Server IP : 192.168.23.10 / Your IP : 3.139.235.100 Web Server : Apache System : Linux echo.premieradvertising.com 5.14.0-362.8.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 7 14:54:22 EST 2023 x86_64 User : rrrallyteam ( 1049) PHP Version : 8.1.31 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF Directory (0755) : /var/cache/dnf/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
SOLV � � � 0 dnf 1.0 1.2��/��!�����j��ăH�'�|V���� D{ !d x86_64 noarch 2.34-100.el9_4.2 60.el9_2.7 cve bugzilla i686 1 final packager@almalinux.org rhsa self 3 Moderate 2.9.4-6.el9_4 4.17.5-102.el9 3.el9_2.alma 8.6-100.el9 1.el9_3.alma.1 Copyright 2024 AlmaLinux OS kernel-abi-stablelists 5.14.0-70.17.1.el9_0 22.1.el9_0 Copyright 2023 AlmaLinux OS 5.14.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 4.16.4-101.el9 3.el9_1 5.14.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_2 427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4 python3-libs bpftool kernel -core debug -core modules -extra modules -extra tools -libs python3-perf Important 5.14.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_1 6.1.el9_1 70.26.1.el9_0 30.1.el9_0 libcurl -minimal 1:2.06-27.el9_0.7.alma 46.el9_1.3.alma 70.el9_3.2.alma.1 252-32.el9_4.alma.1 kernel-debug-modules-core uki-virt modules-core uki-virt 1:1.48.10-2.el9_5.alma.1 4.16.1.3-27.el9_3 1:2.06-77.el9.alma.1 250-12.el9_1.1 3 1.19.1-24.el9_1 20.1-8.el9 1.1-1.el9 2.el9_4 3.el9 4.el9_5 openssl-libs Copyright 2022 AlmaLinux OS python3 krb5-libs pkinit server -ldap libkadm5 smbclient wbclient python3-samba samba-client-libs ommon-libs libs winbind-modules 7.76.1-14.el9_0.5 curl -minimal 1.46.5-3.el9 expat Low gnutls 7.76.1-19.el9 _1.1 2 23.el9 _2.1 2 4 6.el9 _3.2 3 9.el9_4.1 1.29.33.1-2.el9_2.alma.1 3.90.0-6.el9_3 openssl 1:3.0.1-41.el9_0 2:8.2.2637-16.el9_0.2 3 3.21.0-9.el9_3.alma.1 cups-libs libnetapi xml2 samba-dc-libs 18.168.6.1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 :1.12.20-7.el9_1 2.1 2.5.2-1.el9 311.2-1.el9_4 23.1-1.el9_5 samba-common 8.7p1-29.el9_2 30.el9_2 4.el9_3.3 8.el9_4.1 4 0.8.7-20.el9 7.el9_0.1 12:4.4.2-17.b1.el9 8.b1.el9 3.5.3-2.el9_0 c-ares libnghttp2 ua-libs opensc pam systemd -container libs 0.8-15.el9 20.el9 6.2-10.20210508.el9 krb5-workstation samba -common-tools winbind 20230310-135.el9_2.alma.1 814-140.el9_3 40603-143.1.el9_4 905-143.3.el9_4 grub2-common efi-aa64-modules x64-modules pc-modules iwl100-firmware 0-firmware 5-firmware 35-firmware 2000-firmware 30-firmware 3160-firmware 5000-firmware 150-firmware 6000g2a-firmware b-firmware 50-firmware 7260-firmware libertas-sd8787-firmware nux-firmware -whence netronome-firmware openssh -clients keycat server vim-filesystem 1:3.0.1-43.el9_0 7.el9_1 7-16.el9_2 25.el9_3 7.el9 8.el9_4 6.el9_2 2.2-6.el9_5 2.2.10-12.el9_0.2 35.2-42.el9 9.13-3.el9_1 2.1 5.el9_3 6.el9_4 :4.9-8.el9 3.9.14-1.el9 _1.1 2 6-1.el9_2.1 2 8-1.el9_3 .1 3.el9_4.1 3 5 6 9-8.el9 _5.1 21-1.el9_5 5.2.5-8.el9_0 39-16.el9 72-2.el9 avahi -libs dbus-libs evice-mapper-multipath-libs glib2 c -gconv-extra harfbuzz libarchive ksba nsl ssh repokey:type:id sqlite-libs 0.10.4-11.el9 3.el9 3.3.17-13.el9 grub2-efi-x64 -cdboot pc tools -efi xtra minimal python3-libxml2 samba-dc samba-dcerpc ldb-ldap-modules tools usershares vim-minimal grub2-ppc64le-modules systemd-rpm-macros 15.6-1.el9.alma 3.9.10-3.el9_0 device-mapper-multipath kernel-uki-virt-addons less systemd-oomd pam resolved udev 0.23.0-2.el9 3.el9_3 4.el9_3 4.1-3.el9_2 1.10.0-11.el9 7.1-5.el9_2.1 9.1-1.el9 2.el9_4 3.3-0.el9 13.el9 43.0-5.el9_2.1 3.1 4.3 5.1-19.el9 21.el9_5 2.el9_5 5.el9_0 6.el9_1 8-6.el9_4.alma.1 :2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 6.2.0-13.el9 2.10.4-9.el9 4.9-1.el9_1.1 8-9.el9_2 5.0-1.el9_3.1 2.el9_4.1 3.el9_5.1 68.4-11.el9 4.el9_4.1 7.4-10.el9 8.el9 :8.2.2637-20.el9_1 1.el9 3.2.2-2.el9 34.1-6.el9_1 7.el9_3 5.3-4.el9 7.6-12.el9_0 8.el9_1 23.el9_3.3 4 8.3-4.el9_4 4.16.0-8.el9_1 5.4.2-4.el9_0.3 4-2.el9_1 3.el9 NetworkManager-libnm binutils luez-libs e2fsprogs-libs file-libs reetype gmp libcap om_err econf gcrypt ipa_hbac ldb ndp ss s_certmap idmap nss_idmap simpleifp tasn1 irpc ncurses-libs opencryptoki-libs procps-ng tobuf-c ython3-ldb repokey:type:str pm-build-libs libs sign-libs shadow-utils-subid ssd-client tpm2-tss xz-libs 1:25.30.13.0-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 2.24.0-2.el9_5.alma.1 53.0.0-10.el9_1.1 2.el9_4.1 bubblewrap cockpit -bridge doc system ws dbus -common tools hcp-client ommon relay server glibc-all-langpacks common langpack-aa f gr k m n p r s t yc z be m r g hb o i n o r x s yn ca e hr kb mn rh s b v y da e oi sb v z el n o s t u fa f i l o r ur y ga d ez l u v ha k e i f ne r sb t u y ia d g k s t u ja ka b k l m n o k s u w y lb g i j n o t v zh mag i fe g hr i q jw k l n i w r s t y nan b ds e hn iu l n r so oc m r s pa p l s t quz raj o u w sa h t c d e gs hn s i d k l m o q r s t v w zl ta cy e g h e i g k l n o pi r s t ug k nm r z ve i wa e l o xh yi o ue w zh u minimal-langpack kernel-cross-headers debug-devel -matched vel -matched oc headers tools-libs-devel partx libssh-config nscd perf ython3-setuptools -wheel urllib3 shim-x64 udo vim-X11 common enhanced 0.4.1-7.el9_4.alma.1 8.el9_5 8.7-12.el9_1.1 1.2.11-32.el9_0 2-2.el9 8.10-2.el9.alma 9.5p2-10.el9_3 7.el9_1.1 5.8-4.el9_3.alma.1 :2.10-5.el9 3.3-7.el9_2.1 2.2.10-12.el9_0.3 3.3-2.el9_0 8-5.1.el9_0 :1.34-6.el9_1 3.18.0-7.el9 2.3-18.el9 6.0.1-4.el9 :2.1.0-18.el9 4.35.0-6.el9_3 4-10.git1.el9 5.1.8-6.el9_1 2-4.el9 6.1-6.el9 90-2.el9_2 3.el9_3 4.el9_4 7.0.0-284.11.1.el9_2 8.1.el9_2 25.1.el9_2 30.1.el9_2 3.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4 4.0-503.14.1.el9_5 5.1.el9_5 6.1.el9_5 NetworkManager -adsl bluetooth team ui wifi wan bash inutils-gold luez sdtar dbus-broker midecode e2fsprogs xfatprogs pat-devel file wupd gnupg2 ldb-tools ibarchive-devel curl-devel dnf-plugin-subscription-manager sss_autofs sudo ogrotate nano curses spr s -softokn -freebl ysinit util opencryptoki -icsftok swtok ssl-devel perl python3-cloud-what ryptography libipa_hbac sss_nss_idmap rpm sss -murmur ubscription-manager-rhsm repokey:type:flexarray pm -plugin-audit selinux sign sync shadow-utils im-unsigned-x64 quashfs-tools ssd -ad common -pac dbus ipa kcm rb5 -common ldap nfs-idmap passkey olkit-rules roxy tools winbind-idmap ubscription-manager -plugin-ostree tar pm2-tools raceroute wpa_supplicant xz zlib 1.26.5-3.el9_3.1 5.el9_4.1 :39.31.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 2.10-7.el9_4.1 25.1-7.el9_2 6.1-3.el9 1.2.3-7.el9 39.31.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 41.28.5.1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 :20240910-1.el9_5 8.24.2.2-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 83.5.1_1-135.el9_2.alma.1 40.el9_3 3.1.el9_4 3.el9_4 NetworkManager-config-server initscripts-updown microcode_ctl ncurses-base procps-ng-i18n ython3-dns idna pip-wheel requests sssdconfig rhel-net-naming-sysattrs tuned -profiles-cpu-partitioning patch:ALSA-2022:4940 5099 242 4 9 52 942 6003 157 224 602 8 10 838 54 7090 185 288 314 8 23 9 8267 91 9 317 8 40 53 61 84 5 93 400 53 93 637 3:0282 333 4 5 6 7 8 9 40 3 626 752 946 51 2 3 4 7 8 9 1141 470 701 3 2127 458 9 78 87 502 19 23 32 70 82 645 50 3559 95 722 3 5 4325 47 9 50 4 77 412 569 708 838 5061 8 9 71 453 62 763 838 6587 93 5 6 615 21 31 2 5 43 59 61 7 79 85 94 8 9 705 7 44 5 6 7747 879 4:0310 463 4 5 6 8 533 790 811 966 10244 74 384 939 83 1250 9 30 239 530 692 879 903 2394 6 410 33 7 8 47 56 63 83 504 12 7 70 1 679 758 3306 39 501 13 619 842 3 6 4078 312 49 457 583 636 774 6 9 928 5363 529 34 928 6162 3 6 356 464 567 754 83 997 7484 8162 446 617 9317 25 31 3 71 401 4 5 13 23 4 30 49 68 70 4 541 605 repokey:type:relidarray num sitory:solvables solvable:arch buildtime conflicts description evr name patchcategory rovides summary vendor update:collection :arch evr filename name list reference :href id title ype ights severity tatus �R�R�S�S�T�T����mm77�G�G;;44�B�B�A�A�H�H�D�D�E�E11�C�C662288�L�L::99<<3355�o�o�����EEFF�kkjj�)ZZ�*�*�)}}� �"�!�$�$�%�%�#�#� �!�"�c�c�R�R�c�:�:�~�~�x�x�y�y�|�|�{�{�}�}�z�z�P�Pm�oFEZ����ooo�p�p�p�j�j�I�I�j� � �S�S00\\����8�8�(�(�'�'bbhhggeecccgffebdd�&�&hdf�[�[�N�N���N�[�G�G�G0�E�E�P�P�E�J�J�J�P���n�n�n�w�w�t�t�v�v���V�V�V^^``]]__`aa]�%�%_a^�Q�Q�q�q�i�i�s�s�i� � �!�!�!� � ��� �������������t�t�t���U�U�U�N�NNNMMKKLL������������� � �����D�D�B�B�C�C�E�E������K�K�K�L�L���+�+�M�M�2�2������I�I�I�S�S�&�&�{�{� � ���F�F� � �@�@�-�-�+�+�3�3�q�q���B�B�j�j�#�#���p�p�%�%�|�|�i�i�����y�y�J�J�K�K�'�'���U�U�R�R���n�n�8�8���m�m�4�4�1�1�����"�"�"�"�o�o���6�6���3�3�a�a���*�*���X�X���L�L�(�(�D�D�z�z�(�(�������&�&�6�6�N�N���'�'�:�:�l�l���I�I��� � ���x�x�k�k���H�H�M�M� � � � �A�A�0�0�^�^�!�!�-�-�4�4�~�~�=�=�f�f���{�{�E�E�_�_�!�!�>�>������� � ���|�|�l�l�Z�Z�����V�V�7�7�}�}�Q�Q�}�}�/�/�$�$�����T�T���q�q�?�?�b�b���y�y�5�5�\�\�m�m�C�C�x�x�W�W�h�h�P�P�~�~���)�)� � ���s�s�2�2�e�e�0�0���.�.���;�;� � �#�#�q�m�?�?���������=�=�<�<�G�G�,�,�9�9� � ���.�.�*�*�1�1�+�+�7�7�d�d���u�u�2�2�g�g�,�,�l�w�w�����$�$���;�;�@�@� � �r�r���c�c�[�[�Y�Y���9�9�������K�K�8�8�`�`�>�>�������5�5�%�%�z�z�O�O�<�<�v�v�����/�/���]�]�t�t�)�)�:�:�������C�C�C���,�,�Z�Z�Z�k�k�k�9�9�`�`�`�r�r�r�H�H�H�b�b�b���W�W�W�Y�Y�Y�h�h�g�g�g�h�7�7�_�_�5�5�/�/�6�6�^�^�]�]�_�4�4�^�]������X�X�X�(�(�'�'�&�&�;�;���P�P�F�F���F�Q�Q�M�M�a�a�.�.�>�>�<�<�1�1�T�T�=�=�I�I�D�D�T�G�G�J�J�S�S�@�@�M�Q�Q�?�?�-�-�E�E�B�B�R�R���K�K�H�H���A�A�C�C�Q�F�F�a�R�0�0�S�p�p�l�l�m�m�O�O�O�k�k� � ��� � �B�B���B�������L�L�L�D�D� � �D�O�O���| �n�o�p�q�r�s�t�u�F�~ �v�O�w�O�x�O�y�O� �z�{�|�}�~�� ������F���� � ��� ������������������� �!� �"��#��$��%��&��'�� �p� �q� �r� �s� �t� �u� �F� �n� �o� � ���z�{�F�|�}��������� ���������� ��� ���� �~������ �!� �(i�)i�*i�+i�,i�-i�.i�/i�0i�1i� �2~�3~�4~�5~�6~�7~�8~�9~� � � � � � � � � � � � � � � � � � � � �! �" �# �$ �% �& �' �( �* �- �. �0 �1 �2 �3 �5 �6 �7 �8 �9 �: �< �= �? �@ �A �B �C �D �E �F �G �H �I �K �M �N �O �P �Q �R �T �W �X �Y �Z �[ �^ �` �c �e �f �g �h �i �j �l �m �n �p �q �r �t�v�w�y�z�|�?|�@|�A|�B|�C�h�:�h�<|�=|�>|�D|�;|�E|�}�~� �������� �� ��������������"�#�$�&�'�(�)�*�-�.�/�0�1�3�5�6�7�8�9�:�;�<�>�?�@�A�B�C�D�E�G�H�I�M�N�O�P�Q�R�F�d�G�d�H�d�I�d�J�d�K��L��MG�NG�OG�PG�QG�RG�SG�TG�UG�VG�/G�.G�G�WG�XG�YG�ZG�0G�[��\��-G�} �]�O�^��_i�`i�a~�b�a�c�a�d�b�e�b� �C�C�C�C�zC�{C�~C�CC�C�C�C�C�C�C�C�C�C�C� C�!C�C� C� C�C�x�`�y�`�f�9�g�9�h�9�i�!�j�!�k�!� �l��m��n��o��p��q��r�� �8�G�9�G�3�G�4�G�a�G�s�X�t�X�D�D�D�D�D�D�D�D�D�D�~D�D�zD�{D� D�!D� D�D�D� D�D�DD�D�D�u� �v� �w� �x� �y�?�z�?�{�?�B�B�B�B�B� B�B�B�B�BB� B�B� B�!B�B�B�zB�{B�B�B�B�B�~B�B�|�e�}�e�+p�,p�)p�*p�`p�_p�0p�1p�.p�/p�~�� ���������� � ��� �������������������������� �� �!�)�"�)�#�)�w�V�x�V�$�V�v�V�u�V�%l�&l�'l�(l�)l�*l�+l�,l�-l�.l�/l�0�2�1�2�2�2�u��3��4��5��6��7��8�� �9�d�:�d� �;��<��=�� �q�W�r�W� �$�W�v�W�w�W�x�W�u�W�>T�?T�@T�AT�BT�CT�DT�ET�FT�GT�HT�IT�JT�KT�LT�MT�NT�O�\�P�\�0q�1q�+q�,q�)q�*q�`q�_q�.q�/q�z>�{>�>�>�>�>�>�>�>�>�>�>�>� >� >�>>�>�>� >�!>�>�>�~>�>�Q� �R� �S� �T� �r� �U� �V� �W� �XR�YR�ZR�[R�\R�R�]R�^R�_R�`R�aR�bR�cR�dR�eR�fR�gR�hR�]�*�y�*�x�*�i�Q�j�Q�k�Q�l�Q�m�Q�n�6�o�6�p�6�q�j�r�j�) �s�>�t�>�u�>�i�"�j�"�k�"�+ �SH�TH�UH�VH�-H�WH�XH�MH�NH�.H�H�YH�ZH�0H�/H�QH�RH�OH�PH�, �a�H�4�H�8�H�9�H�3�H?�~?�?�?�?�?�?�z?�{?� ?�!?�?�?�?� ?�?�?�?�?� ?�?�?�?�?�?�N�i�M�i�/ �w�X�x�X�$�X�v�X�u�X�\S�[S�_S�`S�dS�eS�bS�cS�]S�^S�XS�YS�hS�ZS�aS�S�fS�gS�{�@�z�@�y�@�t�3�u�3�F�3�v�c�w�c�4 �h�:�g�:�f�:�@�@�@� @�@�@�@�@�@�@�@�@@� @�@�@�@�@�@� @�!@�~@�@�z@�{@�)r�*r�`r�_r�,r�0r�1r�+r�.r�/r�A� A� A�!A�A�A�zA�{A�A�A�A�A�A�A�A�A� A�A�A�AA�A�A�~A�A���� � �� ��� �����������������~��z�{�~������x�y�����z�{����p� �p��� �� �!�|�}�~����n��o��q��r��l��m��p��; �`s�*s�0s�1s�_s�,s�)s�+s�.s�/s� �Z��Z�u��5��6��7��8��3��4��> �������� ���� ��� � ��� ��� ��� �������������~�������3�M�4�M�a�M�8�M�9�M�^�8�#�8�"�8�FU�AU�BU�CU�IU�DU�EU�JU�KU�MU�HU�NU�?U�LU�GU�>U�@U�{�A�z�A�y�A�����������������0t�1t�)t�*t�.t�/t�+t�,t�`t�_t�������u�Y�v�Y�$�Y�w�Y�x�Y�a�I�4�I�3�I�8�I�9�I� � � � � � � � � � � � � � �z �{ �| �} � � �~ � ��q� �q�z �{ � �! �~ � �x �y ��m��m�J �� � ��������� ���� ��� �� ������������ �����~��������� ��!��L �i�R�j�R�l�R�m�R�k�R�w�[�0u�1u�_u�,u�+u�`u�*u�.u�/u�)u�!�!�z!�{!�!�!�!�!� !�!�!�!�!�!�!�!�|!�}!� !�!!�~!�!�z!�{!��r� �r�~!�!�!�!�x!�y!!�����������������U��V��S��T��r��Q��R��W��"{�#{�${�%{�&{�'{�({�){�*{�+{�S �,�$�-�$�.�$�/�_�0�_�U �7�d�;��8�k�9�g�5��A�)�:��3��4��1�^�6��@�)�=�d�2�V�>�)�?�)�<�b�V �"�"�z"�{"�"�"� "�"�"�"�x"�y"�"�"�"�"�|"�}"��s� �s�~"�"� "�!"�z"�{"�~"�""�"�"�"�"�1�+�2�+�3�+�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� � ��� ������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� � ��� ������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�z�{�|�}�~�� ��������� � ��� ������������������� �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�u�Z�v�Z�$�Z�w�Z�x�Z�.v�/v�_v�,v�+v�)v�*v�0v�1v�`v�Q��R��S��\ �T��U��V��] �W�P�X�P�Y�P�Z�P�[�P�4��?�*�A�*�2�W�@�*�6��8�l�3��1�_�7�e�:��;��5��>�*�<�c�=�e�9�h�_ �.�%�-�%�,�%�\�f�]�f�a �^��_��`��b �a�/�b�/�c�/�d�U�e�U�f�U�g�U�h�U�d �������i�u�j�u�J�u�k�u�$�[�v�[�w�[�x�[�u�[�l�(�m�(�n�(��� ����� ��~������ ���� ���������� � � �������������)w�*w�_w�,w�.w�/w�`w�0w�1w�+w�o�5�p�5�q�5�k �v�]�r�$�s�$�t�$�u�$�v�$�r�$�IV�CV�MV�HV�>V�?V�@V�AV�GV�DV�EV�LV�BV�JV�KV�FV�NV�w�w�x�w�s�w�y�w�o �z�"�{�"�|�"�}�"�~�"��"�� �� ������������� �� ������������� �~��� � ��������.x�/x�)x�*x�0x�1x�_x�,x�`x�+x�Q��R��S��s �l�S�m�S�i�S�j�S�k�S�V��U��T��u�8�J�9�J�a�J�4�J�3�J� P�P�P�P�P�P�P�P�P� P� P�P�P� P�P�P�P�P�P�O�T�x�n�7�o�7�p�7�u�\�v�\�w�\�x�\�$�\�.I�/I�QI�RI�YI�ZI�-I�I�0I�OI�PI�MI�NI�WI�XI�SI�TI�UI�VI�{�f�;�g�;�h�;�O�[�P�[�T��U��V���� �� �� ���|�}�~����x�y��� �!��� ������z�{�z�{� ��~��������{�h�z�h����� �� �!���~��x�y���z�{��� ����|�}�~����z�{�����u�c�v�c�w�c�x�c�$�c�������_y�,y�+y�.y�/y�)y�*y�`y�0y�1y��������������������������������� ���x�,�y�,�]�,��n��n� �f�<�g�<�h�<�[�]�\�]��#�#�z#�{##�#�#�~#�#�|#�}#�~#�#� #�!#�#�#�#�#�#�#�z#�{#� #�#�#�#�x#�y#�#�#��t� �t�!�i�"�i��0�1�1�1�2�1��#�{�#�~�#�}�#�z�#�|�#�#�Y�$�Y��������a�K�4�K�3�K�8�K�9�K�0Q�UQ�VQ�YQ�ZQ�WQ�XQ�OQ�PQ�QQ�RQ�SQ�TQ�/Q�.Q�-Q�MQ�NQ��yJ�aJ�YJ�dJ�eJ�]J�^J�hJ�cJ�ZJ�[J�\J�bJ�fJ�gJ�XJ�_J�`J�J�%�g�&�g��k�v�j�v�J�v�i�v�'�e�(�e�)�e�*�e�+�e�,�^�-�^��h�=�g�=�f�=�x�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�k�l�T�m�T�k�T�j�T�i�T�$�$�z$�{$$�$�$�$�$��u� �u� $�$�$�$�$�$�z$�{$�$�$�~$�$�$�$�x$�y$�|$�}$� $�!$�~$�$�%�%�%�%�|%�}%�x%�y%�z%�{%%� %�!%�%�%� %�%�~%�%�%�%�%�%�z%�{%�~%�%�%�%�%�%��v� �v�N�O� ����'�(�E�F�F�G�8�9�(�)�p�q�*�+�f�g�Z�[�X�Y��� ��C�D�(�)�V�W�4�5�L�M�I�J���&�'�d�e�!�"�h�i�v�w���d�e�t�u�T�U�:�;�z�{�9�:�h�i�r�s�x�y�R�S�`�a�f�g�H�I�"�#���^�_�"�#�)�*�2�3�^�_�l�m���B�C�R�S�O�P�.�/�P�Q���<�=���0�1���$�%�p�q�H�I�A�B�X�Y�x�y�8�9���:�;�b�c�*�+�6�7�L�M�J�K���%�&���=�>���~��@�A�b�c�<�=�����K�L�� ���n�o���D�E�1�2���;�<�~����6�7�>�?�,�-���r�s�@�A�|�}� � �t�u�Z�[�#�$�@�A��� ��,�-� ��\�]�B�C� �!�\�]�G�H�r�s���M�N�/�0���`�a�T�U�F�G� �!���P�Q�3�4� ��D�E���f�g�z�{�n�o�8�9���2�3�n�o�h�i�p�q���j�k�?�@�B�C�b�c�d�e����:�;�Z�[�R�S�y�H�I�V�W�~��`�a�$�%�5�6�|�}�+�,�&�'�����7�8�6�7�\�]�D�E�� �l�m�<�=�N�O�x�����>�?�-�.�J�K�v�w�t�u�v�w�P�Q�V�W�J�K���F�G�X�Y�L�M�� �l�m�N�O���.�/���� �>�?�T�U� ��4�5�j�k�j�k�0�1���4�5�z�{�� �|�}�^�_�S��R��Q�� ��o��o�!�~&�&�&�&�&�&�&�&� &�&�|&�}&� &�!&��w� �w�~&�&�x&�y&�z&�{&�&�&�&�&�&�&&�&�&�z&�{&�������o� �l� �m� �n� �o� �n� �p� �q� �u�Z�%�u�]�v�]�w�]�x�]�$�]�����������������~'�'�z'�{'�~'�'�z'�{'� '�'�'�'�x'�y'��x� �x�'�'�|'�}'� '�!'�'�'�'�''�'�'�'�'�'�'�����������������z(�{(�(�(�~(�((� (�!(�(�(�(�(�(�(�~(�(�(�(��y� �y� (�(�(�(�(�(�z(�{(�|(�}(�x(�y(�r�#�s�#�t�#�+�6��<�d�7�f�;��9�i�A�+�1�`�4��3��>�+�2�X�?�+�:��8�m�=�f�@�+�5��,�,�&�-�&�.�&�w�^�x�^�u�^�v�^�$�^�)�)� )�!)�)�)�z)�{)�)�)�|)�})�~)�)�x)�y)�z)�{)�)�)�)�)�~)�)�)�)� )�)��z� �z)�)�)�|*�}*��{� �{�*�*�*�*�*�*�~*�*�*�*�~*�*�z*�{*�*�*�z*�{*� *�!**� *�*�*�*�x*�y*�*�*�_z�,z�`z�*z�+z�.z�/z�0z�1z�)z�M�j�N�j�2� +�!+�+�+� +�++�|+�}+�+�+�+�+�+�+�~+�+�+�+�x+�y+�+�+�~+�+�z+�{+�z+�{+��|� �|�+�+�O�U�4�$�_�v�_�w�_�x�_�u�_�IW�CW�JW�KW�DW�EW�MW�HW�LW�BW�FW�AW�>W�?W�GW�NW�@W�u�U�v�U�a�0�b�0�c�0�,�,�~,�,�,�,� ,�,�,�,�|,�},�,�,�,�,��}� �}�z,�{,�,�,�z,�{,� ,�!,�x,�y,,�~,�,�,�,�]�-�y�-�x�-�a�L�4�L�8�L�9�L�3�L�-�-�|-�}-� -�!-�-�-�-�-�-�-�z-�{-� -�-�x-�y-�z-�{-�~-�-�-�-�-�-��~� �~�~-�-�-�--�:� �5� �3� �=�g�2�Y�7�g�8�n�@�,�9�j�6� �<�e�>�,�;� �A�,�?�,�1�a�4� �=�x.�y.� .�.�.�.�.�.�.�.�z.�{.��� ��.�.�~.�.�.�.�.�.�|.�}.�.�.�z.�{..� .�!.�~.�.�w�`�x�`�$�`�v�`�u�`� /�/�/�/�/�//�z/�{/�/�/�~/�/�x/�y/� /�!/�|/�}/�/�/�/�/�~/�/�/�/�� � � �/�/�z/�{/�pO�wO�xO�yO�zO�oO�{O�|O�}O�~O�O� O�O�O�O�O�O�O�O�p��q��l��m��n��o��o��n��IX�CX�GX�HX�LX�EX�FX�AX�BX�>X�?X�DX�@X�NX�MX�JX�KX�8�N�9�N�3�N�4�N�a�N�$�a�v�a�u�a�w�a�x�a�q�f�F��� �� ��F�4�t�4�u�4��f��f� �f��f��f�t�\�J��k��k�K��l��l�L�u�V�v�V�$�b�v�b�w�b�x�b�u�b�,�'�-�'�.�'�@Y�AY�NY�?Y�FY�LY�EY�BY�CY�DY�IY�>Y�MY�HY�JY�KY�GY�x�.�y�.�]�.�~������~��z�{������� ���� ������|�}� �!�x�y�z�{���[�s �V�s �Z�s �_�s �]�S�.�X�S�s�U�3�\�\ �m�s �^�\ �k�s �l�s �Y�\��'�g�\ �h�\ �i�\ �j�s �f�3 �d�s �b�s �a�s �c�\ �`�3 �e�3 �W�T NOPSTUABCDEFHIJKLMRWX��w�� �W�| ��DBBBsecurity Important: xz security update [= �https://access.redhat.com/errata/RHSA-2022:4940 RHSA-2022:4940 RHSA-2022:4940 https://access.redhat.com/security/cve/CVE-2022-1271 CVE-2022-1271 CVE-2022-1271 https://bugzilla.redhat.com/2073310 2073310 https://errata.almalinux.org/9/ALSA-2022-4940.html ALSA-2022:4940 ALSA-2022:4940 �c�dxz-libs-5.2.5-8.el9_0.i686.rpm �R�dxz-5.2.5-8.el9_0.x86_64.rpm �c�dxz-libs-5.2.5-8.el9_0.x86_64.rpm �c�dxz-libs-5.2.5-8.el9_0.i686.rpm �R�dxz-5.2.5-8.el9_0.x86_64.rpm �c�dxz-libs-5.2.5-8.el9_0.x86_64.rpm ���� �} � �IBBBBBBBBBBBBBBBBBBBBBsecurity Important: grub2, mokutil, shim, and shim-unsigned-x64 security update [=��|https://access.redhat.com/errata/RHSA-2022:5099 RHSA-2022:5099 RHSA-2022:5099 https://access.redhat.com/security/cve/CVE-2021-3695 CVE-2021-3695 CVE-2021-3695 https://access.redhat.com/security/cve/CVE-2021-3696 CVE-2021-3696 CVE-2021-3696 https://access.redhat.com/security/cve/CVE-2021-3697 CVE-2021-3697 CVE-2021-3697 https://access.redhat.com/security/cve/CVE-2022-28733 CVE-2022-28733 CVE-2022-28733 https://access.redhat.com/security/cve/CVE-2022-28734 CVE-2022-28734 CVE-2022-28734 https://access.redhat.com/security/cve/CVE-2022-28735 CVE-2022-28735 CVE-2022-28735 https://access.redhat.com/security/cve/CVE-2022-28736 CVE-2022-28736 CVE-2022-28736 https://access.redhat.com/security/cve/CVE-2022-28737 CVE-2022-28737 CVE-2022-28737 https://bugzilla.redhat.com/1991685 1991685 https://bugzilla.redhat.com/1991686 1991686 https://bugzilla.redhat.com/1991687 1991687 https://bugzilla.redhat.com/2083339 2083339 https://bugzilla.redhat.com/2090463 2090463 https://bugzilla.redhat.com/2090857 2090857 https://bugzilla.redhat.com/2090899 2090899 https://bugzilla.redhat.com/2092613 2092613 https://errata.almalinux.org/9/ALSA-2022-5099.html ALSA-2022:5099 ALSA-2022:5099 �:�shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �~Ggrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �xGgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �yGgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �|Ggrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �{Ggrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �/Ggrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �.Ggrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm �Ggrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �}Ggrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �zGgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �0Ggrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm �P�shim-x64-15.6-1.el9.alma.x86_64.rpm �-Ggrub2-common-2.06-27.el9_0.7.alma.noarch.rpm �:�shim-unsigned-x64-15.6-1.el9.alma.x86_64.rpm �~Ggrub2-tools-minimal-2.06-27.el9_0.7.alma.x86_64.rpm �xGgrub2-efi-x64-2.06-27.el9_0.7.alma.x86_64.rpm �yGgrub2-efi-x64-cdboot-2.06-27.el9_0.7.alma.x86_64.rpm �|Ggrub2-tools-efi-2.06-27.el9_0.7.alma.x86_64.rpm �{Ggrub2-tools-2.06-27.el9_0.7.alma.x86_64.rpm �/Ggrub2-efi-x64-modules-2.06-27.el9_0.7.alma.noarch.rpm �.Ggrub2-efi-aa64-modules-2.06-27.el9_0.7.alma.noarch.rpm �Ggrub2-ppc64le-modules-2.06-27.el9_0.7.alma.noarch.rpm �}Ggrub2-tools-extra-2.06-27.el9_0.7.alma.x86_64.rpm �zGgrub2-pc-2.06-27.el9_0.7.alma.x86_64.rpm �0Ggrub2-pc-modules-2.06-27.el9_0.7.alma.noarch.rpm �P�shim-x64-15.6-1.el9.alma.x86_64.rpm �-Ggrub2-common-2.06-27.el9_0.7.alma.noarch.rpm ����f�~ ��VBBBBBBBsecurity Moderate: vim security update [��Thttps://access.redhat.com/errata/RHSA-2022:5242 RHSA-2022:5242 RHSA-2022:5242 https://access.redhat.com/security/cve/CVE-2022-0554 CVE-2022-0554 CVE-2022-0554 https://access.redhat.com/security/cve/CVE-2022-0943 CVE-2022-0943 CVE-2022-0943 https://access.redhat.com/security/cve/CVE-2022-1154 CVE-2022-1154 CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1420 CVE-2022-1420 CVE-2022-1420 https://access.redhat.com/security/cve/CVE-2022-1621 CVE-2022-1621 CVE-2022-1621 https://access.redhat.com/security/cve/CVE-2022-1629 CVE-2022-1629 CVE-2022-1629 https://bugzilla.redhat.com/2058483 2058483 https://bugzilla.redhat.com/2064064 2064064 https://bugzilla.redhat.com/2073013 2073013 https://bugzilla.redhat.com/2077734 2077734 https://bugzilla.redhat.com/2083924 2083924 https://bugzilla.redhat.com/2083931 2083931 https://errata.almalinux.org/9/ALSA-2022-5242.html ALSA-2022:5242 ALSA-2022:5242 �Rvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm �Svim-common-8.2.2637-16.el9_0.2.x86_64.rpm �Tvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm �vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm �Fvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm �Rvim-X11-8.2.2637-16.el9_0.2.x86_64.rpm �Svim-common-8.2.2637-16.el9_0.2.x86_64.rpm �Tvim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm �vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm �Fvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm ���_� �$�`BBB�?security Moderate: expat security update [�e�xhttps://access.redhat.com/errata/RHSA-2022:5244 RHSA-2022:5244 RHSA-2022:5244 https://access.redhat.com/security/cve/CVE-2022-25313 CVE-2022-25313 CVE-2022-25313 https://access.redhat.com/security/cve/CVE-2022-25314 CVE-2022-25314 CVE-2022-25314 https://bugzilla.redhat.com/2056350 2056350 https://bugzilla.redhat.com/2056354 2056354 https://errata.almalinux.org/9/ALSA-2022-5244.html ALSA-2022:5244 ALSA-2022:5244 ��Oexpat-devel-2.2.10-12.el9_0.2.x86_64.rpm m�Oexpat-2.2.10-12.el9_0.2.i686.rpm m�Oexpat-2.2.10-12.el9_0.2.x86_64.rpm ��Oexpat-devel-2.2.10-12.el9_0.2.x86_64.rpm m�Oexpat-2.2.10-12.el9_0.2.i686.rpm m�Oexpat-2.2.10-12.el9_0.2.x86_64.rpm ���%� ��eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update [=�]� https://access.redhat.com/errata/RHSA-2022:5249 RHSA-2022:5249 RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 CVE-2022-1012 CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 CVE-2022-1729 CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 CVE-2022-1966 CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 CVE-2022-27666 CVE-2022-27666 https://bugzilla.redhat.com/2061633 2061633 https://bugzilla.redhat.com/2064604 2064604 https://bugzilla.redhat.com/2086753 2086753 https://bugzilla.redhat.com/2092427 2092427 https://errata.almalinux.org/9/ALSA-2022-5249.html ALSA-2022:5249 ALSA-2022:5249 7kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �Gkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm ;kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm 4kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �Bkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Akernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �Fkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm �Hkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Dkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Ekernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm 1bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �Ckernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm 6kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm 2kernel-5.14.0-70.17.1.el9_0.x86_64.rpm 8kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �Lperf-5.14.0-70.17.1.el9_0.x86_64.rpm :kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm 9kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm <python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm 3kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm 5kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm �Gkernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm ;kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm 4kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm �Bkernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Akernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm �Fkernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm �Hkernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Dkernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm �Ekernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm 1bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm �Ckernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm 6kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm 2kernel-5.14.0-70.17.1.el9_0.x86_64.rpm 8kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm �Lperf-5.14.0-70.17.1.el9_0.x86_64.rpm :kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm 9kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm <python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm 3kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm 5kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm ����� ��PBBBBB�security Moderate: libarchive security update [�r�Xhttps://access.redhat.com/errata/RHSA-2022:5252 RHSA-2022:5252 RHSA-2022:5252 https://access.redhat.com/security/cve/CVE-2022-26280 CVE-2022-26280 CVE-2022-26280 https://bugzilla.redhat.com/2071931 2071931 https://errata.almalinux.org/9/ALSA-2022-5252.html ALSA-2022:5252 ALSA-2022:5252 �o�libarchive-3.5.3-2.el9_0.x86_64.rpm ��bsdtar-3.5.3-2.el9_0.x86_64.rpm �o�libarchive-3.5.3-2.el9_0.i686.rpm ��libarchive-devel-3.5.3-2.el9_0.x86_64.rpm �o�libarchive-3.5.3-2.el9_0.x86_64.rpm ��bsdtar-3.5.3-2.el9_0.x86_64.rpm �o�libarchive-3.5.3-2.el9_0.i686.rpm ��libarchive-devel-3.5.3-2.el9_0.x86_64.rpm ���t� � �WBBBBBBBsecurity Moderate: vim security update [�J�Rhttps://access.redhat.com/errata/RHSA-2022:5942 RHSA-2022:5942 RHSA-2022:5942 https://access.redhat.com/security/cve/CVE-2022-1785 CVE-2022-1785 CVE-2022-1785 https://access.redhat.com/security/cve/CVE-2022-1897 CVE-2022-1897 CVE-2022-1897 https://access.redhat.com/security/cve/CVE-2022-1927 CVE-2022-1927 CVE-2022-1927 https://bugzilla.redhat.com/2088689 2088689 https://bugzilla.redhat.com/2091682 2091682 https://bugzilla.redhat.com/2091687 2091687 https://errata.almalinux.org/9/ALSA-2022-5942.html ALSA-2022:5942 ALSA-2022:5942 �S� vim-common-8.2.2637-16.el9_0.3.x86_64.rpm �T� vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm �� vim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm �F� vim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm �R� vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm �S� vim-common-8.2.2637-16.el9_0.3.x86_64.rpm �T� vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm �� vim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm �F� vim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm �R� vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm ����U� ��aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security, bug fix, and enhancement update [��qhttps://access.redhat.com/errata/RHSA-2022:6003 RHSA-2022:6003 RHSA-2022:6003 https://access.redhat.com/security/cve/CVE-2022-0494 CVE-2022-0494 CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1055 CVE-2022-1055 CVE-2022-1055 https://bugzilla.redhat.com/2039448 2039448 https://bugzilla.redhat.com/2070220 2070220 https://errata.almalinux.org/9/ALSA-2022-6003.html ALSA-2022:6003 ALSA-2022:6003 :kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �Fkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �Gkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm 8kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm 3kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �Lperf-5.14.0-70.22.1.el9_0.x86_64.rpm 2kernel-5.14.0-70.22.1.el9_0.x86_64.rpm 4kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �Ckernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �Akernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �Hkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm 9kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �Ekernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm 1bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm 6kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �Dkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm ;kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm <python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �Bkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm 5kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm :kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm �Fkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm �Gkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm 8kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm 3kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm �Lperf-5.14.0-70.22.1.el9_0.x86_64.rpm 2kernel-5.14.0-70.22.1.el9_0.x86_64.rpm 4kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm �Ckernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm �Akernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm �Hkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm 9kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm �Ekernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm 1bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm 6kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm �Dkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm ;kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm <python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm �Bkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm 5kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm ��о}� ��LBBBBBBBBB�Osecurity Moderate: curl security update [� �https://access.redhat.com/errata/RHSA-2022:6157 RHSA-2022:6157 RHSA-2022:6157 https://access.redhat.com/security/cve/CVE-2022-32206 CVE-2022-32206 CVE-2022-32206 https://access.redhat.com/security/cve/CVE-2022-32207 CVE-2022-32207 CVE-2022-32207 https://access.redhat.com/security/cve/CVE-2022-32208 CVE-2022-32208 CVE-2022-32208 https://bugzilla.redhat.com/2099300 2099300 https://bugzilla.redhat.com/2099305 2099305 https://bugzilla.redhat.com/2099306 2099306 https://errata.almalinux.org/9/ALSA-2022-6157.html ALSA-2022:6157 ALSA-2022:6157 Filibcurl-minimal-7.76.1-14.el9_0.5.i686.rpm Eilibcurl-7.76.1-14.el9_0.5.i686.rpm Eilibcurl-7.76.1-14.el9_0.5.x86_64.rpm Filibcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm �ilibcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm kicurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm jicurl-7.76.1-14.el9_0.5.x86_64.rpm Filibcurl-minimal-7.76.1-14.el9_0.5.i686.rpm Eilibcurl-7.76.1-14.el9_0.5.i686.rpm Eilibcurl-7.76.1-14.el9_0.5.x86_64.rpm Filibcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm �ilibcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm kicurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm jicurl-7.76.1-14.el9_0.5.x86_64.rpm ����� ��WBBBBBBB�security Moderate: openssl security and bug fix update [�&�/https://access.redhat.com/errata/RHSA-2022:6224 RHSA-2022:6224 RHSA-2022:6224 https://access.redhat.com/security/cve/CVE-2022-1292 CVE-2022-1292 CVE-2022-1292 https://access.redhat.com/security/cve/CVE-2022-1343 CVE-2022-1343 CVE-2022-1343 https://access.redhat.com/security/cve/CVE-2022-1473 CVE-2022-1473 CVE-2022-1473 https://access.redhat.com/security/cve/CVE-2022-2068 CVE-2022-2068 CVE-2022-2068 https://access.redhat.com/security/cve/CVE-2022-2097 CVE-2022-2097 CVE-2022-2097 https://bugzilla.redhat.com/2081494 2081494 https://bugzilla.redhat.com/2087911 2087911 https://bugzilla.redhat.com/2087913 2087913 https://bugzilla.redhat.com/2097310 2097310 https://bugzilla.redhat.com/2104905 2104905 https://errata.almalinux.org/9/ALSA-2022-6224.html ALSA-2022:6224 ALSA-2022:6224 Z~openssl-libs-3.0.1-41.el9_0.x86_64.rpm �*~openssl-perl-3.0.1-41.el9_0.x86_64.rpm Z~openssl-libs-3.0.1-41.el9_0.i686.rpm �)~openssl-devel-3.0.1-41.el9_0.x86_64.rpm }~openssl-3.0.1-41.el9_0.x86_64.rpm Z~openssl-libs-3.0.1-41.el9_0.x86_64.rpm �*~openssl-perl-3.0.1-41.el9_0.x86_64.rpm Z~openssl-libs-3.0.1-41.el9_0.i686.rpm �)~openssl-devel-3.0.1-41.el9_0.x86_64.rpm }~openssl-3.0.1-41.el9_0.x86_64.rpm ����� � �fsecurity Moderate: gnupg2 security update [�U�(https://access.redhat.com/errata/RHSA-2022:6602 RHSA-2022:6602 RHSA-2022:6602 https://access.redhat.com/security/cve/CVE-2022-34903 CVE-2022-34903 CVE-2022-34903 https://bugzilla.redhat.com/2102868 2102868 https://errata.almalinux.org/9/ALSA-2022-6602.html ALSA-2022:6602 ALSA-2022:6602 ��agnupg2-2.3.3-2.el9_0.x86_64.rpm ��agnupg2-2.3.3-2.el9_0.x86_64.rpm ����'� �*�hsecurity Moderate: dbus-broker security update [�}�chttps://access.redhat.com/errata/RHSA-2022:6608 RHSA-2022:6608 RHSA-2022:6608 https://access.redhat.com/security/cve/CVE-2022-31212 CVE-2022-31212 CVE-2022-31212 https://access.redhat.com/security/cve/CVE-2022-31213 CVE-2022-31213 CVE-2022-31213 https://bugzilla.redhat.com/2094718 2094718 https://bugzilla.redhat.com/2094722 2094722 https://errata.almalinux.org/9/ALSA-2022-6608.html ALSA-2022:6608 ALSA-2022:6608 ��bdbus-broker-28-5.1.el9_0.x86_64.rpm ��bdbus-broker-28-5.1.el9_0.x86_64.rpm ����� �!�kBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update [=�`�=https://access.redhat.com/errata/RHSA-2022:6610 RHSA-2022:6610 RHSA-2022:6610 https://access.redhat.com/security/cve/CVE-2022-2078 CVE-2022-2078 CVE-2022-2078 https://access.redhat.com/security/cve/CVE-2022-34918 CVE-2022-34918 CVE-2022-34918 https://bugzilla.redhat.com/2096178 2096178 https://bugzilla.redhat.com/2104423 2104423 https://errata.almalinux.org/9/ALSA-2022-6610.html ALSA-2022:6610 ALSA-2022:6610 3Ckernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm <Cpython3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm 7Ckernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm ;Ckernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm Ckernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm 9Ckernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm 6Ckernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm 8Ckernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm :Ckernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm 2Ckernel-5.14.0-70.26.1.el9_0.x86_64.rpm 5Ckernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm 1Cbpftool-5.14.0-70.26.1.el9_0.x86_64.rpm 4Ckernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm 3Ckernel-core-5.14.0-70.26.1.el9_0.x86_64.rpm <Cpython3-perf-5.14.0-70.26.1.el9_0.x86_64.rpm 7Ckernel-debug-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm ;Ckernel-tools-libs-5.14.0-70.26.1.el9_0.x86_64.rpm Ckernel-abi-stablelists-5.14.0-70.26.1.el9_0.noarch.rpm 9Ckernel-modules-extra-5.14.0-70.26.1.el9_0.x86_64.rpm 6Ckernel-debug-modules-5.14.0-70.26.1.el9_0.x86_64.rpm 8Ckernel-modules-5.14.0-70.26.1.el9_0.x86_64.rpm :Ckernel-tools-5.14.0-70.26.1.el9_0.x86_64.rpm 2Ckernel-5.14.0-70.26.1.el9_0.x86_64.rpm 5Ckernel-debug-core-5.14.0-70.26.1.el9_0.x86_64.rpm 1Cbpftool-5.14.0-70.26.1.el9_0.x86_64.rpm 4Ckernel-debug-5.14.0-70.26.1.el9_0.x86_64.rpm ����+� �"�Dsecurity Important: expat security update [=��Uhttps://access.redhat.com/errata/RHSA-2022:6838 RHSA-2022:6838 RHSA-2022:6838 https://access.redhat.com/security/cve/CVE-2022-40674 CVE-2022-40674 CVE-2022-40674 https://bugzilla.redhat.com/2130769 2130769 https://errata.almalinux.org/9/ALSA-2022-6838.html ALSA-2022:6838 ALSA-2022:6838 m�`expat-2.2.10-12.el9_0.3.x86_64.rpm m�`expat-2.2.10-12.el9_0.3.x86_64.rpm ����� �#�FBsecurity Moderate: gnutls and nettle security, bug fix, and enhancement update [�r�2https://access.redhat.com/errata/RHSA-2022:6854 RHSA-2022:6854 RHSA-2022:6854 https://access.redhat.com/security/cve/CVE-2022-2509 CVE-2022-2509 CVE-2022-2509 https://bugzilla.redhat.com/2108977 2108977 https://errata.almalinux.org/9/ALSA-2022-6854.html ALSA-2022:6854 ALSA-2022:6854 o�9gnutls-3.7.6-12.el9_0.i686.rpm o�9gnutls-3.7.6-12.el9_0.x86_64.rpm o�9gnutls-3.7.6-12.el9_0.i686.rpm o�9gnutls-3.7.6-12.el9_0.x86_64.rpm ����~� ��IBsecurity Important: libksba security update [=�$�Yhttps://access.redhat.com/errata/RHSA-2022:7090 RHSA-2022:7090 RHSA-2022:7090 https://access.redhat.com/security/cve/CVE-2022-3515 CVE-2022-3515 CVE-2022-3515 https://bugzilla.redhat.com/2135610 2135610 https://errata.almalinux.org/9/ALSA-2022-7090.html ALSA-2022:7090 ALSA-2022:7090 �p�!libksba-1.5.1-5.el9_0.x86_64.rpm �p�!libksba-1.5.1-5.el9_0.i686.rpm �p�!libksba-1.5.1-5.el9_0.x86_64.rpm �p�!libksba-1.5.1-5.el9_0.i686.rpm ����^� ��MBBBBBsecurity Important: device-mapper-multipath security update [=�}�chttps://access.redhat.com/errata/RHSA-2022:7185 RHSA-2022:7185 RHSA-2022:7185 https://access.redhat.com/security/cve/CVE-2022-41974 CVE-2022-41974 CVE-2022-41974 https://bugzilla.redhat.com/2133988 2133988 https://errata.almalinux.org/9/ALSA-2022-7185.html ALSA-2022:7185 ALSA-2022:7185 �j�device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm �I�kpartx-0.8.7-7.el9_0.1.x86_64.rpm �j�device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm � �device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm �j�device-mapper-multipath-libs-0.8.7-7.el9_0.1.i686.rpm �I�kpartx-0.8.7-7.el9_0.1.x86_64.rpm �j�device-mapper-multipath-libs-0.8.7-7.el9_0.1.x86_64.rpm � �device-mapper-multipath-0.8.7-7.el9_0.1.x86_64.rpm ����d� �$�UBBBsecurity Important: openssl security update [=�`�https://access.redhat.com/errata/RHSA-2022:7288 RHSA-2022:7288 RHSA-2022:7288 https://access.redhat.com/security/cve/CVE-2022-3602 CVE-2022-3602 CVE-2022-3602 https://access.redhat.com/security/cve/CVE-2022-3786 CVE-2022-3786 CVE-2022-3786 https://bugzilla.redhat.com/2137723 2137723 https://bugzilla.redhat.com/2139104 2139104 https://errata.almalinux.org/9/ALSA-2022-7288.html ALSA-2022:7288 ALSA-2022:7288 }�Gopenssl-3.0.1-43.el9_0.x86_64.rpm Z�Gopenssl-libs-3.0.1-43.el9_0.x86_64.rpm Z�Gopenssl-libs-3.0.1-43.el9_0.i686.rpm }�Gopenssl-3.0.1-43.el9_0.x86_64.rpm Z�Gopenssl-libs-3.0.1-43.el9_0.x86_64.rpm Z�Gopenssl-libs-3.0.1-43.el9_0.i686.rpm ����h� �%�Zsecurity Moderate: zlib security update [�s�Ohttps://access.redhat.com/errata/RHSA-2022:7314 RHSA-2022:7314 RHSA-2022:7314 https://access.redhat.com/security/cve/CVE-2022-37434 CVE-2022-37434 CVE-2022-37434 https://bugzilla.redhat.com/2116639 2116639 https://errata.almalinux.org/9/ALSA-2022-7314.html ALSA-2022:7314 ALSA-2022:7314 �S�Xzlib-1.2.11-32.el9_0.x86_64.rpm �S�Xzlib-1.2.11-32.el9_0.x86_64.rpm ����S� �&�\BBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update [=�B�https://access.redhat.com/errata/RHSA-2022:7318 RHSA-2022:7318 RHSA-2022:7318 https://access.redhat.com/security/cve/CVE-2022-2585 CVE-2022-2585 CVE-2022-2585 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://bugzilla.redhat.com/2085300 2085300 https://bugzilla.redhat.com/2114874 2114874 https://errata.almalinux.org/9/ALSA-2022-7318.html ALSA-2022:7318 ALSA-2022:7318 9Dkernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm :Dkernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm 3Dkernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm <Dpython3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm 6Dkernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm ;Dkernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm 7Dkernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm 5Dkernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm 4Dkernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm 1Dbpftool-5.14.0-70.30.1.el9_0.x86_64.rpm 2Dkernel-5.14.0-70.30.1.el9_0.x86_64.rpm Dkernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm 8Dkernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm 9Dkernel-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm :Dkernel-tools-5.14.0-70.30.1.el9_0.x86_64.rpm 3Dkernel-core-5.14.0-70.30.1.el9_0.x86_64.rpm <Dpython3-perf-5.14.0-70.30.1.el9_0.x86_64.rpm 6Dkernel-debug-modules-5.14.0-70.30.1.el9_0.x86_64.rpm ;Dkernel-tools-libs-5.14.0-70.30.1.el9_0.x86_64.rpm 7Dkernel-debug-modules-extra-5.14.0-70.30.1.el9_0.x86_64.rpm 5Dkernel-debug-core-5.14.0-70.30.1.el9_0.x86_64.rpm 4Dkernel-debug-5.14.0-70.30.1.el9_0.x86_64.rpm 1Dbpftool-5.14.0-70.30.1.el9_0.x86_64.rpm 2Dkernel-5.14.0-70.30.1.el9_0.x86_64.rpm Dkernel-abi-stablelists-5.14.0-70.30.1.el9_0.noarch.rpm 8Dkernel-modules-5.14.0-70.30.1.el9_0.x86_64.rpm ����j� �'�uBBsecurity Moderate: python3.9 security update [�E�nhttps://access.redhat.com/errata/RHSA-2022:7323 RHSA-2022:7323 RHSA-2022:7323 https://access.redhat.com/security/cve/CVE-2020-10735 CVE-2020-10735 CVE-2020-10735 https://bugzilla.redhat.com/1834423 1834423 https://errata.almalinux.org/9/ALSA-2022-7323.html ALSA-2022:7323 ALSA-2022:7323 0� python3-libs-3.9.10-3.el9_0.x86_64.rpm \� python3-3.9.10-3.el9_0.x86_64.rpm 0� python3-libs-3.9.10-3.el9_0.x86_64.rpm \� python3-3.9.10-3.el9_0.x86_64.rpm ����� �(�yBsecurity Moderate: lua security update [��3�https://access.redhat.com/errata/RHSA-2022:7329 RHSA-2022:7329 RHSA-2022:7329 https://access.redhat.com/security/cve/CVE-2022-33099 CVE-2022-33099 CVE-2022-33099 https://bugzilla.redhat.com/2104427 2104427 https://errata.almalinux.org/9/ALSA-2022-7329.html ALSA-2022:7329 ALSA-2022:7329 ��?lua-libs-5.4.2-4.el9_0.3.i686.rpm ��?lua-libs-5.4.2-4.el9_0.3.x86_64.rpm ��?lua-libs-5.4.2-4.el9_0.3.i686.rpm ��?lua-libs-5.4.2-4.el9_0.3.x86_64.rpm ����t� �)�|BBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security, bug fix, and enhancement update [��E�?https://access.redhat.com/errata/RHSA-2022:8267 RHSA-2022:8267 RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516 CVE-2020-36516 CVE-2020-36516 https://access.redhat.com/security/cve/CVE-2021-3640 CVE-2021-3640 CVE-2021-3640 https://access.redhat.com/security/cve/CVE-2022-0168 CVE-2022-0168 CVE-2022-0168 https://access.redhat.com/security/cve/CVE-2022-0617 CVE-2022-0617 CVE-2022-0617 https://access.redhat.com/security/cve/CVE-2022-0854 CVE-2022-0854 CVE-2022-0854 https://access.redhat.com/security/cve/CVE-2022-1016 CVE-2022-1016 CVE-2022-1016 https://access.redhat.com/security/cve/CVE-2022-1048 CVE-2022-1048 CVE-2022-1048 https://access.redhat.com/security/cve/CVE-2022-1184 CVE-2022-1184 CVE-2022-1184 https://access.redhat.com/security/cve/CVE-2022-1280 CVE-2022-1280 CVE-2022-1280 https://access.redhat.com/security/cve/CVE-2022-1353 CVE-2022-1353 CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-1679 CVE-2022-1679 CVE-2022-1679 https://access.redhat.com/security/cve/CVE-2022-1852 CVE-2022-1852 CVE-2022-1852 https://access.redhat.com/security/cve/CVE-2022-1998 CVE-2022-1998 CVE-2022-1998 https://access.redhat.com/security/cve/CVE-2022-20368 CVE-2022-20368 CVE-2022-20368 https://access.redhat.com/security/cve/CVE-2022-21123 CVE-2022-21123 CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 CVE-2022-21125 CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 CVE-2022-21166 CVE-2022-21166 https://access.redhat.com/security/cve/CVE-2022-21499 CVE-2022-21499 CVE-2022-21499 https://access.redhat.com/security/cve/CVE-2022-23816 CVE-2022-23816 CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 CVE-2022-23825 CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-24448 CVE-2022-24448 CVE-2022-24448 https://access.redhat.com/security/cve/CVE-2022-2586 CVE-2022-2586 CVE-2022-2586 https://access.redhat.com/security/cve/CVE-2022-26373 CVE-2022-26373 CVE-2022-26373 https://access.redhat.com/security/cve/CVE-2022-2639 CVE-2022-2639 CVE-2022-2639 https://access.redhat.com/security/cve/CVE-2022-28390 CVE-2022-28390 CVE-2022-28390 https://access.redhat.com/security/cve/CVE-2022-28893 CVE-2022-28893 CVE-2022-28893 https://access.redhat.com/security/cve/CVE-2022-29581 CVE-2022-29581 CVE-2022-29581 https://access.redhat.com/security/cve/CVE-2022-29900 CVE-2022-29900 CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 CVE-2022-29901 CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-36946 CVE-2022-36946 CVE-2022-36946 https://access.redhat.com/security/cve/CVE-2022-39190 CVE-2022-39190 CVE-2022-39190 https://bugzilla.redhat.com/1980646 1980646 https://bugzilla.redhat.com/2037386 2037386 https://bugzilla.redhat.com/2051444 2051444 https://bugzilla.redhat.com/2052312 2052312 https://bugzilla.redhat.com/2053632 2053632 https://bugzilla.redhat.com/2058395 2058395 https://bugzilla.redhat.com/2059928 2059928 https://bugzilla.redhat.com/2066614 2066614 https://bugzilla.redhat.com/2066706 2066706 https://bugzilla.redhat.com/2066819 2066819 https://bugzilla.redhat.com/2070205 2070205 https://bugzilla.redhat.com/2071022 2071022 https://bugzilla.redhat.com/2073064 2073064 https://bugzilla.redhat.com/2074208 2074208 https://bugzilla.redhat.com/2084125 2084125 https://bugzilla.redhat.com/2084183 2084183 https://bugzilla.redhat.com/2084479 2084479 https://bugzilla.redhat.com/2088021 2088021 https://bugzilla.redhat.com/2089815 2089815 https://bugzilla.redhat.com/2090226 2090226 https://bugzilla.redhat.com/2090237 2090237 https://bugzilla.redhat.com/2090240 2090240 https://bugzilla.redhat.com/2090241 2090241 https://bugzilla.redhat.com/2103148 2103148 https://bugzilla.redhat.com/2103153 2103153 https://bugzilla.redhat.com/2114878 2114878 https://bugzilla.redhat.com/2115065 2115065 https://bugzilla.redhat.com/2115278 2115278 https://bugzilla.redhat.com/2123695 2123695 https://bugzilla.redhat.com/2129152 2129152 https://errata.almalinux.org/9/ALSA-2022-8267.html ALSA-2022:8267 ALSA-2022:8267 6Bkernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm 2Bkernel-5.14.0-162.6.1.el9_1.x86_64.rpm 1Bbpftool-5.14.0-162.6.1.el9_1.x86_64.rpm <Bpython3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm 8Bkernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm Bkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm 4Bkernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm 5Bkernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm 9Bkernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm 7Bkernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm 3Bkernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm :Bkernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm ;Bkernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm 6Bkernel-debug-modules-5.14.0-162.6.1.el9_1.x86_64.rpm 2Bkernel-5.14.0-162.6.1.el9_1.x86_64.rpm 1Bbpftool-5.14.0-162.6.1.el9_1.x86_64.rpm <Bpython3-perf-5.14.0-162.6.1.el9_1.x86_64.rpm 8Bkernel-modules-5.14.0-162.6.1.el9_1.x86_64.rpm Bkernel-abi-stablelists-5.14.0-162.6.1.el9_1.noarch.rpm 4Bkernel-debug-5.14.0-162.6.1.el9_1.x86_64.rpm 5Bkernel-debug-core-5.14.0-162.6.1.el9_1.x86_64.rpm 9Bkernel-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm 7Bkernel-debug-modules-extra-5.14.0-162.6.1.el9_1.x86_64.rpm 3Bkernel-core-5.14.0-162.6.1.el9_1.x86_64.rpm :Bkernel-tools-5.14.0-162.6.1.el9_1.x86_64.rpm ;Bkernel-tools-libs-5.14.0-162.6.1.el9_1.x86_64.rpm ��۰Q� �*�Usecurity Moderate: rsync security and bug fix update [��H�zhttps://access.redhat.com/errata/RHSA-2022:8291 RHSA-2022:8291 RHSA-2022:8291 https://access.redhat.com/security/cve/CVE-2022-37434 CVE-2022-37434 CVE-2022-37434 https://bugzilla.redhat.com/2116639 2116639 https://errata.almalinux.org/9/ALSA-2022-8291.html ALSA-2022:8291 ALSA-2022:8291 �8�ersync-3.2.3-18.el9.x86_64.rpm �8�ersync-3.2.3-18.el9.x86_64.rpm ��ۨ3� �+�WBBBBBBBBsecurity Low: curl security update [n��B�8https://access.redhat.com/errata/RHSA-2022:8299 RHSA-2022:8299 RHSA-2022:8299 https://access.redhat.com/security/cve/CVE-2022-27775 CVE-2022-27775 CVE-2022-27775 https://bugzilla.redhat.com/2078388 2078388 https://errata.almalinux.org/9/ALSA-2022-8299.html ALSA-2022:8299 ALSA-2022:8299 Fplibcurl-minimal-7.76.1-19.el9.x86_64.rpm Eplibcurl-7.76.1-19.el9.x86_64.rpm Eplibcurl-7.76.1-19.el9.i686.rpm Fplibcurl-minimal-7.76.1-19.el9.i686.rpm jpcurl-7.76.1-19.el9.x86_64.rpm kpcurl-minimal-7.76.1-19.el9.x86_64.rpm Fplibcurl-minimal-7.76.1-19.el9.x86_64.rpm Eplibcurl-7.76.1-19.el9.x86_64.rpm Eplibcurl-7.76.1-19.el9.i686.rpm Fplibcurl-minimal-7.76.1-19.el9.i686.rpm jpcurl-7.76.1-19.el9.x86_64.rpm kpcurl-minimal-7.76.1-19.el9.x86_64.rpm ��ދ� �,�aBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update [��z�mhttps://access.redhat.com/errata/RHSA-2022:8317 RHSA-2022:8317 RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742 CVE-2022-32742 CVE-2022-32742 https://bugzilla.redhat.com/2108196 2108196 https://errata.almalinux.org/9/ALSA-2022-8317.html ALSA-2022:8317 ALSA-2022:8317 �(samba-winbind-4.16.4-101.el9.x86_64.rpm �'samba-common-tools-4.16.4-101.el9.x86_64.rpm blibsmbclient-4.16.4-101.el9.x86_64.rpm �samba-common-4.16.4-101.el9.noarch.rpm hsamba-winbind-modules-4.16.4-101.el9.x86_64.rpm gsamba-libs-4.16.4-101.el9.x86_64.rpm esamba-client-libs-4.16.4-101.el9.i686.rpm clibwbclient-4.16.4-101.el9.x86_64.rpm clibwbclient-4.16.4-101.el9.i686.rpm gsamba-libs-4.16.4-101.el9.i686.rpm fsamba-common-libs-4.16.4-101.el9.i686.rpm esamba-client-libs-4.16.4-101.el9.x86_64.rpm blibsmbclient-4.16.4-101.el9.i686.rpm dpython3-samba-4.16.4-101.el9.i686.rpm �&samba-4.16.4-101.el9.x86_64.rpm hsamba-winbind-modules-4.16.4-101.el9.i686.rpm dpython3-samba-4.16.4-101.el9.x86_64.rpm fsamba-common-libs-4.16.4-101.el9.x86_64.rpm �(samba-winbind-4.16.4-101.el9.x86_64.rpm �'samba-common-tools-4.16.4-101.el9.x86_64.rpm blibsmbclient-4.16.4-101.el9.x86_64.rpm �samba-common-4.16.4-101.el9.noarch.rpm hsamba-winbind-modules-4.16.4-101.el9.x86_64.rpm gsamba-libs-4.16.4-101.el9.x86_64.rpm esamba-client-libs-4.16.4-101.el9.i686.rpm clibwbclient-4.16.4-101.el9.x86_64.rpm clibwbclient-4.16.4-101.el9.i686.rpm gsamba-libs-4.16.4-101.el9.i686.rpm fsamba-common-libs-4.16.4-101.el9.i686.rpm esamba-client-libs-4.16.4-101.el9.x86_64.rpm blibsmbclient-4.16.4-101.el9.i686.rpm dpython3-samba-4.16.4-101.el9.i686.rpm �&samba-4.16.4-101.el9.x86_64.rpm hsamba-winbind-modules-4.16.4-101.el9.i686.rpm dpython3-samba-4.16.4-101.el9.x86_64.rpm fsamba-common-libs-4.16.4-101.el9.x86_64.rpm ��ދN� ��}BBBBBBsecurity Moderate: libldb security, bug fix, and enhancement update [��g�Lhttps://access.redhat.com/errata/RHSA-2022:8318 RHSA-2022:8318 RHSA-2022:8318 https://access.redhat.com/security/cve/CVE-2022-32746 CVE-2022-32746 CVE-2022-32746 https://bugzilla.redhat.com/2108215 2108215 https://errata.almalinux.org/9/ALSA-2022-8318.html ALSA-2022:8318 ALSA-2022:8318 �[�python3-ldb-2.5.2-1.el9.i686.rpm �N�libldb-2.5.2-1.el9.i686.rpm ��ldb-tools-2.5.2-1.el9.x86_64.rpm �N�libldb-2.5.2-1.el9.x86_64.rpm �[�python3-ldb-2.5.2-1.el9.x86_64.rpm �[�python3-ldb-2.5.2-1.el9.i686.rpm �N�libldb-2.5.2-1.el9.i686.rpm ��ldb-tools-2.5.2-1.el9.x86_64.rpm �N�libldb-2.5.2-1.el9.x86_64.rpm �[�python3-ldb-2.5.2-1.el9.x86_64.rpm ��ތ� �-�FBsecurity Moderate: freetype security update [��3�Ohttps://access.redhat.com/errata/RHSA-2022:8340 RHSA-2022:8340 RHSA-2022:8340 https://access.redhat.com/security/cve/CVE-2022-27404 CVE-2022-27404 CVE-2022-27404 https://access.redhat.com/security/cve/CVE-2022-27405 CVE-2022-27405 CVE-2022-27405 https://access.redhat.com/security/cve/CVE-2022-27406 CVE-2022-27406 CVE-2022-27406 https://bugzilla.redhat.com/2077985 2077985 https://bugzilla.redhat.com/2077989 2077989 https://bugzilla.redhat.com/2077991 2077991 https://errata.almalinux.org/9/ALSA-2022-8340.html ALSA-2022:8340 ALSA-2022:8340 �G�)freetype-2.10.4-9.el9.i686.rpm �G�)freetype-2.10.4-9.el9.x86_64.rpm �G�)freetype-2.10.4-9.el9.i686.rpm �G�)freetype-2.10.4-9.el9.x86_64.rpm ��ތ*� �.