSA-2026:4216 ALSA-2026:4216 �python3.11-debug-3.11.13-5.1.el9_7.x86_64.rpm �python3.11-idle-3.11.13-5.1.el9_7.x86_64.rpm �python3.11-debug-3.11.13-5.1.el9_7.i686.rpm �python3.11-test-3.11.13-5.1.el9_7.i686.rpm b�python3.11-tkinter-3.11.13-5.1.el9_7.i686.rpm �python3.11-idle-3.11.13-5.1.el9_7.i686.rpm a�python3.11-3.11.13-5.1.el9_7.i686.rpm �python3.11-test-3.11.13-5.1.el9_7.x86_64.rpm �python3.11-debug-3.11.13-5.1.el9_7.x86_64.rpm �python3.11-idle-3.11.13-5.1.el9_7.x86_64.rpm �python3.11-debug-3.11.13-5.1.el9_7.i686.rpm �python3.11-test-3.11.13-5.1.el9_7.i686.rpm b�python3.11-tkinter-3.11.13-5.1.el9_7.i686.rpm �python3.11-idle-3.11.13-5.1.el9_7.i686.rpm a�python3.11-3.11.13-5.1.el9_7.i686.rpm �python3.11-test-3.11.13-5.1.el9_7.x86_64.rpm ��ϭ=� �5�ysecurity Important: .NET 10.0 security update !��$�*https://access.redhat.com/errata/RHSA-2026:4445 RHSA-2026:4445 RHSA-2026:4445
https://access.redhat.com/security/cve/CVE-2026-26127 CVE-2026-26127 CVE-2026-26127 https://access.redhat.com/security/cve/CVE-2026-26130 CVE-2026-26130 CVE-2026-26130 https://bugzilla.redhat.com/2446098 2446098 https://bugzilla.redhat.com/2446134 2446134 https://errata.almalinux.org/9/ALSA-2026-4445.html ALSA-2026:4445 ALSA-2026:4445 ��7dotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7.x86_64.rpm ��7dotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7.x86_64.rpm ����<�
�6�{Bsecurity Important: libvpx security update !��N�9https://access.redhat.com/errata/RHSA-2026:4447 RHSA-2026:4447 RHSA-2026:4447
https://access.redhat.com/security/cve/CVE-2026-2447 CVE-2026-2447 CVE-2026-2447 https://bugzilla.redhat.com/2440219 2440219 https://errata.almalinux.org/9/ALSA-2026-4447.html ALSA-2026:4447 ALSA-2026:4447 ��8libvpx-devel-1.9.0-10.el9_7.i686.rpm ��8libvpx-devel-1.9.0-10.el9_7.x86_64.rpm ��8libvpx-devel-1.9.0-10.el9_7.i686.rpm ��8libvpx-devel-1.9.0-10.el9_7.x86_64.rpm ����H� �7�~security Important: .NET 8.0 security update !���_https://access.redhat.com/errata/RHSA-2026:4454 RHSA-2026:4454 RHSA-2026:4454
https://access.redhat.com/security/cve/CVE-2026-26130 CVE-2026-26130 CVE-2026-26130 https://bugzilla.redhat.com/2446134 2446134 https://errata.almalinux.org/9/ALSA-2026-4454.html ALSA-2026:4454 ALSA-2026:4454 ��{dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7.x86_64.rpm ��{dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7.x86_64.rpm ��Ϭ$� �8�@security Important: .NET 9.0 security update !��f�)https://access.redhat.com/errata/RHSA-2026:4456 RHSA-2026:4456 RHSA-2026:4456
https://access.redhat.com/security/cve/CVE-2026-26127 CVE-2026-26127 CVE-2026-26127 https://access.redhat.com/security/cve/CVE-2026-26130 CVE-2026-26130 CVE-2026-26130 https://bugzilla.redhat.com/2446098 2446098 https://bugzilla.redhat.com/2446134 2446134 https://errata.almalinux.org/9/ALSA-2026-4456.html ALSA-2026:4456 ALSA-2026:4456 �^�dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7.x86_64.rpm �^�dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7.x86_64.rpm �����
�9�BBBBBsecurity Moderate: kernel security update !
���https://access.redhat.com/errata/RHSA-2026:4759 RHSA-2026:4759 RHSA-2026:4759
https://access.redhat.com/security/cve/CVE-2025-39818 CVE-2025-39818 CVE-2025-39818 https://access.redhat.com/security/cve/CVE-2025-68800 CVE-2025-68800 CVE-2025-68800 https://bugzilla.redhat.com/2395797 2395797 https://bugzilla.redhat.com/2429065 2429065 https://errata.almalinux.org/9/ALSA-2026-4759.html ALSA-2026:4759 ALSA-2026:4759 �7kernel-tools-libs-devel-5.14.0-611.41.1.el9_7.x86_64.rpm �7kernel-cross-headers-5.14.0-611.41.1.el9_7.x86_64.rpm �7libperf-5.14.0-611.41.1.el9_7.x86_64.rpm �7kernel-tools-libs-devel-5.14.0-611.41.1.el9_7.x86_64.rpm �7kernel-cross-headers-5.14.0-611.41.1.el9_7.x86_64.rpm �7libperf-5.14.0-611.41.1.el9_7.x86_64.rpm ����g� �:�HBBsecurity Moderate: mysql security update !
���Ahttps://access.redhat.com/errata/RHSA-2026:4828 RHSA-2026:4828 RHSA-2026:4828
https://access.redhat.com/security/cve/CVE-2026-21936 CVE-2026-21936 CVE-2026-21936 https://access.redhat.com/security/cve/CVE-2026-21937 CVE-2026-21937 CVE-2026-21937 https://access.redhat.com/security/cve/CVE-2026-21941 CVE-2026-21941 CVE-2026-21941 https://access.redhat.com/security/cve/CVE-2026-21948 CVE-2026-21948 CVE-2026-21948 https://access.redhat.com/security/cve/CVE-2026-21964 CVE-2026-21964 CVE-2026-21964 https://access.redhat.com/security/cve/CVE-2026-21968 CVE-2026-21968 CVE-2026-21968 https://bugzilla.redhat.com/2431384 2431384 https://bugzilla.redhat.com/2431385 2431385 https://bugzilla.redhat.com/2431402 2431402 https://bugzilla.redhat.com/2431409 2431409 https://bugzilla.redhat.com/2431413 2431413 https://bugzilla.redhat.com/2431431 2431431 https://errata.almalinux.org/9/ALSA-2026-4828.html ALSA-2026:4828 ALSA-2026:4828 �+�mysql-test-8.0.45-1.el9_7.x86_64.rpm �*�mysql-devel-8.0.45-1.el9_7.x86_64.rpm �+�mysql-test-8.0.45-1.el9_7.x86_64.rpm �*�mysql-devel-8.0.45-1.el9_7.x86_64.rpm ���>� �;�LBBBBsecurity Important: capstone security update !��T�Thttps://access.redhat.com/errata/RHSA-2026:4898 RHSA-2026:4898 RHSA-2026:4898
https://access.redhat.com/security/cve/CVE-2025-67873 CVE-2025-67873 CVE-2025-67873 https://access.redhat.com/security/cve/CVE-2025-68114 CVE-2025-68114 CVE-2025-68114 https://bugzilla.redhat.com/2423416 2423416 https://bugzilla.redhat.com/2423419 2423419 https://errata.almalinux.org/9/ALSA-2026-4898.html ALSA-2026:4898 ALSA-2026:4898 �n�]capstone-devel-4.0.2-11.el9_7.i686.rpm �k�]python3-capstone-4.0.2-11.el9_7.x86_64.rpm �n�]capstone-devel-4.0.2-11.el9_7.x86_64.rpm ��]capstone-java-4.0.2-11.el9_7.noarch.rpm �n�]capstone-devel-4.0.2-11.el9_7.i686.rpm �k�]python3-capstone-4.0.2-11.el9_7.x86_64.rpm �n�]capstone-devel-4.0.2-11.el9_7.x86_64.rpm ��]capstone-java-4.0.2-11.el9_7.noarch.rpm ���V� �<�Rsecurity Moderate: nginx security update !
��(�Lhttps://access.redhat.com/errata/RHSA-2026:5599 RHSA-2026:5599 RHSA-2026:5599
https://access.redhat.com/security/cve/CVE-2026-1642 CVE-2026-1642 CVE-2026-1642 https://bugzilla.redhat.com/2436738 2436738 https://errata.almalinux.org/9/ALSA-2026-5599.html ALSA-2026:5599 ALSA-2026:5599 ��Enginx-mod-devel-1.20.1-24.el9_7.1.alma.1.x86_64.rpm ��Enginx-mod-devel-1.20.1-24.el9_7.1.alma.1.x86_64.rpm ��� ��TBsecurity Moderate: opencryptoki security update !
��t�[https://access.redhat.com/errata/RHSA-2026:5603 RHSA-2026:5603 RHSA-2026:5603
https://access.redhat.com/security/cve/CVE-2026-23893 CVE-2026-23893 CVE-2026-23893 https://bugzilla.redhat.com/2431909 2431909 https://errata.almalinux.org/9/ALSA-2026-5603.html ALSA-2026:5603 ALSA-2026:5603 �e�[opencryptoki-devel-3.25.0-4.el9_7.2.i686.rpm �e�[opencryptoki-devel-3.25.0-4.el9_7.2.x86_64.rpm �e�[opencryptoki-devel-3.25.0-4.el9_7.2.i686.rpm �e�[opencryptoki-devel-3.25.0-4.el9_7.2.x86_64.rpm ��d� �=�WBBBBsecurity Important: freerdp security update !��O�https://access.redhat.com/errata/RHSA-2026:6004 RHSA-2026:6004 RHSA-2026:6004
https://access.redhat.com/security/cve/CVE-2026-26955 CVE-2026-26955 CVE-2026-26955 https://access.redhat.com/security/cve/CVE-2026-26965 CVE-2026-26965 CVE-2026-26965 https://bugzilla.redhat.com/2442959 2442959 https://bugzilla.redhat.com/2443132 2443132 https://errata.almalinux.org/9/ALSA-2026-6004.html ALSA-2026:6004 ALSA-2026:6004 � �Klibwinpr-devel-2.11.7-1.el9_7.3.i686.rpm �Kfreerdp-devel-2.11.7-1.el9_7.3.x86_64.rpm � �Klibwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpm �Kfreerdp-devel-2.11.7-1.el9_7.3.i686.rpm � �Klibwinpr-devel-2.11.7-1.el9_7.3.i686.rpm �Kfreerdp-devel-2.11.7-1.el9_7.3.x86_64.rpm � �Klibwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpm �Kfreerdp-devel-2.11.7-1.el9_7.3.i686.rpm �ή�!� �>�]BBBBsecurity Moderate: kernel security update !