�IBBBsecurity Moderate: python3.9 security, bug fix, and enhancement update [���5https://access.redhat.com/errata/RHSA-2022:8353 RHSA-2022:8353 RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107 CVE-2015-20107 CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2021-28861 CVE-2021-28861 CVE-2021-28861 https://bugzilla.redhat.com/2075390 2075390 https://bugzilla.redhat.com/2120642 2120642 https://errata.almalinux.org/9/ALSA-2022-8353.html ALSA-2022:8353 ALSA-2022:8353 \�Vpython3-3.9.14-1.el9.x86_64.rpm 0�Vpython3-libs-3.9.14-1.el9.i686.rpm 0�Vpython3-libs-3.9.14-1.el9.x86_64.rpm \�Vpython3-3.9.14-1.el9.x86_64.rpm 0�Vpython3-libs-3.9.14-1.el9.i686.rpm 0�Vpython3-libs-3.9.14-1.el9.x86_64.rpm ��ތ_� �/�NBBBBBBBBBsecurity Moderate: e2fsprogs security update [��7�<https://access.redhat.com/errata/RHSA-2022:8361 RHSA-2022:8361 RHSA-2022:8361 https://access.redhat.com/security/cve/CVE-2022-1304 CVE-2022-1304 CVE-2022-1304 https://bugzilla.redhat.com/2069726 2069726 https://errata.almalinux.org/9/ALSA-2022-8361.html ALSA-2022:8361 ALSA-2022:8361 �Ele2fsprogs-libs-1.46.5-3.el9.x86_64.rpm �Pllibss-1.46.5-3.el9.x86_64.rpm �Ele2fsprogs-libs-1.46.5-3.el9.i686.rpm �Jllibcom_err-1.46.5-3.el9.i686.rpm �Jllibcom_err-1.46.5-3.el9.x86_64.rpm �Pllibss-1.46.5-3.el9.i686.rpm �le2fsprogs-1.46.5-3.el9.x86_64.rpm �Ele2fsprogs-libs-1.46.5-3.el9.x86_64.rpm �Pllibss-1.46.5-3.el9.x86_64.rpm �Ele2fsprogs-libs-1.46.5-3.el9.i686.rpm �Jllibcom_err-1.46.5-3.el9.i686.rpm �Jllibcom_err-1.46.5-3.el9.x86_64.rpm �Pllibss-1.46.5-3.el9.i686.rpm �le2fsprogs-1.46.5-3.el9.x86_64.rpm ����p� �0�YBsecurity Moderate: harfbuzz security update [��s�uhttps://access.redhat.com/errata/RHSA-2022:8384 RHSA-2022:8384 RHSA-2022:8384 https://access.redhat.com/security/cve/CVE-2022-33068 CVE-2022-33068 CVE-2022-33068 https://bugzilla.redhat.com/2102608 2102608 https://errata.almalinux.org/9/ALSA-2022-8384.html ALSA-2022:8384 ALSA-2022:8384 �n�2harfbuzz-2.7.4-8.el9.x86_64.rpm �n�2harfbuzz-2.7.4-8.el9.i686.rpm �n�2harfbuzz-2.7.4-8.el9.x86_64.rpm �n�2harfbuzz-2.7.4-8.el9.i686.rpm ��ލ � �#�\BBBBBsecurity Moderate: dhcp security and enhancement update [��h�}https://access.redhat.com/errata/RHSA-2022:8385 RHSA-2022:8385 RHSA-2022:8385 https://access.redhat.com/security/cve/CVE-2021-25220 CVE-2021-25220 CVE-2021-25220 https://bugzilla.redhat.com/2064512 2064512 https://errata.almalinux.org/9/ALSA-2022-8385.html ALSA-2022:8385 ALSA-2022:8385 �u�dhcp-common-4.4.2-17.b1.el9.noarch.rpm �w�dhcp-server-4.4.2-17.b1.el9.x86_64.rpm �t�dhcp-client-4.4.2-17.b1.el9.x86_64.rpm �v�dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm �u�dhcp-common-4.4.2-17.b1.el9.noarch.rpm �w�dhcp-server-4.4.2-17.b1.el9.x86_64.rpm �t�dhcp-client-4.4.2-17.b1.el9.x86_64.rpm �v�dhcp-relay-4.4.2-17.b1.el9.x86_64.rpm ����� �&�dsecurity Moderate: logrotate security update [��e�Jhttps://access.redhat.com/errata/RHSA-2022:8393 RHSA-2022:8393 RHSA-2022:8393 https://access.redhat.com/security/cve/CVE-2022-1348 CVE-2022-1348 CVE-2022-1348 https://bugzilla.redhat.com/2075074 2075074 https://errata.almalinux.org/9/ALSA-2022-8393.html ALSA-2022:8393 ALSA-2022:8393 ��dlogrotate-3.18.0-7.el9.x86_64.rpm ��dlogrotate-3.18.0-7.el9.x86_64.rpm ����K� �*�gBsecurity Moderate: libtirpc security update [��/�{https://access.redhat.com/errata/RHSA-2022:8400 RHSA-2022:8400 RHSA-2022:8400 https://access.redhat.com/security/cve/CVE-2021-46828 CVE-2021-46828 CVE-2021-46828 https://bugzilla.redhat.com/2109352 2109352 https://errata.almalinux.org/9/ALSA-2022-8400.html ALSA-2022:8400 ALSA-2022:8400 �V�libtirpc-1.3.3-0.el9.i686.rpm �V�libtirpc-1.3.3-0.el9.x86_64.rpm �V�libtirpc-1.3.3-0.el9.i686.rpm �V�libtirpc-1.3.3-0.el9.x86_64.rpm ��ލR� �-�ksecurity Important: device-mapper-multipath security update [=��*�.https://access.redhat.com/errata/RHSA-2022:8453 RHSA-2022:8453 RHSA-2022:8453 https://access.redhat.com/security/cve/CVE-2022-3787 CVE-2022-3787 CVE-2022-3787 https://bugzilla.redhat.com/2138959 2138959 https://errata.almalinux.org/9/ALSA-2022-8453.html ALSA-2022:8453 ALSA-2022:8453 � �Wdevice-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm � �Wdevice-mapper-multipath-0.8.7-12.el9_1.1.x86_64.rpm ����`� �1�nBBBsecurity Important: python3.9 security update [=��X�Qhttps://access.redhat.com/errata/RHSA-2022:8493 RHSA-2022:8493 RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919 CVE-2022-42919 CVE-2022-42919 https://bugzilla.redhat.com/2138705 2138705 https://errata.almalinux.org/9/ALSA-2022-8493.html ALSA-2022:8493 ALSA-2022:8493 0�Wpython3-libs-3.9.14-1.el9_1.1.i686.rpm \�Wpython3-3.9.14-1.el9_1.1.x86_64.rpm 0�Wpython3-libs-3.9.14-1.el9_1.1.x86_64.rpm 0�Wpython3-libs-3.9.14-1.el9_1.1.i686.rpm \�Wpython3-3.9.14-1.el9_1.1.x86_64.rpm 0�Wpython3-libs-3.9.14-1.el9_1.1.x86_64.rpm ����|� �2�sBBBBBBBBBBBBBBBsecurity Important: krb5 security update [=��)�ghttps://access.redhat.com/errata/RHSA-2022:8637 RHSA-2022:8637 RHSA-2022:8637 https://access.redhat.com/security/cve/CVE-2022-42898 CVE-2022-42898 CVE-2022-42898 https://bugzilla.redhat.com/2140960 2140960 https://errata.almalinux.org/9/ALSA-2022-8637.html ALSA-2022:8637 ALSA-2022:8637 ^Tkrb5-pkinit-1.19.1-24.el9_1.i686.rpm `Tkrb5-server-ldap-1.19.1-24.el9_1.i686.rpm ]Tkrb5-libs-1.19.1-24.el9_1.x86_64.rpm _Tkrb5-server-1.19.1-24.el9_1.x86_64.rpm `Tkrb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm aTlibkadm5-1.19.1-24.el9_1.x86_64.rpm ]Tkrb5-libs-1.19.1-24.el9_1.i686.rpm �%Tkrb5-workstation-1.19.1-24.el9_1.x86_64.rpm _Tkrb5-server-1.19.1-24.el9_1.i686.rpm aTlibkadm5-1.19.1-24.el9_1.i686.rpm ^Tkrb5-pkinit-1.19.1-24.el9_1.x86_64.rpm ^Tkrb5-pkinit-1.19.1-24.el9_1.i686.rpm `Tkrb5-server-ldap-1.19.1-24.el9_1.i686.rpm ]Tkrb5-libs-1.19.1-24.el9_1.x86_64.rpm _Tkrb5-server-1.19.1-24.el9_1.x86_64.rpm `Tkrb5-server-ldap-1.19.1-24.el9_1.x86_64.rpm aTlibkadm5-1.19.1-24.el9_1.x86_64.rpm ]Tkrb5-libs-1.19.1-24.el9_1.i686.rpm �%Tkrb5-workstation-1.19.1-24.el9_1.x86_64.rpm _Tkrb5-server-1.19.1-24.el9_1.i686.rpm aTlibkadm5-1.19.1-24.el9_1.i686.rpm ^Tkrb5-pkinit-1.19.1-24.el9_1.x86_64.rpm �����! �3�Dsecurity Important: sudo security update =���https://access.redhat.com/errata/RHSA-2023:0282 RHSA-2023:0282 RHSA-2023:0282 https://access.redhat.com/security/cve/CVE-2023-22809 CVE-2023-22809 CVE-2023-22809 https://bugzilla.redhat.com/2161142 2161142 https://errata.almalinux.org/9/ALSA-2023-0282.html ALSA-2023:0282 ALSA-2023:0282 �Q�\sudo-1.9.5p2-7.el9_1.1.x86_64.rpm �Q�\sudo-1.9.5p2-7.el9_1.1.x86_64.rpm ����O�" �4�FBBBBBBBBsecurity Moderate: curl security update ���&https://access.redhat.com/errata/RHSA-2023:0333 RHSA-2023:0333 RHSA-2023:0333 https://access.redhat.com/security/cve/CVE-2022-32221 CVE-2022-32221 CVE-2022-32221 https://bugzilla.redhat.com/2135411 2135411 https://errata.almalinux.org/9/ALSA-2023-0333.html ALSA-2023:0333 ALSA-2023:0333 jqcurl-7.76.1-19.el9_1.1.x86_64.rpm Fqlibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm Eqlibcurl-7.76.1-19.el9_1.1.x86_64.rpm Eqlibcurl-7.76.1-19.el9_1.1.i686.rpm Fqlibcurl-minimal-7.76.1-19.el9_1.1.i686.rpm kqcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm jqcurl-7.76.1-19.el9_1.1.x86_64.rpm Fqlibcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm Eqlibcurl-7.76.1-19.el9_1.1.x86_64.rpm Eqlibcurl-7.76.1-19.el9_1.1.i686.rpm Fqlibcurl-minimal-7.76.1-19.el9_1.1.i686.rpm kqcurl-minimal-7.76.1-19.el9_1.1.x86_64.rpm �����# �5�PBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update =��D�;https://access.redhat.com/errata/RHSA-2023:0334 RHSA-2023:0334 RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959 CVE-2022-2959 CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 CVE-2022-2964 CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-30594 CVE-2022-30594 CVE-2022-30594 https://access.redhat.com/security/cve/CVE-2022-3077 CVE-2022-3077 CVE-2022-3077 https://access.redhat.com/security/cve/CVE-2022-4139 CVE-2022-4139 CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945 CVE-2022-43945 CVE-2022-43945 https://bugzilla.redhat.com/2067482 2067482 https://bugzilla.redhat.com/2085300 2085300 https://bugzilla.redhat.com/2103681 2103681 https://bugzilla.redhat.com/2123309 2123309 https://bugzilla.redhat.com/2141752 2141752 https://bugzilla.redhat.com/2147572 2147572 https://errata.almalinux.org/9/ALSA-2023-0334.html ALSA-2023:0334 ALSA-2023:0334 7>kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm 9>kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm 2>kernel-5.14.0-162.12.1.el9_1.x86_64.rpm 6>kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm :>kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm <>python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm 1>bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm 4>kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm >kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm 3>kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm 5>kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm 8>kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm ;>kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm 7>kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm 9>kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm 2>kernel-5.14.0-162.12.1.el9_1.x86_64.rpm 6>kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm :>kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm <>python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm 1>bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm 4>kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm >kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm 3>kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm 5>kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm 8>kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm ;>kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm ����f�$ �6�iBBBBBBsecurity Moderate: dbus security update ���^https://access.redhat.com/errata/RHSA-2023:0335 RHSA-2023:0335 RHSA-2023:0335 https://access.redhat.com/security/cve/CVE-2022-42010 CVE-2022-42010 CVE-2022-42010 https://access.redhat.com/security/cve/CVE-2022-42011 CVE-2022-42011 CVE-2022-42011 https://access.redhat.com/security/cve/CVE-2022-42012 CVE-2022-42012 CVE-2022-42012 https://bugzilla.redhat.com/2133616 2133616 https://bugzilla.redhat.com/2133617 2133617 https://bugzilla.redhat.com/2133618 2133618 https://errata.almalinux.org/9/ALSA-2023-0335.html ALSA-2023:0335 ALSA-2023:0335 �q� dbus-1.12.20-7.el9_1.x86_64.rpm �i� dbus-libs-1.12.20-7.el9_1.x86_64.rpm �r� dbus-common-1.12.20-7.el9_1.noarch.rpm �s� dbus-tools-1.12.20-7.el9_1.x86_64.rpm �i� dbus-libs-1.12.20-7.el9_1.i686.rpm �q� dbus-1.12.20-7.el9_1.x86_64.rpm �i� dbus-libs-1.12.20-7.el9_1.x86_64.rpm �r� dbus-common-1.12.20-7.el9_1.noarch.rpm �s� dbus-tools-1.12.20-7.el9_1.x86_64.rpm �i� dbus-libs-1.12.20-7.el9_1.i686.rpm ����}�% �7�qBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update ��]�Qhttps://access.redhat.com/errata/RHSA-2023:0336 RHSA-2023:0336 RHSA-2023:0336 https://access.redhat.com/security/cve/CVE-2022-3821 CVE-2022-3821 CVE-2022-3821 https://bugzilla.redhat.com/2139327 2139327 https://errata.almalinux.org/9/ALSA-2023-0336.html ALSA-2023:0336 ALSA-2023:0336 � Rsystemd-container-250-12.el9_1.1.x86_64.rpm �!Rsystemd-libs-250-12.el9_1.1.i686.rpm �!Rsystemd-libs-250-12.el9_1.1.x86_64.rpm �Rsystemd-rpm-macros-250-12.el9_1.1.noarch.rpm � Rsystemd-oomd-250-12.el9_1.1.x86_64.rpm �Rsystemd-resolved-250-12.el9_1.1.x86_64.rpm � Rsystemd-container-250-12.el9_1.1.i686.rpm �Rsystemd-250-12.el9_1.1.i686.rpm �Rsystemd-udev-250-12.el9_1.1.x86_64.rpm �Rsystemd-pam-250-12.el9_1.1.x86_64.rpm �Rsystemd-250-12.el9_1.1.x86_64.rpm � Rsystemd-container-250-12.el9_1.1.x86_64.rpm �!Rsystemd-libs-250-12.el9_1.1.i686.rpm �!Rsystemd-libs-250-12.el9_1.1.x86_64.rpm �Rsystemd-rpm-macros-250-12.el9_1.1.noarch.rpm � Rsystemd-oomd-250-12.el9_1.1.x86_64.rpm �Rsystemd-resolved-250-12.el9_1.1.x86_64.rpm � Rsystemd-container-250-12.el9_1.1.i686.rpm �Rsystemd-250-12.el9_1.1.i686.rpm �Rsystemd-udev-250-12.el9_1.1.x86_64.rpm �Rsystemd-pam-250-12.el9_1.1.x86_64.rpm �Rsystemd-250-12.el9_1.1.x86_64.rpm �����& �8�CBsecurity Moderate: expat security update ��.�}https://access.redhat.com/errata/RHSA-2023:0337 RHSA-2023:0337 RHSA-2023:0337 https://access.redhat.com/security/cve/CVE-2022-43680 CVE-2022-43680 CVE-2022-43680 https://bugzilla.redhat.com/2140059 2140059 https://errata.almalinux.org/9/ALSA-2023-0337.html ALSA-2023:0337 ALSA-2023:0337 m�*expat-2.4.9-1.el9_1.1.i686.rpm m�*expat-2.4.9-1.el9_1.1.x86_64.rpm m�*expat-2.4.9-1.el9_1.1.i686.rpm m�*expat-2.4.9-1.el9_1.1.x86_64.rpm �����' �9�FBBBsecurity Moderate: libxml2 security update ��+�Fhttps://access.redhat.com/errata/RHSA-2023:0338 RHSA-2023:0338 RHSA-2023:0338 https://access.redhat.com/security/cve/CVE-2022-40303 CVE-2022-40303 CVE-2022-40303 https://access.redhat.com/security/cve/CVE-2022-40304 CVE-2022-40304 CVE-2022-40304 https://bugzilla.redhat.com/2136266 2136266 https://bugzilla.redhat.com/2136288 2136288 https://errata.almalinux.org/9/ALSA-2023-0338.html ALSA-2023:0338 ALSA-2023:0338 ��Qlibxml2-2.9.13-3.el9_1.i686.rpm ��Qlibxml2-2.9.13-3.el9_1.x86_64.rpm ��Qpython3-libxml2-2.9.13-3.el9_1.x86_64.rpm ��Qlibxml2-2.9.13-3.el9_1.i686.rpm ��Qlibxml2-2.9.13-3.el9_1.x86_64.rpm ��Qpython3-libxml2-2.9.13-3.el9_1.x86_64.rpm �����( �:�KBsecurity Moderate: sqlite security update ��q�<https://access.redhat.com/errata/RHSA-2023:0339 RHSA-2023:0339 RHSA-2023:0339 https://access.redhat.com/security/cve/CVE-2022-35737 CVE-2022-35737 CVE-2022-35737 https://bugzilla.redhat.com/2110291 2110291 https://errata.almalinux.org/9/ALSA-2023-0339.html ALSA-2023:0339 ALSA-2023:0339 �t�6sqlite-libs-3.34.1-6.el9_1.i686.rpm �t�6sqlite-libs-3.34.1-6.el9_1.x86_64.rpm �t�6sqlite-libs-3.34.1-6.el9_1.i686.rpm �t�6sqlite-libs-3.34.1-6.el9_1.x86_64.rpm ����~�) ��Nsecurity Moderate: bash security update ��-�}https://access.redhat.com/errata/RHSA-2023:0340 RHSA-2023:0340 RHSA-2023:0340 https://access.redhat.com/security/cve/CVE-2022-3715 CVE-2022-3715 CVE-2022-3715 https://bugzilla.redhat.com/2126720 2126720 https://errata.almalinux.org/9/ALSA-2023-0340.html ALSA-2023:0340 ALSA-2023:0340 ��jbash-5.1.8-6.el9_1.x86_64.rpm ��jbash-5.1.8-6.el9_1.x86_64.rpm �����* �;�QBsecurity Moderate: libtasn1 security update ��*�uhttps://access.redhat.com/errata/RHSA-2023:0343 RHSA-2023:0343 RHSA-2023:0343 https://access.redhat.com/security/cve/CVE-2021-46848 CVE-2021-46848 CVE-2021-46848 https://bugzilla.redhat.com/2140058 2140058 https://errata.almalinux.org/9/ALSA-2023-0343.html ALSA-2023:0343 ALSA-2023:0343 �U�>libtasn1-4.16.0-8.el9_1.x86_64.rpm �U�>libtasn1-4.16.0-8.el9_1.i686.rpm �U�>libtasn1-4.16.0-8.el9_1.x86_64.rpm �U�>libtasn1-4.16.0-8.el9_1.i686.rpm ����O�+ ��TBsecurity Important: libksba security update =���Jhttps://access.redhat.com/errata/RHSA-2023:0626 RHSA-2023:0626 RHSA-2023:0626 https://access.redhat.com/security/cve/CVE-2022-47629 CVE-2022-47629 CVE-2022-47629 https://bugzilla.redhat.com/2161571 2161571 https://errata.almalinux.org/9/ALSA-2023-0626.html ALSA-2023:0626 ALSA-2023:0626 �p�"libksba-1.5.1-6.el9_1.x86_64.rpm �p�"libksba-1.5.1-6.el9_1.i686.rpm �p�"libksba-1.5.1-6.el9_1.x86_64.rpm �p�"libksba-1.5.1-6.el9_1.i686.rpm ����s�, �+�XBBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update ��i�Chttps://access.redhat.com/errata/RHSA-2023:0752 RHSA-2023:0752 RHSA-2023:0752 https://access.redhat.com/security/cve/CVE-2022-2601 CVE-2022-2601 CVE-2022-2601 https://access.redhat.com/security/cve/CVE-2022-3775 CVE-2022-3775 CVE-2022-3775 https://bugzilla.redhat.com/2112975 2112975 https://bugzilla.redhat.com/2138880 2138880 https://errata.almalinux.org/9/ALSA-2023-0752.html ALSA-2023:0752 ALSA-2023:0752 �|Hgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm �{Hgrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm �-Hgrub2-common-2.06-46.el9_1.3.alma.noarch.rpm �}Hgrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm �~Hgrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm �.Hgrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm �Hgrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm �zHgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm �0Hgrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm �/Hgrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm �yHgrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm �xHgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm �|Hgrub2-tools-efi-2.06-46.el9_1.3.alma.x86_64.rpm �{Hgrub2-tools-2.06-46.el9_1.3.alma.x86_64.rpm �-Hgrub2-common-2.06-46.el9_1.3.alma.noarch.rpm �}Hgrub2-tools-extra-2.06-46.el9_1.3.alma.x86_64.rpm �~Hgrub2-tools-minimal-2.06-46.el9_1.3.alma.x86_64.rpm �.Hgrub2-efi-aa64-modules-2.06-46.el9_1.3.alma.noarch.rpm �Hgrub2-ppc64le-modules-2.06-46.el9_1.3.alma.noarch.rpm �zHgrub2-pc-2.06-46.el9_1.3.alma.x86_64.rpm �0Hgrub2-pc-modules-2.06-46.el9_1.3.alma.noarch.rpm �/Hgrub2-efi-x64-modules-2.06-46.el9_1.3.alma.noarch.rpm �yHgrub2-efi-x64-cdboot-2.06-46.el9_1.3.alma.x86_64.rpm �xHgrub2-efi-x64-2.06-46.el9_1.3.alma.x86_64.rpm ����#�- �<�lBBBsecurity Moderate: openssl security and bug fix update ��,�"https://access.redhat.com/errata/RHSA-2023:0946 RHSA-2023:0946 RHSA-2023:0946 https://access.redhat.com/security/cve/CVE-2022-4203 CVE-2022-4203 CVE-2022-4203 https://access.redhat.com/security/cve/CVE-2022-4304 CVE-2022-4304 CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 CVE-2022-4450 CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 CVE-2023-0215 CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0216 CVE-2023-0216 CVE-2023-0216 https://access.redhat.com/security/cve/CVE-2023-0217 CVE-2023-0217 CVE-2023-0217 https://access.redhat.com/security/cve/CVE-2023-0286 CVE-2023-0286 CVE-2023-0286 https://access.redhat.com/security/cve/CVE-2023-0401 CVE-2023-0401 CVE-2023-0401 https://bugzilla.redhat.com/2164440 2164440 https://bugzilla.redhat.com/2164487 2164487 https://bugzilla.redhat.com/2164488 2164488 https://bugzilla.redhat.com/2164492 2164492 https://bugzilla.redhat.com/2164494 2164494 https://bugzilla.redhat.com/2164497 2164497 https://bugzilla.redhat.com/2164499 2164499 https://bugzilla.redhat.com/2164500 2164500 https://errata.almalinux.org/9/ALSA-2023-0946.html ALSA-2023:0946 ALSA-2023:0946 Z�Hopenssl-libs-3.0.1-47.el9_1.i686.rpm }�Hopenssl-3.0.1-47.el9_1.x86_64.rpm Z�Hopenssl-libs-3.0.1-47.el9_1.x86_64.rpm Z�Hopenssl-libs-3.0.1-47.el9_1.i686.rpm }�Hopenssl-3.0.1-47.el9_1.x86_64.rpm Z�Hopenssl-libs-3.0.1-47.el9_1.x86_64.rpm ����r�. �=�qBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update =��N�~https://access.redhat.com/errata/RHSA-2023:0951 RHSA-2023:0951 RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873 CVE-2022-2873 CVE-2022-2873 https://access.redhat.com/security/cve/CVE-2022-3564 CVE-2022-3564 CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-4378 CVE-2022-4378 CVE-2022-4378 https://access.redhat.com/security/cve/CVE-2022-4379 CVE-2022-4379 CVE-2022-4379 https://access.redhat.com/security/cve/CVE-2023-0179 CVE-2023-0179 CVE-2023-0179 https://bugzilla.redhat.com/2119048 2119048 https://bugzilla.redhat.com/2150999 2150999 https://bugzilla.redhat.com/2152548 2152548 https://bugzilla.redhat.com/2152807 2152807 https://bugzilla.redhat.com/2161713 2161713 https://errata.almalinux.org/9/ALSA-2023-0951.html ALSA-2023:0951 ALSA-2023:0951 ?kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm ;?kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm 2?kernel-5.14.0-162.18.1.el9_1.x86_64.rpm :?kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm 7?kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm 5?kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm 8?kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm 1?bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm <?python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm 3?kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm 4?kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm 9?kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm 6?kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm ?kernel-abi-stablelists-5.14.0-162.18.1.el9_1.noarch.rpm ;?kernel-tools-libs-5.14.0-162.18.1.el9_1.x86_64.rpm 2?kernel-5.14.0-162.18.1.el9_1.x86_64.rpm :?kernel-tools-5.14.0-162.18.1.el9_1.x86_64.rpm 7?kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm 5?kernel-debug-core-5.14.0-162.18.1.el9_1.x86_64.rpm 8?kernel-modules-5.14.0-162.18.1.el9_1.x86_64.rpm 1?bpftool-5.14.0-162.18.1.el9_1.x86_64.rpm <?python3-perf-5.14.0-162.18.1.el9_1.x86_64.rpm 3?kernel-core-5.14.0-162.18.1.el9_1.x86_64.rpm 4?kernel-debug-5.14.0-162.18.1.el9_1.x86_64.rpm 9?kernel-modules-extra-5.14.0-162.18.1.el9_1.x86_64.rpm 6?kernel-debug-modules-5.14.0-162.18.1.el9_1.x86_64.rpm �����/ ��Jsecurity Moderate: python-setuptools security update ��L�^https://access.redhat.com/errata/RHSA-2023:0952 RHSA-2023:0952 RHSA-2023:0952 https://access.redhat.com/security/cve/CVE-2022-40897 CVE-2022-40897 CVE-2022-40897 https://bugzilla.redhat.com/2158559 2158559 https://errata.almalinux.org/9/ALSA-2023-0952.html ALSA-2023:0952 ALSA-2023:0952 �N�ipython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm �M�ipython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm �N�ipython3-setuptools-wheel-53.0.0-10.el9_1.1.noarch.rpm �M�ipython3-setuptools-53.0.0-10.el9_1.1.noarch.rpm ����l�0 �>�MBBBsecurity Moderate: python3.9 security update ��*�9https://access.redhat.com/errata/RHSA-2023:0953 RHSA-2023:0953 RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061 CVE-2022-45061 CVE-2022-45061 https://bugzilla.redhat.com/2144072 2144072 https://errata.almalinux.org/9/ALSA-2023-0953.html ALSA-2023:0953 ALSA-2023:0953 \�Xpython3-3.9.14-1.el9_1.2.x86_64.rpm 0�Xpython3-libs-3.9.14-1.el9_1.2.i686.rpm 0�Xpython3-libs-3.9.14-1.el9_1.2.x86_64.rpm \�Xpython3-3.9.14-1.el9_1.2.x86_64.rpm 0�Xpython3-libs-3.9.14-1.el9_1.2.i686.rpm 0�Xpython3-libs-3.9.14-1.el9_1.2.x86_64.rpm ����I�1 �?�RBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update ��c�]https://access.redhat.com/errata/RHSA-2023:0954 RHSA-2023:0954 RHSA-2023:0954 https://access.redhat.com/security/cve/CVE-2022-4415 CVE-2022-4415 CVE-2022-4415 https://access.redhat.com/security/cve/CVE-2022-45873 CVE-2022-45873 CVE-2022-45873 https://bugzilla.redhat.com/2149063 2149063 https://bugzilla.redhat.com/2155515 2155515 https://errata.almalinux.org/9/ALSA-2023-0954.html ALSA-2023:0954 ALSA-2023:0954 �!Ssystemd-libs-250-12.el9_1.3.x86_64.rpm �Ssystemd-resolved-250-12.el9_1.3.x86_64.rpm �Ssystemd-udev-250-12.el9_1.3.x86_64.rpm �Ssystemd-250-12.el9_1.3.i686.rpm � Ssystemd-oomd-250-12.el9_1.3.x86_64.rpm � Ssystemd-container-250-12.el9_1.3.x86_64.rpm �Ssystemd-250-12.el9_1.3.x86_64.rpm �!Ssystemd-libs-250-12.el9_1.3.i686.rpm � Ssystemd-container-250-12.el9_1.3.i686.rpm �Ssystemd-rpm-macros-250-12.el9_1.3.noarch.rpm �Ssystemd-pam-250-12.el9_1.3.x86_64.rpm �!Ssystemd-libs-250-12.el9_1.3.x86_64.rpm �Ssystemd-resolved-250-12.el9_1.3.x86_64.rpm �Ssystemd-udev-250-12.el9_1.3.x86_64.rpm �Ssystemd-250-12.el9_1.3.i686.rpm � Ssystemd-oomd-250-12.el9_1.3.x86_64.rpm � Ssystemd-container-250-12.el9_1.3.x86_64.rpm �Ssystemd-250-12.el9_1.3.x86_64.rpm �!Ssystemd-libs-250-12.el9_1.3.i686.rpm � Ssystemd-container-250-12.el9_1.3.i686.rpm �Ssystemd-rpm-macros-250-12.el9_1.3.noarch.rpm �Ssystemd-pam-250-12.el9_1.3.x86_64.rpm ����|�2 � �dBsecurity Moderate: lua security update ��@�8https://access.redhat.com/errata/RHSA-2023:0957 RHSA-2023:0957 RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519 CVE-2021-43519 CVE-2021-43519 https://access.redhat.com/security/cve/CVE-2021-44964 CVE-2021-44964 CVE-2021-44964 https://bugzilla.redhat.com/2047672 2047672 https://bugzilla.redhat.com/2064772 2064772 https://errata.almalinux.org/9/ALSA-2023-0957.html ALSA-2023:0957 ALSA-2023:0957 ��@lua-libs-5.4.4-2.el9_1.x86_64.rpm ��@lua-libs-5.4.4-2.el9_1.i686.rpm ��@lua-libs-5.4.4-2.el9_1.x86_64.rpm ��@lua-libs-5.4.4-2.el9_1.i686.rpm ����b�3 ��gBsecurity Moderate: vim security update ��x�ehttps://access.redhat.com/errata/RHSA-2023:0958 RHSA-2023:0958 RHSA-2023:0958 https://access.redhat.com/security/cve/CVE-2022-47024 CVE-2022-47024 CVE-2022-47024 https://bugzilla.redhat.com/2163613 2163613 https://errata.almalinux.org/9/ALSA-2023-0958.html ALSA-2023:0958 ALSA-2023:0958 ��3vim-minimal-8.2.2637-20.el9_1.x86_64.rpm �F�3vim-filesystem-8.2.2637-20.el9_1.noarch.rpm ��3vim-minimal-8.2.2637-20.el9_1.x86_64.rpm �F�3vim-filesystem-8.2.2637-20.el9_1.noarch.rpm ����A�4 �,�jsecurity Moderate: tar security update ��]�https://access.redhat.com/errata/RHSA-2023:0959 RHSA-2023:0959 RHSA-2023:0959 https://access.redhat.com/security/cve/CVE-2022-48303 CVE-2022-48303 CVE-2022-48303 https://bugzilla.redhat.com/2149722 2149722 https://errata.almalinux.org/9/ALSA-2023-0959.html ALSA-2023:0959 ALSA-2023:0959 �N�ctar-1.34-6.el9_1.x86_64.rpm �N�ctar-1.34-6.el9_1.x86_64.rpm ����r�5 ��mBsecurity Moderate: gnutls security and bug fix update ��s�https://access.redhat.com/errata/RHSA-2023:1141 RHSA-2023:1141 RHSA-2023:1141 https://access.redhat.com/security/cve/CVE-2023-0361 CVE-2023-0361 CVE-2023-0361 https://bugzilla.redhat.com/2162596 2162596 https://errata.almalinux.org/9/ALSA-2023-1141.html ALSA-2023:1141 ALSA-2023:1141 o�:gnutls-3.7.6-18.el9_1.x86_64.rpm o�:gnutls-3.7.6-18.el9_1.i686.rpm o�:gnutls-3.7.6-18.el9_1.x86_64.rpm o�:gnutls-3.7.6-18.el9_1.i686.rpm �����6 ��pBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update =���Yhttps://access.redhat.com/errata/RHSA-2023:1470 RHSA-2023:1470 RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269 CVE-2022-4269 CVE-2022-4269 https://access.redhat.com/security/cve/CVE-2022-4744 CVE-2022-4744 CVE-2022-4744 https://access.redhat.com/security/cve/CVE-2023-0266 CVE-2023-0266 CVE-2023-0266 https://bugzilla.redhat.com/2150272 2150272 https://bugzilla.redhat.com/2156322 2156322 https://bugzilla.redhat.com/2163379 2163379 https://errata.almalinux.org/9/ALSA-2023-1470.html ALSA-2023:1470 ALSA-2023:1470 2@kernel-5.14.0-162.22.2.el9_1.x86_64.rpm 1@bpftool-5.14.0-162.22.2.el9_1.x86_64.rpm 3@kernel-core-5.14.0-162.22.2.el9_1.x86_64.rpm 9@kernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm 8@kernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm <@python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm @kernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpm 4@kernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpm :@kernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpm 6@kernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpm 5@kernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpm ;@kernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpm 7@kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm 2@kernel-5.14.0-162.22.2.el9_1.x86_64.rpm 1@bpftool-5.14.0-162.22.2.el9_1.x86_64.rpm 3@kernel-core-5.14.0-162.22.2.el9_1.x86_64.rpm 9@kernel-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm 8@kernel-modules-5.14.0-162.22.2.el9_1.x86_64.rpm <@python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm @kernel-abi-stablelists-5.14.0-162.22.2.el9_1.noarch.rpm 4@kernel-debug-5.14.0-162.22.2.el9_1.x86_64.rpm :@kernel-tools-5.14.0-162.22.2.el9_1.x86_64.rpm 6@kernel-debug-modules-5.14.0-162.22.2.el9_1.x86_64.rpm 5@kernel-debug-core-5.14.0-162.22.2.el9_1.x86_64.rpm ;@kernel-tools-libs-5.14.0-162.22.2.el9_1.x86_64.rpm 7@kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.x86_64.rpm ����C�7 ��IBBBBBBBBsecurity Moderate: curl security update ��k�9https://access.redhat.com/errata/RHSA-2023:1701 RHSA-2023:1701 RHSA-2023:1701 https://access.redhat.com/security/cve/CVE-2023-23916 CVE-2023-23916 CVE-2023-23916 https://bugzilla.redhat.com/2167815 2167815 https://errata.almalinux.org/9/ALSA-2023-1701.html ALSA-2023:1701 ALSA-2023:1701 Erlibcurl-7.76.1-19.el9_1.2.x86_64.rpm Erlibcurl-7.76.1-19.el9_1.2.i686.rpm Frlibcurl-minimal-7.76.1-19.el9_1.2.i686.rpm jrcurl-7.76.1-19.el9_1.2.x86_64.rpm Frlibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm krcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm Erlibcurl-7.76.1-19.el9_1.2.x86_64.rpm Erlibcurl-7.76.1-19.el9_1.2.i686.rpm Frlibcurl-minimal-7.76.1-19.el9_1.2.i686.rpm jrcurl-7.76.1-19.el9_1.2.x86_64.rpm Frlibcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm krcurl-minimal-7.76.1-19.el9_1.2.x86_64.rpm �����8 ��SBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update =��$�4https://access.redhat.com/errata/RHSA-2023:1703 RHSA-2023:1703 RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386 CVE-2023-0386 CVE-2023-0386 https://bugzilla.redhat.com/2159505 2159505 https://errata.almalinux.org/9/ALSA-2023-1703.html ALSA-2023:1703 ALSA-2023:1703 1Abpftool-5.14.0-162.23.1.el9_1.x86_64.rpm 5Akernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm 9Akernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm 7Akernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm 3Akernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm 6Akernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm <Apython3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm 8Akernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm 4Akernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm :Akernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm Akernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm 2Akernel-5.14.0-162.23.1.el9_1.x86_64.rpm ;Akernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm 1Abpftool-5.14.0-162.23.1.el9_1.x86_64.rpm 5Akernel-debug-core-5.14.0-162.23.1.el9_1.x86_64.rpm 9Akernel-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm 7Akernel-debug-modules-extra-5.14.0-162.23.1.el9_1.x86_64.rpm 3Akernel-core-5.14.0-162.23.1.el9_1.x86_64.rpm 6Akernel-debug-modules-5.14.0-162.23.1.el9_1.x86_64.rpm <Apython3-perf-5.14.0-162.23.1.el9_1.x86_64.rpm 8Akernel-modules-5.14.0-162.23.1.el9_1.x86_64.rpm 4Akernel-debug-5.14.0-162.23.1.el9_1.x86_64.rpm :Akernel-tools-5.14.0-162.23.1.el9_1.x86_64.rpm Akernel-abi-stablelists-5.14.0-162.23.1.el9_1.noarch.rpm 2Akernel-5.14.0-162.23.1.el9_1.x86_64.rpm ;Akernel-tools-libs-5.14.0-162.23.1.el9_1.x86_64.rpm �����9 ��lBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: samba security update =��X�https://access.redhat.com/errata/RHSA-2023:2127 RHSA-2023:2127 RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023 CVE-2022-38023 CVE-2022-38023 https://bugzilla.redhat.com/2154362 2154362 https://errata.almalinux.org/9/ALSA-2023-2127.html ALSA-2023:2127 ALSA-2023:2127 hsamba-winbind-modules-4.16.4-103.el9_1.i686.rpm esamba-client-libs-4.16.4-103.el9_1.x86_64.rpm clibwbclient-4.16.4-103.el9_1.x86_64.rpm �'samba-common-tools-4.16.4-103.el9_1.x86_64.rpm hsamba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm gsamba-libs-4.16.4-103.el9_1.i686.rpm blibsmbclient-4.16.4-103.el9_1.x86_64.rpm esamba-client-libs-4.16.4-103.el9_1.i686.rpm dpython3-samba-4.16.4-103.el9_1.i686.rpm fsamba-common-libs-4.16.4-103.el9_1.i686.rpm �&samba-4.16.4-103.el9_1.x86_64.rpm dpython3-samba-4.16.4-103.el9_1.x86_64.rpm gsamba-libs-4.16.4-103.el9_1.x86_64.rpm fsamba-common-libs-4.16.4-103.el9_1.x86_64.rpm clibwbclient-4.16.4-103.el9_1.i686.rpm �samba-common-4.16.4-103.el9_1.noarch.rpm blibsmbclient-4.16.4-103.el9_1.i686.rpm �(samba-winbind-4.16.4-103.el9_1.x86_64.rpm hsamba-winbind-modules-4.16.4-103.el9_1.i686.rpm esamba-client-libs-4.16.4-103.el9_1.x86_64.rpm clibwbclient-4.16.4-103.el9_1.x86_64.rpm �'samba-common-tools-4.16.4-103.el9_1.x86_64.rpm hsamba-winbind-modules-4.16.4-103.el9_1.x86_64.rpm gsamba-libs-4.16.4-103.el9_1.i686.rpm blibsmbclient-4.16.4-103.el9_1.x86_64.rpm esamba-client-libs-4.16.4-103.el9_1.i686.rpm dpython3-samba-4.16.4-103.el9_1.i686.rpm fsamba-common-libs-4.16.4-103.el9_1.i686.rpm �&samba-4.16.4-103.el9_1.x86_64.rpm dpython3-samba-4.16.4-103.el9_1.x86_64.rpm gsamba-libs-4.16.4-103.el9_1.x86_64.rpm fsamba-common-libs-4.16.4-103.el9_1.x86_64.rpm clibwbclient-4.16.4-103.el9_1.i686.rpm �samba-common-4.16.4-103.el9_1.noarch.rpm blibsmbclient-4.16.4-103.el9_1.i686.rpm �(samba-winbind-4.16.4-103.el9_1.x86_64.rpm ��ӿ/�: ��HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update =��l�SRhttps://access.redhat.com/errata/RHSA-2023:2458 RHSA-2023:2458 RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341 CVE-2021-26341 CVE-2021-26341 https://access.redhat.com/security/cve/CVE-2021-33655 CVE-2021-33655 CVE-2021-33655 https://access.redhat.com/security/cve/CVE-2022-1462 CVE-2022-1462 CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-1789 CVE-2022-1789 CVE-2022-1789 https://access.redhat.com/security/cve/CVE-2022-1882 CVE-2022-1882 CVE-2022-1882 https://access.redhat.com/security/cve/CVE-2022-20141 CVE-2022-20141 CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-21505 CVE-2022-21505 CVE-2022-21505 https://access.redhat.com/security/cve/CVE-2022-2196 CVE-2022-2196 CVE-2022-2196 https://access.redhat.com/security/cve/CVE-2022-2663 CVE-2022-2663 CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-28388 CVE-2022-28388 CVE-2022-28388 https://access.redhat.com/security/cve/CVE-2022-3028 CVE-2022-3028 CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-33743 CVE-2022-33743 CVE-2022-33743 https://access.redhat.com/security/cve/CVE-2022-3435 CVE-2022-3435 CVE-2022-3435 https://access.redhat.com/security/cve/CVE-2022-3522 CVE-2022-3522 CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3524 CVE-2022-3524 CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3566 CVE-2022-3566 CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3567 CVE-2022-3567 CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3619 CVE-2022-3619 CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 CVE-2022-3623 CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3625 CVE-2022-3625 CVE-2022-3625 https://access.redhat.com/security/cve/CVE-2022-3628 CVE-2022-3628 CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-3640 CVE-2022-3640 CVE-2022-3640 https://access.redhat.com/security/cve/CVE-2022-3707 CVE-2022-3707 CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-39188 CVE-2022-39188 CVE-2022-39188 https://access.redhat.com/security/cve/CVE-2022-39189 CVE-2022-39189 CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-4128 CVE-2022-4128 CVE-2022-4128 https://access.redhat.com/security/cve/CVE-2022-4129 CVE-2022-4129 CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-41674 CVE-2022-41674 CVE-2022-41674 https://access.redhat.com/security/cve/CVE-2022-42703 CVE-2022-42703 CVE-2022-42703 https://access.redhat.com/security/cve/CVE-2022-42720 CVE-2022-42720 CVE-2022-42720 https://access.redhat.com/security/cve/CVE-2022-42721 CVE-2022-42721 CVE-2022-42721 https://access.redhat.com/security/cve/CVE-2022-42722 CVE-2022-42722 CVE-2022-42722 https://access.redhat.com/security/cve/CVE-2022-42896 CVE-2022-42896 CVE-2022-42896 https://access.redhat.com/security/cve/CVE-2022-43750 CVE-2022-43750 CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 CVE-2022-47929 CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 CVE-2023-0394 CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-0461 CVE-2023-0461 CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-0590 CVE-2023-0590 CVE-2023-0590 https://access.redhat.com/security/cve/CVE-2023-1195 CVE-2023-1195 CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1382 CVE-2023-1382 CVE-2023-1382 https://bugzilla.redhat.com/2061703 2061703 https://bugzilla.redhat.com/2073091 2073091 https://bugzilla.redhat.com/2078466 2078466 https://bugzilla.redhat.com/2089701 2089701 https://bugzilla.redhat.com/2090723 2090723 https://bugzilla.redhat.com/2106830 2106830 https://bugzilla.redhat.com/2107924 2107924 https://bugzilla.redhat.com/2108691 2108691 https://bugzilla.redhat.com/2114937 2114937 https://bugzilla.redhat.com/2122228 2122228 https://bugzilla.redhat.com/2123056 2123056 https://bugzilla.redhat.com/2124788 2124788 https://bugzilla.redhat.com/2130141 2130141 https://bugzilla.redhat.com/2133483 2133483 https://bugzilla.redhat.com/2133490 2133490 https://bugzilla.redhat.com/2134377 2134377 https://bugzilla.redhat.com/2134380 2134380 https://bugzilla.redhat.com/2134451 2134451 https://bugzilla.redhat.com/2134506 2134506 https://bugzilla.redhat.com/2134517 2134517 https://bugzilla.redhat.com/2134528 2134528 https://bugzilla.redhat.com/2137979 2137979 https://bugzilla.redhat.com/2139610 2139610 https://bugzilla.redhat.com/2143893 2143893 https://bugzilla.redhat.com/2143943 2143943 https://bugzilla.redhat.com/2144720 2144720 https://bugzilla.redhat.com/2147364 2147364 https://bugzilla.redhat.com/2150947 2150947 https://bugzilla.redhat.com/2150960 2150960 https://bugzilla.redhat.com/2150979 2150979 https://bugzilla.redhat.com/2151270 2151270 https://bugzilla.redhat.com/2154171 2154171 https://bugzilla.redhat.com/2154235 2154235 https://bugzilla.redhat.com/2160023 2160023 https://bugzilla.redhat.com/2162120 2162120 https://bugzilla.redhat.com/2165721 2165721 https://bugzilla.redhat.com/2165741 2165741 https://bugzilla.redhat.com/2168246 2168246 https://bugzilla.redhat.com/2176192 2176192 https://bugzilla.redhat.com/2177371 2177371 https://errata.almalinux.org/9/ALSA-2023-2458.html ALSA-2023:2458 ALSA-2023:2458 7kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm ;kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm :kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm 3kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm Nkernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm 6kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm 8kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm Mkernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm 9kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm 1�pbpftool-7.0.0-284.11.1.el9_2.x86_64.rpm <python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm 4kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm 5kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm Kkernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm 2kernel-5.14.0-284.11.1.el9_2.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm ;kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm :kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm 3kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm Nkernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm 6kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm 8kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm Mkernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm 9kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm 1�pbpftool-7.0.0-284.11.1.el9_2.x86_64.rpm <python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm 4kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm 5kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm Kkernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm 2kernel-5.14.0-284.11.1.el9_2.x86_64.rpm ����[�; �0�iBBBBBsecurity Moderate: device-mapper-multipath security and bug fix update ��?�]https://access.redhat.com/errata/RHSA-2023:2459 RHSA-2023:2459 RHSA-2023:2459 https://access.redhat.com/security/cve/CVE-2022-41973 CVE-2022-41973 CVE-2022-41973 https://bugzilla.redhat.com/2123894 2123894 https://errata.almalinux.org/9/ALSA-2023-2459.html ALSA-2023:2459 ALSA-2023:2459 �I�kpartx-0.8.7-20.el9.x86_64.rpm � �device-mapper-multipath-0.8.7-20.el9.x86_64.rpm �j�device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm �j�device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm �I�kpartx-0.8.7-20.el9.x86_64.rpm � �device-mapper-multipath-0.8.7-20.el9.x86_64.rpm �j�device-mapper-multipath-libs-0.8.7-20.el9.i686.rpm �j�device-mapper-multipath-libs-0.8.7-20.el9.x86_64.rpm �����< ��qBBBBBBBBsecurity Low: curl security update n���"https://access.redhat.com/errata/RHSA-2023:2478 RHSA-2023:2478 RHSA-2023:2478 https://access.redhat.com/security/cve/CVE-2022-35252 CVE-2022-35252 CVE-2022-35252 https://access.redhat.com/security/cve/CVE-2022-43552 CVE-2022-43552 CVE-2022-43552 https://bugzilla.redhat.com/2120718 2120718 https://bugzilla.redhat.com/2152652 2152652 https://errata.almalinux.org/9/ALSA-2023-2478.html ALSA-2023:2478 ALSA-2023:2478 Eslibcurl-7.76.1-23.el9.i686.rpm jscurl-7.76.1-23.el9.x86_64.rpm Fslibcurl-minimal-7.76.1-23.el9.i686.rpm Eslibcurl-7.76.1-23.el9.x86_64.rpm Fslibcurl-minimal-7.76.1-23.el9.x86_64.rpm kscurl-minimal-7.76.1-23.el9.x86_64.rpm Eslibcurl-7.76.1-23.el9.i686.rpm jscurl-7.76.1-23.el9.x86_64.rpm Fslibcurl-minimal-7.76.1-23.el9.i686.rpm Eslibcurl-7.76.1-23.el9.x86_64.rpm Fslibcurl-minimal-7.76.1-23.el9.x86_64.rpm kscurl-minimal-7.76.1-23.el9.x86_64.rpm ����c�= � �{security Moderate: fwupd security and bug fix update ��>�M https://access.redhat.com/errata/RHSA-2023:2487 RHSA-2023:2487 RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287 CVE-2022-3287 CVE-2022-3287 https://access.redhat.com/security/cve/CVE-2022-34301 CVE-2022-34301 CVE-2022-34301 https://access.redhat.com/security/cve/CVE-2022-34302 CVE-2022-34302 CVE-2022-34302 https://access.redhat.com/security/cve/CVE-2022-34303 CVE-2022-34303 CVE-2022-34303 https://bugzilla.redhat.com/2120687 2120687 https://bugzilla.redhat.com/2120699 2120699 https://bugzilla.redhat.com/2120701 2120701 https://bugzilla.redhat.com/2129904 2129904 https://errata.almalinux.org/9/ALSA-2023-2487.html ALSA-2023:2487 ALSA-2023:2487 ��Zfwupd-1.8.10-2.el9.alma.x86_64.rpm ��Zfwupd-1.8.10-2.el9.alma.x86_64.rpm ����}�> ��}BBBBBsecurity Moderate: dhcp security and enhancement update ���Ahttps://access.redhat.com/errata/RHSA-2023:2502 RHSA-2023:2502 RHSA-2023:2502 https://access.redhat.com/security/cve/CVE-2022-2928 CVE-2022-2928 CVE-2022-2928 https://access.redhat.com/security/cve/CVE-2022-2929 CVE-2022-2929 CVE-2022-2929 https://bugzilla.redhat.com/2132001 2132001 https://bugzilla.redhat.com/2132002 2132002 https://errata.almalinux.org/9/ALSA-2023-2502.html ALSA-2023:2502 ALSA-2023:2502 �u�dhcp-common-4.4.2-18.b1.el9.noarch.rpm �t�dhcp-client-4.4.2-18.b1.el9.x86_64.rpm �v�dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm �w�dhcp-server-4.4.2-18.b1.el9.x86_64.rpm �u�dhcp-common-4.4.2-18.b1.el9.noarch.rpm �t�dhcp-client-4.4.2-18.b1.el9.x86_64.rpm �v�dhcp-relay-4.4.2-18.b1.el9.x86_64.rpm �w�dhcp-server-4.4.2-18.b1.el9.x86_64.rpm �����? � �EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Low: samba security, bug fix, and enhancement update n��L�https://access.redhat.com/errata/RHSA-2023:2519 RHSA-2023:2519 RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615 CVE-2022-1615 CVE-2022-1615 https://bugzilla.redhat.com/2122649 2122649 https://errata.almalinux.org/9/ALSA-2023-2519.html ALSA-2023:2519 ALSA-2023:2519 �samba-dc-libs-4.17.5-102.el9.i686.rpm �samba-tools-4.17.5-102.el9.x86_64.rpm �samba-common-4.17.5-102.el9.noarch.rpm �samba-usershares-4.17.5-102.el9.x86_64.rpm clibwbclient-4.17.5-102.el9.x86_64.rpm blibsmbclient-4.17.5-102.el9.i686.rpm �'samba-common-tools-4.17.5-102.el9.x86_64.rpm esamba-client-libs-4.17.5-102.el9.x86_64.rpm gsamba-libs-4.17.5-102.el9.i686.rpm �samba-dcerpc-4.17.5-102.el9.x86_64.rpm hsamba-winbind-modules-4.17.5-102.el9.x86_64.rpm �libnetapi-4.17.5-102.el9.x86_64.rpm � python3-samba-dc-4.17.5-102.el9.x86_64.rpm �samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm blibsmbclient-4.17.5-102.el9.x86_64.rpm fsamba-common-libs-4.17.5-102.el9.x86_64.rpm clibwbclient-4.17.5-102.el9.i686.rpm esamba-client-libs-4.17.5-102.el9.i686.rpm �libnetapi-4.17.5-102.el9.i686.rpm hsamba-winbind-modules-4.17.5-102.el9.i686.rpm gsamba-libs-4.17.5-102.el9.x86_64.rpm dpython3-samba-4.17.5-102.el9.i686.rpm �(samba-winbind-4.17.5-102.el9.x86_64.rpm �samba-dc-libs-4.17.5-102.el9.x86_64.rpm �&samba-4.17.5-102.el9.x86_64.rpm dpython3-samba-4.17.5-102.el9.x86_64.rpm fsamba-common-libs-4.17.5-102.el9.i686.rpm �samba-dc-libs-4.17.5-102.el9.i686.rpm �samba-tools-4.17.5-102.el9.x86_64.rpm �samba-common-4.17.5-102.el9.noarch.rpm �samba-usershares-4.17.5-102.el9.x86_64.rpm clibwbclient-4.17.5-102.el9.x86_64.rpm blibsmbclient-4.17.5-102.el9.i686.rpm �'samba-common-tools-4.17.5-102.el9.x86_64.rpm esamba-client-libs-4.17.5-102.el9.x86_64.rpm gsamba-libs-4.17.5-102.el9.i686.rpm �samba-dcerpc-4.17.5-102.el9.x86_64.rpm hsamba-winbind-modules-4.17.5-102.el9.x86_64.rpm �libnetapi-4.17.5-102.el9.x86_64.rpm � python3-samba-dc-4.17.5-102.el9.x86_64.rpm �samba-ldb-ldap-modules-4.17.5-102.el9.x86_64.rpm blibsmbclient-4.17.5-102.el9.x86_64.rpm fsamba-common-libs-4.17.5-102.el9.x86_64.rpm clibwbclient-4.17.5-102.el9.i686.rpm esamba-client-libs-4.17.5-102.el9.i686.rpm �libnetapi-4.17.5-102.el9.i686.rpm hsamba-winbind-modules-4.17.5-102.el9.i686.rpm gsamba-libs-4.17.5-102.el9.x86_64.rpm dpython3-samba-4.17.5-102.el9.i686.rpm �(samba-winbind-4.17.5-102.el9.x86_64.rpm �samba-dc-libs-4.17.5-102.el9.x86_64.rpm �&samba-4.17.5-102.el9.x86_64.rpm dpython3-samba-4.17.5-102.el9.x86_64.rpm fsamba-common-libs-4.17.5-102.el9.i686.rpm ����l�@ ��qBBBsecurity Low: openssl security and bug fix update n��P�phttps://access.redhat.com/errata/RHSA-2023:2523 RHSA-2023:2523 RHSA-2023:2523 https://access.redhat.com/security/cve/CVE-2022-3358 CVE-2022-3358 CVE-2022-3358 https://bugzilla.redhat.com/2134740 2134740 https://errata.almalinux.org/9/ALSA-2023-2523.html ALSA-2023:2523 ALSA-2023:2523 Z�Mopenssl-libs-3.0.7-6.el9_2.x86_64.rpm Z�Mopenssl-libs-3.0.7-6.el9_2.i686.rpm }�Mopenssl-3.0.7-6.el9_2.x86_64.rpm Z�Mopenssl-libs-3.0.7-6.el9_2.x86_64.rpm Z�Mopenssl-libs-3.0.7-6.el9_2.i686.rpm }�Mopenssl-3.0.7-6.el9_2.x86_64.rpm ����B�A ��vBsecurity Low: libarchive security update n��@�Yhttps://access.redhat.com/errata/RHSA-2023:2532 RHSA-2023:2532 RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227 CVE-2022-36227 CVE-2022-36227 https://bugzilla.redhat.com/2144972 2144972 https://errata.almalinux.org/9/ALSA-2023-2532.html ALSA-2023:2532 ALSA-2023:2532 �o�8libarchive-3.5.3-4.el9.i686.rpm �o�8libarchive-3.5.3-4.el9.x86_64.rpm �o�8libarchive-3.5.3-4.el9.i686.rpm �o�8libarchive-3.5.3-4.el9.x86_64.rpm �����B � �yBBBBBBBBBBBBBBBsecurity Moderate: krb5 security, bug fix, and enhancement update ���Whttps://access.redhat.com/errata/RHSA-2023:2570 RHSA-2023:2570 RHSA-2023:2570 https://access.redhat.com/security/cve/CVE-2020-17049 CVE-2020-17049 CVE-2020-17049 https://bugzilla.redhat.com/2025721 2025721 https://errata.almalinux.org/9/ALSA-2023-2570.html ALSA-2023:2570 ALSA-2023:2570 `Ukrb5-server-ldap-1.20.1-8.el9.x86_64.rpm ]Ukrb5-libs-1.20.1-8.el9.x86_64.rpm ]Ukrb5-libs-1.20.1-8.el9.i686.rpm _Ukrb5-server-1.20.1-8.el9.x86_64.rpm �%Ukrb5-workstation-1.20.1-8.el9.x86_64.rpm aUlibkadm5-1.20.1-8.el9.i686.rpm ^Ukrb5-pkinit-1.20.1-8.el9.x86_64.rpm _Ukrb5-server-1.20.1-8.el9.i686.rpm aUlibkadm5-1.20.1-8.el9.x86_64.rpm ^Ukrb5-pkinit-1.20.1-8.el9.i686.rpm `Ukrb5-server-ldap-1.20.1-8.el9.i686.rpm `Ukrb5-server-ldap-1.20.1-8.el9.x86_64.rpm ]Ukrb5-libs-1.20.1-8.el9.x86_64.rpm ]Ukrb5-libs-1.20.1-8.el9.i686.rpm _Ukrb5-server-1.20.1-8.el9.x86_64.rpm �%Ukrb5-workstation-1.20.1-8.el9.x86_64.rpm aUlibkadm5-1.20.1-8.el9.i686.rpm ^Ukrb5-pkinit-1.20.1-8.el9.x86_64.rpm _Ukrb5-server-1.20.1-8.el9.i686.rpm aUlibkadm5-1.20.1-8.el9.x86_64.rpm ^Ukrb5-pkinit-1.20.1-8.el9.i686.rpm `Ukrb5-server-ldap-1.20.1-8.el9.i686.rpm ����-�C ��JBsecurity Low: lua security update n��p�Rhttps://access.redhat.com/errata/RHSA-2023:2582 RHSA-2023:2582 RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805 CVE-2022-28805 CVE-2022-28805 https://bugzilla.redhat.com/2073884 2073884 https://errata.almalinux.org/9/ALSA-2023-2582.html ALSA-2023:2582 ALSA-2023:2582 ��Alua-libs-5.4.4-3.el9.x86_64.rpm ��Alua-libs-5.4.4-3.el9.i686.rpm ��Alua-libs-5.4.4-3.el9.x86_64.rpm ��Alua-libs-5.4.4-3.el9.i686.rpm ����n�D ��MBBBBBBsecurity Moderate: openssh security update ��B�https://access.redhat.com/errata/RHSA-2023:2645 RHSA-2023:2645 RHSA-2023:2645 https://access.redhat.com/security/cve/CVE-2023-25136 CVE-2023-25136 CVE-2023-25136 https://bugzilla.redhat.com/2167636 2167636 https://errata.almalinux.org/9/ALSA-2023-2645.html ALSA-2023:2645 ALSA-2023:2645 �D�openssh-keycat-8.7p1-29.el9_2.x86_64.rpm �B�openssh-8.7p1-29.el9_2.x86_64.rpm �C�openssh-clients-8.7p1-29.el9_2.x86_64.rpm �E�openssh-server-8.7p1-29.el9_2.x86_64.rpm �D�openssh-keycat-8.7p1-29.el9_2.x86_64.rpm �B�openssh-8.7p1-29.el9_2.x86_64.rpm �C�openssh-clients-8.7p1-29.el9_2.x86_64.rpm �E�openssh-server-8.7p1-29.el9_2.x86_64.rpm ����I�E ��UBBBBBBBBsecurity Moderate: curl security update ��J�(https://access.redhat.com/errata/RHSA-2023:2650 RHSA-2023:2650 RHSA-2023:2650 https://access.redhat.com/security/cve/CVE-2023-27535 CVE-2023-27535 CVE-2023-27535 https://bugzilla.redhat.com/2179073 2179073 https://errata.almalinux.org/9/ALSA-2023-2650.html ALSA-2023:2650 ALSA-2023:2650 jtcurl-7.76.1-23.el9_2.1.x86_64.rpm Etlibcurl-7.76.1-23.el9_2.1.x86_64.rpm ktcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm Ftlibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm Etlibcurl-7.76.1-23.el9_2.1.i686.rpm Ftlibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm jtcurl-7.76.1-23.el9_2.1.x86_64.rpm Etlibcurl-7.76.1-23.el9_2.1.x86_64.rpm ktcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm Ftlibcurl-minimal-7.76.1-23.el9_2.1.x86_64.rpm Etlibcurl-7.76.1-23.el9_2.1.i686.rpm Ftlibcurl-minimal-7.76.1-23.el9_2.1.i686.rpm ����C�F ��_Bsecurity Important: c-ares security update =��r�https://access.redhat.com/errata/RHSA-2023:3559 RHSA-2023:3559 RHSA-2023:3559 https://access.redhat.com/security/cve/CVE-2023-32067 CVE-2023-32067 CVE-2023-32067 https://bugzilla.redhat.com/2209502 2209502 https://errata.almalinux.org/9/ALSA-2023-3559.html ALSA-2023:3559 ALSA-2023:3559 ��c-ares-1.17.1-5.el9_2.1.x86_64.rpm ��c-ares-1.17.1-5.el9_2.1.i686.rpm ��c-ares-1.17.1-5.el9_2.1.x86_64.rpm ��c-ares-1.17.1-5.el9_2.1.i686.rpm ����|�G ��bBBBsecurity Important: python3.9 security update =��q�+https://access.redhat.com/errata/RHSA-2023:3595 RHSA-2023:3595 RHSA-2023:3595 https://access.redhat.com/security/cve/CVE-2023-24329 CVE-2023-24329 CVE-2023-24329 https://bugzilla.redhat.com/2173917 2173917 https://errata.almalinux.org/9/ALSA-2023-3595.html ALSA-2023:3595 ALSA-2023:3595 0�Ypython3-libs-3.9.16-1.el9_2.1.x86_64.rpm 0�Ypython3-libs-3.9.16-1.el9_2.1.i686.rpm \�Ypython3-3.9.16-1.el9_2.1.x86_64.rpm 0�Ypython3-libs-3.9.16-1.el9_2.1.x86_64.rpm 0�Ypython3-libs-3.9.16-1.el9_2.1.i686.rpm \�Ypython3-3.9.16-1.el9_2.1.x86_64.rpm ����u�H ��gBBBsecurity Moderate: openssl security and bug fix update ���Vhttps://access.redhat.com/errata/RHSA-2023:3722 RHSA-2023:3722 RHSA-2023:3722 https://access.redhat.com/security/cve/CVE-2023-0464 CVE-2023-0464 CVE-2023-0464 https://access.redhat.com/security/cve/CVE-2023-0465 CVE-2023-0465 CVE-2023-0465 https://access.redhat.com/security/cve/CVE-2023-0466 CVE-2023-0466 CVE-2023-0466 https://access.redhat.com/security/cve/CVE-2023-1255 CVE-2023-1255 CVE-2023-1255 https://access.redhat.com/security/cve/CVE-2023-2650 CVE-2023-2650 CVE-2023-2650 https://bugzilla.redhat.com/2181082 2181082 https://bugzilla.redhat.com/2182561 2182561 https://bugzilla.redhat.com/2182565 2182565 https://bugzilla.redhat.com/2188461 2188461 https://bugzilla.redhat.com/2207947 2207947 https://errata.almalinux.org/9/ALSA-2023-3722.html ALSA-2023:3722 ALSA-2023:3722 Z�Iopenssl-libs-3.0.7-16.el9_2.i686.rpm Z�Iopenssl-libs-3.0.7-16.el9_2.x86_64.rpm }�Iopenssl-3.0.7-16.el9_2.x86_64.rpm Z�Iopenssl-libs-3.0.7-16.el9_2.i686.rpm Z�Iopenssl-libs-3.0.7-16.el9_2.x86_64.rpm }�Iopenssl-3.0.7-16.el9_2.x86_64.rpm ����z�I ��lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security and bug fix update =��r�https://access.redhat.com/errata/RHSA-2023:3723 RHSA-2023:3723 RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002 CVE-2023-2002 CVE-2023-2002 https://access.redhat.com/security/cve/CVE-2023-2124 CVE-2023-2124 CVE-2023-2124 https://access.redhat.com/security/cve/CVE-2023-2194 CVE-2023-2194 CVE-2023-2194 https://access.redhat.com/security/cve/CVE-2023-2235 CVE-2023-2235 CVE-2023-2235 https://access.redhat.com/security/cve/CVE-2023-28466 CVE-2023-28466 CVE-2023-28466 https://access.redhat.com/security/cve/CVE-2023-32233 CVE-2023-32233 CVE-2023-32233 https://bugzilla.redhat.com/2179000 2179000 https://bugzilla.redhat.com/2187308 2187308 https://bugzilla.redhat.com/2187439 2187439 https://bugzilla.redhat.com/2188396 2188396 https://bugzilla.redhat.com/2192589 2192589 https://bugzilla.redhat.com/2196105 2196105 https://errata.almalinux.org/9/ALSA-2023-3723.html ALSA-2023:3723 ALSA-2023:3723 9 kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm 2 kernel-5.14.0-284.18.1.el9_2.x86_64.rpm 3 kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm 6 kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm 4 kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm 8 kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm : kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm M kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm K kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm < python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm L kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm 1�qbpftool-7.0.0-284.18.1.el9_2.x86_64.rpm 7 kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm 5 kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm ; kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm N kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm 9 kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm 2 kernel-5.14.0-284.18.1.el9_2.x86_64.rpm 3 kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm 6 kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm 4 kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm 8 kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm : kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm M kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm K kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm < python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm L kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm 1�qbpftool-7.0.0-284.18.1.el9_2.x86_64.rpm 7 kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm 5 kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm ; kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm N kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm ����_�J ��Msecurity Moderate: less security update �� �Chttps://access.redhat.com/errata/RHSA-2023:3725 RHSA-2023:3725 RHSA-2023:3725 https://access.redhat.com/security/cve/CVE-2022-46663 CVE-2022-46663 CVE-2022-46663 https://bugzilla.redhat.com/2169621 2169621 https://errata.almalinux.org/9/ALSA-2023-3725.html ALSA-2023:3725 ALSA-2023:3725 ��mless-590-2.el9_2.x86_64.rpm ��mless-590-2.el9_2.x86_64.rpm ����/�K ��PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security and bug fix update ��C�https://access.redhat.com/errata/RHSA-2023:4325 RHSA-2023:4325 RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347 CVE-2023-3347 CVE-2023-3347 https://bugzilla.redhat.com/2222792 2222792 https://errata.almalinux.org/9/ALSA-2023-4325.html ALSA-2023:4325 ALSA-2023:4325 � python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm �'samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm �libnetapi-4.17.5-103.el9_2.alma.i686.rpm �samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm hsamba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm �samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm �samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm esamba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm blibsmbclient-4.17.5-103.el9_2.alma.i686.rpm clibwbclient-4.17.5-103.el9_2.alma.x86_64.rpm �libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm esamba-client-libs-4.17.5-103.el9_2.alma.i686.rpm �&samba-4.17.5-103.el9_2.alma.x86_64.rpm dpython3-samba-4.17.5-103.el9_2.alma.x86_64.rpm �samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm fsamba-common-libs-4.17.5-103.el9_2.alma.i686.rpm �samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm gsamba-libs-4.17.5-103.el9_2.alma.i686.rpm blibsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm gsamba-libs-4.17.5-103.el9_2.alma.x86_64.rpm clibwbclient-4.17.5-103.el9_2.alma.i686.rpm �(samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm �samba-common-4.17.5-103.el9_2.alma.noarch.rpm hsamba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm dpython3-samba-4.17.5-103.el9_2.alma.i686.rpm �samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm fsamba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm � python3-samba-dc-4.17.5-103.el9_2.alma.x86_64.rpm �'samba-common-tools-4.17.5-103.el9_2.alma.x86_64.rpm �libnetapi-4.17.5-103.el9_2.alma.i686.rpm �samba-dc-libs-4.17.5-103.el9_2.alma.i686.rpm hsamba-winbind-modules-4.17.5-103.el9_2.alma.x86_64.rpm �samba-dcerpc-4.17.5-103.el9_2.alma.x86_64.rpm �samba-ldb-ldap-modules-4.17.5-103.el9_2.alma.x86_64.rpm esamba-client-libs-4.17.5-103.el9_2.alma.x86_64.rpm blibsmbclient-4.17.5-103.el9_2.alma.i686.rpm clibwbclient-4.17.5-103.el9_2.alma.x86_64.rpm �libnetapi-4.17.5-103.el9_2.alma.x86_64.rpm esamba-client-libs-4.17.5-103.el9_2.alma.i686.rpm �&samba-4.17.5-103.el9_2.alma.x86_64.rpm dpython3-samba-4.17.5-103.el9_2.alma.x86_64.rpm �samba-tools-4.17.5-103.el9_2.alma.x86_64.rpm fsamba-common-libs-4.17.5-103.el9_2.alma.i686.rpm �samba-usershares-4.17.5-103.el9_2.alma.x86_64.rpm gsamba-libs-4.17.5-103.el9_2.alma.i686.rpm blibsmbclient-4.17.5-103.el9_2.alma.x86_64.rpm gsamba-libs-4.17.5-103.el9_2.alma.x86_64.rpm clibwbclient-4.17.5-103.el9_2.alma.i686.rpm �(samba-winbind-4.17.5-103.el9_2.alma.x86_64.rpm �samba-common-4.17.5-103.el9_2.alma.noarch.rpm hsamba-winbind-modules-4.17.5-103.el9_2.alma.i686.rpm dpython3-samba-4.17.5-103.el9_2.alma.i686.rpm �samba-dc-libs-4.17.5-103.el9_2.alma.x86_64.rpm fsamba-common-libs-4.17.5-103.el9_2.alma.x86_64.rpm ����@�L �?�|Bsecurity Moderate: libeconf security update ��K�https://access.redhat.com/errata/RHSA-2023:4347 RHSA-2023:4347 RHSA-2023:4347 https://access.redhat.com/security/cve/CVE-2023-22652 CVE-2023-22652 CVE-2023-22652 https://bugzilla.redhat.com/2212463 2212463 https://errata.almalinux.org/9/ALSA-2023-4347.html ALSA-2023:4347 ALSA-2023:4347 �K�libeconf-0.4.1-3.el9_2.x86_64.rpm �K�libeconf-0.4.1-3.el9_2.i686.rpm �K�libeconf-0.4.1-3.el9_2.x86_64.rpm �K�libeconf-0.4.1-3.el9_2.i686.rpm ����T�M ��@BBBsecurity Moderate: libxml2 security update ��Y�Nhttps://access.redhat.com/errata/RHSA-2023:4349 RHSA-2023:4349 RHSA-2023:4349 https://access.redhat.com/security/cve/CVE-2023-28484 CVE-2023-28484 CVE-2023-28484 https://access.redhat.com/security/cve/CVE-2023-29469 CVE-2023-29469 CVE-2023-29469 https://bugzilla.redhat.com/2185984 2185984 https://bugzilla.redhat.com/2185994 2185994 https://errata.almalinux.org/9/ALSA-2023-4349.html ALSA-2023:4349 ALSA-2023:4349 ��Rlibxml2-2.9.13-3.el9_2.1.i686.rpm ��Rpython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm ��Rlibxml2-2.9.13-3.el9_2.1.x86_64.rpm ��Rlibxml2-2.9.13-3.el9_2.1.i686.rpm ��Rpython3-libxml2-2.9.13-3.el9_2.1.x86_64.rpm ��Rlibxml2-2.9.13-3.el9_2.1.x86_64.rpm �����N ��security Moderate: python-requests security update ��'�https://access.redhat.com/errata/RHSA-2023:4350 RHSA-2023:4350 RHSA-2023:4350 https://access.redhat.com/security/cve/CVE-2023-32681 CVE-2023-32681 CVE-2023-32681 https://bugzilla.redhat.com/2209469 2209469 https://errata.almalinux.org/9/ALSA-2023-4350.html ALSA-2023:4350 ALSA-2023:4350 �w�[python3-requests-2.25.1-7.el9_2.noarch.rpm �w�[python3-requests-2.25.1-7.el9_2.noarch.rpm ����J�O ��FBBBBBBBBsecurity Moderate: curl security update ��.�~https://access.redhat.com/errata/RHSA-2023:4354 RHSA-2023:4354 RHSA-2023:4354 https://access.redhat.com/security/cve/CVE-2023-28321 CVE-2023-28321 CVE-2023-28321 https://access.redhat.com/security/cve/CVE-2023-28322 CVE-2023-28322 CVE-2023-28322 https://bugzilla.redhat.com/2196786 2196786 https://bugzilla.redhat.com/2196793 2196793 https://errata.almalinux.org/9/ALSA-2023-4354.html ALSA-2023:4354 ALSA-2023:4354 jucurl-7.76.1-23.el9_2.2.x86_64.rpm Fulibcurl-minimal-7.76.1-23.el9_2.2.i686.rpm Fulibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm Eulibcurl-7.76.1-23.el9_2.2.i686.rpm kucurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm Eulibcurl-7.76.1-23.el9_2.2.x86_64.rpm jucurl-7.76.1-23.el9_2.2.x86_64.rpm Fulibcurl-minimal-7.76.1-23.el9_2.2.i686.rpm Fulibcurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm Eulibcurl-7.76.1-23.el9_2.2.i686.rpm kucurl-minimal-7.76.1-23.el9_2.2.x86_64.rpm Eulibcurl-7.76.1-23.el9_2.2.x86_64.rpm ����j�P ��PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update =��,�0https://access.redhat.com/errata/RHSA-2023:4377 RHSA-2023:4377 RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869 CVE-2022-45869 CVE-2022-45869 https://access.redhat.com/security/cve/CVE-2023-0458 CVE-2023-0458 CVE-2023-0458 https://access.redhat.com/security/cve/CVE-2023-1998 CVE-2023-1998 CVE-2023-1998 https://access.redhat.com/security/cve/CVE-2023-3090 CVE-2023-3090 CVE-2023-3090 https://access.redhat.com/security/cve/CVE-2023-35788 CVE-2023-35788 CVE-2023-35788 https://bugzilla.redhat.com/2151317 2151317 https://bugzilla.redhat.com/2187257 2187257 https://bugzilla.redhat.com/2193219 2193219 https://bugzilla.redhat.com/2215768 2215768 https://bugzilla.redhat.com/2218672 2218672 https://errata.almalinux.org/9/ALSA-2023-4377.html ALSA-2023:4377 ALSA-2023:4377 <!python3-perf-5.14.0-284.25.1.el9_2.x86_64.rpm 7!kernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm 8!kernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpm 6!kernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpm 4!kernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpm :!kernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpm 9!kernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm 2!kernel-5.14.0-284.25.1.el9_2.x86_64.rpm K!kernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm 5!kernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm L!kernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm M!kernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm 1�rbpftool-7.0.0-284.25.1.el9_2.x86_64.rpm ;!kernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpm 3!kernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm N!kernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm !kernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm <!python3-perf-5.14.0-284.25.1.el9_2.x86_64.rpm 7!kernel-debug-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm 8!kernel-modules-5.14.0-284.25.1.el9_2.x86_64.rpm 6!kernel-debug-modules-5.14.0-284.25.1.el9_2.x86_64.rpm 4!kernel-debug-5.14.0-284.25.1.el9_2.x86_64.rpm :!kernel-tools-5.14.0-284.25.1.el9_2.x86_64.rpm 9!kernel-modules-extra-5.14.0-284.25.1.el9_2.x86_64.rpm 2!kernel-5.14.0-284.25.1.el9_2.x86_64.rpm K!kernel-debug-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm 5!kernel-debug-core-5.14.0-284.25.1.el9_2.x86_64.rpm L!kernel-debug-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm M!kernel-modules-core-5.14.0-284.25.1.el9_2.x86_64.rpm 1�rbpftool-7.0.0-284.25.1.el9_2.x86_64.rpm ;!kernel-tools-libs-5.14.0-284.25.1.el9_2.x86_64.rpm 3!kernel-core-5.14.0-284.25.1.el9_2.x86_64.rpm N!kernel-uki-virt-5.14.0-284.25.1.el9_2.x86_64.rpm !kernel-abi-stablelists-5.14.0-284.25.1.el9_2.noarch.rpm ���:�Q ��qBBBBBBsecurity Important: openssh security update =��\�]https://access.redhat.com/errata/RHSA-2023:4412 RHSA-2023:4412 RHSA-2023:4412 https://access.redhat.com/security/cve/CVE-2023-38408 CVE-2023-38408 CVE-2023-38408 https://bugzilla.redhat.com/2224173 2224173 https://errata.almalinux.org/9/ALSA-2023-4412.html ALSA-2023:4412 ALSA-2023:4412 �D�openssh-keycat-8.7p1-30.el9_2.x86_64.rpm �B�openssh-8.7p1-30.el9_2.x86_64.rpm �C�openssh-clients-8.7p1-30.el9_2.x86_64.rpm �E�openssh-server-8.7p1-30.el9_2.x86_64.rpm �D�openssh-keycat-8.7p1-30.el9_2.x86_64.rpm �B�openssh-8.7p1-30.el9_2.x86_64.rpm �C�openssh-clients-8.7p1-30.el9_2.x86_64.rpm �E�openssh-server-8.7p1-30.el9_2.x86_64.rpm ���� �R ��yBBBBBBsecurity Moderate: dbus security update ��9�https://access.redhat.com/errata/RHSA-2023:4569 RHSA-2023:4569 RHSA-2023:4569 https://access.redhat.com/security/cve/CVE-2023-34969 CVE-2023-34969 CVE-2023-34969 https://bugzilla.redhat.com/2213166 2213166 https://errata.almalinux.org/9/ALSA-2023-4569.html ALSA-2023:4569 ALSA-2023:4569 �s�dbus-tools-1.12.20-7.el9_2.1.x86_64.rpm �i�dbus-libs-1.12.20-7.el9_2.1.x86_64.rpm �r�dbus-common-1.12.20-7.el9_2.1.noarch.rpm �q�dbus-1.12.20-7.el9_2.1.x86_64.rpm �i�dbus-libs-1.12.20-7.el9_2.1.i686.rpm �s�dbus-tools-1.12.20-7.el9_2.1.x86_64.rpm �i�dbus-libs-1.12.20-7.el9_2.1.x86_64.rpm �r�dbus-common-1.12.20-7.el9_2.1.noarch.rpm �q�dbus-1.12.20-7.el9_2.1.x86_64.rpm �i�dbus-libs-1.12.20-7.el9_2.1.i686.rpm �����S ��ABBBBBBBBsecurity Important: subscription-manager security update =��8�https://access.redhat.com/errata/RHSA-2023:4708 RHSA-2023:4708 RHSA-2023:4708 https://access.redhat.com/security/cve/CVE-2023-3899 CVE-2023-3899 CVE-2023-3899 https://bugzilla.redhat.com/2225407 2225407 https://errata.almalinux.org/9/ALSA-2023-4708.html ALSA-2023:4708 ALSA-2023:4708 �L{subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �{libdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �+{python3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �M{subscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �2{python3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �L{subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �{libdnf-plugin-subscription-manager-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �+{python3-cloud-what-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �M{subscription-manager-plugin-ostree-1.29.33.1-2.el9_2.alma.1.x86_64.rpm �2{python3-subscription-manager-rhsm-1.29.33.1-2.el9_2.alma.1.x86_64.rpm ����e�T ��LBsecurity Important: cups security update =��C�https://access.redhat.com/errata/RHSA-2023:4838 RHSA-2023:4838 RHSA-2023:4838 https://access.redhat.com/security/cve/CVE-2023-32360 CVE-2023-32360 CVE-2023-32360 https://bugzilla.redhat.com/2230495 2230495 https://errata.almalinux.org/9/ALSA-2023-4838.html ALSA-2023:4838 ALSA-2023:4838 ��$cups-libs-2.3.3op2-16.el9_2.1.i686.rpm ��$cups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm ��$cups-libs-2.3.3op2-16.el9_2.1.i686.rpm ��$cups-libs-2.3.3op2-16.el9_2.1.x86_64.rpm ����E�U ��Osecurity Moderate: dmidecode security update ��]�https://access.redhat.com/errata/RHSA-2023:5061 RHSA-2023:5061 RHSA-2023:5061 https://access.redhat.com/security/cve/CVE-2023-30630 CVE-2023-30630 CVE-2023-30630 https://bugzilla.redhat.com/2186669 2186669 https://errata.almalinux.org/9/ALSA-2023-5061.html ALSA-2023:5061 ALSA-2023:5061 ��_dmidecode-3.3-7.el9_2.1.x86_64.rpm ��_dmidecode-3.3-7.el9_2.1.x86_64.rpm ����O�V �#�RBBBBBBBBBBBBBBBsecurity Moderate: linux-firmware security update ��e�|https://access.redhat.com/errata/RHSA-2023:5068 RHSA-2023:5068 RHSA-2023:5068 https://access.redhat.com/security/cve/CVE-2023-20593 CVE-2023-20593 CVE-2023-20593 https://bugzilla.redhat.com/2217845 2217845 https://errata.almalinux.org/9/ALSA-2023-5068.html ALSA-2023:5068 ALSA-2023:5068 �7�diwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �;�iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �8�kiwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm �9�giwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm �5�iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �A�)netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm �:�iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �3�iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �4�iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �1�^iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �6�iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �@�)linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm �=�diwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �2�Viwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �>�)libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm �?�)linux-firmware-20230310-135.el9_2.alma.1.noarch.rpm �<�biwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm �7�diwl3160-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �;�iwl6000g2b-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �8�kiwl5000-firmware-8.83.5.1_1-135.el9_2.alma.1.noarch.rpm �9�giwl5150-firmware-8.24.2.2-135.el9_2.alma.1.noarch.rpm �5�iwl2000-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �A�)netronome-firmware-20230310-135.el9_2.alma.1.noarch.rpm �:�iwl6000g2a-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �3�iwl105-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �4�iwl135-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �1�^iwl100-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �6�iwl2030-firmware-18.168.6.1-135.el9_2.alma.1.noarch.rpm �@�)linux-firmware-whence-20230310-135.el9_2.alma.1.noarch.rpm �=�diwl7260-firmware-25.30.13.0-135.el9_2.alma.1.noarch.rpm �2�Viwl1000-firmware-39.31.5.1-135.el9_2.alma.1.noarch.rpm �>�)libertas-sd8787-firmware-20230310-135.el9_2.alma.1.noarch.rpm �?�)linux-firmware-20230310-135.el9_2.alma.1.noarch.rpm �<�biwl6050-firmware-41.28.5.1-135.el9_2.alma.1.noarch.rpm ����S�W ��dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update =��a�_https://access.redhat.com/errata/RHSA-2023:5069 RHSA-2023:5069 RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637 CVE-2023-1637 CVE-2023-1637 https://access.redhat.com/security/cve/CVE-2023-20593 CVE-2023-20593 CVE-2023-20593 https://access.redhat.com/security/cve/CVE-2023-21102 CVE-2023-21102 CVE-2023-21102 https://access.redhat.com/security/cve/CVE-2023-31248 CVE-2023-31248 CVE-2023-31248 https://access.redhat.com/security/cve/CVE-2023-3390 CVE-2023-3390 CVE-2023-3390 https://access.redhat.com/security/cve/CVE-2023-35001 CVE-2023-35001 CVE-2023-35001 https://access.redhat.com/security/cve/CVE-2023-3610 CVE-2023-3610 CVE-2023-3610 https://access.redhat.com/security/cve/CVE-2023-3776 CVE-2023-3776 CVE-2023-3776 https://access.redhat.com/security/cve/CVE-2023-4004 CVE-2023-4004 CVE-2023-4004 https://access.redhat.com/security/cve/CVE-2023-4147 CVE-2023-4147 CVE-2023-4147 https://bugzilla.redhat.com/2181891 2181891 https://bugzilla.redhat.com/2213260 2213260 https://bugzilla.redhat.com/2213455 2213455 https://bugzilla.redhat.com/2217845 2217845 https://bugzilla.redhat.com/2220892 2220892 https://bugzilla.redhat.com/2220893 2220893 https://bugzilla.redhat.com/2225097 2225097 https://bugzilla.redhat.com/2225198 2225198 https://bugzilla.redhat.com/2225239 2225239 https://bugzilla.redhat.com/2225275 2225275 https://errata.almalinux.org/9/ALSA-2023-5069.html ALSA-2023:5069 ALSA-2023:5069 <"python3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm 7"kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm 2"kernel-5.14.0-284.30.1.el9_2.x86_64.rpm 4"kernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm 6"kernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm N"kernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm 8"kernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpm :"kernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpm K"kernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm 1�sbpftool-7.0.0-284.30.1.el9_2.x86_64.rpm L"kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm 5"kernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm M"kernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm ;"kernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm "kernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpm 9"kernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm 3"kernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm <"python3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm 7"kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm 2"kernel-5.14.0-284.30.1.el9_2.x86_64.rpm 4"kernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm 6"kernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpm N"kernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm 8"kernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpm :"kernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpm K"kernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm 1�sbpftool-7.0.0-284.30.1.el9_2.x86_64.rpm L"kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm 5"kernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpm M"kernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpm ;"kernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm "kernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpm 9"kernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm 3"kernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm ���� �X ��EBsecurity Moderate: libcap security update ��@�0https://access.redhat.com/errata/RHSA-2023:5071 RHSA-2023:5071 RHSA-2023:5071 https://access.redhat.com/security/cve/CVE-2023-2602 CVE-2023-2602 CVE-2023-2602 https://access.redhat.com/security/cve/CVE-2023-2603 CVE-2023-2603 CVE-2023-2603 https://bugzilla.redhat.com/2209113 2209113 https://bugzilla.redhat.com/2209114 2209114 https://errata.almalinux.org/9/ALSA-2023-5071.html ALSA-2023:5071 ALSA-2023:5071 �I�+libcap-2.48-9.el9_2.i686.rpm �I�+libcap-2.48-9.el9_2.x86_64.rpm �I�+libcap-2.48-9.el9_2.i686.rpm �I�+libcap-2.48-9.el9_2.x86_64.rpm �����Y ��HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: glibc security update =��p� https://access.redhat.com/errata/RHSA-2023:5453 RHSA-2023:5453 RHSA-2023:5453 https://access.redhat.com/security/cve/CVE-2023-4527 CVE-2023-4527 CVE-2023-4527 https://access.redhat.com/security/cve/CVE-2023-4806 CVE-2023-4806 CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-4813 CVE-2023-4813 CVE-2023-4813 https://access.redhat.com/security/cve/CVE-2023-4911 CVE-2023-4911 CVE-2023-4911 https://bugzilla.redhat.com/2234712 2234712 https://bugzilla.redhat.com/2237782 2237782 https://bugzilla.redhat.com/2237798 2237798 https://bugzilla.redhat.com/2238352 2238352 https://errata.almalinux.org/9/ALSA-2023-5453.html ALSA-2023:5453 ALSA-2023:5453 �P�Sglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm �{glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm �Fglibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm �@glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm �qlibnsl-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm �Bglibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm �jglibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm �pglibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm �|glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm �iglibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm �yglibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm �Jglibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm �Knscd-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm �Uglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm �Rglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm �nglibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm �mglibc-gconv-extra-2.34-60.el9_2.7.i686.rpm �4glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm �oglibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm �aglibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm �Xglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm �Lglibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm �Dglibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm �zglibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm �Nglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm �lglibc-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm �Iglibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm �xglibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm �kglibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm �Hglibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm �Mglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm �Aglibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm �^glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm �4glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm �~glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm �fglibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm �{glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm �Eglibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm �_glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm �|glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm �lglibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm �Zglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm �Vglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm �}glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm �Qglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm �}glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm �Tglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm �qglibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm �bglibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm �yglibc-common-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm �\glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm �mglibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm �Cglibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm �xglibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm �Wglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm �hglibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm �Pglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm �~glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm �sglibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm �eglibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm �qlibnsl-2.34-60.el9_2.7.i686.rpm �mglibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm �Gglibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm �dglibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm �uglibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm �gglibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm �lglibc-2.34-60.el9_2.7.i686.rpm �wglibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm �@glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm �rglibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm �cglibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm �[glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm �Yglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm �Kglibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm �`glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm �zglibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm �Oglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm �vglibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm �]glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm �tglibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm �P�Sglibc-langpack-ku-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-es-2.34-60.el9_2.7.x86_64.rpm �{glibc-langpack-af-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-se-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bo-2.34-60.el9_2.7.x86_64.rpm �Fglibc-langpack-is-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bn-2.34-60.el9_2.7.x86_64.rpm �@glibc-minimal-langpack-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-tt-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-tr-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-ve-2.34-60.el9_2.7.x86_64.rpm �qlibnsl-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-crh-2.34-60.el9_2.7.x86_64.rpm �Bglibc-langpack-ia-2.34-60.el9_2.7.x86_64.rpm �jglibc-langpack-mni-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-the-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sm-2.34-60.el9_2.7.x86_64.rpm �pglibc-langpack-nan-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-tig-2.34-60.el9_2.7.x86_64.rpm �|glibc-langpack-agr-2.34-60.el9_2.7.x86_64.rpm �iglibc-langpack-mn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sk-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-doi-2.34-60.el9_2.7.x86_64.rpm �yglibc-langpack-nso-2.34-60.el9_2.7.x86_64.rpm �Jglibc-langpack-ka-2.34-60.el9_2.7.x86_64.rpm �Knscd-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-et-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-so-2.34-60.el9_2.7.x86_64.rpm �Uglibc-langpack-ky-2.34-60.el9_2.7.x86_64.rpm �Rglibc-langpack-ks-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-az-2.34-60.el9_2.7.x86_64.rpm �nglibc-langpack-mt-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-wo-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-quz-2.34-60.el9_2.7.x86_64.rpm �mglibc-gconv-extra-2.34-60.el9_2.7.i686.rpm �4glibc-langpack-gl-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-ga-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-an-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ar-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-th-2.34-60.el9_2.7.x86_64.rpm �"glibc-langpack-dz-2.34-60.el9_2.7.x86_64.rpm �oglibc-langpack-my-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-shs-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-wae-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-szl-2.34-60.el9_2.7.x86_64.rpm �3glibc-langpack-gez-2.34-60.el9_2.7.x86_64.rpm �aglibc-langpack-mfe-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-da-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-tpi-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-tcy-2.34-60.el9_2.7.x86_64.rpm �Xglibc-langpack-li-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ca-2.34-60.el9_2.7.x86_64.rpm �Lglibc-langpack-kk-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-eu-2.34-60.el9_2.7.x86_64.rpm �Dglibc-langpack-ig-2.34-60.el9_2.7.x86_64.rpm �zglibc-langpack-oc-2.34-60.el9_2.7.x86_64.rpm �(glibc-langpack-tn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sv-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-be-2.34-60.el9_2.7.x86_64.rpm �&glibc-langpack-tk-2.34-60.el9_2.7.x86_64.rpm �6glibc-langpack-gv-2.34-60.el9_2.7.x86_64.rpm �Nglibc-langpack-km-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ayc-2.34-60.el9_2.7.x86_64.rpm �'glibc-langpack-tl-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-yi-2.34-60.el9_2.7.x86_64.rpm �lglibc-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sid-2.34-60.el9_2.7.x86_64.rpm �Iglibc-langpack-ja-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-st-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-dsb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sa-2.34-60.el9_2.7.x86_64.rpm �xglibc-langpack-nr-2.34-60.el9_2.7.x86_64.rpm �kglibc-langpack-mnw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pt-2.34-60.el9_2.7.x86_64.rpm �Hglibc-langpack-iu-2.34-60.el9_2.7.x86_64.rpm �Mglibc-langpack-kl-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bg-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-sah-2.34-60.el9_2.7.x86_64.rpm �Aglibc-langpack-hy-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-unm-2.34-60.el9_2.7.x86_64.rpm �^glibc-langpack-lzh-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-tg-2.34-60.el9_2.7.x86_64.rpm �-glibc-langpack-fo-2.34-60.el9_2.7.x86_64.rpm �4glibc-langpack-vi-2.34-60.el9_2.7.x86_64.rpm �~glibc-langpack-am-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-yuw-2.34-60.el9_2.7.x86_64.rpm �fglibc-langpack-mjw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ce-2.34-60.el9_2.7.x86_64.rpm �{glibc-langpack-om-2.34-60.el9_2.7.x86_64.rpm �Eglibc-langpack-ik-2.34-60.el9_2.7.x86_64.rpm �_glibc-langpack-mag-2.34-60.el9_2.7.x86_64.rpm �!glibc-langpack-dv-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-zh-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cy-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-si-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bho-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-bhb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ast-2.34-60.el9_2.7.x86_64.rpm �|glibc-langpack-or-2.34-60.el9_2.7.x86_64.rpm �lglibc-langpack-mr-2.34-60.el9_2.7.x86_64.rpm �Zglibc-langpack-ln-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-br-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cv-2.34-60.el9_2.7.x86_64.rpm �Vglibc-langpack-lb-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-wal-2.34-60.el9_2.7.x86_64.rpm �}glibc-langpack-ak-2.34-60.el9_2.7.x86_64.rpm �Qglibc-langpack-kok-2.34-60.el9_2.7.x86_64.rpm �}glibc-langpack-os-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-uk-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-en-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-pap-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sc-2.34-60.el9_2.7.x86_64.rpm �Tglibc-langpack-kw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ru-2.34-60.el9_2.7.x86_64.rpm �qglibc-langpack-nb-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-ht-2.34-60.el9_2.7.x86_64.rpm �bglibc-langpack-mg-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bem-2.34-60.el9_2.7.x86_64.rpm �yglibc-common-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-wa-2.34-60.el9_2.7.x86_64.rpm �\glibc-langpack-lt-2.34-60.el9_2.7.x86_64.rpm �mglibc-langpack-ms-2.34-60.el9_2.7.x86_64.rpm �Cglibc-langpack-id-2.34-60.el9_2.7.x86_64.rpm �xglibc-all-langpacks-2.34-60.el9_2.7.x86_64.rpm �Wglibc-langpack-lg-2.34-60.el9_2.7.x86_64.rpm �hglibc-langpack-ml-2.34-60.el9_2.7.x86_64.rpm �Pglibc-langpack-ko-2.34-60.el9_2.7.x86_64.rpm �~glibc-langpack-pa-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-as-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-fa-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-te-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-brx-2.34-60.el9_2.7.x86_64.rpm �sglibc-langpack-ne-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-gd-2.34-60.el9_2.7.x86_64.rpm �eglibc-langpack-miq-2.34-60.el9_2.7.x86_64.rpm �0glibc-langpack-fy-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-raj-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-fr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bi-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-hif-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-pl-2.34-60.el9_2.7.x86_64.rpm �#glibc-langpack-el-2.34-60.el9_2.7.x86_64.rpm �qlibnsl-2.34-60.el9_2.7.i686.rpm �mglibc-gconv-extra-2.34-60.el9_2.7.x86_64.rpm �?glibc-langpack-zu-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ro-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-rw-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-de-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ckb-2.34-60.el9_2.7.x86_64.rpm �=glibc-langpack-hr-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-hne-2.34-60.el9_2.7.x86_64.rpm �Gglibc-langpack-it-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-fil-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-xh-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-sat-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sq-2.34-60.el9_2.7.x86_64.rpm �.glibc-langpack-ug-2.34-60.el9_2.7.x86_64.rpm �*glibc-langpack-ff-2.34-60.el9_2.7.x86_64.rpm �1glibc-langpack-ur-2.34-60.el9_2.7.x86_64.rpm �+glibc-langpack-fi-2.34-60.el9_2.7.x86_64.rpm �7glibc-langpack-ha-2.34-60.el9_2.7.x86_64.rpm �dglibc-langpack-mi-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-byn-2.34-60.el9_2.7.x86_64.rpm �uglibc-langpack-niu-2.34-60.el9_2.7.x86_64.rpm �2glibc-langpack-uz-2.34-60.el9_2.7.x86_64.rpm �gglibc-langpack-mk-2.34-60.el9_2.7.x86_64.rpm �,glibc-langpack-ts-2.34-60.el9_2.7.x86_64.rpm �lglibc-2.34-60.el9_2.7.i686.rpm �wglibc-langpack-nn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-bs-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sd-2.34-60.el9_2.7.x86_64.rpm �$glibc-langpack-ti-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ta-2.34-60.el9_2.7.x86_64.rpm �;glibc-langpack-yo-2.34-60.el9_2.7.x86_64.rpm �@glibc-langpack-hu-2.34-60.el9_2.7.x86_64.rpm � glibc-langpack-anp-2.34-60.el9_2.7.x86_64.rpm �rglibc-langpack-nds-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ber-2.34-60.el9_2.7.x86_64.rpm �cglibc-langpack-mhr-2.34-60.el9_2.7.x86_64.rpm �[glibc-langpack-lo-2.34-60.el9_2.7.x86_64.rpm �Yglibc-langpack-lij-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sl-2.34-60.el9_2.7.x86_64.rpm �9glibc-langpack-he-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sgs-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-chr-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ps-2.34-60.el9_2.7.x86_64.rpm �Kglibc-langpack-kab-2.34-60.el9_2.7.x86_64.rpm �8glibc-langpack-hak-2.34-60.el9_2.7.x86_64.rpm �`glibc-langpack-mai-2.34-60.el9_2.7.x86_64.rpm �>glibc-langpack-hsb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-csb-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-shn-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-ss-2.34-60.el9_2.7.x86_64.rpm �5glibc-langpack-gu-2.34-60.el9_2.7.x86_64.rpm �%glibc-langpack-eo-2.34-60.el9_2.7.x86_64.rpm �zglibc-langpack-aa-2.34-60.el9_2.7.x86_64.rpm �Oglibc-langpack-kn-2.34-60.el9_2.7.x86_64.rpm �<glibc-langpack-yue-2.34-60.el9_2.7.x86_64.rpm �vglibc-langpack-nl-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cs-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-cmn-2.34-60.el9_2.7.x86_64.rpm �/glibc-langpack-fur-2.34-60.el9_2.7.x86_64.rpm �glibc-langpack-sw-2.34-60.el9_2.7.x86_64.rpm �]glibc-langpack-lv-2.34-60.el9_2.7.x86_64.rpm �tglibc-langpack-nhn-2.34-60.el9_2.7.x86_64.rpm �)glibc-langpack-to-2.34-60.el9_2.7.x86_64.rpm �:glibc-langpack-hi-2.34-60.el9_2.7.x86_64.rpm ����&�Z � �eBBBsecurity Important: python3.9 security update =��|�https://access.redhat.com/errata/RHSA-2023:5462 RHSA-2023:5462 RHSA-2023:5462 https://access.redhat.com/security/cve/CVE-2023-40217 CVE-2023-40217 CVE-2023-40217 https://bugzilla.redhat.com/2235789 2235789 https://errata.almalinux.org/9/ALSA-2023-5462.html ALSA-2023:5462 ALSA-2023:5462 0�Zpython3-libs-3.9.16-1.el9_2.2.x86_64.rpm 0�Zpython3-libs-3.9.16-1.el9_2.2.i686.rpm \�Zpython3-3.9.16-1.el9_2.2.x86_64.rpm 0�Zpython3-libs-3.9.16-1.el9_2.2.x86_64.rpm 0�Zpython3-libs-3.9.16-1.el9_2.2.i686.rpm \�Zpython3-3.9.16-1.el9_2.2.x86_64.rpm ����E�[ �!