��b�<https://access.redhat.com/errata/RHSA-2026:6153 RHSA-2026:6153 RHSA-2026:6153
https://access.redhat.com/security/cve/CVE-2025-38180 CVE-2025-38180 CVE-2025-38180 https://access.redhat.com/security/cve/CVE-2025-40096 CVE-2025-40096 CVE-2025-40096 https://access.redhat.com/security/cve/CVE-2026-23144 CVE-2026-23144 CVE-2026-23144 https://access.redhat.com/security/cve/CVE-2026-23171 CVE-2026-23171 CVE-2026-23171 https://access.redhat.com/security/cve/CVE-2026-23191 CVE-2026-23191 CVE-2026-23191 https://access.redhat.com/security/cve/CVE-2026-23193 CVE-2026-23193 CVE-2026-23193 https://access.redhat.com/security/cve/CVE-2026-23204 CVE-2026-23204 CVE-2026-23204 https://access.redhat.com/security/cve/CVE-2026-23209 CVE-2026-23209 CVE-2026-23209 https://bugzilla.redhat.com/2376376 2376376 https://bugzilla.redhat.com/2407333 2407333 https://bugzilla.redhat.com/2439872 2439872 https://bugzilla.redhat.com/2439886 2439886 https://bugzilla.redhat.com/2439887 2439887 https://bugzilla.redhat.com/2439900 2439900 https://bugzilla.redhat.com/2439931 2439931 https://bugzilla.redhat.com/2439947 2439947 https://errata.almalinux.org/9/ALSA-2026-6153.html ALSA-2026:6153 ALSA-2026:6153 �8kernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm �8kernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm �8libperf-5.14.0-611.45.1.el9_7.x86_64.rpm �8kernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm �8kernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm �8libperf-5.14.0-611.45.1.el9_7.x86_64.rpm �� ��B�dBBBBBBBBBsecurity Important: python3.12 security update !���Yhttps://access.redhat.com/errata/RHSA-2026:6285 RHSA-2026:6285 RHSA-2026:6285
https://access.redhat.com/security/cve/CVE-2026-4519 CVE-2026-4519 CVE-2026-4519 https://bugzilla.redhat.com/2449649 2449649 https://errata.almalinux.org/9/ALSA-2026-6285.html ALSA-2026:6285 ALSA-2026:6285 �E�$python3.12-tkinter-3.12.12-4.el9_7.2.i686.rpm G�$python3.12-test-3.12.12-4.el9_7.2.x86_64.rpm F�$python3.12-idle-3.12.12-4.el9_7.2.x86_64.rpm F�$python3.12-idle-3.12.12-4.el9_7.2.i686.rpm G�$python3.12-test-3.12.12-4.el9_7.2.i686.rpm E�$python3.12-debug-3.12.12-4.el9_7.2.i686.rpm E�$python3.12-debug-3.12.12-4.el9_7.2.x86_64.rpm �D�$python3.12-3.12.12-4.el9_7.2.i686.rpm �E�$python3.12-tkinter-3.12.12-4.el9_7.2.i686.rpm G�$python3.12-test-3.12.12-4.el9_7.2.x86_64.rpm F�$python3.12-idle-3.12.12-4.el9_7.2.x86_64.rpm F�$python3.12-idle-3.12.12-4.el9_7.2.i686.rpm G�$python3.12-test-3.12.12-4.el9_7.2.i686.rpm E�$python3.12-debug-3.12.12-4.el9_7.2.i686.rpm E�$python3.12-debug-3.12.12-4.el9_7.2.x86_64.rpm �D�$python3.12-3.12.12-4.el9_7.2.i686.rpm �γ�=� ��BB�lBBBBBBBBBsecurity Important: python3.11 security update !��w�Yhttps://access.redhat.com/errata/RHSA-2026:6286 RHSA-2026:6286 RHSA-2026:6286
https://access.redhat.com/security/cve/CVE-2026-4519 CVE-2026-4519 CVE-2026-4519 https://bugzilla.redhat.com/2449649 2449649 https://errata.almalinux.org/9/ALSA-2026-6286.html ALSA-2026:6286 ALSA-2026:6286 �python3.11-debug-3.11.13-5.2.el9_7.x86_64.rpm �python3.11-idle-3.11.13-5.2.el9_7.i686.rpm �python3.11-idle-3.11.13-5.2.el9_7.x86_64.rpm b�python3.11-tkinter-3.11.13-5.2.el9_7.i686.rpm �python3.11-test-3.11.13-5.2.el9_7.i686.rpm �python3.11-debug-3.11.13-5.2.el9_7.i686.rpm a�python3.11-3.11.13-5.2.el9_7.i686.rpm �python3.11-test-3.11.13-5.2.el9_7.x86_64.rpm �python3.11-debug-3.11.13-5.2.el9_7.x86_64.rpm �python3.11-idle-3.11.13-5.2.el9_7.i686.rpm �python3.11-idle-3.11.13-5.2.el9_7.x86_64.rpm b�python3.11-tkinter-3.11.13-5.2.el9_7.i686.rpm �python3.11-test-3.11.13-5.2.el9_7.i686.rpm �python3.11-debug-3.11.13-5.2.el9_7.i686.rpm a�python3.11-3.11.13-5.2.el9_7.i686.rpm �python3.11-test-3.11.13-5.2.el9_7.x86_64.rpm �γ�,� ��yBsecurity Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update !��P�https://access.redhat.com/errata/RHSA-2026:6300 RHSA-2026:6300 RHSA-2026:6300