�jBBBBBBBBsecurity Important: curl security update =���}https://access.redhat.com/errata/RHSA-2023:5763 RHSA-2023:5763 RHSA-2023:5763 https://access.redhat.com/security/cve/CVE-2023-38545 CVE-2023-38545 CVE-2023-38545 https://access.redhat.com/security/cve/CVE-2023-38546 CVE-2023-38546 CVE-2023-38546 https://bugzilla.redhat.com/2241933 2241933 https://bugzilla.redhat.com/2241938 2241938 https://errata.almalinux.org/9/ALSA-2023-5763.html ALSA-2023:5763 ALSA-2023:5763 kvcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm Fvlibcurl-minimal-7.76.1-23.el9_2.4.i686.rpm Fvlibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm Evlibcurl-7.76.1-23.el9_2.4.x86_64.rpm jvcurl-7.76.1-23.el9_2.4.x86_64.rpm Evlibcurl-7.76.1-23.el9_2.4.i686.rpm kvcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm Fvlibcurl-minimal-7.76.1-23.el9_2.4.i686.rpm Fvlibcurl-minimal-7.76.1-23.el9_2.4.x86_64.rpm Evlibcurl-7.76.1-23.el9_2.4.x86_64.rpm jvcurl-7.76.1-23.el9_2.4.x86_64.rpm Evlibcurl-7.76.1-23.el9_2.4.i686.rpm ����g�\ �7�tBsecurity Important: nghttp2 security update =���-https://access.redhat.com/errata/RHSA-2023:5838 RHSA-2023:5838 RHSA-2023:5838 https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-5838.html ALSA-2023:5838 ALSA-2023:5838 ��libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��libnghttp2-1.43.0-5.el9_2.1.i686.rpm ��libnghttp2-1.43.0-5.el9_2.1.x86_64.rpm ��libnghttp2-1.43.0-5.el9_2.1.i686.rpm ��Ù0�] �;�xBsecurity Low: opensc security update n��A�(https://access.redhat.com/errata/RHSA-2023:6587 RHSA-2023:6587 RHSA-2023:6587 https://access.redhat.com/security/cve/CVE-2023-2977 CVE-2023-2977 CVE-2023-2977 https://bugzilla.redhat.com/2211088 2211088 https://errata.almalinux.org/9/ALSA-2023-6587.html ALSA-2023:6587 ALSA-2023:6587 ��opensc-0.23.0-2.el9.i686.rpm ��opensc-0.23.0-2.el9.x86_64.rpm ��opensc-0.23.0-2.el9.i686.rpm ��opensc-0.23.0-2.el9.x86_64.rpm �����^ �"�|BBBsecurity Moderate: binutils security update ��i�Jhttps://access.redhat.com/errata/RHSA-2023:6593 RHSA-2023:6593 RHSA-2023:6593 https://access.redhat.com/security/cve/CVE-2022-4285 CVE-2022-4285 CVE-2022-4285 https://bugzilla.redhat.com/2150768 2150768 https://errata.almalinux.org/9/ALSA-2023-6593.html ALSA-2023:6593 ALSA-2023:6593 �C�Pbinutils-2.35.2-42.el9.x86_64.rpm �C�Pbinutils-2.35.2-42.el9.i686.rpm ��Pbinutils-gold-2.35.2-42.el9.x86_64.rpm �C�Pbinutils-2.35.2-42.el9.x86_64.rpm �C�Pbinutils-2.35.2-42.el9.i686.rpm ��Pbinutils-gold-2.35.2-42.el9.x86_64.rpm ����<�_ ��ABBBBBBBBBBBBBBBsecurity Important: linux-firmware security, bug fix, and enhancement update =��3�https://access.redhat.com/errata/RHSA-2023:6595 RHSA-2023:6595 RHSA-2023:6595 https://access.redhat.com/security/cve/CVE-2022-27635 CVE-2022-27635 CVE-2022-27635 https://access.redhat.com/security/cve/CVE-2022-36351 CVE-2022-36351 CVE-2022-36351 https://access.redhat.com/security/cve/CVE-2022-38076 CVE-2022-38076 CVE-2022-38076 https://access.redhat.com/security/cve/CVE-2022-40964 CVE-2022-40964 CVE-2022-40964 https://access.redhat.com/security/cve/CVE-2022-46329 CVE-2022-46329 CVE-2022-46329 https://access.redhat.com/security/cve/CVE-2023-20569 CVE-2023-20569 CVE-2023-20569 https://bugzilla.redhat.com/2207625 2207625 https://bugzilla.redhat.com/2238960 2238960 https://bugzilla.redhat.com/2238961 2238961 https://bugzilla.redhat.com/2238962 2238962 https://bugzilla.redhat.com/2238963 2238963 https://bugzilla.redhat.com/2238964 2238964 https://errata.almalinux.org/9/ALSA-2023-6595.html ALSA-2023:6595 ALSA-2023:6595 �4�iwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm �?�*linux-firmware-20230814-140.el9_3.noarch.rpm �A�*netronome-firmware-20230814-140.el9_3.noarch.rpm �2�Wiwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm �@�*linux-firmware-whence-20230814-140.el9_3.noarch.rpm �6�iwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm �8�liwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm �3�iwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm �1�_iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm �7�eiwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm �:�iwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm �;�iwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm �5�iwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm �>�*libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm �<�ciwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm �=�eiwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm �9�hiwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm �4�iwl135-firmware-18.168.6.1-140.el9_3.noarch.rpm �?�*linux-firmware-20230814-140.el9_3.noarch.rpm �A�*netronome-firmware-20230814-140.el9_3.noarch.rpm �2�Wiwl1000-firmware-39.31.5.1-140.el9_3.noarch.rpm �@�*linux-firmware-whence-20230814-140.el9_3.noarch.rpm �6�iwl2030-firmware-18.168.6.1-140.el9_3.noarch.rpm �8�liwl5000-firmware-8.83.5.1_1-140.el9_3.noarch.rpm �3�iwl105-firmware-18.168.6.1-140.el9_3.noarch.rpm �1�_iwl100-firmware-39.31.5.1-140.el9_3.noarch.rpm �7�eiwl3160-firmware-25.30.13.0-140.el9_3.noarch.rpm �:�iwl6000g2a-firmware-18.168.6.1-140.el9_3.noarch.rpm �;�iwl6000g2b-firmware-18.168.6.1-140.el9_3.noarch.rpm �5�iwl2000-firmware-18.168.6.1-140.el9_3.noarch.rpm �>�*libertas-sd8787-firmware-20230814-140.el9_3.noarch.rpm �<�ciwl6050-firmware-41.28.5.1-140.el9_3.noarch.rpm �=�eiwl7260-firmware-25.30.13.0-140.el9_3.noarch.rpm �9�hiwl5150-firmware-8.24.2.2-140.el9_3.noarch.rpm ����c�` �#�SBsecurity Moderate: cups security and bug fix update ��?�nhttps://access.redhat.com/errata/RHSA-2023:6596 RHSA-2023:6596 RHSA-2023:6596 https://access.redhat.com/security/cve/CVE-2023-32324 CVE-2023-32324 CVE-2023-32324 https://access.redhat.com/security/cve/CVE-2023-34241 CVE-2023-34241 CVE-2023-34241 https://bugzilla.redhat.com/2209603 2209603 https://bugzilla.redhat.com/2214914 2214914 https://errata.almalinux.org/9/ALSA-2023-6596.html ALSA-2023:6596 ALSA-2023:6596 ��%cups-libs-2.3.3op2-21.el9.x86_64.rpm ��%cups-libs-2.3.3op2-21.el9.i686.rpm ��%cups-libs-2.3.3op2-21.el9.x86_64.rpm ��%cups-libs-2.3.3op2-21.el9.i686.rpm �����a ��Vsecurity Moderate: python-cryptography security update ��-�fhttps://access.redhat.com/errata/RHSA-2023:6615 RHSA-2023:6615 RHSA-2023:6615 https://access.redhat.com/security/cve/CVE-2023-23931 CVE-2023-23931 CVE-2023-23931 https://bugzilla.redhat.com/2171817 2171817 https://errata.almalinux.org/9/ALSA-2023-6615.html ALSA-2023:6615 ALSA-2023:6615 �,�fpython3-cryptography-36.0.1-4.el9.x86_64.rpm �,�fpython3-cryptography-36.0.1-4.el9.x86_64.rpm �����b ��YBsecurity Moderate: protobuf-c security update ���}https://access.redhat.com/errata/RHSA-2023:6621 RHSA-2023:6621 RHSA-2023:6621 https://access.redhat.com/security/cve/CVE-2022-48468 CVE-2022-48468 CVE-2022-48468 https://bugzilla.redhat.com/2186673 2186673 https://errata.almalinux.org/9/ALSA-2023-6621.html ALSA-2023:6621 ALSA-2023:6621 �Z�protobuf-c-1.3.3-13.el9.x86_64.rpm �Z�protobuf-c-1.3.3-13.el9.i686.rpm �Z�protobuf-c-1.3.3-13.el9.x86_64.rpm �Z�protobuf-c-1.3.3-13.el9.i686.rpm �����c �$�]Bsecurity Low: glib2 security and bug fix update n���ohttps://access.redhat.com/errata/RHSA-2023:6631 RHSA-2023:6631 RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499 CVE-2023-29499 CVE-2023-29499 https://access.redhat.com/security/cve/CVE-2023-32611 CVE-2023-32611 CVE-2023-32611 https://access.redhat.com/security/cve/CVE-2023-32665 CVE-2023-32665 CVE-2023-32665 https://bugzilla.redhat.com/2211827 2211827 https://bugzilla.redhat.com/2211828 2211828 https://bugzilla.redhat.com/2211829 2211829 https://errata.almalinux.org/9/ALSA-2023-6631.html ALSA-2023:6631 ALSA-2023:6631 �k�/glib2-2.68.4-11.el9.x86_64.rpm �k�/glib2-2.68.4-11.el9.i686.rpm �k�/glib2-2.68.4-11.el9.x86_64.rpm �k�/glib2-2.68.4-11.el9.i686.rpm �����d �%�`BBBsecurity Low: shadow-utils security and bug fix update n���Yhttps://access.redhat.com/errata/RHSA-2023:6632 RHSA-2023:6632 RHSA-2023:6632 https://access.redhat.com/security/cve/CVE-2023-4641 CVE-2023-4641 CVE-2023-4641 https://bugzilla.redhat.com/2215945 2215945 https://errata.almalinux.org/9/ALSA-2023-6632.html ALSA-2023:6632 ALSA-2023:6632 �9�Ushadow-utils-4.9-8.el9.x86_64.rpm �`�Ushadow-utils-subid-4.9-8.el9.i686.rpm �`�Ushadow-utils-subid-4.9-8.el9.x86_64.rpm �9�Ushadow-utils-4.9-8.el9.x86_64.rpm �`�Ushadow-utils-subid-4.9-8.el9.i686.rpm �`�Ushadow-utils-subid-4.9-8.el9.x86_64.rpm ����@�e �%�fBsecurity Moderate: c-ares security, bug fix, and enhancement update ��X� https://access.redhat.com/errata/RHSA-2023:6635 RHSA-2023:6635 RHSA-2023:6635 https://access.redhat.com/security/cve/CVE-2022-4904 CVE-2022-4904 CVE-2022-4904 https://access.redhat.com/security/cve/CVE-2023-31124 CVE-2023-31124 CVE-2023-31124 https://access.redhat.com/security/cve/CVE-2023-31130 CVE-2023-31130 CVE-2023-31130 https://access.redhat.com/security/cve/CVE-2023-31147 CVE-2023-31147 CVE-2023-31147 https://bugzilla.redhat.com/2168631 2168631 https://bugzilla.redhat.com/2209494 2209494 https://bugzilla.redhat.com/2209497 2209497 https://bugzilla.redhat.com/2209501 2209501 https://errata.almalinux.org/9/ALSA-2023-6635.html ALSA-2023:6635 ALSA-2023:6635 ��c-ares-1.19.1-1.el9.i686.rpm ��c-ares-1.19.1-1.el9.x86_64.rpm ��c-ares-1.19.1-1.el9.i686.rpm ��c-ares-1.19.1-1.el9.x86_64.rpm �����f �&�iBBsecurity Moderate: libssh security update ��b�{https://access.redhat.com/errata/RHSA-2023:6643 RHSA-2023:6643 RHSA-2023:6643 https://access.redhat.com/security/cve/CVE-2023-1667 CVE-2023-1667 CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 CVE-2023-2283 CVE-2023-2283 https://bugzilla.redhat.com/2182199 2182199 https://bugzilla.redhat.com/2189736 2189736 https://errata.almalinux.org/9/ALSA-2023-6643.html ALSA-2023:6643 ALSA-2023:6643 �r�ulibssh-0.10.4-11.el9.i686.rpm �J�ulibssh-config-0.10.4-11.el9.noarch.rpm �r�ulibssh-0.10.4-11.el9.x86_64.rpm �r�ulibssh-0.10.4-11.el9.i686.rpm �J�ulibssh-config-0.10.4-11.el9.noarch.rpm �r�ulibssh-0.10.4-11.el9.x86_64.rpm ����X�g �'�mBBBsecurity Moderate: python3.9 security update ��]� https://access.redhat.com/errata/RHSA-2023:6659 RHSA-2023:6659 RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://bugzilla.redhat.com/263261 263261 https://errata.almalinux.org/9/ALSA-2023-6659.html ALSA-2023:6659 ALSA-2023:6659 0�[python3-libs-3.9.18-1.el9_3.i686.rpm \�[python3-3.9.18-1.el9_3.x86_64.rpm 0�[python3-libs-3.9.18-1.el9_3.x86_64.rpm 0�[python3-libs-3.9.18-1.el9_3.i686.rpm \�[python3-3.9.18-1.el9_3.x86_64.rpm 0�[python3-libs-3.9.18-1.el9_3.x86_64.rpm ����B�h �(�rBsecurity Low: gmp security and enhancement update n��}�Uhttps://access.redhat.com/errata/RHSA-2023:6661 RHSA-2023:6661 RHSA-2023:6661 https://access.redhat.com/security/cve/CVE-2021-43618 CVE-2021-43618 CVE-2021-43618 https://bugzilla.redhat.com/2024904 2024904 https://errata.almalinux.org/9/ALSA-2023-6661.html ALSA-2023:6661 ALSA-2023:6661 �H�(gmp-6.2.0-13.el9.x86_64.rpm �H�(gmp-6.2.0-13.el9.i686.rpm �H�(gmp-6.2.0-13.el9.x86_64.rpm �H�(gmp-6.2.0-13.el9.i686.rpm ����B�i �)�uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security, bug fix, and enhancement update ��R�K https://access.redhat.com/errata/RHSA-2023:6667 RHSA-2023:6667 RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127 CVE-2022-2127 CVE-2022-2127 https://access.redhat.com/security/cve/CVE-2023-34966 CVE-2023-34966 CVE-2023-34966 https://access.redhat.com/security/cve/CVE-2023-34967 CVE-2023-34967 CVE-2023-34967 https://access.redhat.com/security/cve/CVE-2023-34968 CVE-2023-34968 CVE-2023-34968 https://bugzilla.redhat.com/2222791 2222791 https://bugzilla.redhat.com/2222793 2222793 https://bugzilla.redhat.com/2222794 2222794 https://bugzilla.redhat.com/2222795 2222795 https://errata.almalinux.org/9/ALSA-2023-6667.html ALSA-2023:6667 ALSA-2023:6667 �&samba-4.18.6-100.el9.x86_64.rpm �'samba-common-tools-4.18.6-100.el9.x86_64.rpm hsamba-winbind-modules-4.18.6-100.el9.i686.rpm esamba-client-libs-4.18.6-100.el9.x86_64.rpm esamba-client-libs-4.18.6-100.el9.i686.rpm �(samba-winbind-4.18.6-100.el9.x86_64.rpm fsamba-common-libs-4.18.6-100.el9.i686.rpm blibsmbclient-4.18.6-100.el9.i686.rpm �libnetapi-4.18.6-100.el9.x86_64.rpm blibsmbclient-4.18.6-100.el9.x86_64.rpm � python3-samba-dc-4.18.6-100.el9.x86_64.rpm gsamba-libs-4.18.6-100.el9.x86_64.rpm �samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm dpython3-samba-4.18.6-100.el9.x86_64.rpm clibwbclient-4.18.6-100.el9.i686.rpm �samba-dcerpc-4.18.6-100.el9.x86_64.rpm clibwbclient-4.18.6-100.el9.x86_64.rpm gsamba-libs-4.18.6-100.el9.i686.rpm �samba-usershares-4.18.6-100.el9.x86_64.rpm hsamba-winbind-modules-4.18.6-100.el9.x86_64.rpm dpython3-samba-4.18.6-100.el9.i686.rpm �samba-dc-libs-4.18.6-100.el9.x86_64.rpm �samba-tools-4.18.6-100.el9.x86_64.rpm �samba-dc-libs-4.18.6-100.el9.i686.rpm fsamba-common-libs-4.18.6-100.el9.x86_64.rpm �libnetapi-4.18.6-100.el9.i686.rpm �samba-common-4.18.6-100.el9.noarch.rpm �&samba-4.18.6-100.el9.x86_64.rpm �'samba-common-tools-4.18.6-100.el9.x86_64.rpm hsamba-winbind-modules-4.18.6-100.el9.i686.rpm esamba-client-libs-4.18.6-100.el9.x86_64.rpm esamba-client-libs-4.18.6-100.el9.i686.rpm �(samba-winbind-4.18.6-100.el9.x86_64.rpm fsamba-common-libs-4.18.6-100.el9.i686.rpm blibsmbclient-4.18.6-100.el9.i686.rpm �libnetapi-4.18.6-100.el9.x86_64.rpm blibsmbclient-4.18.6-100.el9.x86_64.rpm � python3-samba-dc-4.18.6-100.el9.x86_64.rpm gsamba-libs-4.18.6-100.el9.x86_64.rpm �samba-ldb-ldap-modules-4.18.6-100.el9.x86_64.rpm dpython3-samba-4.18.6-100.el9.x86_64.rpm clibwbclient-4.18.6-100.el9.i686.rpm �samba-dcerpc-4.18.6-100.el9.x86_64.rpm clibwbclient-4.18.6-100.el9.x86_64.rpm gsamba-libs-4.18.6-100.el9.i686.rpm �samba-usershares-4.18.6-100.el9.x86_64.rpm hsamba-winbind-modules-4.18.6-100.el9.x86_64.rpm dpython3-samba-4.18.6-100.el9.i686.rpm �samba-dc-libs-4.18.6-100.el9.x86_64.rpm �samba-tools-4.18.6-100.el9.x86_64.rpm �samba-dc-libs-4.18.6-100.el9.i686.rpm fsamba-common-libs-4.18.6-100.el9.x86_64.rpm �libnetapi-4.18.6-100.el9.i686.rpm �samba-common-4.18.6-100.el9.noarch.rpm ����8�j �*�aBBBBBBBBsecurity Moderate: curl security update ���q https://access.redhat.com/errata/RHSA-2023:6679 RHSA-2023:6679 RHSA-2023:6679 https://access.redhat.com/security/cve/CVE-2023-27533 CVE-2023-27533 CVE-2023-27533 https://access.redhat.com/security/cve/CVE-2023-27534 CVE-2023-27534 CVE-2023-27534 https://access.redhat.com/security/cve/CVE-2023-27536 CVE-2023-27536 CVE-2023-27536 https://access.redhat.com/security/cve/CVE-2023-27538 CVE-2023-27538 CVE-2023-27538 https://bugzilla.redhat.com/2179062 2179062 https://bugzilla.redhat.com/2179069 2179069 https://bugzilla.redhat.com/2179092 2179092 https://bugzilla.redhat.com/2179103 2179103 https://errata.almalinux.org/9/ALSA-2023-6679.html ALSA-2023:6679 ALSA-2023:6679 Ewlibcurl-7.76.1-26.el9.x86_64.rpm Fwlibcurl-minimal-7.76.1-26.el9.i686.rpm kwcurl-minimal-7.76.1-26.el9.x86_64.rpm Ewlibcurl-7.76.1-26.el9.i686.rpm jwcurl-7.76.1-26.el9.x86_64.rpm Fwlibcurl-minimal-7.76.1-26.el9.x86_64.rpm Ewlibcurl-7.76.1-26.el9.x86_64.rpm Fwlibcurl-minimal-7.76.1-26.el9.i686.rpm kwcurl-minimal-7.76.1-26.el9.x86_64.rpm Ewlibcurl-7.76.1-26.el9.i686.rpm jwcurl-7.76.1-26.el9.x86_64.rpm Fwlibcurl-minimal-7.76.1-26.el9.x86_64.rpm ����Y�k �.�kBsecurity Low: tpm2-tss security and enhancement update n���Rhttps://access.redhat.com/errata/RHSA-2023:6685 RHSA-2023:6685 RHSA-2023:6685 https://access.redhat.com/security/cve/CVE-2023-22745 CVE-2023-22745 CVE-2023-22745 https://bugzilla.redhat.com/2162610 2162610 https://errata.almalinux.org/9/ALSA-2023-6685.html ALSA-2023:6685 ALSA-2023:6685 �b�5tpm2-tss-3.2.2-2.el9.i686.rpm �b�5tpm2-tss-3.2.2-2.el9.x86_64.rpm �b�5tpm2-tss-3.2.2-2.el9.i686.rpm �b�5tpm2-tss-3.2.2-2.el9.x86_64.rpm ���� �l �+�/security Moderate: python-pip security update ��`�(https://access.redhat.com/errata/RHSA-2023:6694 RHSA-2023:6694 RHSA-2023:6694 https://access.redhat.com/security/cve/CVE-2007-4559 CVE-2007-4559 CVE-2007-4559 https://bugzilla.redhat.com/263261 263261 https://errata.almalinux.org/9/ALSA-2023-6694.html ALSA-2023:6694 ALSA-2023:6694 �v�]python3-pip-wheel-21.2.3-7.el9.noarch.rpm �v�]python3-pip-wheel-21.2.3-7.el9.noarch.rpm ����C�m �,�pBBBBsecurity Moderate: ncurses security and bug fix update ���xhttps://access.redhat.com/errata/RHSA-2023:6698 RHSA-2023:6698 RHSA-2023:6698 https://access.redhat.com/security/cve/CVE-2023-29491 CVE-2023-29491 CVE-2023-29491 https://bugzilla.redhat.com/2191704 2191704 https://errata.almalinux.org/9/ALSA-2023-6698.html ALSA-2023:6698 ALSA-2023:6698 ��$ncurses-6.2-10.20210508.el9.x86_64.rpm �W�$ncurses-libs-6.2-10.20210508.el9.i686.rpm �W�$ncurses-libs-6.2-10.20210508.el9.x86_64.rpm �r�$ncurses-base-6.2-10.20210508.el9.noarch.rpm ��$ncurses-6.2-10.20210508.el9.x86_64.rpm �W�$ncurses-libs-6.2-10.20210508.el9.i686.rpm �W�$ncurses-libs-6.2-10.20210508.el9.x86_64.rpm �r�$ncurses-base-6.2-10.20210508.el9.noarch.rpm ����b�n �-�vBBBBBBBBBBBBBBBsecurity Moderate: krb5 security and bug fix update �� �9https://access.redhat.com/errata/RHSA-2023:6699 RHSA-2023:6699 RHSA-2023:6699 https://access.redhat.com/security/cve/CVE-2023-36054 CVE-2023-36054 CVE-2023-36054 https://access.redhat.com/security/cve/CVE-2023-39975 CVE-2023-39975 CVE-2023-39975 https://bugzilla.redhat.com/2230178 2230178 https://bugzilla.redhat.com/2232682 2232682 https://errata.almalinux.org/9/ALSA-2023-6699.html ALSA-2023:6699 ALSA-2023:6699 ]Vkrb5-libs-1.21.1-1.el9.i686.rpm aVlibkadm5-1.21.1-1.el9.i686.rpm ^Vkrb5-pkinit-1.21.1-1.el9.i686.rpm `Vkrb5-server-ldap-1.21.1-1.el9.i686.rpm aVlibkadm5-1.21.1-1.el9.x86_64.rpm _Vkrb5-server-1.21.1-1.el9.x86_64.rpm _Vkrb5-server-1.21.1-1.el9.i686.rpm ]Vkrb5-libs-1.21.1-1.el9.x86_64.rpm �%Vkrb5-workstation-1.21.1-1.el9.x86_64.rpm `Vkrb5-server-ldap-1.21.1-1.el9.x86_64.rpm ^Vkrb5-pkinit-1.21.1-1.el9.x86_64.rpm ]Vkrb5-libs-1.21.1-1.el9.i686.rpm aVlibkadm5-1.21.1-1.el9.i686.rpm ^Vkrb5-pkinit-1.21.1-1.el9.i686.rpm `Vkrb5-server-ldap-1.21.1-1.el9.i686.rpm aVlibkadm5-1.21.1-1.el9.x86_64.rpm _Vkrb5-server-1.21.1-1.el9.x86_64.rpm _Vkrb5-server-1.21.1-1.el9.i686.rpm ]Vkrb5-libs-1.21.1-1.el9.x86_64.rpm �%Vkrb5-workstation-1.21.1-1.el9.x86_64.rpm `Vkrb5-server-ldap-1.21.1-1.el9.x86_64.rpm ^Vkrb5-pkinit-1.21.1-1.el9.x86_64.rpm ����u�o ��GBBsecurity Low: procps-ng security and bug fix update n��9�Hhttps://access.redhat.com/errata/RHSA-2023:6705 RHSA-2023:6705 RHSA-2023:6705 https://access.redhat.com/security/cve/CVE-2023-4016 CVE-2023-4016 CVE-2023-4016 https://bugzilla.redhat.com/2228494 2228494 https://errata.almalinux.org/9/ALSA-2023-6705.html ALSA-2023:6705 ALSA-2023:6705 �Y�wprocps-ng-3.3.17-13.el9.x86_64.rpm �s�wprocps-ng-i18n-3.3.17-13.el9.noarch.rpm �Y�wprocps-ng-3.3.17-13.el9.i686.rpm �Y�wprocps-ng-3.3.17-13.el9.x86_64.rpm �s�wprocps-ng-i18n-3.3.17-13.el9.noarch.rpm �Y�wprocps-ng-3.3.17-13.el9.i686.rpm ����Z�p �.�LBBBBsecurity Moderate: avahi security update ���https://access.redhat.com/errata/RHSA-2023:6707 RHSA-2023:6707 RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468 CVE-2021-3468 CVE-2021-3468 https://access.redhat.com/security/cve/CVE-2021-3502 CVE-2021-3502 CVE-2021-3502 https://access.redhat.com/security/cve/CVE-2023-1981 CVE-2023-1981 CVE-2023-1981 https://bugzilla.redhat.com/1939614 1939614 https://bugzilla.redhat.com/1946914 1946914 https://bugzilla.redhat.com/2185911 2185911 https://errata.almalinux.org/9/ALSA-2023-6707.html ALSA-2023:6707 ALSA-2023:6707 �h�"avahi-libs-0.8-15.el9.i686.rpm �g�"avahi-0.8-15.el9.i686.rpm �g�"avahi-0.8-15.el9.x86_64.rpm �h�"avahi-libs-0.8-15.el9.x86_64.rpm �h�"avahi-libs-0.8-15.el9.i686.rpm �g�"avahi-0.8-15.el9.i686.rpm �g�"avahi-0.8-15.el9.x86_64.rpm �h�"avahi-libs-0.8-15.el9.x86_64.rpm ����h�q �/�RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: samba security update ���Yhttps://access.redhat.com/errata/RHSA-2023:6744 RHSA-2023:6744 RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961 CVE-2023-3961 CVE-2023-3961 https://access.redhat.com/security/cve/CVE-2023-4091 CVE-2023-4091 CVE-2023-4091 https://access.redhat.com/security/cve/CVE-2023-42669 CVE-2023-42669 CVE-2023-42669 https://bugzilla.redhat.com/2241881 2241881 https://bugzilla.redhat.com/2241882 2241882 https://bugzilla.redhat.com/2241884 2241884 https://errata.almalinux.org/9/ALSA-2023-6744.html ALSA-2023:6744 ALSA-2023:6744 �samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm esamba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm clibwbclient-4.18.6-101.el9_3.alma.1.i686.rpm �samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm blibsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm �libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm �samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm hsamba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm clibwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm esamba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm gsamba-libs-4.18.6-101.el9_3.alma.1.i686.rpm fsamba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm gsamba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm dpython3-samba-4.18.6-101.el9_3.alma.1.i686.rpm blibsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm � python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm �(samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm �libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm �'samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm �&samba-4.18.6-101.el9_3.alma.1.x86_64.rpm hsamba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm dpython3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm fsamba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm �samba-dcerpc-4.18.6-101.el9_3.alma.1.x86_64.rpm esamba-client-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm clibwbclient-4.18.6-101.el9_3.alma.1.i686.rpm �samba-dc-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm blibsmbclient-4.18.6-101.el9_3.alma.1.i686.rpm �libnetapi-4.18.6-101.el9_3.alma.1.i686.rpm �samba-usershares-4.18.6-101.el9_3.alma.1.x86_64.rpm hsamba-winbind-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm clibwbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm esamba-client-libs-4.18.6-101.el9_3.alma.1.i686.rpm gsamba-libs-4.18.6-101.el9_3.alma.1.i686.rpm fsamba-common-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-ldb-ldap-modules-4.18.6-101.el9_3.alma.1.x86_64.rpm gsamba-libs-4.18.6-101.el9_3.alma.1.x86_64.rpm dpython3-samba-4.18.6-101.el9_3.alma.1.i686.rpm blibsmbclient-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm � python3-samba-dc-4.18.6-101.el9_3.alma.1.x86_64.rpm �(samba-winbind-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-dc-libs-4.18.6-101.el9_3.alma.1.i686.rpm �libnetapi-4.18.6-101.el9_3.alma.1.x86_64.rpm �'samba-common-tools-4.18.6-101.el9_3.alma.1.x86_64.rpm �samba-common-4.18.6-101.el9_3.alma.1.noarch.rpm �&samba-4.18.6-101.el9_3.alma.1.x86_64.rpm hsamba-winbind-modules-4.18.6-101.el9_3.alma.1.i686.rpm dpython3-samba-4.18.6-101.el9_3.alma.1.x86_64.rpm fsamba-common-libs-4.18.6-101.el9_3.alma.1.i686.rpm ����0�r �0�~BBBBBBBBsecurity Important: curl security update =��k�}https://access.redhat.com/errata/RHSA-2023:6745 RHSA-2023:6745 RHSA-2023:6745 https://access.redhat.com/security/cve/CVE-2023-38545 CVE-2023-38545 CVE-2023-38545 https://access.redhat.com/security/cve/CVE-2023-38546 CVE-2023-38546 CVE-2023-38546 https://bugzilla.redhat.com/2241933 2241933 https://bugzilla.redhat.com/2241938 2241938 https://errata.almalinux.org/9/ALSA-2023-6745.html ALSA-2023:6745 ALSA-2023:6745 kxcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm Exlibcurl-7.76.1-26.el9_3.2.x86_64.rpm jxcurl-7.76.1-26.el9_3.2.x86_64.rpm Fxlibcurl-minimal-7.76.1-26.el9_3.2.i686.rpm Exlibcurl-7.76.1-26.el9_3.2.i686.rpm Fxlibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm kxcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm Exlibcurl-7.76.1-26.el9_3.2.x86_64.rpm jxcurl-7.76.1-26.el9_3.2.x86_64.rpm Fxlibcurl-minimal-7.76.1-26.el9_3.2.i686.rpm Exlibcurl-7.76.1-26.el9_3.2.i686.rpm Fxlibcurl-minimal-7.76.1-26.el9_3.2.x86_64.rpm ����!�s ��HBsecurity Important: nghttp2 security update =��h�-https://access.redhat.com/errata/RHSA-2023:6746 RHSA-2023:6746 RHSA-2023:6746 https://access.redhat.com/security/cve/CVE-2023-44487 CVE-2023-44487 CVE-2023-44487 https://bugzilla.redhat.com/2242803 2242803 https://errata.almalinux.org/9/ALSA-2023-6746.html ALSA-2023:6746 ALSA-2023:6746 ��libnghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��libnghttp2-1.43.0-5.el9_3.1.i686.rpm ��libnghttp2-1.43.0-5.el9_3.1.x86_64.rpm ��libnghttp2-1.43.0-5.el9_3.1.i686.rpm ����J�t�1�LBBBsecurity Moderate: libxml2 security update ���https://access.redhat.com/errata/RHSA-2023:7747 RHSA-2023:7747 RHSA-2023:7747 https://access.redhat.com/security/cve/CVE-2023-39615 CVE-2023-39615 CVE-2023-39615 https://bugzilla.redhat.com/2235864 2235864 https://errata.almalinux.org/9/ALSA-2023-7747.html ALSA-2023:7747 ALSA-2023:7747 ��Spython3-libxml2-2.9.13-5.el9_3.x86_64.rpm ��Slibxml2-2.9.13-5.el9_3.i686.rpm ��Slibxml2-2.9.13-5.el9_3.x86_64.rpm ��Spython3-libxml2-2.9.13-5.el9_3.x86_64.rpm ��Slibxml2-2.9.13-5.el9_3.i686.rpm ��Slibxml2-2.9.13-5.el9_3.x86_64.rpm ���N�u��QBsecurity Moderate: opensc security update ���Khttps://access.redhat.com/errata/RHSA-2023:7879 RHSA-2023:7879 RHSA-2023:7879 https://access.redhat.com/security/cve/CVE-2023-40660 CVE-2023-40660 CVE-2023-40660 https://access.redhat.com/security/cve/CVE-2023-40661 CVE-2023-40661 CVE-2023-40661 https://access.redhat.com/security/cve/CVE-2023-4535 CVE-2023-4535 CVE-2023-4535 https://bugzilla.redhat.com/2240912 2240912 https://bugzilla.redhat.com/2240913 2240913 https://bugzilla.redhat.com/2240914 2240914 https://errata.almalinux.org/9/ALSA-2023-7879.html ALSA-2023:7879 ALSA-2023:7879 ��opensc-0.23.0-3.el9_3.x86_64.rpm ��opensc-0.23.0-3.el9_3.i686.rpm ��opensc-0.23.0-3.el9_3.x86_64.rpm ��opensc-0.23.0-3.el9_3.i686.rpm �����v�2�UBBBsecurity Moderate: openssl security update ��_�Nhttps://access.redhat.com/errata/RHSA-2024:0310 RHSA-2024:0310 RHSA-2024:0310 https://access.redhat.com/security/cve/CVE-2023-5363 CVE-2023-5363 CVE-2023-5363 https://bugzilla.redhat.com/2243839 2243839 https://errata.almalinux.org/9/ALSA-2024-0310.html ALSA-2024:0310 ALSA-2024:0310 }�Jopenssl-3.0.7-25.el9_3.x86_64.rpm Z�Jopenssl-libs-3.0.7-25.el9_3.i686.rpm Z�Jopenssl-libs-3.0.7-25.el9_3.x86_64.rpm }�Jopenssl-3.0.7-25.el9_3.x86_64.rpm Z�Jopenssl-libs-3.0.7-25.el9_3.i686.rpm Z�Jopenssl-libs-3.0.7-25.el9_3.x86_64.rpm ����[�w�3�ZBBBBBBBBBBBBBBBBBsecurity Moderate: rpm security update ��-�whttps://access.redhat.com/errata/RHSA-2024:0463 RHSA-2024:0463 RHSA-2024:0463 https://access.redhat.com/security/cve/CVE-2021-35937 CVE-2021-35937 CVE-2021-35937 https://access.redhat.com/security/cve/CVE-2021-35938 CVE-2021-35938 CVE-2021-35938 https://access.redhat.com/security/cve/CVE-2021-35939 CVE-2021-35939 CVE-2021-35939 https://bugzilla.redhat.com/1964114 1964114 https://bugzilla.redhat.com/1964125 1964125 https://bugzilla.redhat.com/1964129 1964129 https://errata.almalinux.org/9/ALSA-2024-0463.html ALSA-2024:0463 ALSA-2024:0463 �7Prpm-sign-4.16.1.3-27.el9_3.x86_64.rpm �_Prpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm �5Prpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm �/Ppython3-rpm-4.16.1.3-27.el9_3.x86_64.rpm �6Prpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm �^Prpm-libs-4.16.1.3-27.el9_3.i686.rpm �]Prpm-build-libs-4.16.1.3-27.el9_3.i686.rpm �_Prpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm �4Prpm-4.16.1.3-27.el9_3.x86_64.rpm �^Prpm-libs-4.16.1.3-27.el9_3.x86_64.rpm �]Prpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm �7Prpm-sign-4.16.1.3-27.el9_3.x86_64.rpm �_Prpm-sign-libs-4.16.1.3-27.el9_3.x86_64.rpm �5Prpm-plugin-audit-4.16.1.3-27.el9_3.x86_64.rpm �/Ppython3-rpm-4.16.1.3-27.el9_3.x86_64.rpm �6Prpm-plugin-selinux-4.16.1.3-27.el9_3.x86_64.rpm �^Prpm-libs-4.16.1.3-27.el9_3.i686.rpm �]Prpm-build-libs-4.16.1.3-27.el9_3.i686.rpm �_Prpm-sign-libs-4.16.1.3-27.el9_3.i686.rpm �4Prpm-4.16.1.3-27.el9_3.x86_64.rpm �^Prpm-libs-4.16.1.3-27.el9_3.x86_64.rpm �]Prpm-build-libs-4.16.1.3-27.el9_3.x86_64.rpm ��˰2�x�.�-security Moderate: python-urllib3 security update ��$�https://access.redhat.com/errata/RHSA-2024:0464 RHSA-2024:0464 RHSA-2024:0464 https://access.redhat.com/security/cve/CVE-2023-43804 CVE-2023-43804 CVE-2023-43804 https://access.redhat.com/security/cve/CVE-2023-45803 CVE-2023-45803 CVE-2023-45803 https://bugzilla.redhat.com/2242493 2242493 https://bugzilla.redhat.com/2246840 2246840 https://errata.almalinux.org/9/ALSA-2024-0464.html ALSA-2024:0464 ALSA-2024:0464 �O�Tpython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm �O�Tpython3-urllib3-1.26.5-3.el9_3.1.noarch.rpm ��˭�y�4�oBsecurity Moderate: sqlite security update ��;�https://access.redhat.com/errata/RHSA-2024:0465 RHSA-2024:0465 RHSA-2024:0465 https://access.redhat.com/security/cve/CVE-2023-7104 CVE-2023-7104 CVE-2023-7104 https://bugzilla.redhat.com/2256194 2256194 https://errata.almalinux.org/9/ALSA-2024-0465.html ALSA-2024:0465 ALSA-2024:0465 �t�7sqlite-libs-3.34.1-7.el9_3.i686.rpm �t�7sqlite-libs-3.34.1-7.el9_3.x86_64.rpm �t�7sqlite-libs-3.34.1-7.el9_3.i686.rpm �t�7sqlite-libs-3.34.1-7.el9_3.x86_64.rpm ��˩6�z�5�rBBBsecurity Moderate: python3.9 security update ��C�chttps://access.redhat.com/errata/RHSA-2024:0466 RHSA-2024:0466 RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043 CVE-2023-27043 CVE-2023-27043 https://bugzilla.redhat.com/2196183 2196183 https://errata.almalinux.org/9/ALSA-2024-0466.html ALSA-2024:0466 ALSA-2024:0466 0�\python3-libs-3.9.18-1.el9_3.1.x86_64.rpm \�\python3-3.9.18-1.el9_3.1.x86_64.rpm 0�\python3-libs-3.9.18-1.el9_3.1.i686.rpm 0�\python3-libs-3.9.18-1.el9_3.1.x86_64.rpm \�\python3-3.9.18-1.el9_3.1.x86_64.rpm 0�\python3-libs-3.9.18-1.el9_3.1.i686.rpm ��ˤ�{� �wBBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update ��&�!https://access.redhat.com/errata/RHSA-2024:0468 RHSA-2024:0468 RHSA-2024:0468 https://access.redhat.com/security/cve/CVE-2023-4001 CVE-2023-4001 CVE-2023-4001 https://bugzilla.redhat.com/2224951 2224951 https://errata.almalinux.org/9/ALSA-2024-0468.html ALSA-2024:0468 ALSA-2024:0468 �.Igrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �/Igrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �yIgrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm �zIgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm �-Igrub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm �Igrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �0Igrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �xIgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm �~Igrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm �}Igrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm �|Igrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm �{Igrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm �.Igrub2-efi-aa64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �/Igrub2-efi-x64-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �yIgrub2-efi-x64-cdboot-2.06-70.el9_3.2.alma.1.x86_64.rpm �zIgrub2-pc-2.06-70.el9_3.2.alma.1.x86_64.rpm �-Igrub2-common-2.06-70.el9_3.2.alma.1.noarch.rpm �Igrub2-ppc64le-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �0Igrub2-pc-modules-2.06-70.el9_3.2.alma.1.noarch.rpm �xIgrub2-efi-x64-2.06-70.el9_3.2.alma.1.x86_64.rpm �~Igrub2-tools-minimal-2.06-70.el9_3.2.alma.1.x86_64.rpm �}Igrub2-tools-extra-2.06-70.el9_3.2.alma.1.x86_64.rpm �|Igrub2-tools-efi-2.06-70.el9_3.2.alma.1.x86_64.rpm �{Igrub2-tools-2.06-70.el9_3.2.alma.1.x86_64.rpm ��Όr�|�6�KBsecurity Moderate: gnutls security update ��G�Ghttps://access.redhat.com/errata/RHSA-2024:0533 RHSA-2024:0533 RHSA-2024:0533 https://access.redhat.com/security/cve/CVE-2023-5981 CVE-2023-5981 CVE-2023-5981 https://access.redhat.com/security/cve/CVE-2024-0553 CVE-2024-0553 CVE-2024-0553 https://access.redhat.com/security/cve/CVE-2024-0567 CVE-2024-0567 CVE-2024-0567 https://bugzilla.redhat.com/2248445 2248445 https://bugzilla.redhat.com/2258412 2258412 https://bugzilla.redhat.com/2258544 2258544 https://errata.almalinux.org/9/ALSA-2024-0533.html ALSA-2024:0533 ALSA-2024:0533 o�;gnutls-3.7.6-23.el9_3.3.i686.rpm o�;gnutls-3.7.6-23.el9_3.3.x86_64.rpm o�;gnutls-3.7.6-23.el9_3.3.i686.rpm o�;gnutls-3.7.6-23.el9_3.3.x86_64.rpm ��߲ �}��wBBBBBBBBBBsecurity Moderate: nss security update ���:https://access.redhat.com/errata/RHSA-2024:0790 RHSA-2024:0790 RHSA-2024:0790 https://access.redhat.com/security/cve/CVE-2023-6135 CVE-2023-6135 CVE-2023-6135 https://bugzilla.redhat.com/2249906 2249906 https://errata.almalinux.org/9/ALSA-2024-0790.html ALSA-2024:0790 ALSA-2024:0790 �%|nss-util-3.90.0-6.el9_3.x86_64.rpm �#|nss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm � �hnspr-4.35.0-6.el9_3.x86_64.rpm �$|nss-sysinit-3.90.0-6.el9_3.x86_64.rpm �!|nss-3.90.0-6.el9_3.x86_64.rpm �"|nss-softokn-3.90.0-6.el9_3.x86_64.rpm �%|nss-util-3.90.0-6.el9_3.x86_64.rpm �#|nss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm � �hnspr-4.35.0-6.el9_3.x86_64.rpm �$|nss-sysinit-3.90.0-6.el9_3.x86_64.rpm �!|nss-3.90.0-6.el9_3.x86_64.rpm �"|nss-softokn-3.90.0-6.el9_3.x86_64.rpm ����4�~��Nsecurity Moderate: sudo security update ��H�|https://access.redhat.com/errata/RHSA-2024:0811 RHSA-2024:0811 RHSA-2024:0811 https://access.redhat.com/security/cve/CVE-2023-28486 CVE-2023-28486 CVE-2023-28486 https://access.redhat.com/security/cve/CVE-2023-28487 CVE-2023-28487 CVE-2023-28487 https://access.redhat.com/security/cve/CVE-2023-42465 CVE-2023-42465 CVE-2023-42465 https://bugzilla.redhat.com/2179272 2179272 https://bugzilla.redhat.com/2179273 2179273 https://bugzilla.redhat.com/2255568 2255568 https://errata.almalinux.org/9/ALSA-2024-0811.html ALSA-2024:0811 ALSA-2024:0811 �Q�[sudo-1.9.5p2-10.el9_3.x86_64.rpm �Q�[sudo-1.9.5p2-10.el9_3.x86_64.rpm ����[���PBsecurity Moderate: opensc security update ��D�https://access.redhat.com/errata/RHSA-2024:0966 RHSA-2024:0966 RHSA-2024:0966 https://access.redhat.com/security/cve/CVE-2023-5992 CVE-2023-5992 CVE-2023-5992 https://bugzilla.redhat.com/2248685 2248685 https://errata.almalinux.org/9/ALSA-2024-0966.html ALSA-2024:0966 ALSA-2024:0966 ��opensc-0.23.0-4.el9_3.i686.rpm ��opensc-0.23.0-4.el9_3.x86_64.rpm ��opensc-0.23.0-4.el9_3.i686.rpm ��opensc-0.23.0-4.el9_3.x86_64.rpm ����E� ��TBsecurity Important: pam:1.5.1 security update =��V�[https://access.redhat.com/errata/RHSA-2024:10244 RHSA-2024:10244 RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963 CVE-2024-10963 CVE-2024-10963 https://bugzilla.redhat.com/2324291 2324291 https://errata.almalinux.org/9/ALSA-2024-10244.html ALSA-2024:10244 ALSA-2024:10244 �� pam-1.5.1-22.el9_5.x86_64.rpm �� pam-1.5.1-22.el9_5.i686.rpm �� pam-1.5.1-22.el9_5.x86_64.rpm �� pam-1.5.1-22.el9_5.i686.rpm ����g���WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ��1�https://access.redhat.com/errata/RHSA-2024:10274 RHSA-2024:10274 RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009 CVE-2024-41009 CVE-2024-41009 https://access.redhat.com/security/cve/CVE-2024-42244 CVE-2024-42244 CVE-2024-42244 https://access.redhat.com/security/cve/CVE-2024-50226 CVE-2024-50226 CVE-2024-50226 https://bugzilla.redhat.com/2298412 2298412 https://bugzilla.redhat.com/2324876 2324876 https://errata.almalinux.org/9/ALSA-2024-10274.html ALSA-2024:10274 ALSA-2024:10274 8kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm Kkernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm �kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm Nkernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm 1�bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm Mkernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm 3kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm 2kernel-5.14.0-503.15.1.el9_5.x86_64.rpm <python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.15.1.el9_5.x86_64.rpm kernel-abi-stablelists-5.14.0-503.15.1.el9_5.noarch.rpm Kkernel-debug-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm �kernel-uki-virt-addons-5.14.0-503.15.1.el9_5.x86_64.rpm Nkernel-uki-virt-5.14.0-503.15.1.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.15.1.el9_5.x86_64.rpm 1�bpftool-7.4.0-503.15.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.15.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.15.1.el9_5.x86_64.rpm Mkernel-modules-core-5.14.0-503.15.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.15.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.15.1.el9_5.x86_64.rpm 3kernel-core-5.14.0-503.15.1.el9_5.x86_64.rpm 2kernel-5.14.0-503.15.1.el9_5.x86_64.rpm <python3-perf-5.14.0-503.15.1.el9_5.x86_64.rpm ���� ���zsecurity Important: tuned security update =��P�https://access.redhat.com/errata/RHSA-2024:10384 RHSA-2024:10384 RHSA-2024:10384 https://access.redhat.com/security/cve/CVE-2024-52336 CVE-2024-52336 CVE-2024-52336 https://access.redhat.com/security/cve/CVE-2024-52337 CVE-2024-52337 CVE-2024-52337 https://bugzilla.redhat.com/2324540 2324540 https://bugzilla.redhat.com/2324541 2324541 https://errata.almalinux.org/9/ALSA-2024-10384.html ALSA-2024:10384 ALSA-2024:10384 �{�htuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm �z�htuned-2.24.0-2.el9_5.alma.1.noarch.rpm �{�htuned-profiles-cpu-partitioning-2.24.0-2.el9_5.alma.1.noarch.rpm �z�htuned-2.24.0-2.el9_5.alma.1.noarch.rpm ����^���|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ��n�Ahttps://access.redhat.com/errata/RHSA-2024:10939 RHSA-2024:10939 RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615 CVE-2024-26615 CVE-2024-26615 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-44994 CVE-2024-44994 CVE-2024-44994 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://access.redhat.com/security/cve/CVE-2024-46695 CVE-2024-46695 CVE-2024-46695 https://access.redhat.com/security/cve/CVE-2024-49949 CVE-2024-49949 CVE-2024-49949 https://access.redhat.com/security/cve/CVE-2024-50251 CVE-2024-50251 CVE-2024-50251 https://bugzilla.redhat.com/2267355 2267355 https://bugzilla.redhat.com/2309857 2309857 https://bugzilla.redhat.com/2311715 2311715 https://bugzilla.redhat.com/2312083 2312083 https://bugzilla.redhat.com/2320505 2320505 https://bugzilla.redhat.com/2324886 2324886 https://errata.almalinux.org/9/ALSA-2024-10939.html ALSA-2024:10939 ALSA-2024:10939 �kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm 1�bpftool-7.4.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm 3kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm Nkernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm <python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm Kkernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm Mkernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 2kernel-5.14.0-503.16.1.el9_5.x86_64.rpm �kernel-uki-virt-addons-5.14.0-503.16.1.el9_5.x86_64.rpm 1�bpftool-7.4.0-503.16.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.16.1.el9_5.x86_64.rpm 3kernel-core-5.14.0-503.16.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.16.1.el9_5.x86_64.rpm Nkernel-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.16.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.16.1.el9_5.x86_64.rpm <python3-perf-5.14.0-503.16.1.el9_5.x86_64.rpm kernel-abi-stablelists-5.14.0-503.16.1.el9_5.noarch.rpm Kkernel-debug-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-503.16.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.16.1.el9_5.x86_64.rpm Mkernel-modules-core-5.14.0-503.16.1.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.16.1.el9_5.x86_64.rpm 2kernel-5.14.0-503.16.1.el9_5.x86_64.rpm ����5�� �_BBBsecurity Moderate: python3.9:3.9.21 security update ��/�https://access.redhat.com/errata/RHSA-2024:10983 RHSA-2024:10983 RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168 CVE-2024-11168 CVE-2024-11168 https://access.redhat.com/security/cve/CVE-2024-9287 CVE-2024-9287 CVE-2024-9287 https://bugzilla.redhat.com/2321440 2321440 https://bugzilla.redhat.com/2325776 2325776 https://errata.almalinux.org/9/ALSA-2024-10983.html ALSA-2024:10983 ALSA-2024:10983 0�cpython3-libs-3.9.21-1.el9_5.x86_64.rpm \�cpython3-3.9.21-1.el9_5.x86_64.rpm 0�cpython3-libs-3.9.21-1.el9_5.i686.rpm 0�cpython3-libs-3.9.21-1.el9_5.x86_64.rpm \�cpython3-3.9.21-1.el9_5.x86_64.rpm 0�cpython3-libs-3.9.21-1.el9_5.i686.rpm ����E�� �dBsecurity Moderate: pam security update ��M�?https://access.redhat.com/errata/RHSA-2024:11250 RHSA-2024:11250 RHSA-2024:11250 https://access.redhat.com/security/cve/CVE-2024-10041 CVE-2024-10041 CVE-2024-10041 https://bugzilla.redhat.com/2319212 2319212 https://errata.almalinux.org/9/ALSA-2024-11250.html ALSA-2024:11250 ALSA-2024:11250 ��pam-1.5.1-21.el9_5.i686.rpm ��pam-1.5.1-21.el9_5.x86_64.rpm ��pam-1.5.1-21.el9_5.i686.rpm ��pam-1.5.1-21.el9_5.x86_64.rpm �������gBBBBBBBBsecurity Moderate: curl security update ���@https://access.redhat.com/errata/RHSA-2024:1129 RHSA-2024:1129 RHSA-2024:1129 https://access.redhat.com/security/cve/CVE-2023-46218 CVE-2023-46218 CVE-2023-46218 https://bugzilla.redhat.com/2252030 2252030 https://errata.almalinux.org/9/ALSA-2024-1129.html ALSA-2024:1129 ALSA-2024:1129 Fylibcurl-minimal-7.76.1-26.el9_3.3.i686.rpm Fylibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm kycurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm Eylibcurl-7.76.1-26.el9_3.3.x86_64.rpm Eylibcurl-7.76.1-26.el9_3.3.i686.rpm jycurl-7.76.1-26.el9_3.3.x86_64.rpm Fylibcurl-minimal-7.76.1-26.el9_3.3.i686.rpm Fylibcurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm kycurl-minimal-7.76.1-26.el9_3.3.x86_64.rpm Eylibcurl-7.76.1-26.el9_3.3.x86_64.rpm Eylibcurl-7.76.1-26.el9_3.3.i686.rpm jycurl-7.76.1-26.el9_3.3.x86_64.rpm ����7���qBBBBBBsecurity Moderate: openssh security update ��L�0https://access.redhat.com/errata/RHSA-2024:1130 RHSA-2024:1130 RHSA-2024:1130 https://access.redhat.com/security/cve/CVE-2023-48795 CVE-2023-48795 CVE-2023-48795 https://access.redhat.com/security/cve/CVE-2023-51385 CVE-2023-51385 CVE-2023-51385 https://bugzilla.redhat.com/2254210 2254210 https://bugzilla.redhat.com/2255271 2255271 https://errata.almalinux.org/9/ALSA-2024-1130.html ALSA-2024:1130 ALSA-2024:1130 �D�openssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm �B�openssh-8.7p1-34.el9_3.3.x86_64.rpm �C�openssh-clients-8.7p1-34.el9_3.3.x86_64.rpm �E�openssh-server-8.7p1-34.el9_3.3.x86_64.rpm �D�openssh-keycat-8.7p1-34.el9_3.3.x86_64.rpm �B�openssh-8.7p1-34.el9_3.3.x86_64.rpm �C�openssh-clients-8.7p1-34.el9_3.3.x86_64.rpm �E�openssh-server-8.7p1-34.el9_3.3.x86_64.rpm ����R���yBBBBBBBsecurity Moderate: opencryptoki security update ��|�Whttps://access.redhat.com/errata/RHSA-2024:1239 RHSA-2024:1239 RHSA-2024:1239 https://access.redhat.com/security/cve/CVE-2024-0914 CVE-2024-0914 CVE-2024-0914 https://bugzilla.redhat.com/2260407 2260407 https://errata.almalinux.org/9/ALSA-2024-1239.html ALSA-2024:1239 ALSA-2024:1239 �X�opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm �X�opencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm �(�opencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm �'�opencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm �&�opencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm �X�opencryptoki-libs-3.21.0-9.el9_3.alma.1.i686.rpm �X�opencryptoki-libs-3.21.0-9.el9_3.alma.1.x86_64.rpm �(�opencryptoki-swtok-3.21.0-9.el9_3.alma.1.x86_64.rpm �'�opencryptoki-icsftok-3.21.0-9.el9_3.alma.1.x86_64.rpm �&�opencryptoki-3.21.0-9.el9_3.alma.1.x86_64.rpm ����E� � �CBsecurity Moderate: expat security update ��S�Bhttps://access.redhat.com/errata/RHSA-2024:1530 RHSA-2024:1530 RHSA-2024:1530 https://access.redhat.com/security/cve/CVE-2023-52425 CVE-2023-52425 CVE-2023-52425 https://access.redhat.com/security/cve/CVE-2024-28757 CVE-2024-28757 CVE-2024-28757 https://bugzilla.redhat.com/2262877 2262877 https://bugzilla.redhat.com/2268766 2268766 https://errata.almalinux.org/9/ALSA-2024-1530.html ALSA-2024:1530 ALSA-2024:1530 m�,expat-2.5.0-1.el9_3.1.x86_64.rpm m�,expat-2.5.0-1.el9_3.1.i686.rpm m�,expat-2.5.0-1.el9_3.1.x86_64.rpm m�,expat-2.5.0-1.el9_3.1.i686.rpm ����� ��Fsecurity Moderate: less security update ���#https://access.redhat.com/errata/RHSA-2024:1692 RHSA-2024:1692 RHSA-2024:1692 https://access.redhat.com/security/cve/CVE-2022-48624 CVE-2022-48624 CVE-2022-48624 https://bugzilla.redhat.com/2265081 2265081 https://errata.almalinux.org/9/ALSA-2024-1692.html ALSA-2024:1692 ALSA-2024:1692 ��nless-590-3.el9_3.x86_64.rpm ��nless-590-3.el9_3.x86_64.rpm ����|���IBsecurity Moderate: gnutls security update ��8�https://access.redhat.com/errata/RHSA-2024:1879 RHSA-2024:1879 RHSA-2024:1879 https://access.redhat.com/security/cve/CVE-2024-28834 CVE-2024-28834 CVE-2024-28834 https://access.redhat.com/security/cve/CVE-2024-28835 CVE-2024-28835 CVE-2024-28835 https://bugzilla.redhat.com/2269084 2269084 https://bugzilla.redhat.com/2269228 2269228 https://errata.almalinux.org/9/ALSA-2024-1879.html ALSA-2024:1879 ALSA-2024:1879 o�<gnutls-3.7.6-23.el9_3.4.i686.rpm o�<gnutls-3.7.6-23.el9_3.4.x86_64.rpm o�<gnutls-3.7.6-23.el9_3.4.i686.rpm o�<gnutls-3.7.6-23.el9_3.4.x86_64.rpm �������Lsecurity Important: shim bug fix update =��J�Mhttps://access.redhat.com/errata/RHSA-2024:1903 RHSA-2024:1903 RHSA-2024:1903 https://access.redhat.com/security/cve/CVE-2023-40546 CVE-2023-40546 CVE-2023-40546 https://access.redhat.com/security/cve/CVE-2023-40547 CVE-2023-40547 CVE-2023-40547 https://access.redhat.com/security/cve/CVE-2023-40548 CVE-2023-40548 CVE-2023-40548 https://access.redhat.com/security/cve/CVE-2023-40549 CVE-2023-40549 CVE-2023-40549 https://access.redhat.com/security/cve/CVE-2023-40550 CVE-2023-40550 CVE-2023-40550 https://access.redhat.com/security/cve/CVE-2023-40551 CVE-2023-40551 CVE-2023-40551 https://bugzilla.redhat.com/2234589 2234589 https://bugzilla.redhat.com/2241782 2241782 https://bugzilla.redhat.com/2241796 2241796 https://bugzilla.redhat.com/2241797 2241797 https://bugzilla.redhat.com/2259915 2259915 https://bugzilla.redhat.com/2259918 2259918 https://errata.almalinux.org/9/ALSA-2024-1903.html ALSA-2024:1903 ALSA-2024:1903 �P�]shim-x64-15.8-4.el9_3.alma.1.x86_64.rpm �P�]shim-x64-15.8-4.el9_3.alma.1.x86_64.rpm ����x� ��OBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security, bug fix, and enhancement update =���%zhttps://access.redhat.com/errata/RHSA-2024:2394 RHSA-2024:2394 RHSA-2024:2394 https://bugzilla.redhat.com/1918601 1918601 https://bugzilla.redhat.com/2049700 2049700 https://bugzilla.redhat.com/2133452 2133452 https://bugzilla.redhat.com/2151959 2151959 https://bugzilla.redhat.com/2177759 2177759 https://bugzilla.redhat.com/2185519 2185519 https://bugzilla.redhat.com/2188102 2188102 https://bugzilla.redhat.com/2210024 2210024 https://bugzilla.redhat.com/2213132 2213132 https://bugzilla.redhat.com/2218332 2218332 https://bugzilla.redhat.com/2219359 2219359 https://bugzilla.redhat.com/2221039 2221039 https://bugzilla.redhat.com/2221463 2221463 https://bugzilla.redhat.com/2221702 2221702 https://bugzilla.redhat.com/2226777 2226777 https://bugzilla.redhat.com/2226787 2226787 https://bugzilla.redhat.com/2226788 2226788 https://bugzilla.redhat.com/2231410 2231410 https://bugzilla.redhat.com/2239845 2239845 https://bugzilla.redhat.com/2239848 2239848 https://bugzilla.redhat.com/2244720 2244720 https://bugzilla.redhat.com/2246980 2246980 https://bugzilla.redhat.com/2250043 2250043 https://bugzilla.redhat.com/2252731 2252731 https://bugzilla.redhat.com/2253034 2253034 https://bugzilla.redhat.com/2253632 2253632 https://bugzilla.redhat.com/2254961 2254961 https://bugzilla.redhat.com/2254982 2254982 https://bugzilla.redhat.com/2255283 2255283 https://bugzilla.redhat.com/2255498 2255498 https://bugzilla.redhat.com/2256490 2256490 https://bugzilla.redhat.com/2256822 2256822 https://bugzilla.redhat.com/2257682 2257682 https://bugzilla.redhat.com/2258013 2258013 https://bugzilla.redhat.com/2258518 2258518 https://bugzilla.redhat.com/2260005 2260005 https://bugzilla.redhat.com/2262126 2262126 https://bugzilla.redhat.com/2262127 2262127 https://bugzilla.redhat.com/2265285 2265285 https://bugzilla.redhat.com/2265517 2265517 https://bugzilla.redhat.com/2265518 2265518 https://bugzilla.redhat.com/2265519 2265519 https://bugzilla.redhat.com/2265520 2265520 https://bugzilla.redhat.com/2265645 2265645 https://bugzilla.redhat.com/2265646 2265646 https://bugzilla.redhat.com/2265653 2265653 https://bugzilla.redhat.com/2267041 2267041 https://bugzilla.redhat.com/2267695 2267695 https://bugzilla.redhat.com/2267750 2267750 https://bugzilla.redhat.com/2267758 2267758 https://bugzilla.redhat.com/2267760 2267760 https://bugzilla.redhat.com/2267761 2267761 https://bugzilla.redhat.com/2267788 2267788 https://bugzilla.redhat.com/2267795 2267795 https://bugzilla.redhat.com/2269189 2269189 https://bugzilla.redhat.com/2269217 2269217 https://bugzilla.redhat.com/2270080 2270080 https://bugzilla.redhat.com/2270118 2270118 https://bugzilla.redhat.com/2270883 2270883 https://errata.almalinux.org/9/ALSA-2024-2394.html ALSA-2024:2394 ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.html CVE-2020-26555 CVE-2020-26555 https://www.redhat.com/security/data/cve/CVE-2022-0480.html CVE-2022-0480 CVE-2022-0480 https://www.redhat.com/security/data/cve/CVE-2022-38096.html CVE-2022-38096 CVE-2022-38096 https://www.redhat.com/security/data/cve/CVE-2022-45934.html CVE-2022-45934 CVE-2022-45934 https://www.redhat.com/security/data/cve/CVE-2023-24023.html CVE-2023-24023 CVE-2023-24023 https://www.redhat.com/security/data/cve/CVE-2023-25775.html CVE-2023-25775 CVE-2023-25775 https://www.redhat.com/security/data/cve/CVE-2023-28464.html CVE-2023-28464 CVE-2023-28464 https://www.redhat.com/security/data/cve/CVE-2023-28866.html CVE-2023-28866 CVE-2023-28866 https://www.redhat.com/security/data/cve/CVE-2023-31083.html CVE-2023-31083 CVE-2023-31083 https://www.redhat.com/security/data/cve/CVE-2023-3567.html CVE-2023-3567 CVE-2023-3567 https://www.redhat.com/security/data/cve/CVE-2023-37453.html CVE-2023-37453 CVE-2023-37453 https://www.redhat.com/security/data/cve/CVE-2023-39189.html CVE-2023-39189 CVE-2023-39189 https://www.redhat.com/security/data/cve/CVE-2023-39193.html CVE-2023-39193 CVE-2023-39193 https://www.redhat.com/security/data/cve/CVE-2023-39194.html CVE-2023-39194 CVE-2023-39194 https://www.redhat.com/security/data/cve/CVE-2023-39198.html CVE-2023-39198 CVE-2023-39198 https://www.redhat.com/security/data/cve/CVE-2023-4133.html CVE-2023-4133 CVE-2023-4133 https://www.redhat.com/security/data/cve/CVE-2023-42754.html CVE-2023-42754 CVE-2023-42754 https://www.redhat.com/security/data/cve/CVE-2023-42756.html CVE-2023-42756 CVE-2023-42756 https://www.redhat.com/security/data/cve/CVE-2023-45863.html CVE-2023-45863 CVE-2023-45863 https://www.redhat.com/security/data/cve/CVE-2023-46862.html CVE-2023-46862 CVE-2023-46862 https://www.redhat.com/security/data/cve/CVE-2023-51043.html CVE-2023-51043 CVE-2023-51043 https://www.redhat.com/security/data/cve/CVE-2023-51779.html CVE-2023-51779 CVE-2023-51779 https://www.redhat.com/security/data/cve/CVE-2023-51780.html CVE-2023-51780 CVE-2023-51780 https://www.redhat.com/security/data/cve/CVE-2023-52434.html CVE-2023-52434 CVE-2023-52434 https://www.redhat.com/security/data/cve/CVE-2023-52448.html CVE-2023-52448 CVE-2023-52448 https://www.redhat.com/security/data/cve/CVE-2023-52450.html CVE-2023-52450 CVE-2023-52450 https://www.redhat.com/security/data/cve/CVE-2023-52476.html CVE-2023-52476 CVE-2023-52476 https://www.redhat.com/security/data/cve/CVE-2023-52489.html CVE-2023-52489 CVE-2023-52489 https://www.redhat.com/security/data/cve/CVE-2023-52522.html CVE-2023-52522 CVE-2023-52522 https://www.redhat.com/security/data/cve/CVE-2023-52529.html CVE-2023-52529 CVE-2023-52529 https://www.redhat.com/security/data/cve/CVE-2023-52574.html CVE-2023-52574 CVE-2023-52574 https://www.redhat.com/security/data/cve/CVE-2023-52578.html CVE-2023-52578 CVE-2023-52578 https://www.redhat.com/security/data/cve/CVE-2023-52580.html CVE-2023-52580 CVE-2023-52580 https://www.redhat.com/security/data/cve/CVE-2023-52581.html CVE-2023-52581 CVE-2023-52581 https://www.redhat.com/security/data/cve/CVE-2023-52597.html CVE-2023-52597 CVE-2023-52597 https://www.redhat.com/security/data/cve/CVE-2023-52610.html CVE-2023-52610 CVE-2023-52610 https://www.redhat.com/security/data/cve/CVE-2023-52620.html CVE-2023-52620 CVE-2023-52620 https://www.redhat.com/security/data/cve/CVE-2023-6040.html CVE-2023-6040 CVE-2023-6040 https://www.redhat.com/security/data/cve/CVE-2023-6121.html CVE-2023-6121 CVE-2023-6121 https://www.redhat.com/security/data/cve/CVE-2023-6176.html CVE-2023-6176 CVE-2023-6176 https://www.redhat.com/security/data/cve/CVE-2023-6531.html CVE-2023-6531 CVE-2023-6531 https://www.redhat.com/security/data/cve/CVE-2023-6546.html CVE-2023-6546 CVE-2023-6546 https://www.redhat.com/security/data/cve/CVE-2023-6622.html CVE-2023-6622 CVE-2023-6622 https://www.redhat.com/security/data/cve/CVE-2023-6915.html CVE-2023-6915 CVE-2023-6915 https://www.redhat.com/security/data/cve/CVE-2023-6931.html CVE-2023-6931 CVE-2023-6931 https://www.redhat.com/security/data/cve/CVE-2023-6932.html CVE-2023-6932 CVE-2023-6932 https://www.redhat.com/security/data/cve/CVE-2024-0565.html CVE-2024-0565 CVE-2024-0565 https://www.redhat.com/security/data/cve/CVE-2024-0841.html CVE-2024-0841 CVE-2024-0841 https://www.redhat.com/security/data/cve/CVE-2024-1085.html CVE-2024-1085 CVE-2024-1085 https://www.redhat.com/security/data/cve/CVE-2024-1086.html CVE-2024-1086 CVE-2024-1086 https://www.redhat.com/security/data/cve/CVE-2024-25744.html CVE-2024-25744 CVE-2024-25744 https://www.redhat.com/security/data/cve/CVE-2024-26582.html CVE-2024-26582 CVE-2024-26582 https://www.redhat.com/security/data/cve/CVE-2024-26583.html CVE-2024-26583 CVE-2024-26583 https://www.redhat.com/security/data/cve/CVE-2024-26584.html CVE-2024-26584 CVE-2024-26584 https://www.redhat.com/security/data/cve/CVE-2024-26585.html CVE-2024-26585 CVE-2024-26585 https://www.redhat.com/security/data/cve/CVE-2024-26586.html CVE-2024-26586 CVE-2024-26586 https://www.redhat.com/security/data/cve/CVE-2024-26593.html CVE-2024-26593 CVE-2024-26593 https://www.redhat.com/security/data/cve/CVE-2024-26602.html CVE-2024-26602 CVE-2024-26602 https://www.redhat.com/security/data/cve/CVE-2024-26609.html CVE-2024-26609 CVE-2024-26609 https://www.redhat.com/security/data/cve/CVE-2024-26633.html CVE-2024-26633 CVE-2024-26633 https://www.redhat.com/security/data/cve/CVE-2024-26671.html CVE-2024-26671 CVE-2024-26671 2#kernel-5.14.0-427.13.1.el9_4.x86_64.rpm M#kernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm #kernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpm 6#kernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpm ;#kernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm K#kernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm L#kernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm 5#kernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpm :#kernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm <#python3-perf-5.14.0-427.13.1.el9_4.x86_64.rpm 9#kernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm 7#kernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm 4#kernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpm 8#kernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm N#kernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm 3#kernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm 1�tbpftool-7.3.0-427.13.1.el9_4.x86_64.rpm 2#kernel-5.14.0-427.13.1.el9_4.x86_64.rpm M#kernel-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm #kernel-abi-stablelists-5.14.0-427.13.1.el9_4.noarch.rpm 6#kernel-debug-modules-5.14.0-427.13.1.el9_4.x86_64.rpm ;#kernel-tools-libs-5.14.0-427.13.1.el9_4.x86_64.rpm K#kernel-debug-modules-core-5.14.0-427.13.1.el9_4.x86_64.rpm L#kernel-debug-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm 5#kernel-debug-core-5.14.0-427.13.1.el9_4.x86_64.rpm :#kernel-tools-5.14.0-427.13.1.el9_4.x86_64.rpm <#python3-perf-5.14.0-427.13.1.el9_4.x86_64.rpm 9#kernel-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm 7#kernel-debug-modules-extra-5.14.0-427.13.1.el9_4.x86_64.rpm 4#kernel-debug-5.14.0-427.13.1.el9_4.x86_64.rpm 8#kernel-modules-5.14.0-427.13.1.el9_4.x86_64.rpm N#kernel-uki-virt-5.14.0-427.13.1.el9_4.x86_64.rpm 3#kernel-core-5.14.0-427.13.1.el9_4.x86_64.rpm 1�tbpftool-7.3.0-427.13.1.el9_4.x86_64.rpm ����'��2�psecurity Moderate: squashfs-tools security update ��<�https://access.redhat.com/errata/RHSA-2024:2396 RHSA-2024:2396 RHSA-2024:2396 https://access.redhat.com/security/cve/CVE-2021-40153 CVE-2021-40153 CVE-2021-40153 https://access.redhat.com/security/cve/CVE-2021-41072 CVE-2021-41072 CVE-2021-41072 https://bugzilla.redhat.com/1998621 1998621 https://bugzilla.redhat.com/2004957 2004957 https://errata.almalinux.org/9/ALSA-2024-2396.html ALSA-2024:2396 ALSA-2024:2396 �;�isquashfs-tools-4.4-10.git1.el9.x86_64.rpm �;�isquashfs-tools-4.4-10.git1.el9.x86_64.rpm ������sBsecurity Moderate: harfbuzz security update ��[�{https://access.redhat.com/errata/RHSA-2024:2410 RHSA-2024:2410 RHSA-2024:2410 https://access.redhat.com/security/cve/CVE-2023-25193 CVE-2023-25193 CVE-2023-25193 https://bugzilla.redhat.com/2167254 2167254 https://errata.almalinux.org/9/ALSA-2024-2410.html ALSA-2024:2410 ALSA-2024:2410 �n�1harfbuzz-2.7.4-10.el9.x86_64.rpm �n�1harfbuzz-2.7.4-10.el9.i686.rpm �n�1harfbuzz-2.7.4-10.el9.x86_64.rpm �n�1harfbuzz-2.7.4-10.el9.i686.rpm ��� ���vBBBBsecurity Moderate: avahi security update ��V�Ohttps://access.redhat.com/errata/RHSA-2024:2433 RHSA-2024:2433 RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469 CVE-2023-38469 CVE-2023-38469 https://access.redhat.com/security/cve/CVE-2023-38470 CVE-2023-38470 CVE-2023-38470 https://access.redhat.com/security/cve/CVE-2023-38471 CVE-2023-38471 CVE-2023-38471 https://access.redhat.com/security/cve/CVE-2023-38472 CVE-2023-38472 CVE-2023-38472 https://access.redhat.com/security/cve/CVE-2023-38473 CVE-2023-38473 CVE-2023-38473 https://bugzilla.redhat.com/2191687 2191687 https://bugzilla.redhat.com/2191690 2191690 https://bugzilla.redhat.com/2191691 2191691 https://bugzilla.redhat.com/2191692 2191692 https://bugzilla.redhat.com/2191694 2191694 https://errata.almalinux.org/9/ALSA-2024-2433.html ALSA-2024:2433 ALSA-2024:2433 �h�#avahi-libs-0.8-20.el9.x86_64.rpm �g�#avahi-0.8-20.el9.x86_64.rpm �h�#avahi-libs-0.8-20.el9.i686.rpm �g�#avahi-0.8-20.el9.i686.rpm �h�#avahi-libs-0.8-20.el9.x86_64.rpm �g�#avahi-0.8-20.el9.x86_64.rpm �h�#avahi-libs-0.8-20.el9.i686.rpm �g�#avahi-0.8-20.el9.i686.rpm �����>�|security Moderate: exfatprogs security update ��%�https://access.redhat.com/errata/RHSA-2024:2437 RHSA-2024:2437 RHSA-2024:2437 https://access.redhat.com/security/cve/CVE-2023-45897 CVE-2023-45897 CVE-2023-45897 https://bugzilla.redhat.com/2246976 2246976 https://errata.almalinux.org/9/ALSA-2024-2437.html ALSA-2024:2437 ALSA-2024:2437 ��Yexfatprogs-1.2.2-2.el9.x86_64.rpm ��Yexfatprogs-1.2.2-2.el9.x86_64.rpm ������Bsecurity Moderate: pam security update ��-�Ohttps://access.redhat.com/errata/RHSA-2024:2438 RHSA-2024:2438 RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365 CVE-2024-22365 CVE-2024-22365 https://bugzilla.redhat.com/2257722 2257722 https://errata.almalinux.org/9/ALSA-2024-2438.html ALSA-2024:2438 ALSA-2024:2438 ��pam-1.5.1-19.el9.x86_64.rpm ��pam-1.5.1-19.el9.i686.rpm ��pam-1.5.1-19.el9.x86_64.rpm ��pam-1.5.1-19.el9.i686.rpm ��� ���BBBBsecurity Low: openssl and openssl-fips-provider security update n��|�/https://access.redhat.com/errata/RHSA-2024:2447 RHSA-2024:2447 RHSA-2024:2447 https://access.redhat.com/security/cve/CVE-2023-2975 CVE-2023-2975 CVE-2023-2975 https://access.redhat.com/security/cve/CVE-2023-3446 CVE-2023-3446 CVE-2023-3446 https://access.redhat.com/security/cve/CVE-2023-3817 CVE-2023-3817 CVE-2023-3817 https://access.redhat.com/security/cve/CVE-2023-5678 CVE-2023-5678 CVE-2023-5678 https://access.redhat.com/security/cve/CVE-2023-6129 CVE-2023-6129 CVE-2023-6129 https://access.redhat.com/security/cve/CVE-2023-6237 CVE-2023-6237 CVE-2023-6237 https://access.redhat.com/security/cve/CVE-2024-0727 CVE-2024-0727 CVE-2024-0727 https://bugzilla.redhat.com/2223016 2223016 https://bugzilla.redhat.com/2224962 2224962 https://bugzilla.redhat.com/2227852 2227852 https://bugzilla.redhat.com/2248616 2248616 https://bugzilla.redhat.com/2257571 2257571 https://bugzilla.redhat.com/2258502 2258502 https://bugzilla.redhat.com/2259944 2259944 https://errata.almalinux.org/9/ALSA-2024-2447.html ALSA-2024:2447 ALSA-2024:2447 Z�Kopenssl-libs-3.0.7-27.el9.i686.rpm Z�Kopenssl-libs-3.0.7-27.el9.x86_64.rpm }�Kopenssl-3.0.7-27.el9.x86_64.rpm Z�Kopenssl-libs-3.0.7-27.el9.i686.rpm Z�Kopenssl-libs-3.0.7-27.el9.x86_64.rpm }�Kopenssl-3.0.7-27.el9.x86_64.rpm ������GBBBBBBBBBBBBBBBBsecurity Moderate: grub2 security update ��+�Thttps://access.redhat.com/errata/RHSA-2024:2456 RHSA-2024:2456 RHSA-2024:2456 https://access.redhat.com/security/cve/CVE-2023-4692 CVE-2023-4692 CVE-2023-4692 https://access.redhat.com/security/cve/CVE-2023-4693 CVE-2023-4693 CVE-2023-4693 https://access.redhat.com/security/cve/CVE-2024-1048 CVE-2024-1048 CVE-2024-1048 https://bugzilla.redhat.com/2236613 2236613 https://bugzilla.redhat.com/2238343 2238343 https://bugzilla.redhat.com/2256827 2256827 https://errata.almalinux.org/9/ALSA-2024-2456.html ALSA-2024:2456 ALSA-2024:2456 �0Qgrub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm �{Qgrub2-tools-2.06-77.el9.alma.1.x86_64.rpm �zQgrub2-pc-2.06-77.el9.alma.1.x86_64.rpm �}Qgrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm �xQgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm �yQgrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm �|Qgrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm �/Qgrub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm �.Qgrub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm �-Qgrub2-common-2.06-77.el9.alma.1.noarch.rpm �~Qgrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm �0Qgrub2-pc-modules-2.06-77.el9.alma.1.noarch.rpm �{Qgrub2-tools-2.06-77.el9.alma.1.x86_64.rpm �zQgrub2-pc-2.06-77.el9.alma.1.x86_64.rpm �}Qgrub2-tools-extra-2.06-77.el9.alma.1.x86_64.rpm �xQgrub2-efi-x64-2.06-77.el9.alma.1.x86_64.rpm �yQgrub2-efi-x64-cdboot-2.06-77.el9.alma.1.x86_64.rpm �|Qgrub2-tools-efi-2.06-77.el9.alma.1.x86_64.rpm �/Qgrub2-efi-x64-modules-2.06-77.el9.alma.1.noarch.rpm �.Qgrub2-efi-aa64-modules-2.06-77.el9.alma.1.noarch.rpm �-Qgrub2-common-2.06-77.el9.alma.1.noarch.rpm �~Qgrub2-tools-minimal-2.06-77.el9.alma.1.x86_64.rpm ���F���ZBBBBBBBBBBBBBBBBBsecurity Moderate: systemd security update ���https://access.redhat.com/errata/RHSA-2024:2463 RHSA-2024:2463 RHSA-2024:2463 https://access.redhat.com/security/cve/CVE-2023-7008 CVE-2023-7008 CVE-2023-7008 https://bugzilla.redhat.com/2222672 2222672 https://errata.almalinux.org/9/ALSA-2024-2463.html ALSA-2024:2463 ALSA-2024:2463 �yJrhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm � Jsystemd-container-252-32.el9_4.alma.1.i686.rpm �Jsystemd-udev-252-32.el9_4.alma.1.x86_64.rpm � Jsystemd-oomd-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-252-32.el9_4.alma.1.x86_64.rpm �!Jsystemd-libs-252-32.el9_4.alma.1.i686.rpm �!Jsystemd-libs-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-252-32.el9_4.alma.1.i686.rpm �Jsystemd-pam-252-32.el9_4.alma.1.x86_64.rpm � Jsystemd-container-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-resolved-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm �yJrhel-net-naming-sysattrs-252-32.el9_4.alma.1.noarch.rpm � Jsystemd-container-252-32.el9_4.alma.1.i686.rpm �Jsystemd-udev-252-32.el9_4.alma.1.x86_64.rpm � Jsystemd-oomd-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-252-32.el9_4.alma.1.x86_64.rpm �!Jsystemd-libs-252-32.el9_4.alma.1.i686.rpm �!Jsystemd-libs-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-252-32.el9_4.alma.1.i686.rpm �Jsystemd-pam-252-32.el9_4.alma.1.x86_64.rpm � Jsystemd-container-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-resolved-252-32.el9_4.alma.1.x86_64.rpm �Jsystemd-rpm-macros-252-32.el9_4.alma.1.noarch.rpm �����/�msecurity Moderate: traceroute security update �� �https://access.redhat.com/errata/RHSA-2024:2483 RHSA-2024:2483 RHSA-2024:2483 https://access.redhat.com/security/cve/CVE-2023-46316 CVE-2023-46316 CVE-2023-46316 https://bugzilla.redhat.com/2246303 2246303 https://errata.almalinux.org/9/ALSA-2024-2483.html ALSA-2024:2483 ALSA-2024:2483 �P�gtraceroute-2.1.0-18.el9.x86_64.rpm �P�gtraceroute-2.1.0-18.el9.x86_64.rpm ������pBBsecurity Low: libssh security update n���https://access.redhat.com/errata/RHSA-2024:2504 RHSA-2024:2504 RHSA-2024:2504 https://access.redhat.com/security/cve/CVE-2023-6004 CVE-2023-6004 CVE-2023-6004 https://access.redhat.com/security/cve/CVE-2023-6918 CVE-2023-6918 CVE-2023-6918 https://bugzilla.redhat.com/2251110 2251110 https://bugzilla.redhat.com/2254997 2254997 https://errata.almalinux.org/9/ALSA-2024-2504.html ALSA-2024:2504 ALSA-2024:2504 �r�vlibssh-0.10.4-13.el9.x86_64.rpm �J�vlibssh-config-0.10.4-13.el9.noarch.rpm �r�vlibssh-0.10.4-13.el9.i686.rpm �r�vlibssh-0.10.4-13.el9.x86_64.rpm �J�vlibssh-config-0.10.4-13.el9.noarch.rpm �r�vlibssh-0.10.4-13.el9.i686.rpm ���'���tBBBsecurity Low: file security update n���Bhttps://access.redhat.com/errata/RHSA-2024:2512 RHSA-2024:2512 RHSA-2024:2512 https://access.redhat.com/security/cve/CVE-2022-48554 CVE-2022-48554 CVE-2022-48554 https://bugzilla.redhat.com/2235714 2235714 https://errata.almalinux.org/9/ALSA-2024-2512.html ALSA-2024:2512 ALSA-2024:2512 �F�efile-libs-5.39-16.el9.x86_64.rpm ��efile-5.39-16.el9.x86_64.rpm �F�efile-libs-5.39-16.el9.i686.rpm �F�efile-libs-5.39-16.el9.x86_64.rpm ��efile-5.39-16.el9.x86_64.rpm �F�efile-libs-5.39-16.el9.i686.rpm �����;�ysecurity Moderate: wpa_supplicant security update ��]�bhttps://access.redhat.com/errata/RHSA-2024:2517 RHSA-2024:2517 RHSA-2024:2517 https://access.redhat.com/security/cve/CVE-2023-52160 CVE-2023-52160 CVE-2023-52160 https://bugzilla.redhat.com/2264593 2264593 https://errata.almalinux.org/9/ALSA-2024-2517.html ALSA-2024:2517 ALSA-2024:2517 �Q�^wpa_supplicant-2.10-5.el9.x86_64.rpm �Q�^wpa_supplicant-2.10-5.el9.x86_64.rpm ������|Bsecurity Moderate: gnutls security update ��?�https://access.redhat.com/errata/RHSA-2024:2570 RHSA-2024:2570 RHSA-2024:2570 https://access.redhat.com/security/cve/CVE-2024-28834 CVE-2024-28834 CVE-2024-28834 https://access.redhat.com/security/cve/CVE-2024-28835 CVE-2024-28835 CVE-2024-28835 https://bugzilla.redhat.com/2269084 2269084 https://bugzilla.redhat.com/2269228 2269228 https://errata.almalinux.org/9/ALSA-2024-2570.html ALSA-2024:2570 ALSA-2024:2570 o�=gnutls-3.8.3-4.el9_4.x86_64.rpm o�=gnutls-3.8.3-4.el9_4.i686.rpm o�=gnutls-3.8.3-4.el9_4.x86_64.rpm o�=gnutls-3.8.3-4.el9_4.i686.rpm ���A���BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: sssd security and bug fix update ��P�Hhttps://access.redhat.com/errata/RHSA-2024:2571 RHSA-2024:2571 RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758 CVE-2023-3758 CVE-2023-3758 https://bugzilla.redhat.com/2223762 2223762 https://errata.almalinux.org/9/ALSA-2024-2571.html ALSA-2024:2571 ALSA-2024:2571 #�xpython3-sssdconfig-2.9.4-6.el9_4.noarch.rpm �Mlibipa_hbac-2.9.4-6.el9_4.x86_64.rpm �asssd-client-2.9.4-6.el9_4.i686.rpm �.python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �>sssd-common-2.9.4-6.el9_4.x86_64.rpm �<sssd-2.9.4-6.el9_4.x86_64.rpm �1python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm �Tlibsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm �=sssd-ad-2.9.4-6.el9_4.x86_64.rpm �Isssd-proxy-2.9.4-6.el9_4.x86_64.rpm �Dsssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm �Tlibsss_simpleifp-2.9.4-6.el9_4.i686.rpm �Gsssd-passkey-2.9.4-6.el9_4.x86_64.rpm �Jsssd-tools-2.9.4-6.el9_4.x86_64.rpm �Slibsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �@sssd-dbus-2.9.4-6.el9_4.x86_64.rpm �Mlibipa_hbac-2.9.4-6.el9_4.i686.rpm �Qlibsss_certmap-2.9.4-6.el9_4.i686.rpm �?sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm �-python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm �Esssd-ldap-2.9.4-6.el9_4.x86_64.rpm �Bsssd-kcm-2.9.4-6.el9_4.x86_64.rpm �Rlibsss_idmap-2.9.4-6.el9_4.i686.rpm �libsss_sudo-2.9.4-6.el9_4.x86_64.rpm �Ksssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm �Hsssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm �libsss_autofs-2.9.4-6.el9_4.x86_64.rpm �Asssd-ipa-2.9.4-6.el9_4.x86_64.rpm �Csssd-krb5-2.9.4-6.el9_4.x86_64.rpm �Qlibsss_certmap-2.9.4-6.el9_4.x86_64.rpm �Fsssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm �asssd-client-2.9.4-6.el9_4.x86_64.rpm �Rlibsss_idmap-2.9.4-6.el9_4.x86_64.rpm �0python3-sss-2.9.4-6.el9_4.x86_64.rpm �Slibsss_nss_idmap-2.9.4-6.el9_4.i686.rpm #�xpython3-sssdconfig-2.9.4-6.el9_4.noarch.rpm �Mlibipa_hbac-2.9.4-6.el9_4.x86_64.rpm �asssd-client-2.9.4-6.el9_4.i686.rpm �.python3-libsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �>sssd-common-2.9.4-6.el9_4.x86_64.rpm �<sssd-2.9.4-6.el9_4.x86_64.rpm �1python3-sss-murmur-2.9.4-6.el9_4.x86_64.rpm �Tlibsss_simpleifp-2.9.4-6.el9_4.x86_64.rpm �=sssd-ad-2.9.4-6.el9_4.x86_64.rpm �Isssd-proxy-2.9.4-6.el9_4.x86_64.rpm �Dsssd-krb5-common-2.9.4-6.el9_4.x86_64.rpm �Tlibsss_simpleifp-2.9.4-6.el9_4.i686.rpm �Gsssd-passkey-2.9.4-6.el9_4.x86_64.rpm �Jsssd-tools-2.9.4-6.el9_4.x86_64.rpm �Slibsss_nss_idmap-2.9.4-6.el9_4.x86_64.rpm �@sssd-dbus-2.9.4-6.el9_4.x86_64.rpm �Mlibipa_hbac-2.9.4-6.el9_4.i686.rpm �Qlibsss_certmap-2.9.4-6.el9_4.i686.rpm �?sssd-common-pac-2.9.4-6.el9_4.x86_64.rpm �-python3-libipa_hbac-2.9.4-6.el9_4.x86_64.rpm �Esssd-ldap-2.9.4-6.el9_4.x86_64.rpm �Bsssd-kcm-2.9.4-6.el9_4.x86_64.rpm �Rlibsss_idmap-2.9.4-6.el9_4.i686.rpm �libsss_sudo-2.9.4-6.el9_4.x86_64.rpm �Ksssd-winbind-idmap-2.9.4-6.el9_4.x86_64.rpm �Hsssd-polkit-rules-2.9.4-6.el9_4.x86_64.rpm �libsss_autofs-2.9.4-6.el9_4.x86_64.rpm �Asssd-ipa-2.9.4-6.el9_4.x86_64.rpm �Csssd-krb5-2.9.4-6.el9_4.x86_64.rpm �Qlibsss_certmap-2.9.4-6.el9_4.x86_64.rpm �Fsssd-nfs-idmap-2.9.4-6.el9_4.x86_64.rpm �asssd-client-2.9.4-6.el9_4.x86_64.rpm �Rlibsss_idmap-2.9.4-6.el9_4.x86_64.rpm �0python3-sss-2.9.4-6.el9_4.x86_64.rpm �Slibsss_nss_idmap-2.9.4-6.el9_4.i686.rpm ���#���~BBBsecurity Moderate: libxml2 security update ���nhttps://access.redhat.com/errata/RHSA-2024:2679 RHSA-2024:2679 RHSA-2024:2679 https://access.redhat.com/security/cve/CVE-2024-25062 CVE-2024-25062 CVE-2024-25062 https://bugzilla.redhat.com/2262726 2262726 https://errata.almalinux.org/9/ALSA-2024-2679.html ALSA-2024:2679 ALSA-2024:2679 ��Tpython3-libxml2-2.9.13-6.el9_4.x86_64.rpm ��Tlibxml2-2.9.13-6.el9_4.x86_64.rpm ��Tlibxml2-2.9.13-6.el9_4.i686.rpm ��Tpython3-libxml2-2.9.13-6.el9_4.x86_64.rpm ��Tlibxml2-2.9.13-6.el9_4.x86_64.rpm ��Tlibxml2-2.9.13-6.el9_4.i686.rpm ����k���CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ���&https://access.redhat.com/errata/RHSA-2024:2758 RHSA-2024:2758 RHSA-2024:2758 https://bugzilla.redhat.com/2250843 2250843 https://bugzilla.redhat.com/2270836 2270836 https://errata.almalinux.org/9/ALSA-2024-2758.html ALSA-2024:2758 ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.html CVE-2023-5090 CVE-2023-5090 https://www.redhat.com/security/data/cve/CVE-2023-6240.html CVE-2023-6240 CVE-2023-6240 https://www.redhat.com/security/data/cve/CVE-2024-25742.html CVE-2024-25742 CVE-2024-25742 https://www.redhat.com/security/data/cve/CVE-2024-25743.html CVE-2024-25743 CVE-2024-25743 6$kernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm 7$kernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm $kernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpm 2$kernel-5.14.0-427.16.1.el9_4.x86_64.rpm <$python3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm 1�ubpftool-7.3.0-427.16.1.el9_4.x86_64.rpm 4$kernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpm 3$kernel-core-5.14.0-427.16.1.el9_4.x86_64.rpm 8$kernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm M$kernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm :$kernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpm ;$kernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpm 9$kernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm N$kernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm K$kernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm 5$kernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm L$kernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm 6$kernel-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm 7$kernel-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm $kernel-abi-stablelists-5.14.0-427.16.1.el9_4.noarch.rpm 2$kernel-5.14.0-427.16.1.el9_4.x86_64.rpm <$python3-perf-5.14.0-427.16.1.el9_4.x86_64.rpm 1�ubpftool-7.3.0-427.16.1.el9_4.x86_64.rpm 4$kernel-debug-5.14.0-427.16.1.el9_4.x86_64.rpm 3$kernel-core-5.14.0-427.16.1.el9_4.x86_64.rpm 8$kernel-modules-5.14.0-427.16.1.el9_4.x86_64.rpm M$kernel-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm :$kernel-tools-5.14.0-427.16.1.el9_4.x86_64.rpm ;$kernel-tools-libs-5.14.0-427.16.1.el9_4.x86_64.rpm 9$kernel-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm N$kernel-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm K$kernel-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm 5$kernel-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm L$kernel-debug-uki-virt-5.14.0-427.16.1.el9_4.x86_64.rpm ����t���dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ��,�xhttps://access.redhat.com/errata/RHSA-2024:3306 RHSA-2024:3306 RHSA-2024:3306 https://bugzilla.redhat.com/2270879 2270879 https://bugzilla.redhat.com/2270881 2270881 https://bugzilla.redhat.com/2272816 2272816 https://bugzilla.redhat.com/2273423 2273423 https://errata.almalinux.org/9/ALSA-2024-3306.html ALSA-2024:3306 ALSA-2024:3306 https://www.redhat.com/security/data/cve/CVE-2024-26642.html CVE-2024-26642 CVE-2024-26642 https://www.redhat.com/security/data/cve/CVE-2024-26643.html CVE-2024-26643 CVE-2024-26643 https://www.redhat.com/security/data/cve/CVE-2024-26673.html CVE-2024-26673 CVE-2024-26673 https://www.redhat.com/security/data/cve/CVE-2024-26804.html CVE-2024-26804 CVE-2024-26804 https://www.redhat.com/security/data/cve/CVE-2024-35890.html CVE-2024-35890 CVE-2024-35890 8%kernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpm :%kernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm K%kernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm N%kernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm 7%kernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm %kernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpm 5%kernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpm 3%kernel-core-5.14.0-427.18.1.el9_4.x86_64.rpm 4%kernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm L%kernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm 9%kernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm 6%kernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm M%kernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm ;%kernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpm 2%kernel-5.14.0-427.18.1.el9_4.x86_64.rpm <%python3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm 1�vbpftool-7.3.0-427.18.1.el9_4.x86_64.rpm 8%kernel-modules-5.14.0-427.18.1.el9_4.x86_64.rpm :%kernel-tools-5.14.0-427.18.1.el9_4.x86_64.rpm K%kernel-debug-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm N%kernel-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm 7%kernel-debug-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm %kernel-abi-stablelists-5.14.0-427.18.1.el9_4.noarch.rpm 5%kernel-debug-core-5.14.0-427.18.1.el9_4.x86_64.rpm 3%kernel-core-5.14.0-427.18.1.el9_4.x86_64.rpm 4%kernel-debug-5.14.0-427.18.1.el9_4.x86_64.rpm L%kernel-debug-uki-virt-5.14.0-427.18.1.el9_4.x86_64.rpm 9%kernel-modules-extra-5.14.0-427.18.1.el9_4.x86_64.rpm 6%kernel-debug-modules-5.14.0-427.18.1.el9_4.x86_64.rpm M%kernel-modules-core-5.14.0-427.18.1.el9_4.x86_64.rpm ;%kernel-tools-libs-5.14.0-427.18.1.el9_4.x86_64.rpm 2%kernel-5.14.0-427.18.1.el9_4.x86_64.rpm <%python3-perf-5.14.0-427.18.1.el9_4.x86_64.rpm 1�vbpftool-7.3.0-427.18.1.el9_4.x86_64.rpm ����"���EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: glibc security update =��$�https://access.redhat.com/errata/RHSA-2024:3339 RHSA-2024:3339 RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961 CVE-2024-2961 CVE-2024-2961 https://access.redhat.com/security/cve/CVE-2024-33599 CVE-2024-33599 CVE-2024-33599 https://access.redhat.com/security/cve/CVE-2024-33600 CVE-2024-33600 CVE-2024-33600 https://access.redhat.com/security/cve/CVE-2024-33601 CVE-2024-33601 CVE-2024-33601 https://access.redhat.com/security/cve/CVE-2024-33602 CVE-2024-33602 CVE-2024-33602 https://bugzilla.redhat.com/2273404 2273404 https://bugzilla.redhat.com/2277202 2277202 https://bugzilla.redhat.com/2277204 2277204 https://bugzilla.redhat.com/2277205 2277205 https://bugzilla.redhat.com/2277206 2277206 https://errata.almalinux.org/9/ALSA-2024-3339.html ALSA-2024:3339 ALSA-2024:3339 �P� glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm �Kglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm �kglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm �Knscd-2.34-100.el9_4.2.x86_64.rpm �|glibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm �!glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm �mglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm �~glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm �Mglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm �]glibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm �\glibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm �Eglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm �Jglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm �uglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm �zglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm �nglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm �Aglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm �yglibc-common-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm �zglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm �Pglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm �~glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm �Uglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm �Wglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm �jglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm �Xglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm �hglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm �lglibc-2.34-100.el9_4.2.x86_64.rpm �bglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm �fglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm �Cglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm �qlibnsl-2.34-100.el9_4.2.x86_64.rpm �oglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm �rglibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm �Zglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm �yglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm �tglibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm �[glibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm �xglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm �Oglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm �gglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm �Fglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm �Tglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm �Lglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm �xglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm �Qglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm �eglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm �Dglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm �@glibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm �cglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm �{glibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm �{glibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm �qglibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm �Rglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm �vglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm �@glibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm �Gglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm �lglibc-2.34-100.el9_4.2.i686.rpm � glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm �qlibnsl-2.34-100.el9_4.2.i686.rpm �mglibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm �pglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm �`glibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm �aglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm �iglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm �}glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm �Iglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm �mglibc-gconv-extra-2.34-100.el9_4.2.i686.rpm �Yglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm �dglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm �^glibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm �Hglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm �}glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm �!glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm �Bglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm �wglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm �sglibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm �_glibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm �Nglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm �Vglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm �Sglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm �|glibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm �lglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm �P� glibc-langpack-pl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ar-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sd-2.34-100.el9_4.2.x86_64.rpm �Kglibc-langpack-kab-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-fur-2.34-100.el9_4.2.x86_64.rpm �kglibc-langpack-mnw-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-fa-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sv-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-be-2.34-100.el9_4.2.x86_64.rpm �Knscd-2.34-100.el9_4.2.x86_64.rpm �|glibc-langpack-agr-2.34-100.el9_4.2.x86_64.rpm �!glibc-langpack-tg-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ber-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-wae-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cmn-2.34-100.el9_4.2.x86_64.rpm �mglibc-langpack-ms-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ro-2.34-100.el9_4.2.x86_64.rpm �~glibc-langpack-pa-2.34-100.el9_4.2.x86_64.rpm �Mglibc-langpack-kl-2.34-100.el9_4.2.x86_64.rpm �]glibc-langpack-lv-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-th-2.34-100.el9_4.2.x86_64.rpm �\glibc-langpack-lt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ce-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sgs-2.34-100.el9_4.2.x86_64.rpm �Eglibc-langpack-ik-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bhb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-tcy-2.34-100.el9_4.2.x86_64.rpm �Jglibc-langpack-ka-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-ha-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-unm-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sid-2.34-100.el9_4.2.x86_64.rpm �uglibc-langpack-niu-2.34-100.el9_4.2.x86_64.rpm �zglibc-langpack-aa-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-et-2.34-100.el9_4.2.x86_64.rpm �nglibc-langpack-mt-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ast-2.34-100.el9_4.2.x86_64.rpm �Aglibc-langpack-hy-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-doi-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-xh-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-fr-2.34-100.el9_4.2.x86_64.rpm �yglibc-common-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sc-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-hr-2.34-100.el9_4.2.x86_64.rpm �zglibc-langpack-oc-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-hak-2.34-100.el9_4.2.x86_64.rpm �Pglibc-langpack-ko-2.34-100.el9_4.2.x86_64.rpm �~glibc-langpack-am-2.34-100.el9_4.2.x86_64.rpm �Uglibc-langpack-ky-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-anp-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sa-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-the-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-hi-2.34-100.el9_4.2.x86_64.rpm �Wglibc-langpack-lg-2.34-100.el9_4.2.x86_64.rpm �jglibc-langpack-mni-2.34-100.el9_4.2.x86_64.rpm �Xglibc-langpack-li-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bo-2.34-100.el9_4.2.x86_64.rpm �"glibc-langpack-dz-2.34-100.el9_4.2.x86_64.rpm �hglibc-langpack-ml-2.34-100.el9_4.2.x86_64.rpm �/glibc-langpack-uk-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-wa-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-az-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-ve-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cs-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-rw-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-byn-2.34-100.el9_4.2.x86_64.rpm �lglibc-2.34-100.el9_4.2.x86_64.rpm �bglibc-langpack-mg-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-te-2.34-100.el9_4.2.x86_64.rpm �fglibc-langpack-mjw-2.34-100.el9_4.2.x86_64.rpm �Cglibc-langpack-id-2.34-100.el9_4.2.x86_64.rpm �:glibc-langpack-yi-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-hif-2.34-100.el9_4.2.x86_64.rpm �qlibnsl-2.34-100.el9_4.2.x86_64.rpm �oglibc-langpack-my-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ps-2.34-100.el9_4.2.x86_64.rpm �rglibc-langpack-nds-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-yue-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-en-2.34-100.el9_4.2.x86_64.rpm �Zglibc-langpack-ln-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bn-2.34-100.el9_4.2.x86_64.rpm �yglibc-langpack-nso-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-brx-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-tpi-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-ht-2.34-100.el9_4.2.x86_64.rpm �tglibc-langpack-nhn-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-szl-2.34-100.el9_4.2.x86_64.rpm �[glibc-langpack-lo-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-zh-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ca-2.34-100.el9_4.2.x86_64.rpm �xglibc-langpack-nr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-shn-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ta-2.34-100.el9_4.2.x86_64.rpm �Oglibc-langpack-kn-2.34-100.el9_4.2.x86_64.rpm �gglibc-langpack-mk-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-eu-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-es-2.34-100.el9_4.2.x86_64.rpm �Fglibc-langpack-is-2.34-100.el9_4.2.x86_64.rpm �&glibc-langpack-tk-2.34-100.el9_4.2.x86_64.rpm �Tglibc-langpack-kw-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-si-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-dsb-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-ga-2.34-100.el9_4.2.x86_64.rpm �$glibc-langpack-ti-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bho-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-de-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-chr-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-gd-2.34-100.el9_4.2.x86_64.rpm �Lglibc-langpack-kk-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-br-2.34-100.el9_4.2.x86_64.rpm �xglibc-all-langpacks-2.34-100.el9_4.2.x86_64.rpm �Qglibc-langpack-kok-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ckb-2.34-100.el9_4.2.x86_64.rpm �eglibc-langpack-miq-2.34-100.el9_4.2.x86_64.rpm �Dglibc-langpack-ig-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-vi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sw-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-fi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ru-2.34-100.el9_4.2.x86_64.rpm �)glibc-langpack-to-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-csb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sl-2.34-100.el9_4.2.x86_64.rpm �<glibc-langpack-hne-2.34-100.el9_4.2.x86_64.rpm �?glibc-langpack-zu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-raj-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bem-2.34-100.el9_4.2.x86_64.rpm �@glibc-langpack-hu-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-sah-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ss-2.34-100.el9_4.2.x86_64.rpm �;glibc-langpack-yo-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-tt-2.34-100.el9_4.2.x86_64.rpm �cglibc-langpack-mhr-2.34-100.el9_4.2.x86_64.rpm �{glibc-langpack-om-2.34-100.el9_4.2.x86_64.rpm �4glibc-langpack-gl-2.34-100.el9_4.2.x86_64.rpm �*glibc-langpack-ff-2.34-100.el9_4.2.x86_64.rpm �{glibc-langpack-af-2.34-100.el9_4.2.x86_64.rpm �qglibc-langpack-nb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-ayc-2.34-100.el9_4.2.x86_64.rpm �Rglibc-langpack-ks-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-sat-2.34-100.el9_4.2.x86_64.rpm �1glibc-langpack-ur-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-da-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-so-2.34-100.el9_4.2.x86_64.rpm �vglibc-langpack-nl-2.34-100.el9_4.2.x86_64.rpm �@glibc-minimal-langpack-2.34-100.el9_4.2.x86_64.rpm �Gglibc-langpack-it-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-fil-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bs-2.34-100.el9_4.2.x86_64.rpm �lglibc-2.34-100.el9_4.2.i686.rpm � glibc-langpack-se-2.34-100.el9_4.2.x86_64.rpm �-glibc-langpack-fo-2.34-100.el9_4.2.x86_64.rpm �qlibnsl-2.34-100.el9_4.2.i686.rpm �mglibc-gconv-extra-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pt-2.34-100.el9_4.2.x86_64.rpm �pglibc-langpack-nan-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-an-2.34-100.el9_4.2.x86_64.rpm �=glibc-langpack-yuw-2.34-100.el9_4.2.x86_64.rpm �(glibc-langpack-tn-2.34-100.el9_4.2.x86_64.rpm �5glibc-langpack-gu-2.34-100.el9_4.2.x86_64.rpm �2glibc-langpack-uz-2.34-100.el9_4.2.x86_64.rpm �`glibc-langpack-mai-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sr-2.34-100.el9_4.2.x86_64.rpm �aglibc-langpack-mfe-2.34-100.el9_4.2.x86_64.rpm �3glibc-langpack-gez-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-eo-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-as-2.34-100.el9_4.2.x86_64.rpm �iglibc-langpack-mn-2.34-100.el9_4.2.x86_64.rpm �0glibc-langpack-fy-2.34-100.el9_4.2.x86_64.rpm �}glibc-langpack-ak-2.34-100.el9_4.2.x86_64.rpm �.glibc-langpack-ug-2.34-100.el9_4.2.x86_64.rpm �Iglibc-langpack-ja-2.34-100.el9_4.2.x86_64.rpm � glibc-langpack-bg-2.34-100.el9_4.2.x86_64.rpm �mglibc-gconv-extra-2.34-100.el9_4.2.i686.rpm �Yglibc-langpack-lij-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-cv-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-st-2.34-100.el9_4.2.x86_64.rpm �>glibc-langpack-hsb-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-bi-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-quz-2.34-100.el9_4.2.x86_64.rpm �8glibc-langpack-wo-2.34-100.el9_4.2.x86_64.rpm �dglibc-langpack-mi-2.34-100.el9_4.2.x86_64.rpm �#glibc-langpack-el-2.34-100.el9_4.2.x86_64.rpm �^glibc-langpack-lzh-2.34-100.el9_4.2.x86_64.rpm �Hglibc-langpack-iu-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-pap-2.34-100.el9_4.2.x86_64.rpm �+glibc-langpack-tr-2.34-100.el9_4.2.x86_64.rpm �%glibc-langpack-tig-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-crh-2.34-100.el9_4.2.x86_64.rpm �}glibc-langpack-os-2.34-100.el9_4.2.x86_64.rpm �!glibc-langpack-dv-2.34-100.el9_4.2.x86_64.rpm �Bglibc-langpack-ia-2.34-100.el9_4.2.x86_64.rpm �wglibc-langpack-nn-2.34-100.el9_4.2.x86_64.rpm �6glibc-langpack-gv-2.34-100.el9_4.2.x86_64.rpm �7glibc-langpack-wal-2.34-100.el9_4.2.x86_64.rpm �9glibc-langpack-he-2.34-100.el9_4.2.x86_64.rpm �sglibc-langpack-ne-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sm-2.34-100.el9_4.2.x86_64.rpm �,glibc-langpack-ts-2.34-100.el9_4.2.x86_64.rpm �'glibc-langpack-tl-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sq-2.34-100.el9_4.2.x86_64.rpm �_glibc-langpack-mag-2.34-100.el9_4.2.x86_64.rpm �Nglibc-langpack-km-2.34-100.el9_4.2.x86_64.rpm �Vglibc-langpack-lb-2.34-100.el9_4.2.x86_64.rpm �Sglibc-langpack-ku-2.34-100.el9_4.2.x86_64.rpm �|glibc-langpack-or-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-shs-2.34-100.el9_4.2.x86_64.rpm �lglibc-langpack-mr-2.34-100.el9_4.2.x86_64.rpm �glibc-langpack-sk-2.34-100.el9_4.2.x86_64.rpm ����"� �%�bBsecurity Moderate: nghttp2 security update ��4�mhttps://access.redhat.com/errata/RHSA-2024:3501 RHSA-2024:3501 RHSA-2024:3501 https://access.redhat.com/security/cve/CVE-2024-28182 CVE-2024-28182 CVE-2024-28182 https://bugzilla.redhat.com/2268639 2268639 https://errata.almalinux.org/9/ALSA-2024-3501.html ALSA-2024:3501 ALSA-2024:3501 ��libnghttp2-1.43.0-5.el9_4.3.i686.rpm ��libnghttp2-1.43.0-5.el9_4.3.x86_64.rpm ��libnghttp2-1.43.0-5.el9_4.3.i686.rpm ��libnghttp2-1.43.0-5.el9_4.3.x86_64.rpm ���<�!�(�fsecurity Important: less security update =��!�zhttps://access.redhat.com/errata/RHSA-2024:3513 RHSA-2024:3513 RHSA-2024:3513 https://access.redhat.com/security/cve/CVE-2024-32487 CVE-2024-32487 CVE-2024-32487 https://bugzilla.redhat.com/2274980 2274980 https://errata.almalinux.org/9/ALSA-2024-3513.html ALSA-2024:3513 ALSA-2024:3513 ��oless-590-4.el9_4.x86_64.rpm ��oless-590-4.el9_4.x86_64.rpm ���U�"��iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ���bhttps://access.redhat.com/errata/RHSA-2024:3619 RHSA-2024:3619 RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735 CVE-2024-26735 CVE-2024-26735 https://access.redhat.com/security/cve/CVE-2024-26993 CVE-2024-26993 CVE-2024-26993 https://bugzilla.redhat.com/2273278 2273278 https://bugzilla.redhat.com/2278314 2278314 https://errata.almalinux.org/9/ALSA-2024-3619.html ALSA-2024:3619 ALSA-2024:3619 ;&kernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpm 2&kernel-5.14.0-427.20.1.el9_4.x86_64.rpm :&kernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm <&python3-perf-5.14.0-427.20.1.el9_4.x86_64.rpm 4&kernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm K&kernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm 5&kernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm 1�wbpftool-7.3.0-427.20.1.el9_4.x86_64.rpm L&kernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm N&kernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm M&kernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm 6&kernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm 8&kernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpm 9&kernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm &kernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpm 3&kernel-core-5.14.0-427.20.1.el9_4.x86_64.rpm 7&kernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm ;&kernel-tools-libs-5.14.0-427.20.1.el9_4.x86_64.rpm 2&kernel-5.14.0-427.20.1.el9_4.x86_64.rpm :&kernel-tools-5.14.0-427.20.1.el9_4.x86_64.rpm <&python3-perf-5.14.0-427.20.1.el9_4.x86_64.rpm 4&kernel-debug-5.14.0-427.20.1.el9_4.x86_64.rpm K&kernel-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm 5&kernel-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm 1�wbpftool-7.3.0-427.20.1.el9_4.x86_64.rpm L&kernel-debug-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm N&kernel-uki-virt-5.14.0-427.20.1.el9_4.x86_64.rpm M&kernel-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm 6&kernel-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm 8&kernel-modules-5.14.0-427.20.1.el9_4.x86_64.rpm 9&kernel-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm &kernel-abi-stablelists-5.14.0-427.20.1.el9_4.noarch.rpm 3&kernel-core-5.14.0-427.20.1.el9_4.x86_64.rpm 7&kernel-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm ����O�#��JBsecurity Low: c-ares security update n��}�https://access.redhat.com/errata/RHSA-2024:3842 RHSA-2024:3842 RHSA-2024:3842 https://access.redhat.com/security/cve/CVE-2024-25629 CVE-2024-25629 CVE-2024-25629 https://bugzilla.redhat.com/2265713 2265713 https://errata.almalinux.org/9/ALSA-2024-3842.html ALSA-2024:3842 ALSA-2024:3842 ��c-ares-1.19.1-2.el9_4.i686.rpm ��c-ares-1.19.1-2.el9_4.x86_64.rpm ��c-ares-1.19.1-2.el9_4.i686.rpm ��c-ares-1.19.1-2.el9_4.x86_64.rpm ����W�$��MBBBBBBsecurity Moderate: cockpit security update ���Ehttps://access.redhat.com/errata/RHSA-2024:3843 RHSA-2024:3843 RHSA-2024:3843 https://access.redhat.com/security/cve/CVE-2024-2947 CVE-2024-2947 CVE-2024-2947 https://bugzilla.redhat.com/2271614 2271614 https://errata.almalinux.org/9/ALSA-2024-3843.html ALSA-2024:3843 ALSA-2024:3843 �o� cockpit-system-311.2-1.el9_4.noarch.rpm �p� cockpit-ws-311.2-1.el9_4.x86_64.rpm �l� cockpit-311.2-1.el9_4.x86_64.rpm �n� cockpit-doc-311.2-1.el9_4.noarch.rpm �m� cockpit-bridge-311.2-1.el9_4.x86_64.rpm �o� cockpit-system-311.2-1.el9_4.noarch.rpm �p� cockpit-ws-311.2-1.el9_4.x86_64.rpm �l� cockpit-311.2-1.el9_4.x86_64.rpm �n� cockpit-doc-311.2-1.el9_4.noarch.rpm �m� cockpit-bridge-311.2-1.el9_4.x86_64.rpm ����c�%��security Moderate: python-idna security update ��D�https://access.redhat.com/errata/RHSA-2024:3846 RHSA-2024:3846 RHSA-2024:3846 https://access.redhat.com/security/cve/CVE-2024-3651 CVE-2024-3651 CVE-2024-3651 https://bugzilla.redhat.com/2274779 2274779 https://errata.almalinux.org/9/ALSA-2024-3846.html ALSA-2024:3846 ALSA-2024:3846 �u�Zpython3-idna-2.10-7.el9_4.1.noarch.rpm �u�Zpython3-idna-2.10-7.el9_4.1.noarch.rpm ����O�&� �WBBBsecurity Important: python3.9 security update =��H�https://access.redhat.com/errata/RHSA-2024:4078 RHSA-2024:4078 RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597 CVE-2023-6597 CVE-2023-6597 https://access.redhat.com/security/cve/CVE-2024-0450 CVE-2024-0450 CVE-2024-0450 https://bugzilla.redhat.com/2276518 2276518 https://bugzilla.redhat.com/2276525 2276525 https://errata.almalinux.org/9/ALSA-2024-4078.html ALSA-2024:4078 ALSA-2024:4078 0�]python3-libs-3.9.18-3.el9_4.1.x86_64.rpm \�]python3-3.9.18-3.el9_4.1.x86_64.rpm 0�]python3-libs-3.9.18-3.el9_4.1.i686.rpm 0�]python3-libs-3.9.18-3.el9_4.1.x86_64.rpm \�]python3-3.9.18-3.el9_4.1.x86_64.rpm 0�]python3-libs-3.9.18-3.el9_4.1.i686.rpm ����'�!�\BBBBBBsecurity Important: openssh security update =��]�shttps://access.redhat.com/errata/RHSA-2024:4312 RHSA-2024:4312 RHSA-2024:4312 https://access.redhat.com/security/cve/CVE-2024-6387 CVE-2024-6387 CVE-2024-6387 https://bugzilla.redhat.com/2294604 2294604 https://errata.almalinux.org/9/ALSA-2024-4312.html ALSA-2024:4312 ALSA-2024:4312 �E�openssh-server-8.7p1-38.el9_4.1.x86_64.rpm �B�openssh-8.7p1-38.el9_4.1.x86_64.rpm �C�openssh-clients-8.7p1-38.el9_4.1.x86_64.rpm �D�openssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm �E�openssh-server-8.7p1-38.el9_4.1.x86_64.rpm �B�openssh-8.7p1-38.el9_4.1.x86_64.rpm �C�openssh-clients-8.7p1-38.el9_4.1.x86_64.rpm �D�openssh-keycat-8.7p1-38.el9_4.1.x86_64.rpm �����(�"�dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security and bug fix update ��P�https://access.redhat.com/errata/RHSA-2024:4349 RHSA-2024:4349 RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400 CVE-2021-47400 CVE-2021-47400 https://access.redhat.com/security/cve/CVE-2023-52626 CVE-2023-52626 CVE-2023-52626 https://access.redhat.com/security/cve/CVE-2023-52667 CVE-2023-52667 CVE-2023-52667 https://access.redhat.com/security/cve/CVE-2024-26801 CVE-2024-26801 CVE-2024-26801 https://access.redhat.com/security/cve/CVE-2024-26974 CVE-2024-26974 CVE-2024-26974 https://access.redhat.com/security/cve/CVE-2024-27393 CVE-2024-27393 CVE-2024-27393 https://access.redhat.com/security/cve/CVE-2024-35870 CVE-2024-35870 CVE-2024-35870 https://access.redhat.com/security/cve/CVE-2024-35960 CVE-2024-35960 CVE-2024-35960 https://bugzilla.redhat.com/2271680 2271680 https://bugzilla.redhat.com/2273429 2273429 https://bugzilla.redhat.com/2278354 2278354 https://bugzilla.redhat.com/2280745 2280745 https://bugzilla.redhat.com/2281350 2281350 https://bugzilla.redhat.com/2281740 2281740 https://bugzilla.redhat.com/2281920 2281920 https://bugzilla.redhat.com/2282336 2282336 https://errata.almalinux.org/9/ALSA-2024-4349.html ALSA-2024:4349 ALSA-2024:4349 L'kernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm 7'kernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm ;'kernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm M'kernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm 4'kernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpm 2'kernel-5.14.0-427.24.1.el9_4.x86_64.rpm N'kernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm 1�xbpftool-7.3.0-427.24.1.el9_4.x86_64.rpm 3'kernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm K'kernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm 5'kernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm 8'kernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpm :'kernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpm 'kernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm <'python3-perf-5.14.0-427.24.1.el9_4.x86_64.rpm 9'kernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm 6'kernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm L'kernel-debug-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm 7'kernel-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm ;'kernel-tools-libs-5.14.0-427.24.1.el9_4.x86_64.rpm M'kernel-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm 4'kernel-debug-5.14.0-427.24.1.el9_4.x86_64.rpm 2'kernel-5.14.0-427.24.1.el9_4.x86_64.rpm N'kernel-uki-virt-5.14.0-427.24.1.el9_4.x86_64.rpm 1�xbpftool-7.3.0-427.24.1.el9_4.x86_64.rpm 3'kernel-core-5.14.0-427.24.1.el9_4.x86_64.rpm K'kernel-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm 5'kernel-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm 8'kernel-modules-5.14.0-427.24.1.el9_4.x86_64.rpm :'kernel-tools-5.14.0-427.24.1.el9_4.x86_64.rpm 'kernel-abi-stablelists-5.14.0-427.24.1.el9_4.noarch.rpm <'python3-perf-5.14.0-427.24.1.el9_4.x86_64.rpm 9'kernel-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm 6'kernel-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm ����{�)�#�EBBBBBBsecurity Moderate: openssh security update ��^�https://access.redhat.com/errata/RHSA-2024:4457 RHSA-2024:4457 RHSA-2024:4457 https://access.redhat.com/security/cve/CVE-2024-6409 CVE-2024-6409 CVE-2024-6409 https://bugzilla.redhat.com/2295085 2295085 https://errata.almalinux.org/9/ALSA-2024-4457.html ALSA-2024:4457 ALSA-2024:4457 �D�openssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm �C�openssh-clients-8.7p1-38.el9_4.4.x86_64.rpm �E�openssh-server-8.7p1-38.el9_4.4.x86_64.rpm �B�openssh-8.7p1-38.el9_4.4.x86_64.rpm �D�openssh-keycat-8.7p1-38.el9_4.4.x86_64.rpm �C�openssh-clients-8.7p1-38.el9_4.4.x86_64.rpm �E�openssh-server-8.7p1-38.el9_4.4.x86_64.rpm �B�openssh-8.7p1-38.el9_4.4.x86_64.rpm ��ߴ�*�$�MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update =��d�$https://access.redhat.com/errata/RHSA-2024:4583 RHSA-2024:4583 RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548 CVE-2021-47548 CVE-2021-47548 https://access.redhat.com/security/cve/CVE-2021-47596 CVE-2021-47596 CVE-2021-47596 https://access.redhat.com/security/cve/CVE-2022-48627 CVE-2022-48627 CVE-2022-48627 https://access.redhat.com/security/cve/CVE-2023-52638 CVE-2023-52638 CVE-2023-52638 https://access.redhat.com/security/cve/CVE-2024-26783 CVE-2024-26783 CVE-2024-26783 https://access.redhat.com/security/cve/CVE-2024-26858 CVE-2024-26858 CVE-2024-26858 https://access.redhat.com/security/cve/CVE-2024-27397 CVE-2024-27397 CVE-2024-27397 https://access.redhat.com/security/cve/CVE-2024-27435 CVE-2024-27435 CVE-2024-27435 https://access.redhat.com/security/cve/CVE-2024-35958 CVE-2024-35958 CVE-2024-35958 https://access.redhat.com/security/cve/CVE-2024-36270 CVE-2024-36270 CVE-2024-36270 https://access.redhat.com/security/cve/CVE-2024-36886 CVE-2024-36886 CVE-2024-36886 https://access.redhat.com/security/cve/CVE-2024-36904 CVE-2024-36904 CVE-2024-36904 https://access.redhat.com/security/cve/CVE-2024-36957 CVE-2024-36957 CVE-2024-36957 https://access.redhat.com/security/cve/CVE-2024-38543 CVE-2024-38543 CVE-2024-38543 https://access.redhat.com/security/cve/CVE-2024-38586 CVE-2024-38586 CVE-2024-38586 https://access.redhat.com/security/cve/CVE-2024-38593 CVE-2024-38593 CVE-2024-38593 https://access.redhat.com/security/cve/CVE-2024-38663 CVE-2024-38663 CVE-2024-38663 https://bugzilla.redhat.com/2267509 2267509 https://bugzilla.redhat.com/2273082 2273082 https://bugzilla.redhat.com/2273466 2273466 https://bugzilla.redhat.com/2275735 2275735 https://bugzilla.redhat.com/2277238 2277238 https://bugzilla.redhat.com/2280434 2280434 https://bugzilla.redhat.com/2281131 2281131 https://bugzilla.redhat.com/2281925 2281925 https://bugzilla.redhat.com/2283401 2283401 https://bugzilla.redhat.com/2284541 2284541 https://bugzilla.redhat.com/2284581 2284581 https://bugzilla.redhat.com/2293230 2293230 https://bugzilla.redhat.com/2293380 2293380 https://bugzilla.redhat.com/2293402 2293402 https://bugzilla.redhat.com/2293456 2293456 https://bugzilla.redhat.com/2293653 2293653 https://bugzilla.redhat.com/2294225 2294225 https://errata.almalinux.org/9/ALSA-2024-4583.html ALSA-2024:4583 ALSA-2024:4583 7(kernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm :(kernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm L(kernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm (kernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpm 5(kernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm 6(kernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm 3(kernel-core-5.14.0-427.26.1.el9_4.x86_64.rpm 9(kernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm ;(kernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpm 2(kernel-5.14.0-427.26.1.el9_4.x86_64.rpm 1�ybpftool-7.3.0-427.26.1.el9_4.x86_64.rpm 4(kernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm <(python3-perf-5.14.0-427.26.1.el9_4.x86_64.rpm 8(kernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm M(kernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm K(kernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm N(kernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm 7(kernel-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm :(kernel-tools-5.14.0-427.26.1.el9_4.x86_64.rpm L(kernel-debug-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm (kernel-abi-stablelists-5.14.0-427.26.1.el9_4.noarch.rpm 5(kernel-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm 6(kernel-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm 3(kernel-core-5.14.0-427.26.1.el9_4.x86_64.rpm 9(kernel-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm ;(kernel-tools-libs-5.14.0-427.26.1.el9_4.x86_64.rpm 2(kernel-5.14.0-427.26.1.el9_4.x86_64.rpm 1�ybpftool-7.3.0-427.26.1.el9_4.x86_64.rpm 4(kernel-debug-5.14.0-427.26.1.el9_4.x86_64.rpm <(python3-perf-5.14.0-427.26.1.el9_4.x86_64.rpm 8(kernel-modules-5.14.0-427.26.1.el9_4.x86_64.rpm M(kernel-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm K(kernel-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm N(kernel-uki-virt-5.14.0-427.26.1.el9_4.x86_64.rpm ����&�+�1�nBsecurity Important: libndp security update =��~�[https://access.redhat.com/errata/RHSA-2024:4636 RHSA-2024:4636 RHSA-2024:4636 https://access.redhat.com/security/cve/CVE-2024-5564 CVE-2024-5564 CVE-2024-5564 https://bugzilla.redhat.com/2284122 2284122 https://errata.almalinux.org/9/ALSA-2024-4636.html ALSA-2024:4636 ALSA-2024:4636 �O�#libndp-1.8-6.el9_4.alma.1.i686.rpm �O�#libndp-1.8-6.el9_4.alma.1.x86_64.rpm �O�#libndp-1.8-6.el9_4.alma.1.i686.rpm �O�#libndp-1.8-6.el9_4.alma.1.x86_64.rpm ����,��rBBBBBBBBBBBBBBBsecurity Moderate: linux-firmware security update ��Y�#https://access.redhat.com/errata/RHSA-2024:4774 RHSA-2024:4774 RHSA-2024:4774 https://access.redhat.com/security/cve/CVE-2023-31346 CVE-2023-31346 CVE-2023-31346 https://bugzilla.redhat.com/2250458 2250458 https://errata.almalinux.org/9/ALSA-2024-4774.html ALSA-2024:4774 ALSA-2024:4774 �6�iwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �<�diwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm �7�fiwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �;�iwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �9�iiwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm �A�+netronome-firmware-20240603-143.1.el9_4.noarch.rpm �1�`iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �4�iwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �3�iwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �>�+libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm �2�Xiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �?�+linux-firmware-20240603-143.1.el9_4.noarch.rpm �:�iwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �8�miwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm �=�fiwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �@�+linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm �5�iwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �6�iwl2030-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �<�diwl6050-firmware-41.28.5.1-143.1.el9_4.noarch.rpm �7�fiwl3160-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �;�iwl6000g2b-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �9�iiwl5150-firmware-8.24.2.2-143.1.el9_4.noarch.rpm �A�+netronome-firmware-20240603-143.1.el9_4.noarch.rpm �1�`iwl100-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �4�iwl135-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �3�iwl105-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �>�+libertas-sd8787-firmware-20240603-143.1.el9_4.noarch.rpm �2�Xiwl1000-firmware-39.31.5.1-143.1.el9_4.noarch.rpm �?�+linux-firmware-20240603-143.1.el9_4.noarch.rpm �:�iwl6000g2a-firmware-18.168.6.1-143.1.el9_4.noarch.rpm �8�miwl5000-firmware-8.83.5.1_1-143.1.el9_4.noarch.rpm �=�fiwl7260-firmware-25.30.13.0-143.1.el9_4.noarch.rpm �@�+linux-firmware-whence-20240603-143.1.el9_4.noarch.rpm �5�iwl2000-firmware-18.168.6.1-143.1.el9_4.noarch.rpm ����a�-�%�DBsecurity Moderate: cups security update ��|� https://access.redhat.com/errata/RHSA-2024:4776 RHSA-2024:4776 RHSA-2024:4776 https://access.redhat.com/security/cve/CVE-2024-35235 CVE-2024-35235 CVE-2024-35235 https://bugzilla.redhat.com/2290318 2290318 https://errata.almalinux.org/9/ALSA-2024-4776.html ALSA-2024:4776 ALSA-2024:4776 ��&cups-libs-2.3.3op2-27.el9_4.i686.rpm ��&cups-libs-2.3.3op2-27.el9_4.x86_64.rpm ��&cups-libs-2.3.3op2-27.el9_4.i686.rpm ��&cups-libs-2.3.3op2-27.el9_4.x86_64.rpm ����Z�.�&�GBBBsecurity Low: python3 security update n���,https://access.redhat.com/errata/RHSA-2024:4779 RHSA-2024:4779 RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032 CVE-2024-4032 CVE-2024-4032 https://bugzilla.redhat.com/2292921 2292921 https://errata.almalinux.org/9/ALSA-2024-4779.html ALSA-2024:4779 ALSA-2024:4779 \�^python3-3.9.18-3.el9_4.3.x86_64.rpm 0�^python3-libs-3.9.18-3.el9_4.3.x86_64.rpm 0�^python3-libs-3.9.18-3.el9_4.3.i686.rpm \�^python3-3.9.18-3.el9_4.3.x86_64.rpm 0�^python3-libs-3.9.18-3.el9_4.3.x86_64.rpm 0�^python3-libs-3.9.18-3.el9_4.3.i686.rpm ����^�/�'�LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ��2�1$https://access.redhat.com/errata/RHSA-2024:4928 RHSA-2024:4928 RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459 CVE-2021-47459 CVE-2021-47459 https://access.redhat.com/security/cve/CVE-2022-48743 CVE-2022-48743 CVE-2022-48743 https://access.redhat.com/security/cve/CVE-2023-52458 CVE-2023-52458 CVE-2023-52458 https://access.redhat.com/security/cve/CVE-2023-52809 CVE-2023-52809 CVE-2023-52809 https://access.redhat.com/security/cve/CVE-2024-26737 CVE-2024-26737 CVE-2024-26737 https://access.redhat.com/security/cve/CVE-2024-26773 CVE-2024-26773 CVE-2024-26773 https://access.redhat.com/security/cve/CVE-2024-26852 CVE-2024-26852 CVE-2024-26852 https://access.redhat.com/security/cve/CVE-2024-26880 CVE-2024-26880 CVE-2024-26880 https://access.redhat.com/security/cve/CVE-2024-26982 CVE-2024-26982 CVE-2024-26982 https://access.redhat.com/security/cve/CVE-2024-27030 CVE-2024-27030 CVE-2024-27030 https://access.redhat.com/security/cve/CVE-2024-27046 CVE-2024-27046 CVE-2024-27046 https://access.redhat.com/security/cve/CVE-2024-35857 CVE-2024-35857 CVE-2024-35857 https://access.redhat.com/security/cve/CVE-2024-35885 CVE-2024-35885 CVE-2024-35885 https://access.redhat.com/security/cve/CVE-2024-35907 CVE-2024-35907 CVE-2024-35907 https://access.redhat.com/security/cve/CVE-2024-36924 CVE-2024-36924 CVE-2024-36924 https://access.redhat.com/security/cve/CVE-2024-36952 CVE-2024-36952 CVE-2024-36952 https://access.redhat.com/security/cve/CVE-2024-38580 CVE-2024-38580 CVE-2024-38580 https://bugzilla.redhat.com/2265794 2265794 https://bugzilla.redhat.com/2273236 2273236 https://bugzilla.redhat.com/2273274 2273274 https://bugzilla.redhat.com/2275690 2275690 https://bugzilla.redhat.com/2275761 2275761 https://bugzilla.redhat.com/2278337 2278337 https://bugzilla.redhat.com/2278435 2278435 https://bugzilla.redhat.com/2278473 2278473 https://bugzilla.redhat.com/2281247 2281247 https://bugzilla.redhat.com/2281647 2281647 https://bugzilla.redhat.com/2281700 2281700 https://bugzilla.redhat.com/2282669 2282669 https://bugzilla.redhat.com/2282898 2282898 https://bugzilla.redhat.com/2284506 2284506 https://bugzilla.redhat.com/2284598 2284598 https://bugzilla.redhat.com/2293316 2293316 https://bugzilla.redhat.com/2293412 2293412 https://errata.almalinux.org/9/ALSA-2024-4928.html ALSA-2024:4928 ALSA-2024:4928 9)kernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm 5)kernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm 8)kernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm 7)kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm <)python3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm K)kernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm ;)kernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm N)kernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm M)kernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm 2)kernel-5.14.0-427.28.1.el9_4.x86_64.rpm 6)kernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm L)kernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm 3)kernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm 4)kernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm 1�zbpftool-7.3.0-427.28.1.el9_4.x86_64.rpm )kernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm :)kernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm 9)kernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm 5)kernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm 8)kernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm 7)kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm <)python3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm K)kernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm ;)kernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm N)kernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm M)kernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm 2)kernel-5.14.0-427.28.1.el9_4.x86_64.rpm 6)kernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm L)kernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm 3)kernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm 4)kernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm 1�zbpftool-7.3.0-427.28.1.el9_4.x86_64.rpm )kernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm :)kernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm ����Q�0�(�mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update =��c�4^https://access.redhat.com/errata/RHSA-2024:5363 RHSA-2024:5363 RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606 CVE-2021-47606 CVE-2021-47606 https://access.redhat.com/security/cve/CVE-2023-52651 CVE-2023-52651 CVE-2023-52651 https://access.redhat.com/security/cve/CVE-2023-52864 CVE-2023-52864 CVE-2023-52864 https://access.redhat.com/security/cve/CVE-2024-21823 CVE-2024-21823 CVE-2024-21823 https://access.redhat.com/security/cve/CVE-2024-26600 CVE-2024-26600 CVE-2024-26600 https://access.redhat.com/security/cve/CVE-2024-26808 CVE-2024-26808 CVE-2024-26808 https://access.redhat.com/security/cve/CVE-2024-26828 CVE-2024-26828 CVE-2024-26828 https://access.redhat.com/security/cve/CVE-2024-26853 CVE-2024-26853 CVE-2024-26853 https://access.redhat.com/security/cve/CVE-2024-26868 CVE-2024-26868 CVE-2024-26868 https://access.redhat.com/security/cve/CVE-2024-26897 CVE-2024-26897 CVE-2024-26897 https://access.redhat.com/security/cve/CVE-2024-27049 CVE-2024-27049 CVE-2024-27049 https://access.redhat.com/security/cve/CVE-2024-27052 CVE-2024-27052 CVE-2024-27052 https://access.redhat.com/security/cve/CVE-2024-27065 CVE-2024-27065 CVE-2024-27065 https://access.redhat.com/security/cve/CVE-2024-27417 CVE-2024-27417 CVE-2024-27417 https://access.redhat.com/security/cve/CVE-2024-27434 CVE-2024-27434 CVE-2024-27434 https://access.redhat.com/security/cve/CVE-2024-33621 CVE-2024-33621 CVE-2024-33621 https://access.redhat.com/security/cve/CVE-2024-35789 CVE-2024-35789 CVE-2024-35789 https://access.redhat.com/security/cve/CVE-2024-35800 CVE-2024-35800 CVE-2024-35800 https://access.redhat.com/security/cve/CVE-2024-35823 CVE-2024-35823 CVE-2024-35823 https://access.redhat.com/security/cve/CVE-2024-35845 CVE-2024-35845 CVE-2024-35845 https://access.redhat.com/security/cve/CVE-2024-35848 CVE-2024-35848 CVE-2024-35848 https://access.redhat.com/security/cve/CVE-2024-35852 CVE-2024-35852 CVE-2024-35852 https://access.redhat.com/security/cve/CVE-2024-35899 CVE-2024-35899 CVE-2024-35899 https://access.redhat.com/security/cve/CVE-2024-35911 CVE-2024-35911 CVE-2024-35911 https://access.redhat.com/security/cve/CVE-2024-35937 CVE-2024-35937 CVE-2024-35937 https://access.redhat.com/security/cve/CVE-2024-35969 CVE-2024-35969 CVE-2024-35969 https://access.redhat.com/security/cve/CVE-2024-36005 CVE-2024-36005 CVE-2024-36005 https://access.redhat.com/security/cve/CVE-2024-36017 CVE-2024-36017 CVE-2024-36017 https://access.redhat.com/security/cve/CVE-2024-36020 CVE-2024-36020 CVE-2024-36020 https://access.redhat.com/security/cve/CVE-2024-36489 CVE-2024-36489 CVE-2024-36489 https://access.redhat.com/security/cve/CVE-2024-36903 CVE-2024-36903 CVE-2024-36903 https://access.redhat.com/security/cve/CVE-2024-36921 CVE-2024-36921 CVE-2024-36921 https://access.redhat.com/security/cve/CVE-2024-36922 CVE-2024-36922 CVE-2024-36922 https://access.redhat.com/security/cve/CVE-2024-36929 CVE-2024-36929 CVE-2024-36929 https://access.redhat.com/security/cve/CVE-2024-36941 CVE-2024-36941 CVE-2024-36941 https://access.redhat.com/security/cve/CVE-2024-36971 CVE-2024-36971 CVE-2024-36971 https://access.redhat.com/security/cve/CVE-2024-37353 CVE-2024-37353 CVE-2024-37353 https://access.redhat.com/security/cve/CVE-2024-37356 CVE-2024-37356 CVE-2024-37356 https://access.redhat.com/security/cve/CVE-2024-38391 CVE-2024-38391 CVE-2024-38391 https://access.redhat.com/security/cve/CVE-2024-38558 CVE-2024-38558 CVE-2024-38558 https://access.redhat.com/security/cve/CVE-2024-38575 CVE-2024-38575 CVE-2024-38575 https://access.redhat.com/security/cve/CVE-2024-39487 CVE-2024-39487 CVE-2024-39487 https://access.redhat.com/security/cve/CVE-2024-40928 CVE-2024-40928 CVE-2024-40928 https://access.redhat.com/security/cve/CVE-2024-40954 CVE-2024-40954 CVE-2024-40954 https://access.redhat.com/security/cve/CVE-2024-40958 CVE-2024-40958 CVE-2024-40958 https://access.redhat.com/security/cve/CVE-2024-40961 CVE-2024-40961 CVE-2024-40961 https://bugzilla.redhat.com/2265838 2265838 https://bugzilla.redhat.com/2273405 2273405 https://bugzilla.redhat.com/2275600 2275600 https://bugzilla.redhat.com/2275655 2275655 https://bugzilla.redhat.com/2275715 2275715 https://bugzilla.redhat.com/2275748 2275748 https://bugzilla.redhat.com/2278380 2278380 https://bugzilla.redhat.com/2278417 2278417 https://bugzilla.redhat.com/2278429 2278429 https://bugzilla.redhat.com/2278519 2278519 https://bugzilla.redhat.com/2278989 2278989 https://bugzilla.redhat.com/2281057 2281057 https://bugzilla.redhat.com/2281097 2281097 https://bugzilla.redhat.com/2281133 2281133 https://bugzilla.redhat.com/2281190 2281190 https://bugzilla.redhat.com/2281237 2281237 https://bugzilla.redhat.com/2281257 2281257 https://bugzilla.redhat.com/2281265 2281265 https://bugzilla.redhat.com/2281272 2281272 https://bugzilla.redhat.com/2281639 2281639 https://bugzilla.redhat.com/2281667 2281667 https://bugzilla.redhat.com/2281821 2281821 https://bugzilla.redhat.com/2281900 2281900 https://bugzilla.redhat.com/2281949 2281949 https://bugzilla.redhat.com/2282719 2282719 https://bugzilla.redhat.com/2284400 2284400 https://bugzilla.redhat.com/2284417 2284417 https://bugzilla.redhat.com/2284474 2284474 https://bugzilla.redhat.com/2284496 2284496 https://bugzilla.redhat.com/2284511 2284511 https://bugzilla.redhat.com/2284513 2284513 https://bugzilla.redhat.com/2284543 2284543 https://bugzilla.redhat.com/2292331 2292331 https://bugzilla.redhat.com/2293208 2293208 https://bugzilla.redhat.com/2293418 2293418 https://bugzilla.redhat.com/2293441 2293441 https://bugzilla.redhat.com/2293657 2293657 https://bugzilla.redhat.com/2293658 2293658 https://bugzilla.redhat.com/2293686 2293686 https://bugzilla.redhat.com/2293687 2293687 https://bugzilla.redhat.com/2293688 2293688 https://bugzilla.redhat.com/2297056 2297056 https://bugzilla.redhat.com/2297512 2297512 https://bugzilla.redhat.com/2297538 2297538 https://bugzilla.redhat.com/2297542 2297542 https://bugzilla.redhat.com/2297545 2297545 https://errata.almalinux.org/9/ALSA-2024-5363.html ALSA-2024:5363 ALSA-2024:5363 K*kernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm 1�{bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm <*python3-perf-5.14.0-427.31.1.el9_4.x86_64.rpm 3*kernel-core-5.14.0-427.31.1.el9_4.x86_64.rpm 2*kernel-5.14.0-427.31.1.el9_4.x86_64.rpm L*kernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm 6*kernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm ;*kernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm M*kernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm 8*kernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm 7*kernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm 5*kernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm *kernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm 4*kernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm :*kernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm N*kernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm 9*kernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm K*kernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm 1�{bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm <*python3-perf-5.14.0-427.31.1.el9_4.x86_64.rpm 3*kernel-core-5.14.0-427.31.1.el9_4.x86_64.rpm 2*kernel-5.14.0-427.31.1.el9_4.x86_64.rpm L*kernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm 6*kernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm ;*kernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm M*kernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm 8*kernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm 7*kernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm 5*kernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm *kernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm 4*kernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm :*kernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpm N*kernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpm 9*kernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm ����|�1�)�NBBBBBBBBsecurity Moderate: curl security update ���(https://access.redhat.com/errata/RHSA-2024:5529 RHSA-2024:5529 RHSA-2024:5529 https://access.redhat.com/security/cve/CVE-2024-2398 CVE-2024-2398 CVE-2024-2398 https://bugzilla.redhat.com/2270498 2270498 https://errata.almalinux.org/9/ALSA-2024-5529.html ALSA-2024:5529 ALSA-2024:5529 Fzlibcurl-minimal-7.76.1-29.el9_4.1.i686.rpm Ezlibcurl-7.76.1-29.el9_4.1.i686.rpm Fzlibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm kzcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm jzcurl-7.76.1-29.el9_4.1.x86_64.rpm Ezlibcurl-7.76.1-29.el9_4.1.x86_64.rpm Fzlibcurl-minimal-7.76.1-29.el9_4.1.i686.rpm Ezlibcurl-7.76.1-29.el9_4.1.i686.rpm Fzlibcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm kzcurl-minimal-7.76.1-29.el9_4.1.x86_64.rpm jzcurl-7.76.1-29.el9_4.1.x86_64.rpm Ezlibcurl-7.76.1-29.el9_4.1.x86_64.rpm ����/�2��Xsecurity Important: python-setuptools security update =��?