https://access.redhat.com/security/cve/CVE-2026-2920 CVE-2026-2920 CVE-2026-2920 https://access.redhat.com/security/cve/CVE-2026-2921 CVE-2026-2921 CVE-2026-2921 https://access.redhat.com/security/cve/CVE-2026-2922 CVE-2026-2922 CVE-2026-2922 https://access.redhat.com/security/cve/CVE-2026-2923 CVE-2026-2923 CVE-2026-2923 https://access.redhat.com/security/cve/CVE-2026-3082 CVE-2026-3082 CVE-2026-3082 https://access.redhat.com/security/cve/CVE-2026-3083 CVE-2026-3083 CVE-2026-3083 https://access.redhat.com/security/cve/CVE-2026-3085 CVE-2026-3085 CVE-2026-3085 https://bugzilla.redhat.com/2447490 2447490 https://bugzilla.redhat.com/2447492 2447492 https://bugzilla.redhat.com/2447495 2447495 https://bugzilla.redhat.com/2447496 2447496 https://bugzilla.redhat.com/2447498 2447498 https://bugzilla.redhat.com/2447500 2447500 https://bugzilla.redhat.com/2447503 2447503 https://errata.almalinux.org/9/ALSA-2026-6300.html ALSA-2026:6300 ALSA-2026:6300 �`�0gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.i686.rpm �`�0gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.x86_64.rpm �`�0gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.i686.rpm �`�0gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7.x86_64.rpm �ο�5� ��|BBBBsecurity Important: freerdp security update !��[�https://access.redhat.com/errata/RHSA-2026:6340 RHSA-2026:6340 RHSA-2026:6340
https://access.redhat.com/security/cve/CVE-2026-22852 CVE-2026-22852 CVE-2026-22852 https://access.redhat.com/security/cve/CVE-2026-22854 CVE-2026-22854 CVE-2026-22854 https://access.redhat.com/security/cve/CVE-2026-22856 CVE-2026-22856 CVE-2026-22856 https://access.redhat.com/security/cve/CVE-2026-23732 CVE-2026-23732 CVE-2026-23732 https://access.redhat.com/security/cve/CVE-2026-23948 CVE-2026-23948 CVE-2026-23948 https://access.redhat.com/security/cve/CVE-2026-24491 CVE-2026-24491 CVE-2026-24491 https://access.redhat.com/security/cve/CVE-2026-24675 CVE-2026-24675 CVE-2026-24675 https://access.redhat.com/security/cve/CVE-2026-24676 CVE-2026-24676 CVE-2026-24676 https://access.redhat.com/security/cve/CVE-2026-24679 CVE-2026-24679 CVE-2026-24679 https://access.redhat.com/security/cve/CVE-2026-24681 CVE-2026-24681 CVE-2026-24681 https://access.redhat.com/security/cve/CVE-2026-24683 CVE-2026-24683 CVE-2026-24683 https://access.redhat.com/security/cve/CVE-2026-24684 CVE-2026-24684 CVE-2026-24684 https://access.redhat.com/security/cve/CVE-2026-31806 CVE-2026-31806 CVE-2026-31806 https://bugzilla.redhat.com/2429650 2429650 https://bugzilla.redhat.com/2429652 2429652 https://bugzilla.redhat.com/2429654 2429654 https://bugzilla.redhat.com/2430881 2430881 https://bugzilla.redhat.com/2438201 2438201 https://bugzilla.redhat.com/2438202 2438202 https://bugzilla.redhat.com/2438207 2438207 https://bugzilla.redhat.com/2438208 2438208 https://bugzilla.redhat.com/2438210 2438210 https://bugzilla.redhat.com/2438216 2438216 https://bugzilla.redhat.com/2438217 2438217 https://bugzilla.redhat.com/2438221 2438221 https://bugzilla.redhat.com/2447376 2447376 https://errata.almalinux.org/9/ALSA-2026-6340.html ALSA-2026:6340 ALSA-2026:6340 � �Llibwinpr-devel-2.11.7-1.el9_7.5.x86_64.rpm �Lfreerdp-devel-2.11.7-1.el9_7.5.x86_64.rpm �Lfreerdp-devel-2.11.7-1.el9_7.5.i686.rpm � �Llibwinpr-devel-2.11.7-1.el9_7.5.i686.rpm � �Llibwinpr-devel-2.11.7-1.el9_7.5.x86_64.rpm �Lfreerdp-devel-2.11.7-1.el9_7.5.x86_64.rpm �Lfreerdp-devel-2.11.7-1.el9_7.5.i686.rpm � �Llibwinpr-devel-2.11.7-1.el9_7.5.i686.rpm �θ�5� ��BBBBBsecurity Moderate: kernel security update !
��]�
https://access.redhat.com/errata/RHSA-2026:6570 RHSA-2026:6570 RHSA-2026:6570
https://access.redhat.com/security/cve/CVE-2025-38109 CVE-2025-38109 CVE-2025-38109 https://access.redhat.com/security/cve/CVE-2026-23111 CVE-2026-23111 CVE-2026-23111 https://access.redhat.com/security/cve/CVE-2026-23210 CVE-2026-23210 CVE-2026-23210 https://access.redhat.com/security/cve/CVE-2026-23231 CVE-2026-23231 CVE-2026-23231 https://bugzilla.redhat.com/2376101 2376101 https://bugzilla.redhat.com/2439687 2439687 https://bugzilla.redhat.com/2439895 2439895 https://bugzilla.redhat.com/2444376 2444376 https://errata.almalinux.org/9/ALSA-2026-6570.html ALSA-2026:6570 ALSA-2026:6570 �9libperf-5.14.0-611.47.1.el9_7.x86_64.rpm �9kernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm �9kernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm �9libperf-5.14.0-611.47.1.el9_7.x86_64.rpm �9kernel-tools-libs-devel-5.14.0-611.47.1.el9_7.x86_64.rpm �9kernel-cross-headers-5.14.0-611.47.1.el9_7.x86_64.rpm ���� ��HBsecurity Important: fontforge security update !��o�https://access.redhat.com/errata/RHSA-2026:6628 RHSA-2026:6628 RHSA-2026:6628
https://access.redhat.com/security/cve/CVE-2025-15270 CVE-2025-15270 CVE-2025-15270 https://bugzilla.redhat.com/2426434 2426434 https://errata.almalinux.org/9/ALSA-2026-6628.html ALSA-2026:6628 ALSA-2026:6628 �:�Rfontforge-20201107-8.el9_7.i686.rpm �:�Rfontforge-20201107-8.el9_7.x86_64.rpm �:�Rfontforge-20201107-8.el9_7.i686.rpm �:�Rfontforge-20201107-8.el9_7.x86_64.rpm ���4� � �H�I�}BBBBBBBBBsecurity Important: python3.9 security update !��~�Yhttps://access.redhat.com/errata/RHSA-2026:6766 RHSA-2026:6766 RHSA-2026:6766
https://access.redhat.com/security/cve/CVE-2026-4519 CVE-2026-4519 CVE-2026-4519 https://bugzilla.redhat.com/2449649 2449649 https://errata.almalinux.org/9/ALSA-2026-6766.html ALSA-2026:6766 ALSA-2026:6766 �@python3-test-3.9.25-3.el9_7.2.i686.rpm �@python3-debug-3.9.25-3.el9_7.2.i686.rpm �@python3-test-3.9.25-3.el9_7.2.x86_64.rpm �@python3-debug-3.9.25-3.el9_7.2.x86_64.rpm �@python3-idle-3.9.25-3.el9_7.2.x86_64.rpm M�@python3-3.9.25-3.el9_7.2.i686.rpm N�@python3-tkinter-3.9.25-3.el9_7.2.i686.rpm �@python3-idle-3.9.25-3.el9_7.2.i686.rpm �@python3-test-3.9.25-3.el9_7.2.i686.rpm �@python3-debug-3.9.25-3.el9_7.2.i686.rpm �@python3-test-3.9.25-3.el9_7.2.x86_64.rpm �@python3-debug-3.9.25-3.el9_7.2.x86_64.rpm �@python3-idle-3.9.25-3.el9_7.2.x86_64.rpm M�@python3-3.9.25-3.el9_7.2.i686.rpm N�@python3-tkinter-3.9.25-3.el9_7.2.i686.rpm �@python3-idle-3.9.25-3.el9_7.2.i686.rpm ���y� �
�Wsecurity Important: nginx security update !��W�
https://access.redhat.com/errata/RHSA-2026:7002 RHSA-2026:7002 RHSA-2026:7002