�xhttps://access.redhat.com/errata/RHSA-2024:5534 RHSA-2024:5534 RHSA-2024:5534 https://access.redhat.com/security/cve/CVE-2024-6345 CVE-2024-6345 CVE-2024-6345 https://bugzilla.redhat.com/2297771 2297771 https://errata.almalinux.org/9/ALSA-2024-5534.html ALSA-2024:5534 ALSA-2024:5534 �M�jpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm �N�jpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm �M�jpython3-setuptools-53.0.0-12.el9_4.1.noarch.rpm �N�jpython3-setuptools-wheel-53.0.0-12.el9_4.1.noarch.rpm ����l�3�*�[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update =��7�Thttps://access.redhat.com/errata/RHSA-2024:5928 RHSA-2024:5928 RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771 CVE-2023-52771 CVE-2023-52771 https://access.redhat.com/security/cve/CVE-2023-52880 CVE-2023-52880 CVE-2023-52880 https://access.redhat.com/security/cve/CVE-2024-26581 CVE-2024-26581 CVE-2024-26581 https://access.redhat.com/security/cve/CVE-2024-26668 CVE-2024-26668 CVE-2024-26668 https://access.redhat.com/security/cve/CVE-2024-26810 CVE-2024-26810 CVE-2024-26810 https://access.redhat.com/security/cve/CVE-2024-26855 CVE-2024-26855 CVE-2024-26855 https://access.redhat.com/security/cve/CVE-2024-26908 CVE-2024-26908 CVE-2024-26908 https://access.redhat.com/security/cve/CVE-2024-26925 CVE-2024-26925 CVE-2024-26925 https://access.redhat.com/security/cve/CVE-2024-27016 CVE-2024-27016 CVE-2024-27016 https://access.redhat.com/security/cve/CVE-2024-27019 CVE-2024-27019 CVE-2024-27019 https://access.redhat.com/security/cve/CVE-2024-27020 CVE-2024-27020 CVE-2024-27020 https://access.redhat.com/security/cve/CVE-2024-27415 CVE-2024-27415 CVE-2024-27415 https://access.redhat.com/security/cve/CVE-2024-35839 CVE-2024-35839 CVE-2024-35839 https://access.redhat.com/security/cve/CVE-2024-35896 CVE-2024-35896 CVE-2024-35896 https://access.redhat.com/security/cve/CVE-2024-35897 CVE-2024-35897 CVE-2024-35897 https://access.redhat.com/security/cve/CVE-2024-35898 CVE-2024-35898 CVE-2024-35898 https://access.redhat.com/security/cve/CVE-2024-35962 CVE-2024-35962 CVE-2024-35962 https://access.redhat.com/security/cve/CVE-2024-36003 CVE-2024-36003 CVE-2024-36003 https://access.redhat.com/security/cve/CVE-2024-36025 CVE-2024-36025 CVE-2024-36025 https://access.redhat.com/security/cve/CVE-2024-38538 CVE-2024-38538 CVE-2024-38538 https://access.redhat.com/security/cve/CVE-2024-38540 CVE-2024-38540 CVE-2024-38540 https://access.redhat.com/security/cve/CVE-2024-38544 CVE-2024-38544 CVE-2024-38544 https://access.redhat.com/security/cve/CVE-2024-38579 CVE-2024-38579 CVE-2024-38579 https://access.redhat.com/security/cve/CVE-2024-38608 CVE-2024-38608 CVE-2024-38608 https://access.redhat.com/security/cve/CVE-2024-39476 CVE-2024-39476 CVE-2024-39476 https://access.redhat.com/security/cve/CVE-2024-40905 CVE-2024-40905 CVE-2024-40905 https://access.redhat.com/security/cve/CVE-2024-40911 CVE-2024-40911 CVE-2024-40911 https://access.redhat.com/security/cve/CVE-2024-40912 CVE-2024-40912 CVE-2024-40912 https://access.redhat.com/security/cve/CVE-2024-40914 CVE-2024-40914 CVE-2024-40914 https://access.redhat.com/security/cve/CVE-2024-40929 CVE-2024-40929 CVE-2024-40929 https://access.redhat.com/security/cve/CVE-2024-40939 CVE-2024-40939 CVE-2024-40939 https://access.redhat.com/security/cve/CVE-2024-40941 CVE-2024-40941 CVE-2024-40941 https://access.redhat.com/security/cve/CVE-2024-40957 CVE-2024-40957 CVE-2024-40957 https://access.redhat.com/security/cve/CVE-2024-40978 CVE-2024-40978 CVE-2024-40978 https://access.redhat.com/security/cve/CVE-2024-40983 CVE-2024-40983 CVE-2024-40983 https://access.redhat.com/security/cve/CVE-2024-41041 CVE-2024-41041 CVE-2024-41041 https://access.redhat.com/security/cve/CVE-2024-41076 CVE-2024-41076 CVE-2024-41076 https://access.redhat.com/security/cve/CVE-2024-41090 CVE-2024-41090 CVE-2024-41090 https://access.redhat.com/security/cve/CVE-2024-41091 CVE-2024-41091 CVE-2024-41091 https://access.redhat.com/security/cve/CVE-2024-42110 CVE-2024-42110 CVE-2024-42110 https://access.redhat.com/security/cve/CVE-2024-42152 CVE-2024-42152 CVE-2024-42152 https://bugzilla.redhat.com/2265185 2265185 https://bugzilla.redhat.com/2272797 2272797 https://bugzilla.redhat.com/2273654 2273654 https://bugzilla.redhat.com/2275742 2275742 https://bugzilla.redhat.com/2275744 2275744 https://bugzilla.redhat.com/2277166 2277166 https://bugzilla.redhat.com/2278256 2278256 https://bugzilla.redhat.com/2278258 2278258 https://bugzilla.redhat.com/2278264 2278264 https://bugzilla.redhat.com/2281101 2281101 https://bugzilla.redhat.com/2281284 2281284 https://bugzilla.redhat.com/2281669 2281669 https://bugzilla.redhat.com/2281672 2281672 https://bugzilla.redhat.com/2281675 2281675 https://bugzilla.redhat.com/2281916 2281916 https://bugzilla.redhat.com/2281958 2281958 https://bugzilla.redhat.com/2282720 2282720 https://bugzilla.redhat.com/2283468 2283468 https://bugzilla.redhat.com/2284421 2284421 https://bugzilla.redhat.com/2293356 2293356 https://bugzilla.redhat.com/2293414 2293414 https://bugzilla.redhat.com/2293455 2293455 https://bugzilla.redhat.com/2293459 2293459 https://bugzilla.redhat.com/2293461 2293461 https://bugzilla.redhat.com/2295914 2295914 https://bugzilla.redhat.com/2297489 2297489 https://bugzilla.redhat.com/2297495 2297495 https://bugzilla.redhat.com/2297496 2297496 https://bugzilla.redhat.com/2297498 2297498 https://bugzilla.redhat.com/2297513 2297513 https://bugzilla.redhat.com/2297523 2297523 https://bugzilla.redhat.com/2297525 2297525 https://bugzilla.redhat.com/2297541 2297541 https://bugzilla.redhat.com/2297562 2297562 https://bugzilla.redhat.com/2297567 2297567 https://bugzilla.redhat.com/2299240 2299240 https://bugzilla.redhat.com/2299336 2299336 https://bugzilla.redhat.com/2300410 2300410 https://bugzilla.redhat.com/2300453 2300453 https://bugzilla.redhat.com/2301473 2301473 https://bugzilla.redhat.com/2301519 2301519 https://errata.almalinux.org/9/ALSA-2024-5928.html ALSA-2024:5928 ALSA-2024:5928 5+kernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpm 9+kernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm 4+kernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpm +kernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm K+kernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm <+python3-perf-5.14.0-427.33.1.el9_4.x86_64.rpm 6+kernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpm 2+kernel-5.14.0-427.33.1.el9_4.x86_64.rpm L+kernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm 3+kernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm N+kernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm 8+kernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpm ;+kernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpm 7+kernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm M+kernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm 1�|bpftool-7.3.0-427.33.1.el9_4.x86_64.rpm :+kernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm 5+kernel-debug-core-5.14.0-427.33.1.el9_4.x86_64.rpm 9+kernel-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm 4+kernel-debug-5.14.0-427.33.1.el9_4.x86_64.rpm +kernel-abi-stablelists-5.14.0-427.33.1.el9_4.noarch.rpm K+kernel-debug-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm <+python3-perf-5.14.0-427.33.1.el9_4.x86_64.rpm 6+kernel-debug-modules-5.14.0-427.33.1.el9_4.x86_64.rpm 2+kernel-5.14.0-427.33.1.el9_4.x86_64.rpm L+kernel-debug-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm 3+kernel-core-5.14.0-427.33.1.el9_4.x86_64.rpm N+kernel-uki-virt-5.14.0-427.33.1.el9_4.x86_64.rpm 8+kernel-modules-5.14.0-427.33.1.el9_4.x86_64.rpm ;+kernel-tools-libs-5.14.0-427.33.1.el9_4.x86_64.rpm 7+kernel-debug-modules-extra-5.14.0-427.33.1.el9_4.x86_64.rpm M+kernel-modules-core-5.14.0-427.33.1.el9_4.x86_64.rpm 1�|bpftool-7.3.0-427.33.1.el9_4.x86_64.rpm :+kernel-tools-5.14.0-427.33.1.el9_4.x86_64.rpm ����*�4�=�<security Moderate: python-urllib3 security update ��O�+https://access.redhat.com/errata/RHSA-2024:6162 RHSA-2024:6162 RHSA-2024:6162 https://access.redhat.com/security/cve/CVE-2024-37891 CVE-2024-37891 CVE-2024-37891 https://bugzilla.redhat.com/2292788 2292788 https://errata.almalinux.org/9/ALSA-2024-6162.html ALSA-2024:6162 ALSA-2024:6162 �O�Upython3-urllib3-1.26.5-5.el9_4.1.noarch.rpm �O�Upython3-urllib3-1.26.5-5.el9_4.1.noarch.rpm ��ܝ7�5�+�~BBBsecurity Moderate: python3.9 security update ��z�hhttps://access.redhat.com/errata/RHSA-2024:6163 RHSA-2024:6163 RHSA-2024:6163 https://access.redhat.com/security/cve/CVE-2024-6923 CVE-2024-6923 CVE-2024-6923 https://bugzilla.redhat.com/2302255 2302255 https://errata.almalinux.org/9/ALSA-2024-6163.html ALSA-2024:6163 ALSA-2024:6163 0�_python3-libs-3.9.18-3.el9_4.5.i686.rpm \�_python3-3.9.18-3.el9_4.5.x86_64.rpm 0�_python3-libs-3.9.18-3.el9_4.5.x86_64.rpm 0�_python3-libs-3.9.18-3.el9_4.5.i686.rpm \�_python3-3.9.18-3.el9_4.5.x86_64.rpm 0�_python3-libs-3.9.18-3.el9_4.5.x86_64.rpm ����6�,�CBBBBBBBBBBBBBBBsecurity Moderate: krb5 security update ��b�https://access.redhat.com/errata/RHSA-2024:6166 RHSA-2024:6166 RHSA-2024:6166 https://access.redhat.com/security/cve/CVE-2024-37370 CVE-2024-37370 CVE-2024-37370 https://access.redhat.com/security/cve/CVE-2024-37371 CVE-2024-37371 CVE-2024-37371 https://bugzilla.redhat.com/2294676 2294676 https://bugzilla.redhat.com/2294677 2294677 https://errata.almalinux.org/9/ALSA-2024-6166.html ALSA-2024:6166 ALSA-2024:6166 ]Wkrb5-libs-1.21.1-2.el9_4.i686.rpm �%Wkrb5-workstation-1.21.1-2.el9_4.x86_64.rpm _Wkrb5-server-1.21.1-2.el9_4.x86_64.rpm aWlibkadm5-1.21.1-2.el9_4.i686.rpm _Wkrb5-server-1.21.1-2.el9_4.i686.rpm ]Wkrb5-libs-1.21.1-2.el9_4.x86_64.rpm `Wkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm ^Wkrb5-pkinit-1.21.1-2.el9_4.i686.rpm aWlibkadm5-1.21.1-2.el9_4.x86_64.rpm ^Wkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm `Wkrb5-server-ldap-1.21.1-2.el9_4.i686.rpm ]Wkrb5-libs-1.21.1-2.el9_4.i686.rpm �%Wkrb5-workstation-1.21.1-2.el9_4.x86_64.rpm _Wkrb5-server-1.21.1-2.el9_4.x86_64.rpm aWlibkadm5-1.21.1-2.el9_4.i686.rpm _Wkrb5-server-1.21.1-2.el9_4.i686.rpm ]Wkrb5-libs-1.21.1-2.el9_4.x86_64.rpm `Wkrb5-server-ldap-1.21.1-2.el9_4.x86_64.rpm ^Wkrb5-pkinit-1.21.1-2.el9_4.i686.rpm aWlibkadm5-1.21.1-2.el9_4.x86_64.rpm ^Wkrb5-pkinit-1.21.1-2.el9_4.x86_64.rpm `Wkrb5-server-ldap-1.21.1-2.el9_4.i686.rpm ��� �7�-�Tsecurity Important: bubblewrap and flatpak security update =��h�Jhttps://access.redhat.com/errata/RHSA-2024:6356 RHSA-2024:6356 RHSA-2024:6356 https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://bugzilla.redhat.com/2305202 2305202 https://errata.almalinux.org/9/ALSA-2024-6356.html ALSA-2024:6356 ALSA-2024:6356 �k�Ububblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm �k�Ububblewrap-0.4.1-7.el9_4.alma.1.x86_64.rpm ���`�8�.�VBsecurity Moderate: glib2 security update ��2� https://access.redhat.com/errata/RHSA-2024:6464 RHSA-2024:6464 RHSA-2024:6464 https://access.redhat.com/security/cve/CVE-2024-34397 CVE-2024-34397 CVE-2024-34397 https://bugzilla.redhat.com/2279632 2279632 https://errata.almalinux.org/9/ALSA-2024-6464.html ALSA-2024:6464 ALSA-2024:6464 �k�0glib2-2.68.4-14.el9_4.1.x86_64.rpm �k�0glib2-2.68.4-14.el9_4.1.i686.rpm �k�0glib2-2.68.4-14.el9_4.1.x86_64.rpm �k�0glib2-2.68.4-14.el9_4.1.i686.rpm ����0�9�/�YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ��?�l8https://access.redhat.com/errata/RHSA-2024:6567 RHSA-2024:6567 RHSA-2024:6567 https://access.redhat.com/security/cve/CVE-2023-52463 CVE-2023-52463 CVE-2023-52463 https://access.redhat.com/security/cve/CVE-2023-52801 CVE-2023-52801 CVE-2023-52801 https://access.redhat.com/security/cve/CVE-2024-26629 CVE-2024-26629 CVE-2024-26629 https://access.redhat.com/security/cve/CVE-2024-26630 CVE-2024-26630 CVE-2024-26630 https://access.redhat.com/security/cve/CVE-2024-26720 CVE-2024-26720 CVE-2024-26720 https://access.redhat.com/security/cve/CVE-2024-26886 CVE-2024-26886 CVE-2024-26886 https://access.redhat.com/security/cve/CVE-2024-26946 CVE-2024-26946 CVE-2024-26946 https://access.redhat.com/security/cve/CVE-2024-35791 CVE-2024-35791 CVE-2024-35791 https://access.redhat.com/security/cve/CVE-2024-35797 CVE-2024-35797 CVE-2024-35797 https://access.redhat.com/security/cve/CVE-2024-35875 CVE-2024-35875 CVE-2024-35875 https://access.redhat.com/security/cve/CVE-2024-36000 CVE-2024-36000 CVE-2024-36000 https://access.redhat.com/security/cve/CVE-2024-36019 CVE-2024-36019 CVE-2024-36019 https://access.redhat.com/security/cve/CVE-2024-36883 CVE-2024-36883 CVE-2024-36883 https://access.redhat.com/security/cve/CVE-2024-36979 CVE-2024-36979 CVE-2024-36979 https://access.redhat.com/security/cve/CVE-2024-38559 CVE-2024-38559 CVE-2024-38559 https://access.redhat.com/security/cve/CVE-2024-38619 CVE-2024-38619 CVE-2024-38619 https://access.redhat.com/security/cve/CVE-2024-40927 CVE-2024-40927 CVE-2024-40927 https://access.redhat.com/security/cve/CVE-2024-40936 CVE-2024-40936 CVE-2024-40936 https://access.redhat.com/security/cve/CVE-2024-41040 CVE-2024-41040 CVE-2024-41040 https://access.redhat.com/security/cve/CVE-2024-41044 CVE-2024-41044 CVE-2024-41044 https://access.redhat.com/security/cve/CVE-2024-41055 CVE-2024-41055 CVE-2024-41055 https://access.redhat.com/security/cve/CVE-2024-41073 CVE-2024-41073 CVE-2024-41073 https://access.redhat.com/security/cve/CVE-2024-41096 CVE-2024-41096 CVE-2024-41096 https://access.redhat.com/security/cve/CVE-2024-42082 CVE-2024-42082 CVE-2024-42082 https://access.redhat.com/security/cve/CVE-2024-42096 CVE-2024-42096 CVE-2024-42096 https://access.redhat.com/security/cve/CVE-2024-42102 CVE-2024-42102 CVE-2024-42102 https://access.redhat.com/security/cve/CVE-2024-42131 CVE-2024-42131 CVE-2024-42131 https://bugzilla.redhat.com/2265797 2265797 https://bugzilla.redhat.com/2269434 2269434 https://bugzilla.redhat.com/2269436 2269436 https://bugzilla.redhat.com/2273141 2273141 https://bugzilla.redhat.com/2275678 2275678 https://bugzilla.redhat.com/2278206 2278206 https://bugzilla.redhat.com/2281052 2281052 https://bugzilla.redhat.com/2281151 2281151 https://bugzilla.redhat.com/2281727 2281727 https://bugzilla.redhat.com/2281968 2281968 https://bugzilla.redhat.com/2282709 2282709 https://bugzilla.redhat.com/2284271 2284271 https://bugzilla.redhat.com/2284402 2284402 https://bugzilla.redhat.com/2293273 2293273 https://bugzilla.redhat.com/2293276 2293276 https://bugzilla.redhat.com/2293440 2293440 https://bugzilla.redhat.com/2297511 2297511 https://bugzilla.redhat.com/2297520 2297520 https://bugzilla.redhat.com/2300409 2300409 https://bugzilla.redhat.com/2300414 2300414 https://bugzilla.redhat.com/2300429 2300429 https://bugzilla.redhat.com/2300491 2300491 https://bugzilla.redhat.com/2300520 2300520 https://bugzilla.redhat.com/2300713 2300713 https://bugzilla.redhat.com/2301465 2301465 https://bugzilla.redhat.com/2301496 2301496 https://bugzilla.redhat.com/2301637 2301637 https://errata.almalinux.org/9/ALSA-2024-6567.html ALSA-2024:6567 ALSA-2024:6567 :,kernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm L,kernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm 8,kernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpm 4,kernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpm 3,kernel-core-5.14.0-427.35.1.el9_4.x86_64.rpm K,kernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm 9,kernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm <,python3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm 1�}bpftool-7.3.0-427.35.1.el9_4.x86_64.rpm 7,kernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm 2,kernel-5.14.0-427.35.1.el9_4.x86_64.rpm M,kernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm 5,kernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm N,kernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm ,kernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpm ;,kernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpm 6,kernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm :,kernel-tools-5.14.0-427.35.1.el9_4.x86_64.rpm L,kernel-debug-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm 8,kernel-modules-5.14.0-427.35.1.el9_4.x86_64.rpm 4,kernel-debug-5.14.0-427.35.1.el9_4.x86_64.rpm 3,kernel-core-5.14.0-427.35.1.el9_4.x86_64.rpm K,kernel-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm 9,kernel-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm <,python3-perf-5.14.0-427.35.1.el9_4.x86_64.rpm 1�}bpftool-7.3.0-427.35.1.el9_4.x86_64.rpm 7,kernel-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm 2,kernel-5.14.0-427.35.1.el9_4.x86_64.rpm M,kernel-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm 5,kernel-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm N,kernel-uki-virt-5.14.0-427.35.1.el9_4.x86_64.rpm ,kernel-abi-stablelists-5.14.0-427.35.1.el9_4.noarch.rpm ;,kernel-tools-libs-5.14.0-427.35.1.el9_4.x86_64.rpm 6,kernel-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm ����Y�:�0�zBsecurity Moderate: expat security update ��+�;https://access.redhat.com/errata/RHSA-2024:6754 RHSA-2024:6754 RHSA-2024:6754 https://access.redhat.com/security/cve/CVE-2024-45490 CVE-2024-45490 CVE-2024-45490 https://access.redhat.com/security/cve/CVE-2024-45491 CVE-2024-45491 CVE-2024-45491 https://access.redhat.com/security/cve/CVE-2024-45492 CVE-2024-45492 CVE-2024-45492 https://bugzilla.redhat.com/2308615 2308615 https://bugzilla.redhat.com/2308616 2308616 https://bugzilla.redhat.com/2308617 2308617 https://errata.almalinux.org/9/ALSA-2024-6754.html ALSA-2024:6754 ALSA-2024:6754 m�-expat-2.5.0-2.el9_4.1.i686.rpm m�-expat-2.5.0-2.el9_4.1.x86_64.rpm m�-expat-2.5.0-2.el9_4.1.i686.rpm m�-expat-2.5.0-2.el9_4.1.x86_64.rpm ����1�;�1�}BBBsecurity Moderate: openssl security update ��f�Phttps://access.redhat.com/errata/RHSA-2024:6783 RHSA-2024:6783 RHSA-2024:6783 https://access.redhat.com/security/cve/CVE-2024-6119 CVE-2024-6119 CVE-2024-6119 https://bugzilla.redhat.com/2306158 2306158 https://errata.almalinux.org/9/ALSA-2024-6783.html ALSA-2024:6783 ALSA-2024:6783 Z�Lopenssl-libs-3.0.7-28.el9_4.i686.rpm }�Lopenssl-3.0.7-28.el9_4.x86_64.rpm Z�Lopenssl-libs-3.0.7-28.el9_4.x86_64.rpm Z�Lopenssl-libs-3.0.7-28.el9_4.i686.rpm }�Lopenssl-3.0.7-28.el9_4.x86_64.rpm Z�Lopenssl-libs-3.0.7-28.el9_4.x86_64.rpm ����Q�<�2�BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Important: kernel security update =��6�+https://access.redhat.com/errata/RHSA-2024:6997 RHSA-2024:6997 RHSA-2024:6997 https://access.redhat.com/security/cve/CVE-2023-52439 CVE-2023-52439 CVE-2023-52439 https://access.redhat.com/security/cve/CVE-2023-52884 CVE-2023-52884 CVE-2023-52884 https://access.redhat.com/security/cve/CVE-2024-26739 CVE-2024-26739 CVE-2024-26739 https://access.redhat.com/security/cve/CVE-2024-26929 CVE-2024-26929 CVE-2024-26929 https://access.redhat.com/security/cve/CVE-2024-26930 CVE-2024-26930 CVE-2024-26930 https://access.redhat.com/security/cve/CVE-2024-26931 CVE-2024-26931 CVE-2024-26931 https://access.redhat.com/security/cve/CVE-2024-26947 CVE-2024-26947 CVE-2024-26947 https://access.redhat.com/security/cve/CVE-2024-26991 CVE-2024-26991 CVE-2024-26991 https://access.redhat.com/security/cve/CVE-2024-27022 CVE-2024-27022 CVE-2024-27022 https://access.redhat.com/security/cve/CVE-2024-35895 CVE-2024-35895 CVE-2024-35895 https://access.redhat.com/security/cve/CVE-2024-36016 CVE-2024-36016 CVE-2024-36016 https://access.redhat.com/security/cve/CVE-2024-36899 CVE-2024-36899 CVE-2024-36899 https://access.redhat.com/security/cve/CVE-2024-38562 CVE-2024-38562 CVE-2024-38562 https://access.redhat.com/security/cve/CVE-2024-38570 CVE-2024-38570 CVE-2024-38570 https://access.redhat.com/security/cve/CVE-2024-38573 CVE-2024-38573 CVE-2024-38573 https://access.redhat.com/security/cve/CVE-2024-38601 CVE-2024-38601 CVE-2024-38601 https://access.redhat.com/security/cve/CVE-2024-38615 CVE-2024-38615 CVE-2024-38615 https://access.redhat.com/security/cve/CVE-2024-40984 CVE-2024-40984 CVE-2024-40984 https://access.redhat.com/security/cve/CVE-2024-41071 CVE-2024-41071 CVE-2024-41071 https://access.redhat.com/security/cve/CVE-2024-42225 CVE-2024-42225 CVE-2024-42225 https://access.redhat.com/security/cve/CVE-2024-42246 CVE-2024-42246 CVE-2024-42246 https://bugzilla.redhat.com/2265271 2265271 https://bugzilla.redhat.com/2273270 2273270 https://bugzilla.redhat.com/2278167 2278167 https://bugzilla.redhat.com/2278245 2278245 https://bugzilla.redhat.com/2278248 2278248 https://bugzilla.redhat.com/2278250 2278250 https://bugzilla.redhat.com/2278252 2278252 https://bugzilla.redhat.com/2278318 2278318 https://bugzilla.redhat.com/2281677 2281677 https://bugzilla.redhat.com/2283894 2283894 https://bugzilla.redhat.com/2284549 2284549 https://bugzilla.redhat.com/2293348 2293348 https://bugzilla.redhat.com/2293364 2293364 https://bugzilla.redhat.com/2293420 2293420 https://bugzilla.redhat.com/2293423 2293423 https://bugzilla.redhat.com/2293431 2293431 https://bugzilla.redhat.com/2293685 2293685 https://bugzilla.redhat.com/2297568 2297568 https://bugzilla.redhat.com/2300448 2300448 https://bugzilla.redhat.com/2301543 2301543 https://errata.almalinux.org/9/ALSA-2024-6997.html ALSA-2024:6997 ALSA-2024:6997 3-kernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm K-kernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm 5-kernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpm 6-kernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpm :-kernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpm 2-kernel-5.14.0-427.37.1.el9_4.x86_64.rpm 7-kernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm 4-kernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm N-kernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm M-kernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm ;-kernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm <-python3-perf-5.14.0-427.37.1.el9_4.x86_64.rpm 9-kernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm 1�~bpftool-7.3.0-427.37.1.el9_4.x86_64.rpm L-kernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm 8-kernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpm -kernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm 3-kernel-core-5.14.0-427.37.1.el9_4.x86_64.rpm K-kernel-debug-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm 5-kernel-debug-core-5.14.0-427.37.1.el9_4.x86_64.rpm 6-kernel-debug-modules-5.14.0-427.37.1.el9_4.x86_64.rpm :-kernel-tools-5.14.0-427.37.1.el9_4.x86_64.rpm 2-kernel-5.14.0-427.37.1.el9_4.x86_64.rpm 7-kernel-debug-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm 4-kernel-debug-5.14.0-427.37.1.el9_4.x86_64.rpm N-kernel-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm M-kernel-modules-core-5.14.0-427.37.1.el9_4.x86_64.rpm ;-kernel-tools-libs-5.14.0-427.37.1.el9_4.x86_64.rpm <-python3-perf-5.14.0-427.37.1.el9_4.x86_64.rpm 9-kernel-modules-extra-5.14.0-427.37.1.el9_4.x86_64.rpm 1�~bpftool-7.3.0-427.37.1.el9_4.x86_64.rpm L-kernel-debug-uki-virt-5.14.0-427.37.1.el9_4.x86_64.rpm 8-kernel-modules-5.14.0-427.37.1.el9_4.x86_64.rpm -kernel-abi-stablelists-5.14.0-427.37.1.el9_4.noarch.rpm ���� �=�4�cBBBBBBBBBBBBBBBsecurity Moderate: linux-firmware security update ��K�*https://access.redhat.com/errata/RHSA-2024:7484 RHSA-2024:7484 RHSA-2024:7484 https://access.redhat.com/security/cve/CVE-2023-20584 CVE-2023-20584 CVE-2023-20584 https://access.redhat.com/security/cve/CVE-2023-31356 CVE-2023-31356 CVE-2023-31356 https://bugzilla.redhat.com/2304583 2304583 https://bugzilla.redhat.com/2304593 2304593 https://errata.almalinux.org/9/ALSA-2024-7484.html ALSA-2024:7484 ALSA-2024:7484 �:� iwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �5� iwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �3� iwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �=�giwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �2�Yiwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �7�giwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �8�niwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm �@�,linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm �9�jiwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm �6� iwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �<�eiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm �>�,libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm �;� iwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �A�,netronome-firmware-20240905-143.3.el9_4.noarch.rpm �?�,linux-firmware-20240905-143.3.el9_4.noarch.rpm �1�aiwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �4� iwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �:� iwl6000g2a-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �5� iwl2000-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �3� iwl105-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �=�giwl7260-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �2�Yiwl1000-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �7�giwl3160-firmware-25.30.13.0-143.3.el9_4.noarch.rpm �8�niwl5000-firmware-8.83.5.1_1-143.3.el9_4.noarch.rpm �@�,linux-firmware-whence-20240905-143.3.el9_4.noarch.rpm �9�jiwl5150-firmware-8.24.2.2-143.3.el9_4.noarch.rpm �6� iwl2030-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �<�eiwl6050-firmware-41.28.5.1-143.3.el9_4.noarch.rpm �>�,libertas-sd8787-firmware-20240905-143.3.el9_4.noarch.rpm �;� iwl6000g2b-firmware-18.168.6.1-143.3.el9_4.noarch.rpm �A�,netronome-firmware-20240905-143.3.el9_4.noarch.rpm �?�,linux-firmware-20240905-143.3.el9_4.noarch.rpm �1�aiwl100-firmware-39.31.5.1-143.3.el9_4.noarch.rpm �4� iwl135-firmware-18.168.6.1-143.3.el9_4.noarch.rpm ����y�>�3�uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update ��u�<https://access.redhat.com/errata/RHSA-2024:8162 RHSA-2024:8162 RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385 CVE-2021-47385 CVE-2021-47385 https://access.redhat.com/security/cve/CVE-2023-28746 CVE-2023-28746 CVE-2023-28746 https://access.redhat.com/security/cve/CVE-2023-52658 CVE-2023-52658 CVE-2023-52658 https://access.redhat.com/security/cve/CVE-2024-27403 CVE-2024-27403 CVE-2024-27403 https://access.redhat.com/security/cve/CVE-2024-35989 CVE-2024-35989 CVE-2024-35989 https://access.redhat.com/security/cve/CVE-2024-36889 CVE-2024-36889 CVE-2024-36889 https://access.redhat.com/security/cve/CVE-2024-36978 CVE-2024-36978 CVE-2024-36978 https://access.redhat.com/security/cve/CVE-2024-38556 CVE-2024-38556 CVE-2024-38556 https://access.redhat.com/security/cve/CVE-2024-39483 CVE-2024-39483 CVE-2024-39483 https://access.redhat.com/security/cve/CVE-2024-39502 CVE-2024-39502 CVE-2024-39502 https://access.redhat.com/security/cve/CVE-2024-40959 CVE-2024-40959 CVE-2024-40959 https://access.redhat.com/security/cve/CVE-2024-42079 CVE-2024-42079 CVE-2024-42079 https://access.redhat.com/security/cve/CVE-2024-42272 CVE-2024-42272 CVE-2024-42272 https://access.redhat.com/security/cve/CVE-2024-42284 CVE-2024-42284 CVE-2024-42284 https://bugzilla.redhat.com/2270700 2270700 https://bugzilla.redhat.com/2281127 2281127 https://bugzilla.redhat.com/2281149 2281149 https://bugzilla.redhat.com/2281847 2281847 https://bugzilla.redhat.com/2282355 2282355 https://bugzilla.redhat.com/2284571 2284571 https://bugzilla.redhat.com/2293078 2293078 https://bugzilla.redhat.com/2293443 2293443 https://bugzilla.redhat.com/2295921 2295921 https://bugzilla.redhat.com/2297474 2297474 https://bugzilla.redhat.com/2297543 2297543 https://bugzilla.redhat.com/2300517 2300517 https://errata.almalinux.org/9/ALSA-2024-8162.html ALSA-2024:8162 ALSA-2024:8162 N.kernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm 4.kernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm <.python3-perf-5.14.0-427.40.1.el9_4.x86_64.rpm 3.kernel-core-5.14.0-427.40.1.el9_4.x86_64.rpm 2.kernel-5.14.0-427.40.1.el9_4.x86_64.rpm M.kernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 1�bpftool-7.3.0-427.40.1.el9_4.x86_64.rpm 8.kernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm L.kernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm 9.kernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm :.kernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm K.kernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 6.kernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm 7.kernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm .kernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpm 5.kernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm ;.kernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm N.kernel-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm 4.kernel-debug-5.14.0-427.40.1.el9_4.x86_64.rpm <.python3-perf-5.14.0-427.40.1.el9_4.x86_64.rpm 3.kernel-core-5.14.0-427.40.1.el9_4.x86_64.rpm 2.kernel-5.14.0-427.40.1.el9_4.x86_64.rpm M.kernel-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 1�bpftool-7.3.0-427.40.1.el9_4.x86_64.rpm 8.kernel-modules-5.14.0-427.40.1.el9_4.x86_64.rpm L.kernel-debug-uki-virt-5.14.0-427.40.1.el9_4.x86_64.rpm 9.kernel-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm :.kernel-tools-5.14.0-427.40.1.el9_4.x86_64.rpm K.kernel-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 6.kernel-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm 7.kernel-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm .kernel-abi-stablelists-5.14.0-427.40.1.el9_4.noarch.rpm 5.kernel-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm ;.kernel-tools-libs-5.14.0-427.40.1.el9_4.x86_64.rpm ��� �?�4�VBBBsecurity Moderate: python3.9 security update ��1�\https://access.redhat.com/errata/RHSA-2024:8446 RHSA-2024:8446 RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-8446.html ALSA-2024:8446 ALSA-2024:8446 \�`python3-3.9.18-3.el9_4.6.x86_64.rpm 0�`python3-libs-3.9.18-3.el9_4.6.i686.rpm 0�`python3-libs-3.9.18-3.el9_4.6.x86_64.rpm \�`python3-3.9.18-3.el9_4.6.x86_64.rpm 0�`python3-libs-3.9.18-3.el9_4.6.i686.rpm 0�`python3-libs-3.9.18-3.el9_4.6.x86_64.rpm ����@�5�[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �� �>-https://access.redhat.com/errata/RHSA-2024:8617 RHSA-2024:8617 RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383 CVE-2021-47383 CVE-2021-47383 https://access.redhat.com/security/cve/CVE-2024-2201 CVE-2024-2201 CVE-2024-2201 https://access.redhat.com/security/cve/CVE-2024-26640 CVE-2024-26640 CVE-2024-26640 https://access.redhat.com/security/cve/CVE-2024-26826 CVE-2024-26826 CVE-2024-26826 https://access.redhat.com/security/cve/CVE-2024-26923 CVE-2024-26923 CVE-2024-26923 https://access.redhat.com/security/cve/CVE-2024-26935 CVE-2024-26935 CVE-2024-26935 https://access.redhat.com/security/cve/CVE-2024-26961 CVE-2024-26961 CVE-2024-26961 https://access.redhat.com/security/cve/CVE-2024-36244 CVE-2024-36244 CVE-2024-36244 https://access.redhat.com/security/cve/CVE-2024-39472 CVE-2024-39472 CVE-2024-39472 https://access.redhat.com/security/cve/CVE-2024-39504 CVE-2024-39504 CVE-2024-39504 https://access.redhat.com/security/cve/CVE-2024-40904 CVE-2024-40904 CVE-2024-40904 https://access.redhat.com/security/cve/CVE-2024-40931 CVE-2024-40931 CVE-2024-40931 https://access.redhat.com/security/cve/CVE-2024-40960 CVE-2024-40960 CVE-2024-40960 https://access.redhat.com/security/cve/CVE-2024-40972 CVE-2024-40972 CVE-2024-40972 https://access.redhat.com/security/cve/CVE-2024-40977 CVE-2024-40977 CVE-2024-40977 https://access.redhat.com/security/cve/CVE-2024-40995 CVE-2024-40995 CVE-2024-40995 https://access.redhat.com/security/cve/CVE-2024-40998 CVE-2024-40998 CVE-2024-40998 https://access.redhat.com/security/cve/CVE-2024-41005 CVE-2024-41005 CVE-2024-41005 https://access.redhat.com/security/cve/CVE-2024-41013 CVE-2024-41013 CVE-2024-41013 https://access.redhat.com/security/cve/CVE-2024-41014 CVE-2024-41014 CVE-2024-41014 https://access.redhat.com/security/cve/CVE-2024-43854 CVE-2024-43854 CVE-2024-43854 https://access.redhat.com/security/cve/CVE-2024-45018 CVE-2024-45018 CVE-2024-45018 https://bugzilla.redhat.com/2268118 2268118 https://bugzilla.redhat.com/2270100 2270100 https://bugzilla.redhat.com/2275604 2275604 https://bugzilla.redhat.com/2277171 2277171 https://bugzilla.redhat.com/2278176 2278176 https://bugzilla.redhat.com/2278235 2278235 https://bugzilla.redhat.com/2282357 2282357 https://bugzilla.redhat.com/2293654 2293654 https://bugzilla.redhat.com/2296067 2296067 https://bugzilla.redhat.com/2297476 2297476 https://bugzilla.redhat.com/2297488 2297488 https://bugzilla.redhat.com/2297515 2297515 https://bugzilla.redhat.com/2297544 2297544 https://bugzilla.redhat.com/2297556 2297556 https://bugzilla.redhat.com/2297561 2297561 https://bugzilla.redhat.com/2297579 2297579 https://bugzilla.redhat.com/2297582 2297582 https://bugzilla.redhat.com/2297589 2297589 https://bugzilla.redhat.com/2300296 2300296 https://bugzilla.redhat.com/2300297 2300297 https://bugzilla.redhat.com/2311715 2311715 https://errata.almalinux.org/9/ALSA-2024-8617.html ALSA-2024:8617 ALSA-2024:8617 4/kernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm </python3-perf-5.14.0-427.42.1.el9_4.x86_64.rpm 2/kernel-5.14.0-427.42.1.el9_4.x86_64.rpm /kernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm M/kernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm 6/kernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm ;/kernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm N/kernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm 5/kernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm K/kernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm :/kernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm 8/kernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm L/kernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm 3/kernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm 1� bpftool-7.3.0-427.42.1.el9_4.x86_64.rpm 9/kernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm 7/kernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm 4/kernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpm </python3-perf-5.14.0-427.42.1.el9_4.x86_64.rpm 2/kernel-5.14.0-427.42.1.el9_4.x86_64.rpm /kernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm M/kernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm 6/kernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm ;/kernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm N/kernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm 5/kernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm K/kernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm :/kernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm 8/kernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpm L/kernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm 3/kernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm 1� bpftool-7.3.0-427.42.1.el9_4.x86_64.rpm 9/kernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm 7/kernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm ����E�A�6�|BBBBBBBBBBBBBBBBBsecurity Low: NetworkManager security update n��K�jhttps://access.redhat.com/errata/RHSA-2024:9317 RHSA-2024:9317 RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501 CVE-2024-6501 CVE-2024-6501 https://bugzilla.redhat.com/2295734 2295734 https://errata.almalinux.org/9/ALSA-2024-9317.html ALSA-2024:9317 ALSA-2024:9317 �pONetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm � ONetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm �oONetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm � ONetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm �BONetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm �BONetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm �ONetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm �pONetworkManager-initscripts-updown-1.48.10-2.el9_5.alma.1.noarch.rpm � ONetworkManager-wwan-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-bluetooth-1.48.10-2.el9_5.alma.1.x86_64.rpm �oONetworkManager-config-server-1.48.10-2.el9_5.alma.1.noarch.rpm � ONetworkManager-wifi-1.48.10-2.el9_5.alma.1.x86_64.rpm �BONetworkManager-libnm-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-1.48.10-2.el9_5.alma.1.x86_64.rpm �BONetworkManager-libnm-1.48.10-2.el9_5.alma.1.i686.rpm �ONetworkManager-adsl-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-team-1.48.10-2.el9_5.alma.1.x86_64.rpm �ONetworkManager-tui-1.48.10-2.el9_5.alma.1.x86_64.rpm ����%�B�7�OBBBBBBsecurity Low: cockpit security update n��5�2https://access.redhat.com/errata/RHSA-2024:9325 RHSA-2024:9325 RHSA-2024:9325 https://access.redhat.com/security/cve/CVE-2024-6126 CVE-2024-6126 CVE-2024-6126 https://bugzilla.redhat.com/2292897 2292897 https://errata.almalinux.org/9/ALSA-2024-9325.html ALSA-2024:9325 ALSA-2024:9325 �m�cockpit-bridge-323.1-1.el9_5.x86_64.rpm �p�cockpit-ws-323.1-1.el9_5.x86_64.rpm �l�cockpit-323.1-1.el9_5.x86_64.rpm �o�cockpit-system-323.1-1.el9_5.noarch.rpm �n�cockpit-doc-323.1-1.el9_5.noarch.rpm �m�cockpit-bridge-323.1-1.el9_5.x86_64.rpm �p�cockpit-ws-323.1-1.el9_5.x86_64.rpm �l�cockpit-323.1-1.el9_5.x86_64.rpm �o�cockpit-system-323.1-1.el9_5.noarch.rpm �n�cockpit-doc-323.1-1.el9_5.noarch.rpm ����K�C�8�WBBBBBBBBBBBBBBBsecurity Moderate: krb5 security update ��g�https://access.redhat.com/errata/RHSA-2024:9331 RHSA-2024:9331 RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 CVE-2024-26458 CVE-2024-26458 https://access.redhat.com/security/cve/CVE-2024-26461 CVE-2024-26461 CVE-2024-26461 https://access.redhat.com/security/cve/CVE-2024-26462 CVE-2024-26462 CVE-2024-26462 https://bugzilla.redhat.com/2266731 2266731 https://bugzilla.redhat.com/2266740 2266740 https://bugzilla.redhat.com/2266742 2266742 https://errata.almalinux.org/9/ALSA-2024-9331.html ALSA-2024:9331 ALSA-2024:9331 ]Xkrb5-libs-1.21.1-3.el9.i686.rpm aXlibkadm5-1.21.1-3.el9.x86_64.rpm _Xkrb5-server-1.21.1-3.el9.i686.rpm `Xkrb5-server-ldap-1.21.1-3.el9.x86_64.rpm ]Xkrb5-libs-1.21.1-3.el9.x86_64.rpm ^Xkrb5-pkinit-1.21.1-3.el9.i686.rpm _Xkrb5-server-1.21.1-3.el9.x86_64.rpm `Xkrb5-server-ldap-1.21.1-3.el9.i686.rpm ^Xkrb5-pkinit-1.21.1-3.el9.x86_64.rpm aXlibkadm5-1.21.1-3.el9.i686.rpm �%Xkrb5-workstation-1.21.1-3.el9.x86_64.rpm ]Xkrb5-libs-1.21.1-3.el9.i686.rpm aXlibkadm5-1.21.1-3.el9.x86_64.rpm _Xkrb5-server-1.21.1-3.el9.i686.rpm `Xkrb5-server-ldap-1.21.1-3.el9.x86_64.rpm ]Xkrb5-libs-1.21.1-3.el9.x86_64.rpm ^Xkrb5-pkinit-1.21.1-3.el9.i686.rpm _Xkrb5-server-1.21.1-3.el9.x86_64.rpm `Xkrb5-server-ldap-1.21.1-3.el9.i686.rpm ^Xkrb5-pkinit-1.21.1-3.el9.x86_64.rpm aXlibkadm5-1.21.1-3.el9.i686.rpm �%Xkrb5-workstation-1.21.1-3.el9.x86_64.rpm ���h�D�9�hBBBsecurity Low: openssl security update n��r�L https://access.redhat.com/errata/RHSA-2024:9333 RHSA-2024:9333 RHSA-2024:9333 https://access.redhat.com/security/cve/CVE-2024-2511 CVE-2024-2511 CVE-2024-2511 https://access.redhat.com/security/cve/CVE-2024-4603 CVE-2024-4603 CVE-2024-4603 https://access.redhat.com/security/cve/CVE-2024-4741 CVE-2024-4741 CVE-2024-4741 https://access.redhat.com/security/cve/CVE-2024-5535 CVE-2024-5535 CVE-2024-5535 https://bugzilla.redhat.com/2274020 2274020 https://bugzilla.redhat.com/2281029 2281029 https://bugzilla.redhat.com/2283757 2283757 https://bugzilla.redhat.com/2294581 2294581 https://errata.almalinux.org/9/ALSA-2024-9333.html ALSA-2024:9333 ALSA-2024:9333 }�Nopenssl-3.2.2-6.el9_5.x86_64.rpm Z�Nopenssl-libs-3.2.2-6.el9_5.x86_64.rpm Z�Nopenssl-libs-3.2.2-6.el9_5.i686.rpm }�Nopenssl-3.2.2-6.el9_5.x86_64.rpm Z�Nopenssl-libs-3.2.2-6.el9_5.x86_64.rpm Z�Nopenssl-libs-3.2.2-6.el9_5.i686.rpm ����e�E�:�mBBBsecurity Moderate: python3.9 security update ��>�khttps://access.redhat.com/errata/RHSA-2024:9371 RHSA-2024:9371 RHSA-2024:9371 https://access.redhat.com/security/cve/CVE-2024-8088 CVE-2024-8088 CVE-2024-8088 https://bugzilla.redhat.com/2307370 2307370 https://errata.almalinux.org/9/ALSA-2024-9371.html ALSA-2024:9371 ALSA-2024:9371 0�apython3-libs-3.9.19-8.el9.i686.rpm 0�apython3-libs-3.9.19-8.el9.x86_64.rpm \�apython3-3.9.19-8.el9.x86_64.rpm 0�apython3-libs-3.9.19-8.el9.i686.rpm 0�apython3-libs-3.9.19-8.el9.x86_64.rpm \�apython3-3.9.19-8.el9.x86_64.rpm ���4�F�3�2security Moderate: microcode_ctl security update ��)�dhttps://access.redhat.com/errata/RHSA-2024:9401 RHSA-2024:9401 RHSA-2024:9401 https://access.redhat.com/security/cve/CVE-2023-22655 CVE-2023-22655 CVE-2023-22655 https://access.redhat.com/security/cve/CVE-2023-28746 CVE-2023-28746 CVE-2023-28746 https://access.redhat.com/security/cve/CVE-2023-38575 CVE-2023-38575 CVE-2023-38575 https://access.redhat.com/security/cve/CVE-2023-39368 CVE-2023-39368 CVE-2023-39368 https://access.redhat.com/security/cve/CVE-2023-43490 CVE-2023-43490 CVE-2023-43490 https://access.redhat.com/security/cve/CVE-2023-45733 CVE-2023-45733 CVE-2023-45733 https://access.redhat.com/security/cve/CVE-2023-46103 CVE-2023-46103 CVE-2023-46103 https://bugzilla.redhat.com/2270698 2270698 https://bugzilla.redhat.com/2270700 2270700 https://bugzilla.redhat.com/2270701 2270701 https://bugzilla.redhat.com/2270703 2270703 https://bugzilla.redhat.com/2270704 2270704 https://bugzilla.redhat.com/2292296 2292296 https://bugzilla.redhat.com/2292300 2292300 https://errata.almalinux.org/9/ALSA-2024-9401.html ALSA-2024:9401 ALSA-2024:9401 �q�fmicrocode_ctl-20240910-1.el9_5.noarch.rpm �q�fmicrocode_ctl-20240910-1.el9_5.noarch.rpm ����3�G�;�tBsecurity Moderate: libgcrypt security update �� � https://access.redhat.com/errata/RHSA-2024:9404 RHSA-2024:9404 RHSA-2024:9404 https://access.redhat.com/security/cve/CVE-2024-2236 CVE-2024-2236 CVE-2024-2236 https://bugzilla.redhat.com/2245218 2245218 https://errata.almalinux.org/9/ALSA-2024-9404.html ALSA-2024:9404 ALSA-2024:9404 �L�libgcrypt-1.10.0-11.el9.x86_64.rpm �L�libgcrypt-1.10.0-11.el9.i686.rpm �L�libgcrypt-1.10.0-11.el9.x86_64.rpm �L�libgcrypt-1.10.0-11.el9.i686.rpm ����H�H�<�wBsecurity Low: vim security update n���thttps://access.redhat.com/errata/RHSA-2024:9405 RHSA-2024:9405 RHSA-2024:9405 https://access.redhat.com/security/cve/CVE-2021-3903 CVE-2021-3903 CVE-2021-3903 https://bugzilla.redhat.com/2018558 2018558 https://errata.almalinux.org/9/ALSA-2024-9405.html ALSA-2024:9405 ALSA-2024:9405 �F�4vim-filesystem-8.2.2637-21.el9.noarch.rpm ��4vim-minimal-8.2.2637-21.el9.x86_64.rpm �F�4vim-filesystem-8.2.2637-21.el9.noarch.rpm ��4vim-minimal-8.2.2637-21.el9.x86_64.rpm ����a�I�=�zBBBsecurity Moderate: bluez security update ���+https://access.redhat.com/errata/RHSA-2024:9413 RHSA-2024:9413 RHSA-2024:9413 https://access.redhat.com/security/cve/CVE-2023-27349 CVE-2023-27349 CVE-2023-27349 https://access.redhat.com/security/cve/CVE-2023-44431 CVE-2023-44431 CVE-2023-44431 https://access.redhat.com/security/cve/CVE-2023-45866 CVE-2023-45866 CVE-2023-45866 https://access.redhat.com/security/cve/CVE-2023-50229 CVE-2023-50229 CVE-2023-50229 https://access.redhat.com/security/cve/CVE-2023-50230 CVE-2023-50230 CVE-2023-50230 https://access.redhat.com/security/cve/CVE-2023-51580 CVE-2023-51580 CVE-2023-51580 https://access.redhat.com/security/cve/CVE-2023-51589 CVE-2023-51589 CVE-2023-51589 https://access.redhat.com/security/cve/CVE-2023-51592 CVE-2023-51592 CVE-2023-51592 https://access.redhat.com/security/cve/CVE-2023-51594 CVE-2023-51594 CVE-2023-51594 https://access.redhat.com/security/cve/CVE-2023-51596 CVE-2023-51596 CVE-2023-51596 https://bugzilla.redhat.com/2253391 2253391 https://bugzilla.redhat.com/2278787 2278787 https://bugzilla.redhat.com/2278945 2278945 https://bugzilla.redhat.com/2278955 2278955 https://bugzilla.redhat.com/2278962 2278962 https://bugzilla.redhat.com/2278965 2278965 https://bugzilla.redhat.com/2278967 2278967 https://bugzilla.redhat.com/2278969 2278969 https://bugzilla.redhat.com/2278972 2278972 https://bugzilla.redhat.com/2278974 2278974 https://errata.almalinux.org/9/ALSA-2024-9413.html ALSA-2024:9413 ALSA-2024:9413 �D�fbluez-libs-5.72-2.el9.x86_64.rpm � �fbluez-5.72-2.el9.x86_64.rpm �D�fbluez-libs-5.72-2.el9.i686.rpm �D�fbluez-libs-5.72-2.el9.x86_64.rpm � �fbluez-5.72-2.el9.x86_64.rpm �D�fbluez-libs-5.72-2.el9.i686.rpm ����t�J� �?security Moderate: python-dns security update ��6�qhttps://access.redhat.com/errata/RHSA-2024:9423 RHSA-2024:9423 RHSA-2024:9423 https://access.redhat.com/security/cve/CVE-2023-29483 CVE-2023-29483 CVE-2023-29483 https://bugzilla.redhat.com/2274520 2274520 https://errata.almalinux.org/9/ALSA-2024-9423.html ALSA-2024:9423 ALSA-2024:9423 �t�\python3-dns-2.6.1-3.el9.noarch.rpm �t�\python3-dns-2.6.1-3.el9.noarch.rpm ����0�K��Asecurity Low: tpm2-tools security update n��'�'https://access.redhat.com/errata/RHSA-2024:9424 RHSA-2024:9424 RHSA-2024:9424 https://access.redhat.com/security/cve/CVE-2024-29038 CVE-2024-29038 CVE-2024-29038 https://access.redhat.com/security/cve/CVE-2024-29039 CVE-2024-29039 CVE-2024-29039 https://bugzilla.redhat.com/2278071 2278071 https://bugzilla.redhat.com/2278075 2278075 https://errata.almalinux.org/9/ALSA-2024-9424.html ALSA-2024:9424 ALSA-2024:9424 �O�ktpm2-tools-5.2-4.el9.x86_64.rpm �O�ktpm2-tools-5.2-4.el9.x86_64.rpm ����5�L��Dsecurity Low: nano security update n��N�Ahttps://access.redhat.com/errata/RHSA-2024:9430 RHSA-2024:9430 RHSA-2024:9430 https://access.redhat.com/security/cve/CVE-2024-5742 CVE-2024-5742 CVE-2024-5742 https://bugzilla.redhat.com/2278574 2278574 https://errata.almalinux.org/9/ALSA-2024-9430.html ALSA-2024:9430 ALSA-2024:9430 ��lnano-5.6.1-6.el9.x86_64.rpm ��lnano-5.6.1-6.el9.x86_64.rpm ����5�M�>�Gsecurity Important: bubblewrap and flatpak security update =���Rhttps://access.redhat.com/errata/RHSA-2024:9449 RHSA-2024:9449 RHSA-2024:9449 https://access.redhat.com/security/cve/CVE-2024-42472 CVE-2024-42472 CVE-2024-42472 https://errata.almalinux.org/9/ALSA-2024-9449.html ALSA-2024:9449 ALSA-2024:9449 �k�Vbubblewrap-0.4.1-8.el9_5.x86_64.rpm �k�Vbubblewrap-0.4.1-8.el9_5.x86_64.rpm ����6�N�?�IBBBsecurity Moderate: python3.9 security update ��a�\https://access.redhat.com/errata/RHSA-2024:9468 RHSA-2024:9468 RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232 CVE-2024-6232 CVE-2024-6232 https://bugzilla.redhat.com/2309426 2309426 https://errata.almalinux.org/9/ALSA-2024-9468.html ALSA-2024:9468 ALSA-2024:9468 0�bpython3-libs-3.9.19-8.el9_5.1.i686.rpm \�bpython3-3.9.19-8.el9_5.1.x86_64.rpm 0�bpython3-libs-3.9.19-8.el9_5.1.x86_64.rpm 0�bpython3-libs-3.9.19-8.el9_5.1.i686.rpm \�bpython3-3.9.19-8.el9_5.1.x86_64.rpm 0�bpython3-libs-3.9.19-8.el9_5.1.x86_64.rpm �����O� �NBsecurity Low: cups security update n��=�)https://access.redhat.com/errata/RHSA-2024:9470 RHSA-2024:9470 RHSA-2024:9470 https://access.redhat.com/security/cve/CVE-2024-47175 CVE-2024-47175 CVE-2024-47175 https://bugzilla.redhat.com/2314256 2314256 https://errata.almalinux.org/9/ALSA-2024-9470.html ALSA-2024:9470 ALSA-2024:9470 ��'cups-libs-2.3.3op2-31.el9_5.i686.rpm ��'cups-libs-2.3.3op2-31.el9_5.x86_64.rpm ��'cups-libs-2.3.3op2-31.el9_5.i686.rpm ��'cups-libs-2.3.3op2-31.el9_5.x86_64.rpm ����S�P��QBBBBBBBBBBBBBBBsecurity Important: krb5 security update =��f�Shttps://access.redhat.com/errata/RHSA-2024:9474 RHSA-2024:9474 RHSA-2024:9474 https://access.redhat.com/security/cve/CVE-2024-3596 CVE-2024-3596 CVE-2024-3596 https://bugzilla.redhat.com/2263240 2263240 https://errata.almalinux.org/9/ALSA-2024-9474.html ALSA-2024:9474 ALSA-2024:9474 `Ykrb5-server-ldap-1.21.1-4.el9_5.i686.rpm ^Ykrb5-pkinit-1.21.1-4.el9_5.x86_64.rpm `Ykrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm _Ykrb5-server-1.21.1-4.el9_5.i686.rpm ]Ykrb5-libs-1.21.1-4.el9_5.x86_64.rpm _Ykrb5-server-1.21.1-4.el9_5.x86_64.rpm ]Ykrb5-libs-1.21.1-4.el9_5.i686.rpm ^Ykrb5-pkinit-1.21.1-4.el9_5.i686.rpm aYlibkadm5-1.21.1-4.el9_5.i686.rpm �%Ykrb5-workstation-1.21.1-4.el9_5.x86_64.rpm aYlibkadm5-1.21.1-4.el9_5.x86_64.rpm `Ykrb5-server-ldap-1.21.1-4.el9_5.i686.rpm ^Ykrb5-pkinit-1.21.1-4.el9_5.x86_64.rpm `Ykrb5-server-ldap-1.21.1-4.el9_5.x86_64.rpm _Ykrb5-server-1.21.1-4.el9_5.i686.rpm ]Ykrb5-libs-1.21.1-4.el9_5.x86_64.rpm _Ykrb5-server-1.21.1-4.el9_5.x86_64.rpm ]Ykrb5-libs-1.21.1-4.el9_5.i686.rpm ^Ykrb5-pkinit-1.21.1-4.el9_5.i686.rpm aYlibkadm5-1.21.1-4.el9_5.i686.rpm �%Ykrb5-workstation-1.21.1-4.el9_5.x86_64.rpm aYlibkadm5-1.21.1-4.el9_5.x86_64.rpm ����Q�Q��bBsecurity Moderate: expat security update ��9�Ghttps://access.redhat.com/errata/RHSA-2024:9541 RHSA-2024:9541 RHSA-2024:9541 https://access.redhat.com/security/cve/CVE-2024-50602 CVE-2024-50602 CVE-2024-50602 https://bugzilla.redhat.com/2321987 2321987 https://errata.almalinux.org/9/ALSA-2024-9541.html ALSA-2024:9541 ALSA-2024:9541 m�.expat-2.5.0-3.el9_5.1.x86_64.rpm m�.expat-2.5.0-3.el9_5.1.i686.rpm m�.expat-2.5.0-3.el9_5.1.x86_64.rpm m�.expat-2.5.0-3.el9_5.1.i686.rpm ����U�R��eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurity Moderate: kernel security update �� �'https://access.redhat.com/errata/RHSA-2024:9605 RHSA-2024:9605 RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283 CVE-2024-42283 CVE-2024-42283 https://access.redhat.com/security/cve/CVE-2024-46824 CVE-2024-46824 CVE-2024-46824 https://access.redhat.com/security/cve/CVE-2024-46858 CVE-2024-46858 CVE-2024-46858 https://bugzilla.redhat.com/2315176 2315176 https://bugzilla.redhat.com/2315210 2315210 https://errata.almalinux.org/9/ALSA-2024-9605.html ALSA-2024:9605 ALSA-2024:9605 ;kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm �kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm <python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 2kernel-5.14.0-503.14.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm 1�bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm Kkernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm Nkernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm Mkernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm 3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm ;kernel-tools-libs-5.14.0-503.14.1.el9_5.x86_64.rpm �kernel-uki-virt-addons-5.14.0-503.14.1.el9_5.x86_64.rpm <python3-perf-5.14.0-503.14.1.el9_5.x86_64.rpm Lkernel-debug-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm 7kernel-debug-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 2kernel-5.14.0-503.14.1.el9_5.x86_64.rpm 8kernel-modules-5.14.0-503.14.1.el9_5.x86_64.rpm :kernel-tools-5.14.0-503.14.1.el9_5.x86_64.rpm 4kernel-debug-5.14.0-503.14.1.el9_5.x86_64.rpm 1�bpftool-7.4.0-503.14.1.el9_5.x86_64.rpm 9kernel-modules-extra-5.14.0-503.14.1.el9_5.x86_64.rpm 6kernel-debug-modules-5.14.0-503.14.1.el9_5.x86_64.rpm Kkernel-debug-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm 5kernel-debug-core-5.14.0-503.14.1.el9_5.x86_64.rpm Nkernel-uki-virt-5.14.0-503.14.1.el9_5.x86_64.rpm Mkernel-modules-core-5.14.0-503.14.1.el9_5.x86_64.rpm kernel-abi-stablelists-5.14.0-503.14.1.el9_5.noarch.rpm 3kernel-core-5.14.0-503.14.1.el9_5.x86_64.rpm ����F � VmXZ Utils is an integrated collection of user-space file�mpress�u�@ities bas�9�the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossl�[ data�i. T�W�?provide�� highÔ��io�Y��keeping��de�%time short. Secu�Wy Fix(es): * gzip: arbitrary-��-w�%e vulnerab��y (CVE-2022-1271) For mor�ota�_about��s�gissue(s� includ��im�gt,��CVSS sc�G� cknowledgments,���j�/r rel��in�@��n,�f�to�R�� pag�m lis�,�R�&enc�Es��. �egrub2 p�u�6s�j ver�82��?Gr��Unifi�TBoot Load�z(GRUB)�ƪ�ly��nfigu�3le��customiz�b�:l�:w�ީ>dular�}ch�pcture���supp���bvarie�S��kernel � �'��sy��m� ��ute�V�Mhardwa��vi�. �mshim�r��t�IJrfirst-st�UEFI�that�Ondl������o�7tru��full�3un���environ������: I���Bflow�ޢ_net_recv_ip4_��ets�28733)�HCraf��PNG �yscal���nmay lead�DZ�-of-��nds ��sheap�^1-3695�]�S�R�Qd��7huffma���)�V��g6�gJPE�hc�>�hb�N�,������7�ZOȤwhen��sp� HTTP�Id�/�n4�M�[_lock�X�Br����s non-��i�D��e�*d�Q�b�-��r-fre�ӳcmd_���k()�B�=��: B�ov��ޢ6��c�Y���H7�Vi�Vi IM��ed)�upd�g�yim�� �vi editor��v�]Use�.