https://access.redhat.com/security/cve/CVE-2026-27651 CVE-2026-27651 CVE-2026-27651 https://access.redhat.com/security/cve/CVE-2026-27654 CVE-2026-27654 CVE-2026-27654 https://access.redhat.com/security/cve/CVE-2026-27784 CVE-2026-27784 CVE-2026-27784 https://access.redhat.com/security/cve/CVE-2026-32647 CVE-2026-32647 CVE-2026-32647 https://bugzilla.redhat.com/2449598 2449598 https://bugzilla.redhat.com/2450776 2450776 https://bugzilla.redhat.com/2450785 2450785 https://bugzilla.redhat.com/2450791 2450791 https://errata.almalinux.org/9/ALSA-2026-7002.html ALSA-2026:7002 ALSA-2026:7002 ��Fnginx-mod-devel-1.20.1-24.el9_7.2.alma.1.x86_64.rpm ��Fnginx-mod-devel-1.20.1-24.el9_7.2.alma.1.x86_64.rpm ���� ��YBBBsecurity Important: nghttp2 security update !��q�.https://access.redhat.com/errata/RHSA-2026:7668 RHSA-2026:7668 RHSA-2026:7668
https://access.redhat.com/security/cve/CVE-2026-27135 CVE-2026-27135 CVE-2026-27135 https://bugzilla.redhat.com/2448754 2448754 https://errata.almalinux.org/9/ALSA-2026-7668.html ALSA-2026:7668 ALSA-2026:7668 ��Plibnghttp2-devel-1.43.0-6.el9_7.1.i686.rpm �~�Pnghttp2-1.43.0-6.el9_7.1.x86_64.rpm ��Plibnghttp2-devel-1.43.0-6.el9_7.1.x86_64.rpm ��Plibnghttp2-devel-1.43.0-6.el9_7.1.i686.rpm �~�Pnghttp2-1.43.0-6.el9_7.1.x86_64.rpm ��Plibnghttp2-devel-1.43.0-6.el9_7.1.x86_64.rpm ���j� ��K�TBBBsecurity Important: bind9.18 security update !��� https://access.redhat.com/errata/RHSA-2026:7915 RHSA-2026:7915 RHSA-2026:7915
https://access.redhat.com/security/cve/CVE-2026-1519 CVE-2026-1519 CVE-2026-1519 https://bugzilla.redhat.com/2451305 2451305 https://errata.almalinux.org/9/ALSA-2026-7915.html ALSA-2026:7915 ALSA-2026:7915 ��\bind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpm �{�\bind9.18-libs-9.18.29-5.el9_7.4.i686.rpm �A�\bind9.18-doc-9.18.29-5.el9_7.4.noarch.rpm ��\bind9.18-devel-9.18.29-5.el9_7.4.i686.rpm ��\bind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpm �{�\bind9.18-libs-9.18.29-5.el9_7.4.i686.rpm �A�\bind9.18-doc-9.18.29-5.el9_7.4.noarch.rpm ��\bind9.18-devel-9.18.29-5.el9_7.4.i686.rpm ���3� ��M�WBBBsecurity Important: bind security update !���Zhttps://access.redhat.com/errata/RHSA-2026:8075 RHSA-2026:8075 RHSA-2026:8075
https://access.redhat.com/security/cve/CVE-2026-1519 CVE-2026-1519 CVE-2026-1519 https://bugzilla.redhat.com/2451305 2451305 https://errata.almalinux.org/9/ALSA-2026-8075.html ALSA-2026:8075 ALSA-2026:8075 O�Wbind-devel-9.16.23-34.el9_7.2.x86_64.rpm �^�Wbind-libs-9.16.23-34.el9_7.2.i686.rpm ��Wbind-doc-9.16.23-34.el9_7.2.noarch.rpm O�Wbind-devel-9.16.23-34.el9_7.2.i686.rpm O�Wbind-devel-9.16.23-34.el9_7.2.x86_64.rpm �^�Wbind-libs-9.16.23-34.el9_7.2.i686.rpm ��Wbind-doc-9.16.23-34.el9_7.2.noarch.rpm O�Wbind-devel-9.16.23-34.el9_7.2.i686.rpm ���?� ��hBBBBsecurity Important: freerdp security update !��y�https://access.redhat.com/errata/RHSA-2026:8457 RHSA-2026:8457 RHSA-2026:8457
https://access.redhat.com/security/cve/CVE-2026-33983 CVE-2026-33983 CVE-2026-33983 https://access.redhat.com/security/cve/CVE-2026-33984 CVE-2026-33984 CVE-2026-33984 https://bugzilla.redhat.com/2453219 2453219 https://bugzilla.redhat.com/2453220 2453220 https://errata.almalinux.org/9/ALSA-2026-8457.html ALSA-2026:8457 ALSA-2026:8457 � �Mlibwinpr-devel-2.11.7-1.el9_7.6.i686.rpm �Mfreerdp-devel-2.11.7-1.el9_7.6.i686.rpm �Mfreerdp-devel-2.11.7-1.el9_7.6.x86_64.rpm � �Mlibwinpr-devel-2.11.7-1.el9_7.6.x86_64.rpm � �Mlibwinpr-devel-2.11.7-1.el9_7.6.i686.rpm �Mfreerdp-devel-2.11.7-1.el9_7.6.i686.rpm �Mfreerdp-devel-2.11.7-1.el9_7.6.x86_64.rpm � �Mlibwinpr-devel-2.11.7-1.el9_7.6.x86_64.rpm �ψ�D� ��nsecurity Important: .NET 8.0 security update !���o