�F�<��Po�wr Offset��v���W055�4�@H��-�h��O��oc�ts�?943�?�y��420�2��4��+621�+�&-r�o�'9�'us�f�{��utf_ptr2char�51���SExpat�G C�.b�J��B�?��XML docu��e�C�0ta�,exha�D�z�v�9type�M�531���=�� ���=copySt�f��:�w��C�2��3Linux�!,�����any�ope�J ���B���C: Sma����8�[b siz�[TCP sourc��gen�^o��� �k�012)�{r���di��Q_ev�f_�ƤT�Hpriv�T� e���^�Y7���Ya�U�/�a���sub�$���l�r���t966�t�o�mIP�� ESP t�s�co� �76�K� Bug�`make SHA512_� �.s�CRYPTO_USER�4��-� (BZ#20726�SR-IOV�c an�*> 50%��� d��3483�fix� rrup�iau�yby dm-�-��98218�+ SC�cli�$-s�6peeloff�ns [al�(�_-9]�<404���#��n�|f��in��asymme�c�<u��itu¼8548��F�6�4 �fMultipl�jT VMs ea�B�e�vCPUs�E�N �6spec:�����^a��tools�hd�-9�u��c����s���eeh_pser�!ob��:��vm�oi�� t�=p�d,�q kdump���ggere�n225�� �U� �� X NIC d�jer�'�� mai���7638)���ve�� � mm�L���c�t� ��sev�l dif��t st��7�K�r �KGNU�r�w pio�/ISO ��0 CD-ROM�F . L��is �f��Jy�'bsdtar�oy,��rip�l��u��bin�ws su�$�yth�J��pop�d�Ektop�,�ag�� ���J:� � �+via�Mmpon�+ �Fx_lzma_al�_�t �62���7� �<� �o8O�gW��8��*��v�k regs� b�()�r�xp.c�K8�� �� i� �Embyte�D92� �W> ���ascsi_i�� l� 049�%��tc��w_����/sched/cls_api�0�H�&Power9 - LPAR�:��Sha�G��c� ��m�9 ����se�[Hash]�w48�zH�& �up�+���nrun��� ss-� �`��ha����dFIPS���Pd�1�c��Inam���4�>338�Jfs2��=�����g� s�Ume����ght�K730�| i/o��iator��u�o �:�Kwork�;dis�g�Z4.18.0-372.9.1.el8.x86_64)�[825�A����(� esn't��3�SSATA�5974��G�/ t���re���@post�� mig�L����� �����^10��{Oop�r�l�t�x � �IRIP�8de_attr_�_lab����g��!�s�l18��l�BUG:��% ���&��t�#���xn��l�E �fs4�ton� �;��loo���r��lp���s�� ��: K��acc��ebad��a,�P g: 11 [#1]�kc���+tu���Nn��t�L��(P10/ ibmvnic/�����)��30�OS�����^vm��O�U��map��\e�'���) Enh���^�'�Bommu/vt-d:� �,DMAR_UNITS_SUPPORTED��� ����U5326� ������~���% ������ ��dow�f�_�from �#r�� ��ou�atoc�R�Z�=, F��:DAP�8�{:�l���Dial���ti����322��;Un�5�� �mi�Fs�57�5��-KRB�7m�t��v���98� O�=SSL�� � ki����m�; ��<���o�gLaye���:)��T������(TLS)�a�ell�a�)-��ng���-pur�e��ypt��phy���-��Z: c� h��A�sc�C��j��+29�� �CSigne�[�����re�� n�a���hp�V���OCSP_NOCHECKS�o3��oOPEN�H_LH_flus� br�h��L�����D47�D���� �18�GAES��B�a�0����me �s�>�P�g ��qa�*�Cy�,�n��n�}��o�mgnutls��FFDHE��8032���q�"��Z3DES�+549����pts�I �1�c���ara�/�t�|�N� ��5508�]m�U���>ECDSA� �5 licit�k�F�� e�Z�#��s_� -g��p�ip256k1�>�[be�r X��19/X448�S6�Conv���X�8p�-on�Sl�_�? �FKAT�88�j�R��keys������on��9193�+�q�&������Y��O�Z�h���K7�[�w��su��]s�qi�5��[IBM�R HW�$T] POWER10��e�0s���5�\�y��[���o ��view]�R-�R�*�78�*DH t� g�*5856�*EC�*7�*�S�+8�+AND�,9�,zero� ��,61�,HKDF�5mit�"�1838�b�P�acy���1 (GnuPG�lGPG��K���&���r� ��ig�hl� na� ��lian���PGP�7S/MIME�*nd�x��� ��gpg���S ��of�n�t st�s l�?�34�@��dbus-brok�@�$������� bu���Tby�WD-Bus�'�. It�*�i�m�D� ��١�i�D$�%l�$��P�a$��or��ű�z�uexcl�jve��te�~��#���Y�n�A���r�/e�k�����J"ent���e��g�f�K���W�ka�S�Ex���~s�$l�_$�12��]n�S#p���$��Dy�X�g���Q�z� ��a���C�����. �nft_s�$e������J1��?�Y'�� �Rd�S_�йy_�e��0��y �z �&R��/mlx5�numb�f��c�{XLT ���q�-227�O�8,�x t�+��ed�Qun�w-�Ye-nex�7p-ob�.�-�G5�n$�)�4��un�l� d MSR�_�: WR��0x199��amazo�t4.32x� �t��n941�X86/p�X�S/UV��S�>� ����UV5 �)��773�+� l�{:���2�sync s�\��soft����blk_mq_�G_��ch_����9.0�z]�13��&��NVMe/��der���o+v������%�vonic��,�nic�^77�Ad����nvme��a�j-� �7�~ �(/tcp�9t�n�#uses����(_to_rq(�)_�)��l(��ue)��69��Im����hb���Y�&929�x� 9/ppc64�hIn��\�-� & "C�_� pe��"�=�a�lscpu�.�d2171�� � *�/��d��+w ���y�~AMX fla�amx_�~8, � bf16) �H82�6��: D�mU���!4�!avf�"194��i40e�"9)�7$���#��!�sdoCont��f����xml�N�/406�|�������������.��X ����#s���� ��u , �R��D� ��N�����O��|� ���fit e��0��o� ���x�In�N�x�����-or�!�K�M����C++, P�K,��Pike,�f� � �.k�RSH��NUPG�+�$�*���E0�䪈fo�|���have��+p�"��a �r �*�v �:��(3.7.6),��;�8)���3�{ou���j,�_pkcs7_��y.�Q509��Q�A] [���"@�u-��r�l�P�258�xA�����K����K5�� -CBC�mg��{�>�3/��:�(*���2���<2�r��1�0) KSB�p�/�P c�[Kasbah����o�%X.�"�����MS���! i�0y���Q. �R1th�_s��$��������9�G����k��� *�/r�K�� ex�G�7�51�� ��1-�q�� &ath� �%�w�,t�; �;������P$�!�`2�1̔�wuth��bypas�!� d�<��n��n���'��R's�;an��s�t�3��l ��19���p��� �����:�_Em������0�60�B�>V��ML���N78�C�z�m��a�[��8� �+��$)�Z�^)������3��1��l� ��� ���* �J�8�4 � r�6eld��43���U���)�P�8:r�Q �?��N#� h/25�"� �(d�T�D�K�gPTRACE_SEIZE�W�3�O��!S�D�CCOMP���059��� ����#�%�%��T14/G2��D�p��+(mt7921e��%56�&��v������~�-lle�{#�U0�Matrox�x a�Mscr��vVGA�z*put� �D�i�120���nee�1o��a wa�L �"e�a#C� DRBG�fa�5;��y�����;���i��x�|w�dog�%����'��.#30��&�734s! [sw�/30:0]�O7��� ��5.16�"�Bad���Q�p�}( qemu-kvm pfn:68a74600�?�,6f��=��E�%s���2M �6s�>879���Vh�-t 2)�9�n��N�lo��% hpilo�����* HPE RL3� Gen�&��ARM��y.�[(��4�� �����pret�I0�a�G�.����/�����es�3s,�F �k ��[e�g��y��l���0ynam��.�6��d���l. �����3!�K'���B�H4ll�C�pi�=�O o�I&wind�K�u���}��-�:7��PyLong_F���7�6���� �d��gv�y �`���9��o�a��#0-��=�plua�> ����Lua���!��V�m+-we�t+�x ���>�Len��� L�w��lso��nt�d�p� ,�-�u1�k�ua��:in�G_��ms��de��.c�;�� un�xro�3r�a�* �)�$�>�30��#�� �-�B�a,acker�) � �vor �Mmin�o�G� 's�y9��3651��� �����]_�*�}nd� �N�+@�-smb2�0_��ry_�i NULL�� �01�h'�*i�d��9��nd_�_�kicbdu�����.b��[6�{swiotlb��t1�H"�\_F�5_DEVICE�?��-�-�?3�rs����i�do�q@�N6��%�$���'-g�:UM�i10����:s��pcm_hw_���i��M�0� ��0)����%�w4�����6��o�8��/�[B�k1�0�ur��y�wb�F0�0 drm�ma�=�,�+���K/��,<s�b�*6��Y�33���pf��_���:3�� ��P9k_h�B3�be_��Ocould��an�����ß67� � ��!1emu�_� n�9 �2�5�[9fa���u�fd�:t�������G�9�nf_�D�o�2�=o��>.�@�!� �T2�g�oD�F� ��6�._sfa_�>>�� 63�`s�&-�@�p���E��!3�din�D&e���n-up���M-��/4� �ka SBDR�N�\3�Ni�]�lGa��Dl�TS�T5�T���a�$��C�)�_DRPW�_�*po�~�0�����to�N�����c!� cho�\021�+�~:�+tBl��A�@J Sp���)�pC�[��$�[�i3�5.�s�&H��^3816, �9900�nBran�T�� C��$u���Z �b��)�L�c�<H�v#Po�!��:r�F��S���P�iȓ63�d.d�L�Jms_usb_st� _x�?i���s/�7�/�!/�)�j283�6 �x�� �XSUNRPC�l@�589��� i�~:�u����c��i�38u32Ę958�Y�5�?��ӣ`���fqnl_m� le���rA/nf��S k�hu��H4��!���"��'=�al�ey �C�M�D�,0�Ds_��LB�R��0�� ��f ENOTDIR��44���~#� �|C�H%s:�Ҥ��j�7c�%�Ti�!@�6), se�w�R� No�>��ed�j� �r��$�5�_��u�R���&8��*hr�n$z��Os��ly�>a� a��8. S�.�γǤoi�st�/�o�U$�1�R���in�q�] ��Y9�5�:�� hol���M���u� mi�� ��ol�v� t�9�n� ��p�c�8�~�}:�<8�H IPv6�3��D��5�17�'�<7Samb�Ln�4-�I��� �AS�4M�0B�H*(SMB��[�8C�(�A�(rn��>S�IF�7�v�PC-�/l�w�;ne����,�~�Z�����C.�6d%s�,��>6.4)���V+4��G���2:�@�w?�s�?�E1�$2742�@$l�Md����-"�m���#!�%��-��'API�/�n�*$��/�'����TDB� �k��4���(2.5.2�� � �AD� �� u��� +����� add�����.���0!�}�F������#��,�-qua�F5�.�on�DWg�F4�Ъ����-�%�$�a �[� s�W�[re���di�7u�glyph��0ff�4����W�]U�"sf�O�B _�NB�4�L.�>Se��iviol� a FNT_S��_R��H5�Ht�HT�B�O�G�=����4%��3.9�.�],��I24�|� %�)'�O�/4���@!���X2a�z�se� ��1�A15��GD�^��X� 3���z�;/http/�.��G����c�&��(��1��"�>O e2fs��� G2a�7�afo�5/��=, �(7� �=� �@�]�g�z� 2,�3���:�� ���O��/������[��Q13��:;�>MfBuzz���o�+��n,�i����h�Rb�R��Y�O�Rh�4�Uhape-f��%.c�7�M�A�D�HH�5��c�~P�C(DHCP�Y2�X� ��~ �D0�n �M�Gto ge��i� w�Nc�t�j��Ka�.���i��k��a br�c��'�dh�V:� ���{g��@ISC �� �K�9 ��Dt�'�hdm�s���.��������5NS�ow�B�-�ch��iso�D��e1�220�A}ogro�*�us���b�"��r��Ylo�by��ii�u�a��H�^�9�/�Fmo�d=�n�� i�� � &��:� ���u�-��W��*��;�B��tirpc�h�k&Sun�DZ's�S�3-i��p������d�5���3I-�a�)�Z=�F�\ �7���� ��e�6-��� ���������:�}��lot��7��5��4682�Az�,8R�_��(�)���7 �)B�'�� 7���<�%/��&���`�AZf� �"��# �Pho�42�C"�P�oF��os��Pauth�&c�#�e�0�[��^�乍y�l�Eby e�a0nat��n�-����"�!�;�8d�B!�e�LN�����L�=�<�=��to����c�G�m�ahel��'�n�cr��r�s�"�#��Pd�� ib�$�4Le�*KDC��Akrb5� ���+ i�- AC�v��h4�t38�f�esud��4� H/��?�1s��Do����@�F� ���2��X���&�t�� �iGs�r�N$�Z�u����<�.i�ut��]�4+g��as�g����rs�T�ho���t,�+RunA�;��,3-2�&-�X1c��"POST�PUT�|�*�j2221��U�2�E:��9 ��)�&1�{k�~��*�,�U�!��Fa�" X88179_�beA��wUSB e�K�� .�V64�Vi91����KGP�bILB ��Zï�]9���_ ��13ï�\ �'�0�M�,�S�"�3�=g�X�� �X3�I9ò2�{ un�1��l�A���U��?smt_���n/30��K�Y��=�f-�H��v�hN�\M�iN�2<�|3�%2<5�8H�N-�O�Z���g�lt�7t�"ly�t5EMC��8st�~NDU�0�d3�3��i�@N�/�@=9�)��"�w-WARNIN�=�=�b6 PI��/3440�P�Y1/x�Qmm/��:.c:��a��_ha�Ycr_f���+0x3f/0x50�f458�2�v4:���l9�� of�4����X_��>�Y4_�3i�kg�)�&or�$��i61���|/�p���z�'+th�{R�dysf�g�`.�*�"-EINVAL�J9�S69��DE�l4�:�_'i��@�?�1�m�5R�Herc12.�J9��U*��4Jl�+P���?mon�j�!6�}4�^�E��R�-���Ybio�/e�e401�5P��a�q-�\<"Dummy��i��P��ar�/t�%4���� �M2�.8�SQ��8��e��o�z�7R����e's�]�c�alef��0z��?�*]�Z397�;0fa��K��S�{in �4e�g�s2t� -t �gof�n��g���%��5AMdCLIENT:�?�z`l�#�H^ "no�:�"�̪�mp��1�8�\52��8Az�0 :�=)I��-v�:��ECI_�5MA�@MEMORY�me�%VM�e�~�S5�]0�S z�}bam:�H��imes�?��eploy�n�Up��qg�\e� l� ed� �+�� � ��s16�#���TT��- O��� @760�^���B�s�id��g����E�i�l�>7) D V!-Bus is a system for sending messages between applications. It�9used both�:the�I-wide�B b�fservice, and a�sper-us�login-s�,�Z�4��facility. Secur� Fix(es): * d�W:�-daem�;crash��wh��receiv�� wi��incor�tly ne��d parent�8es���k�brackets (CVE-2022-42010)�zan�)���y�@�varray leng��nsi�|nt�elem�type�p1�p`_�_marshal_byteswap` doesn't proc�v fds�dł"��eign" ��ann�)��u2) F��m�3 detail�bout�殐issue(s),��lu�:� impact,��CVSS sc�G� cknowledg��s� o�/r��la��in��m�f,�fe�Wo�R����g�m l�<�,�R�&ences���:. T����ck��v��n��������� man�-r��Linux,�8��tibl�E�uSysV�7LSB��it��ript���v��4ggr��ve�halle��m�0pab��ie�u�{so�p�RD��a��v� ��tart�`���7of��s on-dem�æ#of ���ekeeps t�Ԣ�)e�â.�� cgroup����ddi����upport��napshot�c�Wr�Cor�q���t��m�n�rs�Iun��auto� poi��1��� � bor�B��ns� onal��p����y-ba�}����rol �Mc����also work�sdrop-i�plac�r�Yysv���j�/:���p overrun���_ti�lpan() fun���Q3821�PEx��.C�.�ry�<p���XML�cu���Ie�E:��-aft�dree���Iy�Ye�}d�Xru�I�Z��h��TD���m_Ex�A�Ent�gP��erC�>t�C3680���sxml2�{��develop�<oolbox�z���W�H�Jvario�^����ndard���u: ��e����flow�U��PARSE_HUGE�w0303)�Adict�pup���e��� �� cycles�M4��SQLite�Cth�W��(�ta�� �3ine. A large�bs�&�ȡ&92�N�ed�%�lete�A�!tor���H�le��sk fil�Z�^API�(�v�#�*���Tveni���e�M�x���i� ��link����t�����enjo��e��w�<�Jflexi� y����[��adm�strat�Ehass��5����f�_��er��ql��:�z� -b�ds�� if ��l��of �n a�{���Jtr�|rg���ڪK�5737�b�� �L �� B�(Bourn���� �ll��which�U�Udefault��^Alma�x���p:��heap-�{-�n��lid_��me� _�+���}715�|A�,�[ Ab��USy��x No��On�ASN.1,�specifi�l�dX.� ITU-T �ommend�:)�����ures����D���&ui��E���/Ru�DER�yp��l90) e�"�=de��- � �tasn1: Out-of���}���4ETYPE_OK��1-46848��KSBA (��n��c�+Kasbah)�?�o��k��509 ce� f����ja�CMS�i�� �<���s ����B���6���buil�"bl��S/MIME�TLS��k���G���e� �7�ia�7629�;grub2�<ve�l��2�> Gr��Un��Boot Load�z(GRUB)��high���figura�Ǣ5cus�Y iz�b�:l�:� modu�A��ch�������O�b�# e�ke���� �'�2� s�u���V�Mh�X wa�����: B�\ ���_f�� _�1�_glyph�g �Ylead��o�wr�x��po��#�bypas�[ 260�d��H�l�yed�Vs�W�\�V�_�p��uni��sequ���7�O�vSSL�{�hki��� �<����s Lay���:)�!��c��(�;)�tocol���a�%ll-���?gene�I-pur��e�uyptography��ko���? : r�:b�r�H����&���Q���tt�d�JRSA De���:� ����Idou����&c�8�\PEM_��_bio_ex�D450�D�c-�Gfol��CBIO_new_NDEF�@3-�85�@in�_ �e�� ��d2i_PKCS7���M6�MNULL�B�\a�D�(p��ic�my�E7�EX.400��S�.�u�D��G� N� �L8Ւdu�Ԥ��F���J4�2�� Bug�HMAC�[��s� l��je�b ���s < 112� t� r��a��d�,��xFIPS�ue�Z#214����I�,���n��a �� mum�1�-�����PBKDF2�X��stun��,um���) a�l��me��y��p���TCP�5n�����a�����h�f �p8�ɭ8SHAKE��diges�p�-OAEP�>�g10�g�SS�VP�La�g ���5�a���p��siz���h�� ���,ٙ2�� �Ua�I�79.31��d��m5�o-224,�38�512��P�56����es��� �YDRBGsЙ�� 5-16��7ު�áQ���欘�h�v9���e�^2048�_��EVP��EY_� ��u�w��517����9.1 N��\[0912] - �6or:��� 93:�it��en��e routi�::��n� ����gi�Flon����P� ��bmca�7�� ��l�oca.so.4 (��3.���9�m��Hche��um�need�3pd��6584� ���*�O�o�c�a�!,����y�op�{ng�_���E���Pl2���(��m�J_sdu�2��net/blueto�U/�'��.c� 56��gs���% do_p�B_d�vec���skip_spa�4378�QŹ�Q__nfs42_ssc_����fs/n�4�c���Co��mo��D��D��� �~9�~Net�N���vul���1ft�by�J �)py_vla�1�[��7�Qi2c-�t�iv���287���W� 9.0: LTP T����+��8 a�k14 �S�hir�dapi�FPl���8280+�|3308��d1 ��� NMI watchdog's��� �� LPM����5�FMDSERVER�F:�:dp������1�*�&������K� oa�$127�Rqla2xx�VMe-FC: WARNING: CPU: 0 PID: 124072��xs/scsi/�=�_�c:70�S_�ɹ�ne_�tn��+0x25/0x30 [�#]���X��Re�on: K�n���L��vo T4�+�cAH40 USB-C��k����V327�Sc�� r U�+a��l�2)�.79�E�4, Nx_Gzip: n��ot�� c������decr�I ��y�š�un�(�ur���7b��lpa� �D�. (FW10�/ DL����� �MSFT, MANA��ET P�G��-9:�� race�.��"CQ�:�n��_ip�W�Rfix�b5�0��z�vPCI�W������ �Vi-MSI�B459�BÕVM�ploy�# F�gs��R��~�F93���'��' �{�5w�o�Zim��3#K�bs390x g�L881���.�R���H�3sync�Wup��am v6.0�K6134�1CEE�phf�#�'��i���?���ORIP�I��:n��s_��q_un��ef�8��]�p41����6�:��Ц2535�py�3��$tup�"s��a co�"�g��en�� s�P�B��Xbu�t�&" a��t����7�^�N��Np���:��*���� d(ReDoS��`_i�!x.p�L$089��G�� �7�t�% �ac��!b�^-or��e� g���3gu�p���e�#�'�Il� �ex���,�y��l�� dynam�J����d���l.���#��f� t�0�q �#�X�C�8�$�9o�/ w���O�}����7�#via �f�V��IDNA��o���8506�4#�C�&����� k�� e�V�&-��dump�1 re���/fs.su�6���� ��4���xd�{ ���f��a����a l�9����%5���%ua���� ��ua���"���V�-we�� �V�>e���Lua��Yfr�t���d�#,��%-a�7�k��ua�����|s� nd�d&Es�;��1�,9�4�<�1�_��um��ldo.c�Sa �H�?f�w���l�d35���7Vi�"Vi IM�0ed��n�j d��� ��vi � o��$vim:�����$�5ret�#�qu�}XCh�eGC(�{��702�k'��GNU tar�f�save�K p�ai�"in�~�v��O�fro��!�z�j:�$�V���C_he����¹���g!�y���t�8�O)� !nut� �5�3���"Gnu�%���J�� i�^gor�ms��p�\�ch�&��,����D��"����s��-ch�D1l���(�Y���a�4�+3�� ��CCM��g��kb�,mi�L�f���s�9�3� ���j�5�)*� ac��cmdl�[�q]: E����� � i��z�Y���le ��s�1elf�� i��r�;0�cC�2��vo���v �qun_�_�&�#�!�ALSA: pc�rMo�:rwsem �! s� n�4tl_��4� ��<v�� UA� 6����u�Bsoft�Tup��TC�r���-to-��� a��26�/�P9�- zfc�+�\mi��� �Bs�n�Mus�t�6t�!��278�&1���} _v2�_e�U7e�O�3"� /��er��s��#��pu�1 f�y�s sk�Sa�Ius�r�� o�쵠�37� ���%�dd����%�Qi�^�x���_-rt�bug:�]�&circ���R���� ��u��(&n->��_�%->&p->����wai��860�C��S� ��.s�_�@bal����!��3��� di�_� �}+�1��!�/k�@)��� �]��'�*#��k� �K�+�1gpio���D8se��t��� I��h�R/�*� �E5���9 ��orvs���'swiotlb ���$ �in��fiden�L��`7���>E�((�IBM �] FEAT�b��EQETH�g���n�� ���e.�'�l��6�%��l�_ SPR�AMX: I��n�f�%�D���O8�5��c�V:�������+���1�y��d�D�F�5� ��0�D�����HTTP, F��eLDAP� �}:�0�{� ������239�&� �]�FUSE�����A-pr��<l�d���K�s esca���h 8�{��Fi��_id���Eagle��/�3����~�?����>�pped�robu�7��,x�Y� pth�)m��()�_�`) Samb�n�#-s�3c�P�7���N�!Me�>B�= (SMB� +��aC��A�n�2F�l S�-(CIF�I+�$ �j PC-�Dmach�m#����u,�]�Z���P�������?C4/�M(-MD5�k!Log���1��6 �dak�b�3� ��� �2��UG�[#��#��(���$�_�C�)�$4289��-ul�| �r�n��ULP�T�,4���" �TD���y�j�l�Gecu��beyond��con���( �Anch�Z1��/34�[�p c���.�,F�,PUT_VSCREE� FO ��tl�z�@% OOB��/�/*�Z3365� �M �������!tty�_��s�A146� �F�,�d-kvm_mmu_�-pc�gva�F78� �~� p�| _���-1�`�/1�>�=�W88��nV���:IBPB��9�O�� � �1S�vr���"��y11�G�%:�m%���"_��C�+�/���D� �D�xfrm�&be_� s×����/���n0�Io��%��Wib_nh_m�I!��� ipv4/�!s�tic��34��Ȩhu� l�Yo_�R� mm/��'2�����>�{6_re��/o�<��5�� ���s���-3�����_af�;���'�P�� ��opt�K� �K�I�G�{�/�Nű�(cv_acl�L�P��(6�*� ����0�Q_pt��Sgup.c�+�uso�k�e�uy�\2�X�]��~��8v�<re�&�:��:_�f�Q��B%�7�2brcmf��<���fla�_���+��A�x�UD��?spl��2MB_gtt_����I� gvt_dma�p_���n��f70�pt�� ���>�8ra�Gal�'is��$�Y�|+�l2tp��E ��o����:_�i� ό�d�gigm��i�Y��_mc_�]�y� �x�o�,��i� � 2-�qG����� �6�� IMA�,15��usb_8�~_�~_xm�2������/�&��*� 2��Jn��I��:-nd���ro��>����T/KB��X�4���374�Hn�&m�n��_r� ���gm� ��^VM_PFNMAP �/s��� �(�oB�91�¢flush�5 �:mis�I� �7K�nV�_P�MPTED�m�{�o���M����t�8���vl��dfg8�<1_��_n��0 � ���416�**�f� to��� on_vma�re���G270���]ss_����(wirel�/�1�� 72�"B�9��� ��C���j��_�(�[���^&�beaco��)��n�� P2P-�P:�H�Ģ���/ �n-�r�47� �tr��c���!�C�j �H��*9�Hraw�Rp��_�p�f�@�39����9q�_g�6�D�290�G�!0��7hostn�/7i�t/�=s���q�3-119�{���Tc���e�63�Q �A�$���@s:�Ҥ��j��c�%�Ti�E l�BE, se��.R���Aes �Aed�Z� R�-�"����at� �C�*�;�%t�; �;��(�)�&�!��=͔:�A�J$�����J�/�C/shm�sym�`F��119�51�\� �I�1�Y��cha�+��i�xok�]-�P�, 5�L�QU�C�a-gge�b���!��x�>n��J� n�35�P�>�fw�R ��J����e&�aT�N�B� �Q�Nfirm��`�n:�� ad�>)�<��/etc/�&/� f�k .c���[��5�Z�0�53r�~Tty�����B3�21�-@ 2�-@ �AnD��/Ho�9C��E�~P�(DHCP�H�����"�u�����IP�� ��e��i�twn�c�t�j��K�V���������a���cas�~�gFdhcp����y ��-ISC �����*i�q��en��F�N��.�����h�o��@c�@� ����R+ry�i�p�;��Dd���Z�29��b�����(�"�{@��s����E�Ih��*b�[u�!�(a� r�6�J,:� (4.17.5)�#3199��� ���&�'_rnd�Yan����g�a2�9ct����Jom�'���"5�<�IU��& C��L Cip���+NID_un�:%�����~��rI�358�@����7/p��2���?(��Esev���f�St ���K�����/,�1io�eISO 9660 CD-ROM���.���i�`no����bsd�0�,���m2��a�3b�J �v�,.��;��pop�U(�3k�C"����7� �R�L��$_��� '�9��Aberos�I��T+he���������i�(�s�qy��Sy e�/nat�~� p��� �U�5�J� �/�Ji�vP���ҩ�r8� �?s���p����ea�����T:�Wp�{" �*��t�U%�(�"�#��0�w>ce��(KDC)�7�krb5 (1.20.1�0163�b�[���8�� a���FR����� S4U2P��V0-�x*4�=��/��/9�5���� �_/�C� H� � � � �BL� �FHb��f�Z?UNIX������m'��h��e��0����nec�L�����i�!���D��� h:�=�WS� � ��n��$(����_�B()�'���J��3�O13�-c�F�;� ��d�p������7�-7�-ar��b�� �a�Hh��\s DNS��om���U�i) �s����s ��Vol��k�a�v�~�H-��a UDP ��M��F�~3206���F�� ��%rl�T.�ae�� J�n�D���43�^�KP�-�kB�$l���&c�� �6�{_r��6�[[�$�� x��u��~u�_�gv�GZy�nX�Zpo� �_��/�\I�#�\�A�i�f�a��sil�� �o�<�a5�aC�Y�8�@B�;F� �?�I[I��V� -�0-AES-XTS� �64�xV ARM�Y12�_/�$�4��W�W�4�2on�c�{�N�a�>��@�9586����W� �y�eXor�dX� RX�i4�i�@�L ��G�@o �J�Z�n�6IV�Ss�l\�N�V�C��d�� ����/���I?s�a?-��9��z��@`��`��`��_�lg�C��l�!+fip�(�F_�F�f�s�_$��X�B���� � �e���Z (��+?�M��@VE)� ��o)9���Y�� �o()���DHX�,�r3�v��^&�r�FEC��__�O0�(��R���__�"�r�gLe_�+��� ��pairwi�o�=uc�-4� ������r�Z�L��DH�T���O�galway�Z���^l��lb�=2�A�b��;pkcs5 ��j�}�>�B1��1�B�b>��GEM�B�D�&,�W�V>�=it�ci�ǥP�4�����q/_�'�j�t�>��s�m���as�5�d�P%�x9�>��d �>�7re���[i�&7��[���_�= CIPHERS�bA��H���9�,396�r�[�Z���� _�YA_��c�D��{�WP�VD�H@E�IC�2�e4�FC�[5�.n�����]p�FWb��4�m �/1� <6�* 23�.K���2��n�~��zed�� �qV�j��0�$���5�k�'��rFS� �-�H1�5�H�[� "� �gi�:6�_sl��_�)_xf�I�N9�N�H� 8o_�+g�I5������2�y8� �% �qAQ�lA��=- (���D�g=768�RPL-P IOTG/� S� :�D��c���85� �a�g�����:��to�-R�*�kPT�l���'�!��172�j��BUG�iwlmvm��fi�0�Q��"h��F67�6�bC 9�yqck��.�G��9�m/7a0a36�f2fd6�wa54a��f�hc8�Ae9b [��9��9Fix�Q�l0un��He�}re�kvmc�1Y� �t1blk� nvme/047��a���E����S��l��7O�hif��a�r�+��es��r��&�7�y�3l�� J2 h� s�`70����[�F]: t�& ��Ri�颲:1778��e�M�\�Q�e��o�$��� <�pE�� �*5���9�7e�U=��E�J�5934���2.��w�8:�los��@&�occ�ձ��:�wcach�h9234�wd�zwdt�^�67��, Munexpectedly (BZ#2192585) * ice: high CPU usage with GNSS or ptp4l�5203154�5AlmaLinux 9 "smpboot: Scheduler frequency invarianc�Vent wobbly, disabling!" on nohz_full��s aft�Elong run�}78�}Dyi�percpu kworkers cause issues�Risola��Q[a��l��-9]�P229�PFJ9.2 Bug: [REG] NFS��finite��op of COMMIT�g��and�$4ERR_DELAY reply.�Y33�^��f erro��- "ev�syntax�: 'unc_p_delayed_c_st��_abort_core5'" b'_ value too big for�mat, maximum�� 255'��7471�: Inv�d charac�fdet� by rpmins�,�� Documen��ion/transl�s/zh_CN/process/magic-number.rst��8242��cifs: backp�� sm�Cpat�0s�� br��u��lose�9.1�0�1commit aea02fc40a7f�Tfix wro�>nlock bef�4��turn��om�)_tree�Onn�ܥ�904����x86_64, kdump 2��^nel���r��om�Gpanic�g"kvm-08-g�wt25.hv2"�_10614) The "l�'" utility��a text��le��ows��that��sembl�"m��", bu��ll�# us�� move�wards��t�f�Mas�k��s�!�. Si����do�]no�kad�8��ire�Fput�E��tartup, i�so�s �� quick���n�(dinary��edit��. Secur��Fix(es): �m��: cr��d data�Tn��ul�w�� -R"������� ANSI escape s�a��s�S��ơ(m���CVE-2022-46663) F�0����ail��bout�5s���=(s), �-lud�t� imp�+,��CV�s��� cknowledg�$s,�o�/r���{�D���3,�f�㤩���Cg�m lis�,�R�&��c�:. Samba�5�kpen-sourc��le����AServ�iM�E��B�(SMB) ��toco��+��C�a�AInt��t��l�Hy��m�LIFS�;, which�� PC-��p��b�1machin��s�b���p��t���%�ou����-s���\MB2�0cke��ign��i��e�Dc��when����$= ���d"�0set�3-3347� ��1�otrus���hip�twee�Gis �5s�5� ��m����ai�:ail�y��23600) Libe�Cf��7�flex���H�igura�libr�o��rs�!man��key=���2���/. I�s� snippets��dif�t� r�ories�ibuilds��f��K�Bit����:�ck-base�X�r ov���in��_�Q()��7/get��>t�.c�x22652��h��xml2��d��lop���lbox�=vi»��XML�knd����u: NULL�nr������ ma�1upCo�jxTy�4�848�� �IHash��o� mpty�Mc��ys��n't�* �`�i��946�I ��python-�s�`�p����a� ����de�aed�ake HTTP �9easy� �e��t: Uni�2d�\leak��Proxy-Au�)riz�4h�r����2681�����{s�9e�1�}������] �vow�a���R����G ��s��s� ��, F��eLDAP���}�ZDN�$dc�� m���y�³$Im�fp�C�� fica�[ V����32��V��POST-�-PUT�����6�R�o���|�3��!,����!any��d����s� ���E: ipvlan: �%-of-�-nds�T ��U�u�(ea�W kb->cb�v�G )�Ocls_�er�S�[l_� _gen�_opt�5�P5788�QKVM:� /mmu: ���e��N�_�f_fa�E�N�58��N��u� �B po� �Cdo_prli�t���:/�P��0�[�YS�:��v2� T m��g��cbl�L�<199�<�O�SSH�� �a��sup���La �,����, UNIX��s�vlar��� � e�� ����������bo���!��cli��_���^ ssh:��mot�bd�x�*�m�-ag�MPKCS#11����840��D-Bu������Zsen��m�^s�Xappl����d���:���I-w���B�O�urv���a�sp����-logi���,���4��ac����d�W:�-dae��:�X�P����ure�4a ����c������=��dri�^��{b��l�ed�49� subscrip�-� r��grams���� �u�#�� �U�4y��Bos���;�o�e�t�R p����5ɷ: �d�e �ya�J of�b.�k.RHSM1 � � f�t��Oal��y�\� 9� �!��in��!UP�!�����p�*��r����p p��I���(throu���-Get-��Y����dm�t����P���������l 64���It����h�w����� BIO�Ext�/�Firm�7�D�0(EFI),�Xp�4o�����?/DMI��.�is�stypi�ny�t���}��uf���r,����nam�zse�nl�^,�����g�Z�tag,�(��� ɰ�p�n���s�;-b��o�%� a�9�x�?63��_f�����$� ����$ ��Aic�N��e��hw��md: Cross-P��'L�'�40593�4�Vfo����Yha�y�� up���� ��r �yt�m�t:��(5.14.0)� �UAF��nf�>s� � �0�kup_glob�G�gg�y �0h�bl��� d��nonym�Es�0�Xb���3��n�t�7nf_���o�;�Hin��a�� � c��a�� �h�jNFT_MSG_NEWRULE�x61�x/s�K�Jw�pon���(b�ploit��s �8�c�� ��cf_c��in�A f�� 776�����nf�7���i��e� re���i��pipapo_���j4004� \_newrul�d�]a �� �BA_�<_CHAIN_ID�\�Ű�y1���y���3�īݶibyid�1248�O�"��-�a�Ybyte�)er_e�4��001�Vs�e/r�����MSRs���S3�� s��*���Q163���&��bypass�`��d������e�S�a� �� �Q110��g[�6 9.3 BU�5"[SPR][EM�FHF] ACPI:�1����w�5up�+ 802��[D��"�TM��!�!���j"��WD19TBS��S��wi�'VGA/DVI���-C��ng�s�j���rtmu��H�M�B��i�bwok�����)ue��in �"�3_adj�a_p��1���*21�� AWS ARM�gs�+�D�Mic��hif��2���s3��!.x�adat�� SEV-SNP �|!��>��L��U# ��u��� ne��� b�)��blk��ush_�m��562�<bpf_ji��$� ��g�-�dpy_�6��7�1�;69�o"��ep�c�j�cmsgr2��"fram� ����ng��� ck�707�Tem�����D�i���FIP�$teg�S�U��ould�=zeroiz�6�7%�]76��I�\���avf�g�ơeJu��Ӧ1815��i40e/� ]��$C�!�m�AMAC/�mi�41e:b7:e2:02:b1:aa/0��ifn��X4f0 ��0��� t��il�ava�:ble����lv� ve�--sp�rca�I,� �� �s ��hu��H48����%: ���5 �`un� PMU�s3017��NVIDIA�G�: Ba��$i2c: ���� ��$�� d�#�fw��S483�S�nPEC���%MBUS�� ��X�*[Hy�kV][�i]in��le�6fc_���m��in �vsc�,s�{ ��O�Aim��&���K3�&��K�" �A o��CONFIG_CRYPTO_STATS���@(e�����$is�0h�j(��185�,�ק�Ex� �Shv_�������b�wsrb�'�E SRB��US_INTERNAL_�(OR (0x�� �{9�N �z-�}'WARNING�'���&al�)d�'!�A�H��drm/as�b �� ��)���t6.4�M3��Lenov�a'��] �&��&��M#echo c > ��'� rq-�x".�\70�h�f)bz20��69�/��/��ral�;(reg-suit� �)aarch� (�s[pid]/w�� �)'��d392�eE����(�FEAT] �,*�*��_p���n�<HWP IO ��*s�3��,�l��7����Y- New MB�,AMP�*� C�~��Maya���}+a��o�d)�X896�X���ZMDRA�� - U��������k �G�e ���� Add����5��-�+����1����#�r'��w�"�4���IX.1��t er�� 6)�[a��15 �M�ie� �!�&�����Ov�k#_�_��dup�G260�3�>Me�o y�� ��p�!�#c�t�E� 6� �g� ����p C�(�/�ʬ��%��;),�Am���%m)�ڢi���� �s� (nscd)�y m�ip�,�Ho��� With��se�q����c����� l�$�):��%ld.��*�a��o�v�ge�*l��i91�0�QS�$ �H�Ug�Qddr��no-a� ���K527�Kp�i ���u��P�r806�Baih_i��@��P�[$����pre�3,��v��obj�1-�zn�Q��m��l��u�p�*���u��*cl�T�ex���Q ,�y�Y1l�% dy�ic��,� ����ng. ����|�?y��ll�C����.�Aw����W�%: TLS�M��ke��0217�&c�h%a�&p��*��SOCKS5�pxy���q85��Sc��i�j����n�u��8�X���nghttp2�������,��0T� �pP��"�� 2 (��/2�_/�{C���,������web�?�vul�3� t�dDDoS�1�_(Rap�LRes�L���448���#C ����s�u����s���.���� mar�F�3�Tf�%��.�M3��Bcrypt�ph��3�4�z���$i�I�<uth�Cc��ma��ԢI��7igita�d�E+a�W���$��7��Q4�� kcs�]rdos_�_�*� rc_���� 97�0Ad�(�G�m s:�Ҥ��j�ߤ%�Ti�;le�F�7��R� No�m�Wked���b�;t�G�Ua c�L�]of�)�q��Zma��0���(� ��in�K���0��� 'ar,�, g��f,�� , nm�������an�T��a�Lf,��z��.�p���m 2lin�] ��� �/�l)_bfd_�t_ge��ymbol���[_�������)����)2��:�>��r��:�;.ac�4��rol�2so�e��(R) PROS�?Wi��)WiFi�+276�;�A\ 40964�\�,��me��ism��a 63�<ʾ�9v�R/in�] 3�1�]�2R�D;A��.Pre�3���{�"����;���v056�H� 807� ���'� ��n2�#�����=��dAc�C�*.�/�!��@/�@.�/3424�o4�m�6�x�o?�~�*C��"6ty'�PyCA'��I�� �������i����Ci��b�v��6�|:����via���2�� �l2393�Be��A-� 'C��%�Goo�>!�Q�B�y���[:�c�(9������=_�' _me�3��8468�<�G����%��2�9>�?�4��s��2��6te�C� �]� ���-GNOME���s?�kF��y�n �#g���������<�0c��ms� @�,���#: GVa�G�af�$-�e� �t��*�\�"��i�'����&�=9�� �Wg_v�X�'swa���(t��4&��ime��� n�9�Y � �)26�i��de�-� ����Dm� �E'�'�[��Y6�AK�7(-���-����#�M�n �zword�[��(���,��X�4�Tuser�|g�+2p�� oun�:�º�E�1"�� �yl�Z��'�d(1)�Q�Y46�B* c-ar����@f�Fa�eKch�J�sDN�D��DN��) �.�4��re�@Lv�{API.�6 /��(1.1�#)�A#103�!���3���2%_s�q ��()�+mis�y�?�K(�^90� �aB�aUnd�2in ��_��� ��)�311�2�D��)�Fic�p;�0Kn��J�#�f�����IDs�Q�&�Q��oToo�.���CARES_RANDOM_FI�T/���R*�)mpi�F�\� �:��|�=��I�,��� � >�( ��0� to�.�=�^<�)���m� re�~H��palg�2hm�G,�6�/166���Z�8:�i�}i�n_�T_��� 28�Q!�}z��!�4���3.9 (�.18�7����: �1P��K�Ky�65�c�E�07�$5�*=�$ g��R���?GNU M�r"��&arbit� p���� a�e��s,�����s��C���};�ff�#�����o���)���H��4l�0� �B�OR�C�s1-4�^7�=A�ӎR�4@s�,(4�:.6�<1�x1�i�s��Ro�<I�I*in��� AUTH�1AP���z5��@i��Xi�dssvc RP�I#�+��s�*li�%�'��D6�K���n�wK�L �#�� -s�u���0;�;�E�=��D�)G��d��g�(�[ea�4��n�� ��0��6�753�դCTELNET�q4IAC � )�43�4SF��P��~��%���9a�E1�:4�:�J����re��st�}3�=�A�tpm2-ts� �%�5�=3��T�WW�bPl�H�;�� (TPM) 2.0�A��7�5��D�C�2(�����K�J�*#�����"3�TSS2_RC_D�F�74�=�pi�5�M�k������st�7%��Koft�`%�M�,.�@6n��4f��'�VP��I�x� PI�r��r����8acr�C �%�P��3��ei��"P�5I��s�Xs�a��z"���y n���(new ����rout�<�p�`�L_-�@D�dB���hod��8�kc�Jb�e���r��o�]9�_m�2� ������u-�����fo����ic���xI��c��*�T,�'ut��0��E��8�j�� �Z�8to�>�x��:�R@a�N���;��-��va�/m� �!�z��e�`�9�E6�<��]>�qos�n�R�0�/��K��i�(v�~�s��y���Eby e�Bn� �~n�-���}c�hI�4S�6s��/�Jin une�$0��orm�"�tP�s���V�w��e�each�ֻ��ahel�fa�`�hi�p� 1y�} �#��� ��bu�ce�D(KDC��Irb5: Den�^8����O�d'��un���}B��� 60�`h�Pdou�=�'�� TGS�8 c�3997�A��l�LQ���a �"����T�R��#�wp�P��,�XZ�,�G�g�L �n�Vt�[,�T��F��Ovm��?��,�F��!��pwdx����:�s�A�H4��>�<GAvahi�.�V � S�4Di�0v�\� �#7c��B�#��#�;^i��$Z��.�{UN�Qi�n�@�&Xat���dd�do���Q�. ���~� -aw� ��%�m����I��u������mnd,�R9���,�� �peo�8to��� ���n�����<��[�Y�P���1a�����3-���l-�6Yy-�8������%l�T/�6/�C�bY/so�g�P1��SH�ir�� �Y�L�_�6os�g �!_�Z�,Ms�uj�D�&�do ��HEly-�˺�?�>s5�D��®�K �=shed� D��W�198�=� ���jsmbd�� �}4to�& x�i�N�C�@�Q�Qoo�f96�)�3k�6 �u�Jt�5� d-on��n�[ �b]��?9�R"rpc�H" ��g�!��d� �Uslee�)�76�T4D �� �h�z)�'[c�S@l�k�l� � ��v��X����5�~���A���<o�IPIN�L(�� �Dk�_ks��P��w�]Z����6�>N�T�MK�{����#B-� (en��<l��)�T1�To�� MyE�N�4N�l������?�7r�k�^�]53���ahL�=�Gki��a�)S�L � ��� L�;(�:)�������8(�I����(a �5{-�s"��-�]Q-purp�Jy��8���gDs�=�X��8�2���IV�H.�J�53�iwT���HM��f(R�����Z5��-�����7����P�f ���,� � v�8,� �/� ��d�&����{�� OCTOU�)mi�� �BX��u�^f�Bm� �%9�1\�A�:�3��wn/ch�/�Q���\����U8�Uш����/p��o��%�e m�v@��1��u�a�|s�:��3�R� �;���ks�G��o�T"p��ע��f N�POST abilities. Security Fix(es): * python-urllib3: Cookie request header isn't stripped d�Gng cross-origin�1directs (CVE-2023-43804)�e�^R�Wbody no�Saft�h�E from 303� atus changes��me��d to GET�r5803) For more details� out the s�issue(s), includ�Ӣ impact, a CVSS sc�G� cknowledgments�nd o�/��lat��information,�f����R�� pag�m lis�,�R�&enc��s���:. SQLite���� �9rary�-at��le��� �( database en��e. A larg��ubset of�&92�Nsuppor�}�%co�Kte�A�!tor��a s�l�isk fil�ZT��API�(design�*f�iconveni�ƫe�M�xus��pplic�s��link again�ɥ�c��enjo��e pow�<�Jflexi��y�Q��wi���admini�Q�kve hassl�V�5����a�fpara�server�"sql��:�p-buf��-o�/flow ��sess��fuzz�71���P���n�'��pre�3,�ac�g, obj�1�en�Qprogramm��l��u�p, which��dmodu��, cl���excep�%, �^y high level dynamic�� type��d���l. ����s��fa�ԩ many sy��m�nll�C�^i��as well��.v�ous�bndow�̤;�K: Pars�.error�� em��/_p��Pdr.py��a��or��value�. �(�Z �5��tup���a2704���Qgrub2 p�ua���>vide��W 2���'Gr��Unifi�TBo�>Lo�(GRUB)�Ʋ3ly�figurabl�cu��miz�b�:l�:�@��a�prch��ctur�����S�b�e�kern��� �'�%�%,�`u���V�Mhardwa��vic���: bypass��� � wor�k�X�'fea�`�001� nutl��!�NU T�s��Lay�h�I(GnuTLS�g�C��Ecrypt�ph�Halgor�m��]ocol���6�SSL, �R��D� ����: ti�s��-���0��SA-PSK au� nt�$�598���K�+�fix�z�+�:4-0553�:re���e�f�je�T ���d�7ibu��tru��J67�FNet�/k�S��i�"(NS� �k �. ����s� �a� p������elop���m�c-en�nd��i����j a� �@ns��vulne����Min�?a�L�"�Tk�?6135� sudo���ta�1�ut� ����ows� � �to�=� �Fusers��Qpermis�y�,ex� te priv��g��omm��s,�o�X�C� �^� ���purpo��� hav�]o�g��a����Bug��REn��c�H(��8487� : S�do��T escape�'rol��� ��in�0re���utp���S6�S ��m����N42465�NT���C��u�� �,Reg���St�� V�|��s��OpenSC��/��� �������i��sm�G c�ws.�Tfocuse�"n� ��B�oper���z���ir���q��, �� �ТI��#d�/tal �Z����������s�z�j�=�k �c PKCS#1�.d���M92�lugg�A�4M�O (PAM)��a����Aup�lpo��A�Ine����o�i���@h���V �H. � �� *��m: Im�Ep��Host�e I�S ��in�(_acc�L� �oA�C�zB� �1096��� ���P��Linux�!,����y����o �����K�]pf:� ��runn�@���k������w41009)�IUSB:��ia�mos7840:� crash�h�Wume�F2244�Fcxl/����\-�-fre���t�-of-�er��co�shut�n�_50226�tu� �� �� ��%����s �U�*�x�1lect�Mro��� )�x: `sc�pt_��`����`�}�-��j��arbit��,s�Td�� ��2336)�si�5san��z�*��`�>�_�K` ��me�J�/� cre��()`�7�p7�)<net/smc��il�# ��rmb_d�2 �u���SMC-D��n�dump�26615�block� ��aliz�teg����-zero bef��wri��it�m�Ma�i385�ii�� u���� � �ur��_�- �_�_fault()�V499�V��T��: �&t����x�� ���> �O5018�O����,�� �do����&e�U��n�_���"ctx h���b669�l��: avoid�t����und���Sq�$c_pkt_len_�̩�[ UFO�\�9�nft�y�~:�Ӳ�f��!l���S����kb_���=�}��51��k� ��qVirtua�iviron�w(v� ) �8�3�~�=quot��th�K 9287)�[� v��d�}IPv6�ӡFu�x�e� 1168��v�t�L��Qr�h� �W �T�004�\�c��: �2� ��h�����[���X����3 s���s�����p�;�HTTP, F��eLDAP���}�2� �~��j�8 explo��a mix�c��flaw��3��21����SH�� �]�������"a numbe�L�? UNIX��s���� �rIt� ����7��� ���%�bo�4�����Tsh�(��4 t�r�at� � Bin�eP��@P��(BPP)��87��*��n�T����j�r via ���vme�h���P51�$ �3��ki��\.11�/ �81�� ,�We��IBM C�N�),��4764�Ρ5�7�j�������X��}�G58�e�vCo���s�&(���firm�F��d)���JeS�i�M�Jl��MFC 4960�m�1S�p�L�D Exp��2�:0863��� 7�E�=z)�ߧAP A�s��ĔF�����V3�V�K���als��$��oft��#en���h"b��|� �����TSl�Daem��pkc�o"otd�ge�e�?��%���-���1SA��v1.5 ���iphe�x�%Mar�c�&091�"��%s����O�X!��XML�cu���pe�E:�3�,%�/s�t��&ger�dd��$�����_�'242�x�N�zE�w�l��n�]�~�V57)�"l�C"�X�Ϊ��= br�� ���m�f"��", b���� �to��v�7��w���@�M�e�'�.�Nn�ʥ��� � �8�=r�jput�E�'ar�"��so��Z �*quickl�&��d�� ����w����: ����������LESSCLOSE� �d2-�2���� �)��(83�3*�N���B�|*� buil��/v�sf�@!�M�him���8� st-���UEFI��$�C�6s�0�/t���!��u�f�3����(%�T�����ECE��http�:��m�l��&�?e�%��� 054��P���o)�E� �)���� ify_sbat_�A �32-�s���r8�rO�U�nd�n,a�in���'���C6�C����_�����mal�,��PE�t �]9�]�\���$�B50�B���d whe�}�MZ b��i���i�7L �cL�c(GSM m�;ip��,n�aac��di����k"�t!l����#�k�Y�U�)��$!�1�, �R3��%�4133�6932�,9198�51�*�779�80��{5�26582��B�+to�[BR/EDR PIN� i�p� d�B�9 �ka���)on�N��0�l5�memcg��"li�[���;�J1IX� ��sl�me��ha�O�2-0480��NULL���2 der����2-�J19�6622�15�2754�6� �257��841�4�»�y�kl2�$_�k+_�1�r��b��/�#�J c��459���a�#_�2s��K�N�"_ne�_��604�|GC'��'�<)���� SKB���%unix_�S#e�!�_�� ic()����o UAF�31�hO�\��e��p�9�Wroup()�%� l�0�S0�)ev�'�_s�$�u9�u�3F���C���Sy A��� D�tn��%4��rdma����&�;577�YK�;dou����ci�+n_c�Ln��vb���2���W846�(��: HCI: glob� �)���sync��d86�S�b�?*e�!�pUARTSETPROTO�I�G���ua�4tty_ioct�*3��f������H745�y�89�9��12������ IP��_CMD_ADD���SWAP����U�/k�����f�<_�_�� �D�[586�Csmb:���9OOB�(mb2�1���+�5��mm/s�1���V�in�a��n ->u� �V8����C��tea�����_pe�Ndic_��(Ŭ52�8�F��[ �?�A�258�V���]dge:��/in�-��"_�h_f�"_f�t+hƯ78�]/�:��� �OETH_P_1588 �d�P �^�î0�Psch�7#�f _c�d�<����%ooo ��g�61�SCIFS�� �j�De�j)�I�,V�!R����Co�E��#�V�y��f�r�W��_�ed_�#d���&�V���/����/����a�������so�K�C�n!� 3�L�o�X��+g����� �9s�G4֔�!�/��u��՚� lxsw��p� ru�,)l_tc��F���� c�a,�K�i2c�801�<�n#�_ ��a�t�ha����9�}��/m�ar�7 �@���&e ���� �F n�;_�/�]60��� ��1 QUEUE/DROP��+t�� �&s�W�local�s�%���zt�@walk�,pychunk�*617�O�/x86/lbr�R�� v��K� ��D���U'ime�m�anonym�l��#��2��ip6_tun��NEXTHDR_FRAGMENT�b���,nl�*tlv��_��y#�O3�w+ �Ad��� Ch�g=��֤��n�./�'�Xi�l��;,�W��Alma�-R� N�s �;�w�8͒ Squ��v���7mp�@�-on�� ���r� ��30�/m�%pu�c���vfs�U���,-�W ��un� #�ݡ?�Y#���'���Gdesti��R1�b1�5�]�&D�?���������ymb�S"�`�Q107�/���g� HarfB��=�&�e��� Ty�23��i�?�Mh�Rb�R:�4����O(n^2) g�#�!��con����>��2��(��:�Avahi� �DNS�\8���0v�_(� M��#t�#���Z��+C�<�T�8i�q(I�ac�at���dd�d�/a��n�7�}A���~� -a��8����|l�6���A�<��2�R�K,�/no���,��ew�peo�to��t�0��O�٣���fi� har�E�5�P����a����,�3�+��)r�Fin�_dns_�et_ap��d_�l'��&3�i46�n�O�7_label�C70�Cdbus�,_h�w-��/�C1އr� ��B2�Ba�t ��Ώ�=N�exfat��)���s�����'n� p�exFAT�/���k:�w�s�r�C�H��z97�<�_,�H�Q,�un�=�"�O�Nan����Qsp��E 23���:N�*L�> �Ak���?J�<�S�~s�M"(�:��&�g"�d"�-",�h$a�T -�G��2� '-�?�"y �"�f��*�AES-SIV��&�z �/a� ���'��=� 5�j=�Zempty�oci����ent��29���~Ex��d�� nt�l4��DH�fys�2� y�:4� ���Oq�H�H�1�#!��G�a� �Xly� n�'9.42��or�e�*���!b�G��2�. ���;8ÎPOLY1305 MAC��s�I��r�?�� P�KPC�[�9��i��")p�|���P23�;��'�V n�#���N�=���&�J�-��-����1g��,ab��,b��� (pse�tC-)�#*�10��$�Q�$�ca�es/ntfs��%un�Gc��e��� 692�]�N ���\�8�AY���0?���-�H �� �F�n�63�š��7�0�/V�7LSB � ; �`8���s��Qgr��O� =�K�9p�,� ����RD-Bus���8���r,�泌s, o��&�;-de��2�#�b�/��keeps���^3f��e�5�fc�!��n�����,��9snapsho� ��q���P�Te� F�m����ao� �$��� ��el���R�a����y-�R��!�ic����-�� d�-���G�VH�Yysv�����/-��olv�]U��$re�% ns��zone� �S%�U�n1�c(D�oKEC=ye�7008�@ ��erout�y�-�I���;IP�)�o��i�� t�/C����(���+�) �1�>��:���2�6lin����316�<�l s�^!� �>3�0�<�a9�K�45�N �.�$�N��:��8xyC�/�J�C��Rs��8�bma�����th�W�?�~�60�|Z�lMi�#�EA���B�` ��K�� �Y)�A��%�:s�Zden�"����-�G�[t�^���A�T�q���R�Adif����4��A��#�3L�ϣF� (ELF)�/�}s,����ARPM�u ��v�z3�o�1�$�\:��"����0-�/�%�!�o�unc�\�55�E�>�wpa_� ���� �d�y80�_<X�IQ�%�=�;WE�@WPA��Y;IEEE�71i /��N)�W�W@E�c)����I�k<y�key�goti�'�|a�h�fo����� i��P�T �,a�:���ƌ��a���WLAN� i�����P�5�b�d�J�5452160�A��8��2��8�?�x�DY�?SSSD) �� �U����e���^t��2+d��$i�7�K�����A�����g��N� �!S���A��Y�M�!�l��I�Q1����ha�-!�J�&+-end��=��M���-����s�k!c��sssd��/�}�l�?6GPO��a,�/in�.$��ntly�@3�wB)�}X�{��JIRA:�Q��a3*�5ss�hc�To�"�P:a�et�P�QH�=816�� �I� �s72�*���xml2�� ��[�3box�Y���#��?�-� ��u:�7�t�?Re���5506�W�m� � �3��!�;n9�C��,�������4d��/�u���=�U6�743 h�.am��Ins�.�ra��P#VC�nN� �9�FAMD-SN-3�,�L2��`,���ffdhe*�:ti�:i� �s.��0a2e5b909���B.fips_�Qed=1 l���@"w���9cy t��>��V�3mglru�I-u�1>�e�OU�Rcache�B92��B[EMR] [TBOOT OS] SUT �ld�1go�nS�i�s��9.2 T�OS O�>CPU ��-16 ��WBUSYɄ6��$����F ����t� - NMI���v+�E30��E�g0� :6f:00.��WPTP�� ��get��C1�k2 �l�Tf�m/�I*��7d�h�unbin�Z�x/��/�664�$1��/�V���[� "1�3�]Sl� 3��4�^ ��;in���E�Ļ�s�m7���S0�R0�.�9�1pe�Q�:m��Wm�+�N�m��gl�~N��d�4��F� �/���<����p�),�Am�R7�%m�X�i�:�J��� (nsc��H�#��p�9$o���tW�o$se�q�����v�0���� l�"�)�_;�in ic�l ��2�zISO�r2-CN-��1 �9��S�e��<������F33�T_�G�7 � �=���n��Oin�) �Y��Y�2ma�rm�B0����'l��V�r�L�Z1�Zas�\s N�0�3�� �K#n-��x`�4�T��ng�D�-o�$� ��Hyp�kK��p�O� (��Q/2�(%�{C���y�p8ONTINUATION �N9�` oS�P18� �4K�](�U�1K �S�8��r���+K���KOS��Q�f2487�'ipv6��r�{=� ����-ptr-���7�� �Ufs:���F� >���9in�_br�_�� e_�0��S89� #����c-a���Odefi�a�<h�RJ�� � 3(Dom�����) �a<�����n � ���S�N�~�.�6�_�C��56�u(�8��`�HC�pi�v6�e�!�k�X��/� ��#a�(b�}�f�g#�c�3��j�=��u`�o+st���;`��SE�itr�Dsho��O�7ter��-� �Wu�%������:� 9��E��sos�����f�J�<� 4�Qhsakm����e��=���C���EH�2+o�,���3A�'�SA)��� (�Ekfd)���yidna���*��N��sum�s�:�!�,y������L.en�L�k6��K�'v��;��}.�B.T�o�3��;�t�OH�\3�G��zi�8�.������e)mbs�H��T4�J� N�wc���\�.�#���m+du���E���3�e�Pnl��@��63�)4 n�TF�vD5e�� �p�Ed�� �v2i�v5�!time�m�o�/*i_�l������B�B��JA�f�5�eJ�R_� �{8 W;01) * kernel: crypto: qat - resolve race condition during AER�!covery (CVE-2024-26974�Uxen-netfront: Add miss�Cskb_mark_for_�Lycle�K7393�K�G/mlx5e: fix a potential double-free in fs_any_create_groups�[3-52667�[smb�lie���]UAF�I�2��onnect_ser��()��35870̨: Properly link�w�� rules�\to the t���O96�O: hns3:�� not allow c��_nic_�%_�mn��p��dl�1-4740�V Bug Fix(es): �hci��-�o pa�N with�_pu��mb���DJIRA:AlmaLinux-2894��BUG: unabl��o hand� page fault �� add�Zs�cf16bf752f593ff8 [a�Tl�T9.4.z]�k35672�k[HPE �& ��] Request mer�lof AMD�i�^ansla��libra��patch ��i���x6220�x�9]�/�� �4�\/list_debug.c:51!�\68��ic��DPLL-rel����ݡ716�DCNB95��sched��pd�L TC��r���t�m v6.�y764�.IPv6: SR: backport����m�X�S69�TRFE] B�Otmp��noswap mount op���U825�#I��D��s�,u�w�~u�� ��5���O�ұ��gfunc�y�8as desired.ۈ595�ީ�]�autom��c VF�bet��Tx MDD ev�|��9083�MC�»REGRESSION] turbosta�@� brok�'�z10+ sockets��495�ybnx2x�*crash�� PCI err���6,�Jur�Fleak��432�� F�Gm��details about�4sec�ty��(s),�~clud��� impact,�%CVSS s�� cknowledgm�l,��o�/r���-in���on��f��O�H���j ��)�R�#enc�se�-. O�SSH���b � protocol��le�~�sup���Oby��numb�r���, UNIX��similar �R�;�Cy��m��It��es����fi�g����bo���!�����_��. S�\�' *�unssh��o���remot�kde ex�3�"�ba�:�Lignal� aff�0�P���6409)�x�� T��Tck�7s��Ȥ3���!,�������. � �����2TIPC�����ssemb�use-after�+ ��vuln�tbil�b�688�e�ge�7�is�/����_dsaf_�� c� �;array �@ f����/ge_sr�Fby_��l ��548ā� �c��bug�\clgevf��nd_mbx_msg�V9��v� me�}��lapp��when��le��char���buf�,�Y2-4862�j ca�"j1939:���Madl��c�g�Y�#_�s_���rw� �� 3�mm/vms�f�u��+ ��akeup_k�\d�[�� a w�g zon�?dex��7�n�s�Use�>�%b��i�,e�B� PTP WQ xmit��b�on� ck��oc��s ���pul��Mm���a�'pÐ85����B� f_t� ��us�ime��mp��� �<��ze��"�S�a�|7�avm�w� ��f������Ad tag�c���W435� �ena:���orr�[�jcri� r ��ehavior�)�tcp���c�9 _�Q_��_zero�cp_twsk_uniq�7).��90�� �� �( _hmm.c:��src_pfn��d d�����ur��854�Ir8169����b�I�u� �Rra��cTx�R��a��`micr��gr�iv�c��¡cme�#lan8841�^� ��yt��xy���Pif�.�/s���2is��d�ɢidevic��+� octe�0x2��: avoid�f-by-��r�7�y�{spa�O95��blk-c������d�K� ��io �1 �663�z� � � Libndp� �(�C� NetworkMan�Pr)�E���vi�_ �,� er�$�a� �4ighb�Dis�P�� � also�Dto� n�k�idp� �n�&���NDP��s�� l��:�9�[r�����<�ng�field��5564�t �_firmwa���| �8�e �B�$�.��r�T�� �variou� ��s��� e���oR��i�'g�� spon�Zm� �sbe ��*i��ize�3-31346�Comm�����(in�oS�� ��UPS)�-� �Yp�*lay���( ��c�: C�d�M�*n�bit�chmod 0140777�~2���Pyth� �� in��� �3,�a�&v��obj�1-or�,�Q��g�'m��ngu�p,�i�V��6��,�c��exce�g��!h�3�ve�D y���� type�Y���l. ���5�F��a��m�7 ���� �C��i���well��.��w�� ow�(p�}:��� �4�d���v�kr�es�,4032�'�b���k ull� ��Ar����i�) l.c� ����ogic�t�B�z�{e��Zgn�[524�Pext4�w �� ng�M���= �I�W ���5_�1try_b�:f��m ��U 7�J bp�� � ac�d��7 �_� r_�� cel_a�������c3� dm:�6���{um�f ho� �Y�suspend�K88� �ip����;ip6_�y_m�ph�ify�8��USqu�Nfs��� ��n��is�&�v��d �u�h�8�^98�^nf� � ������>��s����}���{ sepa��^rs��[�(s�O3�Uicmp��SNULL���|�-_build_�be���b�bige�����irq�;�NAPI �~�s0�Rsto� ��.shut�_nĚ8� scsi�mf�d�������fc_l� _ptp_�up���8�G�h��c��_���o� �Ī�rx_k�p�]�,���`�X5�`��p��Rel�}�ba��ef���$_�l���_þ�� 24�]Mov�PIV'���@unregistr��to���c��n up�h5�*�9amd-xgb�۪����aund�e�I��7��epoll:�� b�Xer��q��fe�����d�E0�/ph��6����m�iple�aws�6808, �7065���99��e���?:�R2�awifiԄ97Ą52�4���51ä78¤�4��4��937��941�22���r���6�igc�!5�Admae�e/idxd�,182�,��R741�����903��6�,"��5ǂe���!��6sw�#�eep���$4�<�5�!91ŭp��/x86�*�6�\i40�M602Ÿrt�<l��!�'1�1�x���7�t7�G�V606�W5���2�5��pvl���t�a��1�!7�e!��ir���$��tls�48�uxl/�ođ839őbo��%948�]n�r� 8�3���1��2� �����7�����n loa�����. ��s � !��s�HTTP, F��eLDAP�>r���0/2 push h��g�-��239���� -�t �s���c��,��enh� ���x��d� ib�~��i�=��%���5��������7�^�N�;��pa/��� �ia�H� #���d_�/����\�6345�'nf��� ��_rb�;(skip �� v�/ ����gc�z6581�I�;t_li�:�"����figu�I��I%e�lge�g�d6��vfio/pc�L� � e�hINTx�s�p� 1� ����._brid�V ��� �%/�*�*so�!�x���o�*p.�^�%�^�r�m��� �}gc��q_�ͫ�ab�� �>�e25�e�%� -�#�__�nexpr_�l�u!t�7��$c �;�b19�b�S�c:��i��(p��e�\�H6�H��:��rm� cas�V�@�pa�,��m��tack�j415�j�+l�� s�v�f!����A����a�� 3��x�A�~� ��di�L"r�� ��� g�R*���ba�$h��#on�l7�l������p��%��ec��n�O��co�c'�O�X��]�I96�v�a�LAG�J�)�de���Yy�Y�*_vf�00�� ���� e���T�<v�;r���ҦZ�77�ty��_gsm�x� CAP_NET_ADMIN� t��h N_GSM0710 l���X���hqla2xxx���z ��&$�_edif_��^�* s� � ��;$�Qnet��9�/�J�@86�P�0bcm�.��ar��me�_+�A57�ORDMA/rx��eg�.in �_�=_�ue_pkt�J4�c �+t��shif��d��[�#in�*qp�_�c_�a_hwq�a���Xx�m�(�re�� �`e�~.e��e�%�l�:yt�X�-&d/raid�2.���&����%&ai��itself�Q�Cr�,_SB_CHANGE_PENDING�o9���\��k��#�fib6_d�41_pcpu_��O�� �b�?cfg8�61�_wi�k�R���_�e��O�,�ac�O�����eee�Rs�&ps_��iv���^�[�'hug�� ��1n'�5��s������6lio�O���iwl��v���8n_�^�r ��acce�� ��Y2�u�^w�Aio�\� �� ��l �gi�_/s�� �� �{3��!'�h�������$p�ۢ�mfua� �J��[4���ܶma��%�����*�NF_HOOK����End.DX���6���5�`�4��0�/���e�� 2fs�� e�R7��'ip�@+�N)a�j'���'��do�V���)��-��tap�5_�sh��1�'d�pa�&#�5�&41���Uun�%U �u��$S�)SOCK_RCU_FREE �zl�h*in�!_�S���/,�Q�NFSv�����*�� s4�W �_label�N����ntb�C:��_�?�()�7�u�����__��o�f�vm�q�N-���,�:o�I0ctrl�q� s� ish��c�v�7���3���<�!����6��+poo�0� ��POST �/i�T�v:�oxy-��3h�/#z�� �6�����I(d��cr���e#gi�2di�b"���1��s$c�t$�em�R��doesn'�*�i:quo�� �k:l� ��0�,�U��n�h�6�a3�gKerbe�Q�i�r�g ���3�=�|�Gc��m�0�o���y�;�E� e�)n����n�-�o��c� ��+�s�8ds�/�/�J��n���ed ���0,��s�5�T��� ���|0e�� �G���ahelp�y� u�-thir�M rty��#key�Mce�� (KDC)��*rb�7G����*t�Y8�� �$��3 � �Bub��2. (/usr/bin/b�)���" �t���l �r�-l�g��:�d��� �;s�Sa �li�l���4n�,s� �)��k.�!0�if��pa��A�+���s��0s�s�&box�����Gp���nt= (--���4��9��G�40�L���l�M�� (or� ���-�����l,�tC���]��_�0�-GNOME��m�qlo�w%�X:,�n�*�?�j<f�"������ng��c�-�s�6ctur�1g��2���9��5�4� �D8����4�]5�%�Z�C�S"f�RO���9u�/�Q�3 V�u��m �i<����*��3�afsd�`RELEASE_L�{ OWN��C�����0m�[*ch�i����9�"�'�Vlk�S� )�.�$e�l@�5di�*� 5�.1 wb_dir� ���� g���b7��B�;*�t��<a�� ��B�;k�{)s�_"�*copy�_�"�*�b��5n��:e�B�d9�h*KVM�i�Fl�cp�s�' kvm->�o�(�Dvm_�Q�e� 8���"�&� �� �>m�P:s�>��Cc�S �Z�see��R� �RDRAND�CoCo��V8�J%�=tlb���LF��&;���Nv��;��S��i��uf��F�P����do�as_i�k�spli� 7pt_a���S8�\Gn���-o�7�.s���ops�ê8���m�ap��_�Hc�7in�&�_�'�O��xusb-s�l:a�ealaud�:C�G�\�A�l��a�O�,86� ��ms��$�=9��V�c-En��Spied��6��� �N�ŗ5�+xh�H�t �ED���Ѳ=�%��D���O�-��=��$�[� �Bi����'_������]��E�T�����I��a��h�F�����7��lai��-as-LCP but a���my�Wl�e�"��V�{�#�>�Ln�0�t��<_�4_���}�BD/MSI��Dmsi��0p�@�(�6�7x�6��"�� WARN�gx�.�{�_mo��p0�00����.p�r6��g�N��ro�%��JƕRe� t ��4;�2��I�s10�o�6<�!���N�B�%t�.�'3�J3���?�L�pK ��s���pay�)$���2�[Expat� C�z'�'par�-XML�cu����;e�H:�*<ga�� L��P�FV�wCin�2�R54�y�NI�#O�#��Wra���e�;1�;��#�-� ��FL���&ki�����- �l ���o�L�]:(�:)��T�\1���(TL�:t�A)��a�g ll-�D��ge��l-pur��e��g����W�=�~G��&�I�X.509����~'1��%v u�-��in��yO�k�W � �#��a�JPmirr���'t�r�b� �'� we� �*y�s���3����7�dAR�9��"/�f�'�i��>� is�B�>or�-m��F������"�:���v��c�=�<'�K�X�K�_o��ha��vp�F��X0�X fc���E��f�i: d���?(�% �vma �ql� is�����P'��� �) ��hD��l��%&��(�>��P/pf,��M�;P� �� v����� �_���I*�]�v%� �~$�����V�"0�KSe���* gpio����T�w�~ �w���_�2Ied�a:�Y�4�Y�W"f���;i��� ���fPal�A�����&-�eC����L�;�����J�r<���$�cppc_���W�J��<�P5�O<�b 2�H�&(g����o��hQ�P�N�!nl�#A�=��Gc�I�U�9.�Tof ����K�+.���g�'I�'�y����%a�5V�'�����o�</��<���f��&�ACPICA���� I�\�m��BAR�uHY��K����.��}!��#�_$�3E�i1�ht7�V�*�tW�@��_�4=422� �',�dnr�"Re�EPERM���#�K�L �xs_�oJ�0��Let�j��D�{ l�uqFhw:�;:IOMMU����"s��r��� �yl�$t�Qloss���F�$�� �O205���w �xn�}+��f#�t<�ASEV���k�AC�4�p�F5�+�$� Lo�C����-��u�_n�Dl(R) At�s)R�����&3��Y7�n�>2�_�&,� �w�x�&i�J���H�gL��C274�C-��L�b[B��e����ch�r/�����4c�Q�cy��3<�s'�o;�"�p;�Fo�2�#rmm�3C��z\CPU�g:��9� 9hwm�9w83792d)�[��2�����u�b�5ry� ��K�::3�[Amp��9e�9sn�* x���� �����������_� �� OOB ����!_t�� � �(���9Y�Q�c�R��t�-�Om�L�2�[85��:�J���vNMI + ��#�/ f�s��xr�6$t�4���:�~=o�?]�� n��'napi�0,�95�xfrm6� p6_d�C�ա8re��n��D�b�+��,���R�� � 55�%_�_�� �Q20���ct�R*ke c�5f��d�}�p���cTs_ht_�q"�W��Y�W�*R��n��'������ _�)��2�_��on�Z�Z��e�6' � ��3'�D't�:i�<ReDo�b���ve��^�V�-���+'�}�T2��K� �v�U��. �����Na�Bran��Hi�y��(BHI���a1�.���+san�q�sto��3�J��A66�'�&���re-�)�@?tale��"��:82�d�L �aW�vg�OPag�6� >or��K���U�p()�T�)á�75�.���6ec �I���G���Z:�n�-_�(�r�}�b��C�4���w�6�H�Jc�0h��,��r��?���W��X�(�F ��9�5� im�(bl�����"�N��0r��U<n�+nimum�o�Lr�/i��t�Zt�=�qf����C��x�i#�kog ��f�dU���N�F�l���8h_��8�fI94���@inn�9��a�h�[��h�BŷUSB:���Dc-w�M�~� �3����=�o����jV�D0�Z�T �e�T ���~�6��L�)rt6� �L40�@g��O�;g�h EA�B�"�A#����#�3��V��G��dhu���) �-ch�?� 1i�_�;�&�0 �Pinf�W��o�Zcf� r_���[8���� n��`�c�+7e�S$�__��P��l_��� i�k���K�|�(c�b�_�gB�$���P1�TJ��� 6�D&�:�}�������Q�V13�V�?�k�g�2x� ���r�_�X�R�:�u���a��J�p�\�� ��5�) �/���n#�b�:�=�1?�qse�����_��O501�3G�[�!�Y n�d/�"�lm�(s��d������t�Cp��/o�rep�����:�.v�!�avail����+���"�+�o���UE�n�]wi�s�tmob�x �gadb��(WWAN��!�PPPoE���#�:,�TVPN�g���a�Aet��0dif�Ft�+��I�d��~S��765� �V��Ad���C�bs��֤��n���'�Xi� , se��i�RN�3�Ye�*��Co�#kit�0bb����/�2d�s��GNU/�`��Ia�*b�Vw��m.o�s����E,�in�&��gn� �� re�� ,���itr�V��9o�-��-� s�* ����vc�����2d��0�3ki���������pam��*v'�*_�nv���1��@��8�5� '�V5M��<��/�/�e/l��e�/p�_rmt�H�Z�Fg�pi�k5sealv3�N�S�Nkdc/ndr�=2�B��'� ��'Un�ed�4gr�h����^8�[��v1.3�t5�D�UE��y�.nt�DSA����ZB�06���s��� F�v!���U��]_��A74Ɣ�-se�A�0@xt_�k��e�Z2�B55�b�?K�3�I�*��a�0ic�ZZ�9k�d'�gl�աw� s�Z8�B���?mo�T��� �V��75�V:�R �,�y��O �����Xl � = escal��[�w�� Xe�X3R�3�,6�f2�F!�Xi���PR�]�U�z'�3��¬P�N93�S��KD©��"SGX�q�e!�g��&�����43��0���-�$��&���7��4�)3�QUn�LP�M�PC��(TM) Ul��_61���c �tional Changes: For detailed informa�& �c�'� this release, see�e AlmaLinux R� Not�0link�Nfrom�'Referenc�sec�^. T�libgcrypt� rary provid�(general-purpo�Yimplement��s of various �Aographic algorithms.��Secu�y Fix(es)�� *�{: vul�lbl��o Marv��Attack (CVE-2024-2236) �2more�7s about��s�lissue(s),�<cluding� ��act, a CVSS sc�G� cknow��g��s�nd o�/r�sat�,�f����R�� pag�m��s�,�v��Addi�z Vim (Vi IM��ed) is� upd��� �8� vers��f�Pvi e��or��vim: heap-b��d buf�Bo�Mflow�il�=��1-3903�B���bluez p� a�hcon����fol���Aut��i�f��u� n B�9to�- applic���ci�l,�a��h� �Yfig,�p�6d, l2p�^��tart��ripts (��)��pcm�J �Aur�f�/�]� q��: unauth�z�HID�nvice�Pn�s���s keystrok��j���arbit�comm�s ex�v� ��3-4586��{�Z: A��o Pro�� AVRCP I�Gp�IValid��f Array Inde��m�� Code E�hV�!3-27349�v��phon��ook��s������r�tc�t��v�t51596�tOBEX�D��-of-���,rea��disclosure�`4�`a�L��avrcp��rse_m�a_��d���2z 2�z e��3{ 89�{�m_�m�Qribute_�s�4n 0�n��s�y�2(44431�^��0�`t 29�F�pyt��-dns��s�8��|�wdul�rat� s�NDNS cli������2s�3defin�Zer� symbol�� c�&ta�Ju�)y�P��uc�s�}typ��class�d�op�=� �&��:�~ni���ser���tub�Qsolv���948�G tpm2-���ps�5�(set��� ��"��+�z��Tru�P�;�� M��(TPM) 2.0�s��us�Ms�v�9��:�qu��Za��y go un�G�ݴ��5_check�)�Q4�Q038)�Zpcr��l� va�R� not� ��Wwi� �P�e��T�CGNU nano� sm�� �fr��dl��ext�� �E: runn�p`ch�`�K�own`�̢��2name�2ma�����Zreplac�ݹrg��y�7�#a�3�^��6a r�-�k���-�A5742�B@Bub�rw� (/usr/bin/b�� �%�eng���unpriv��g�e�� �Eworks��,ui�vin�n�d rne������7�R���2f��pak� �� ��� � sid���box������p���nt= (--�)�c4247�d P�H�interpre�4,�a�'v��ob��-o�(�R��mm��l�qu�q, w��h��es�( , ���excep�y��y high level dy���9 �� � ���l. ��support��t�}a�թ�Uy�%��m c�r�C�ei��a�He��.��d��;�U�} c���V:�cDos�a��ss�< b��tr��_�"le�� h� ���!s�\623�[� C� ��UNIX������S��(CUPS)�@a ����p�*lay����,�I��simila�~ pe����cup�F�ppd: � � �����k��r��ed����PPD�v�Kerberos��net� �e����\��c�.����� your�E�? elim��t��n�-���_��n�p�*�8ds�V�/�J��un������. It�Z� ��� �]o���,ea���H� help���x�x�<rd��ty,�"�#���)�X�ce� (KDC)��re��diu����g��c�3�(�RExp�Qs���y���XML docu���6�>e�N: �DoS���C_Res�CP��r� 060�B� �T�u�� �!��� ������l�K:�t�x��p:�g� al��m�eld�d dump�å(��422�m�Si�euf�uRequi��ri�������a�l_inv��e_�� �]6824�]mptcp�|�7�� uaf��__ti�U_d�� �Jsync�F58�&