https://access.redhat.com/errata/RHSA-2026:8469 RHSA-2026:8469 RHSA-2026:8469
https://access.redhat.com/security/cve/CVE-2026-26171 CVE-2026-26171 CVE-2026-26171 https://access.redhat.com/security/cve/CVE-2026-32178 CVE-2026-32178 CVE-2026-32178 https://access.redhat.com/security/cve/CVE-2026-32203 CVE-2026-32203 CVE-2026-32203 https://access.redhat.com/security/cve/CVE-2026-33116 CVE-2026-33116 CVE-2026-33116 https://bugzilla.redhat.com/2457739 2457739 https://bugzilla.redhat.com/2457740 2457740 https://bugzilla.redhat.com/2457741 2457741 https://bugzilla.redhat.com/2457781 2457781 https://errata.almalinux.org/9/ALSA-2026-8469.html ALSA-2026:8469 ALSA-2026:8469 ��|dotnet-sdk-8.0-source-built-artifacts-8.0.126-1.el9_7.x86_64.rpm ��|dotnet-sdk-8.0-source-built-artifacts-8.0.126-1.el9_7.x86_64.rpm �ψ� � N�For detailed information �changes� this release, see�e AlmaLinux R� Not�0link�Nfrom�'Referenc�sec�^. T�grub2 packa�gprovide vers��2 of�?Grand Unifi�VBoot Loader (GRUB), a highly configurable �5customiz�b�:l�:with modular archit��ure. ����support�bvariety��kernel �.s, fi�]system�
compute�Vs,��hardware�uvi�.
�mshim�r�é�ns�rfirst-st�UEFI�that h�Tl����ining to�7tru����ull�3un���ur�environment��S�i��Fix(es):
*��: Integ�Bflow��_net_recv_ip4_��ets (CVE-2022-28733)�HCraf��PNG�aysca�=im�nmay �Kd��out-of-bo�rs wr�J�sheap�^1-3695�]�S�R�Qd��7huffma��)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��split HTTP�Id�/�n4�M�[_lock�X�B��l��s non-��i�D��e�*d�Q�buse-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H�+�mo�F��+b�ګ[s��issue(s�inclu�[� im��t�4CVSS sc�G�
cknow�g�
��o�/r�a���,����1�R����g�m�s�,�
��w�f��3�S�!,����wany�oper����v���C: Sma��ڡ8�b siz��TCP sourc���gen�^�algor�+m���*�k�1012)�{rac��di�-�qp��_ev�f_�ƤT�|priv���Je��^�Y729�Ya��c����sub�$���l�r��t966�tb��mIP�� ESP�wans�co���76�K�
Bug�`make SHA512_���.s�CRYPTO_USER�4��-��(BZ#207264�SR-IOV���n�*> 50%��d��34830�3fix �a�rup�ia�
d by dm�gt�=�F�98218�_SC�1cli�$-s�jpeeloff�ns [al�(�_-9]�<404�N�#��n� f��in��asymmetric�<u��itu¼8548��F�6�h�fMultipl�jT VMs ea�B��vCPUs�E��6spec:����para��too�X�hd�-9�u��c������ ���eeh_pse��s ob�v���vm�oi�!t�=p�d,�kdump���ggere�n225�%Mark�C �X NIC d�j�vs�mai���7638)�lib�2 ve�
� mm�L�rary��cre��r��sev�l dif��t
st��7�K� �KGNU�r� pio�/ISO ��0 CD-ROM�z.
L��is �f��Jy�'bsdta��til�t,��rip�l�Au�bin�ws
su�$��
yth�~��pop�
desktop�`
�ag�����J: an�< �+via�Mmpon�+ zipx_lzma_al�_�B
t
�62���7�
�<�
�l�inp��i�P�J�;���-�M�b �6
�rs��ap�{ c��s�Ene�Ndir�sly�H�����X���%:�� st�
vul�b�R��
�
$215� java-11-� jdk�%�<O�JDK 11 J�/ Runtime E�����+Soft�
D�rlop�,Kit�
fo�"��xhave��up���a ��r��w�:�(11.0.16�8).�]77����: ���Krun�y���BXa�b-J (JAXP, 82�h07�y3416�5 �Oclass�il�N(Hotspot�F1859�1�X�F�&r�
����I�
Me��dH�[.invokeBasic��a� �a1� rh1991003�Bt�br�*�Rn.��.pkcs�wr�Yer.PKCS�getIn��^�7�,��P�[�9�e�z�GretKey�e/im���/�don'�d�CKA_SIGN at��bu�@FIPS�e�{107�ǡ{R�t� s�� �v���1t�q���e�etoge���v�5�h.8.0�-8�,�*�T+��(�.342.b���06�$08�/���V/�z��95�V.�u�-7�X7�X�+�T,��(17�(4�W9�&�a�N�ex�
ia����L�i��J3875�J9�qPr�ous���Cs�r��a�I��he�Wgu���vss����i��rd��fac��������i������Ha�~�#m���\�mo�i�*����5at��
whi�nde��d���� r�=�\��!e���3����
�<���s�/W�0p�v,�Lc�z��q��wou��������la���� ���e�U�`����w�ced�a�
�IN�����c�P�a53��ޢ/r��>���V wa�����������requi�~u�Tbo�h-D��}�HeS�LP�BF�4=���<-D�.��.fips=f� e�=�,�ڢa�n�{����c�b��tr���{�F�1l�,����ha�}�
r������I�� ��7�fe��,�Ṇ��-�1��@�r��=a �M�� �a���e�
�s�m�F���(�!���ed¶3) M�aDB��a�F-u��,�th��SQL�Fb�������r�4�pomp��5��My�4. �5�g�ra (26�11),���db��0.5.� �ysql-sel�~(�C5)�K�=: ���ough �M9���ack���/����on�r_co�_to_i��`��BIGINT�typ�l��,1-4����������v� ���bleng�f�
��-�l���f�o�-copy�m�=
�$xed-�;s��-��d����8˒���7ex�G���Lbj�j��p��.�(�X�,�v50� a��bef�sus��a���4����u1�uCONNECT Stora�pEng� H��1�Ov��P�kE�kV��p2�p�r�3���r �!I�_�s::walk�
�D��6�D�pois�q����lex���/"�vol���gblob�X7�X���nsh�0�Z_tmp_�)::f�;�&�F8�F�]��_�B� or::�e_r� _���X9�X��my_d����::�uor=�A80�AField::s�!defa���=�y�z�s� �� �c�T���R���f�x�!�[s/upd�m�+_map_��_�
�o�S��r��$ca���8bit�`
�Ic����*.c�V3�V�#ɺ�<��ct::�_�5r_c��)r�G�W4��e�nquery_a�a����$��SEL���?%view�`���d�(_��_s�8����V�]HAVI�>#��NOT EXIST�
d�0����[a�744�����_�]�f445�� IS NULLޡ�_�;B��T�j��_�M�J�H���v����lit�)#oup���G�R�4�/i�L�z.cc�A�;��wi��w�in ��ess�
ORD�BY�O5�
��u˔5���LWHERE�� �h� �8
�e����q���d�(˩VD�/:��/���_�ȴ���h
�
�K"dup�ue" erro�; f���@g��ique�P�$�)o5�'�*��%�T�un�
d����/�=b�up/ds��
�31622�Xk �C��ex��
� �VIEW�ggreg�\�9�S�|
5���n� �fi��_�:��d����g�^an���
��mon�d%�b(CTE�D�1˚�13���_�,::�Vɹ����B&�>� ��|3�|�+�&s��'�_postjo����=a��#��
�ă4�� ���0s��ȏbe�#�j��k����Ĉ5�-�y��~D�2IN� �8��(�m(��csi_io�q!�h*049�[�k��c�,w_�(��#(/s�� d/cls_api�%
���J!��ower9 - LPAR��&t�&�Sha�,��c��������C&��s��[H��T22��H��.����+�\&�e��-�ss-ng�`���s�O5��R�i�V�����|nam����>3�gfs�,F�y��0(�Ll�
�5*�en����� t�P0t�K730�i/o���i�~
��u���:�Kwork�;�j�g��
����372.9.1.el8.x86_� �[82�k �c�(�tes�v��3�SSATA�M7�6Guest���re�����3 mig�B���21�� ���-�J�<(�{Oops ���~l�t�[ �?�IRIP�q�+_�K_�_label�r �g�+�!�s�l1�\�l�
BUG:�U�H���%��tas ���(n����'fs4�ton�
�;��lookup�r��lpa��ɢ�: K���o�kad��a�=ig:�C$[#� ����+tu�bon��t�D��(P10/ ibmvnic/����L)��3�)��S�����^vm��O�U��m��q�\e�'���)
Enh�f�^�'�B�u/vt-d���+DMAR_UNITS_SUPPORTED��� ���U5326) .NET�V��d-s��fr���D.�5����a�}-e�E�C�- API�^ s�(n����i��P�u CLR�Z��.
N�/�����_��dd��a��T'����vail�D�3�
d�U�'�VS���%108������%��dot�: Ext�OE�2�"Inj�K�2XML�`nat�G�1���.47��:�I�ZJ�-�9�Q9���L9���M�NDen�OfS�\ice��ASP�]C�MVC���H��0�<M�lS�
D�i�r�u��.�v801��wRub��a�ens������p�:��.�-or�&0���-��h�e���2�5 t�Y�O5���-�����,sks���4Pr��(3�
"� "�Y428)�J��Hou�!�(R��xp���!��5�9�:��5�� �=S��-to-F�Pt��E��L�
���f�>�f�b�i�a�M�.daem�0�d)��m�5
�2�k�1�al�"�7H�w (�(0�J�8���J�2�i6��:���� r��2un�d�>��%(��2 Apr ��r#412, �4�35�6�7�8�40�52�9�6�78��x�D��� ��3�NRe��$V 5�VInno��/��j1�51�2��DDL�/� 2���iFTS�$=27�NG���Plugi�%�5ʲPAM Au��ZJul�Z5�/Z ε�Log�"
�#R 60�R�!`�
50��5�;526�7�8��O30�1�53��o69��R
�"